diff options
author | Micha Mutschler <micha@etezian.org> | 2013-06-30 22:18:31 +0200 |
---|---|---|
committer | Andi Shyti <andi@etezian.org> | 2013-07-01 02:11:16 +0200 |
commit | a5d8be91b53b0c955fbed51ff4ff6cdf20f0c4fe (patch) | |
tree | 1d289366074123e66a9fd41bfa0b5425caa65a79 /src | |
parent | 697c78cd628f9d4241bef1c88ae0aa86fa31216b (diff) |
Fix memory leaks, security issues and compiler warnings
- free unused memory buffers if not needed any more
- the password should be cleared from memory asap
- the return value of scanf should be processed
Signed-off-by: Micha Mutschler <micha@etezian.org>
Acked-by: Andi Shyti <andi@etezian.org>
Diffstat (limited to 'src')
-rw-r--r-- | src/crypt_sha256.c | 8 |
1 files changed, 7 insertions, 1 deletions
diff --git a/src/crypt_sha256.c b/src/crypt_sha256.c index c99cbfd..eff5eac 100644 --- a/src/crypt_sha256.c +++ b/src/crypt_sha256.c @@ -17,7 +17,7 @@ #define LEN_SHA_STR 9 #define LEN_FINAL_PASSWD LEN_ENC64 + LEN_SHA_STR -char* get_crypt_sha256(const char *p) +char* get_crypt_sha256(char *p) { int rand_fd; ssize_t size; @@ -32,6 +32,7 @@ char* get_crypt_sha256(const char *p) rand_fd = open(RAND_FILE, O_RDONLY); if (rand_fd < 0) { fprintf(stderr, "impossible to open " RAND_FILE "\n"); + memset(p, 0, len); exit(EXIT_FAILURE); } @@ -39,6 +40,7 @@ char* get_crypt_sha256(const char *p) close(rand_fd); if (size != LEN_SALT) { fprintf(stderr, "failed to read from " RAND_FILE "\n"); + memset(p, 0, len); exit(EXIT_FAILURE); } @@ -49,6 +51,10 @@ char* get_crypt_sha256(const char *p) memcpy(passwd_buff, sha_pwd, SHA256_DIGEST_LENGTH); memcpy(passwd_buff + SHA256_DIGEST_LENGTH, salt+len, LEN_SALT); + /* clear plaintext passwd copy */ + memset(salt, 0, len + LEN_SALT); + free(salt); + EVP_EncodeBlock(enc64_pwd, passwd_buff, SHA256_DIGEST_LENGTH + LEN_SALT); |