On Fri, 7 Sep 2007 17:35:16 +0200
Charles Longeau <[EMAIL PROTECTED]> wrote:

> Hi,
> 
> In this patch, I've tried to spot fgets calls which return value was
> not checked.
> 
> Also, there's no need to remove 1 byte in the given buffer size (for
> the last NUL char I guess), fgets already deals with that.
> 
> Best regards,
> 
> Charles Longeau
>   
> @@ -362,7 +363,7 @@ int des_read_pw(char *buf, char *buff, i
>               fflush(stderr);
>  
>               buf[0]='\0';
> -             fgets(buf,size,tty);
> +             if (fgets(buf,size,tty) == NULL) goto err;

didn't you mean s/err/error ?

> @@ -373,7 +374,7 @@ int des_read_pw(char *buf, char *buff, i
>                       fprintf(stderr,"\nVerifying password -
> %s",prompt); fflush(stderr);
>                       buff[0]='\0';
> -                     fgets(buff,size,tty);
> +                     if (fgets(buf,size,tty) == NULL) goto err;
>                       if (feof(tty)) goto error;

ditto.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to