On Wed, Aug 30, 2017 at 08:49:20PM -0500, Scott Cheloha wrote: > Hi, > > In the one-time password case we want to wipe the hash itself > before exit, right?
Yes, clearing s1 there makes no sense anymore, it was already zeroed out further up. ok tb > > This must have slipped through when tedu@ patiently rewrote > and committed my botched patch a little while back. > > -- > Scott Cheloha > > P.S. I didn't botch it this time, right? > > Index: usr.bin/lock/lock.c > =================================================================== > RCS file: /cvs/src/usr.bin/lock/lock.c,v > retrieving revision 1.40 > diff -u -p -r1.40 lock.c > --- usr.bin/lock/lock.c 8 Jul 2017 22:27:17 -0000 1.40 > +++ usr.bin/lock/lock.c 31 Aug 2017 01:41:09 -0000 > @@ -211,7 +211,7 @@ main(int argc, char *argv[]) > } > } else if (crypt_checkpass(s, hash) == 0) { > explicit_bzero(s, sizeof(s)); > - explicit_bzero(s1, sizeof(s1)); > + explicit_bzero(hash, sizeof(hash)); > break; > } > putc('\a', stderr); >