diff options
author | 2011-07-05 19:38:32 +0000 | |
---|---|---|
committer | 2011-07-05 19:38:32 +0000 | |
commit | 458db0aa85ca5c9dd5124f6b9f44652d62e8af76 (patch) | |
tree | 31a24fe3fb1ff7b079045bdce7a25a1cfcc7e297 | |
parent | ENOMEM causing EIO errors is bad juju. Softraid crypto did this. (diff) | |
download | wireguard-openbsd-458db0aa85ca5c9dd5124f6b9f44652d62e8af76.tar.xz wireguard-openbsd-458db0aa85ca5c9dd5124f6b9f44652d62e8af76.zip |
fix an incorrect memset use of sizeof
found by jsg, "looks right" tedu jsg
-rw-r--r-- | kerberosV/src/lib/krb5/crypto.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/kerberosV/src/lib/krb5/crypto.c b/kerberosV/src/lib/krb5/crypto.c index 704dadec073..67750f63fa9 100644 --- a/kerberosV/src/lib/krb5/crypto.c +++ b/kerberosV/src/lib/krb5/crypto.c @@ -505,7 +505,7 @@ DES3_random_to_key(krb5_context context, DES_cblock *k; int i, j; - memset(x, 0, sizeof(x)); + memset(key->keyvalue.data, 0, key->keyvalue.length); for (i = 0; i < 3; ++i) { unsigned char foo; for (j = 0; j < 7; ++j) { |