In article <[EMAIL PROTECTED]>,
 Alvin <[EMAIL PROTECTED]> wrote:

> txtPasswd->value("XXXXXXXXXXXXXXXXXXXXXXXX");
> txtPasswd->value(NULL);
> 
> By looking at the addresses of the value_ and buffer members, this seems to
> do the trick.

MMmh. I think horizontal scrolling copies the buffer around in some 
temporary buffers too, so _that_ zeroing would be partial.

Memory is cleared by the OS upon allocation anyway. Memory is also 
copied around the swap too, unless you take measures to force the memory 
to be wired. And then again, if you need to pass the password to another 
process, all that kind of handling is almost pointless. There are too 
many places were your password was actually copied and maybe still 
visible.

> Now that I'm looking at the code again, is this actually correct? Or is
> there another procedure I should be using instead like storing the the
> value() as a non-const and manipulating it's contents. Something like:

If you handle the password yourself, in your code only, force memory 
mapping and disable X event handling that could capture keypresses 
(coupled with a special exclusive keyboard driver), _then_ I suggest to 
take some small effort and implement a secure input control yourself :).

_______________________________________________
fltk mailing list
[email protected]
http://lists.easysw.com/mailman/listinfo/fltk

Reply via email to