Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 18 Aug 2014 03:06:50 +0000 (UTC)
From:      "Andrey A. Chernov" <ache@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-stable@freebsd.org, svn-src-stable-10@freebsd.org
Subject:   svn commit: r270125 - stable/10/lib/libpam/modules/pam_opie
Message-ID:  <201408180306.s7I36oie097678@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: ache
Date: Mon Aug 18 03:06:49 2014
New Revision: 270125
URL: http://svnweb.freebsd.org/changeset/base/270125

Log:
  MFC: r269875
  
  According to opie code and even direct mention in opie(4) challenge buffer
  size must be OPIE_CHALLENGE_MAX + 1, not OPIE_CHALLENGE_MAX
  
  Reviewed by:    des

Modified:
  stable/10/lib/libpam/modules/pam_opie/pam_opie.c
Directory Properties:
  stable/10/   (props changed)

Modified: stable/10/lib/libpam/modules/pam_opie/pam_opie.c
==============================================================================
--- stable/10/lib/libpam/modules/pam_opie/pam_opie.c	Mon Aug 18 02:45:06 2014	(r270124)
+++ stable/10/lib/libpam/modules/pam_opie/pam_opie.c	Mon Aug 18 03:06:49 2014	(r270125)
@@ -62,7 +62,7 @@ pam_sm_authenticate(pam_handle_t *pamh, 
 	struct passwd *pwd;
 	int retval, i;
 	const char *(promptstr[]) = { "%s\nPassword: ", "%s\nPassword [echo on]: "};
-	char challenge[OPIE_CHALLENGE_MAX];
+	char challenge[OPIE_CHALLENGE_MAX + 1];
 	char principal[OPIE_PRINCIPAL_MAX];
 	const char *user;
 	char *response;



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201408180306.s7I36oie097678>