From: Xin LI <delp...@freebsd.org> context after they are finialized after r336539, so do not do it.
Submitted by: David CARLIER <devnexen gmail com> MFC after: 1 month (after r336539) Differential Revision: https://reviews.freebsd.org/D16059 --- cpukit/libcrypt/crypt-sha256.c | 2 -- cpukit/libcrypt/crypt-sha512.c | 2 -- 2 files changed, 4 deletions(-) diff --git a/cpukit/libcrypt/crypt-sha256.c b/cpukit/libcrypt/crypt-sha256.c index f6d510219e..24373680f7 100644 --- a/cpukit/libcrypt/crypt-sha256.c +++ b/cpukit/libcrypt/crypt-sha256.c @@ -257,8 +257,6 @@ crypt_sha256_r(const char *key, const char *salt, struct crypt_data *data) memset(temp_result, '\0', sizeof(temp_result)); memset(p_bytes, '\0', key_len); memset(s_bytes, '\0', salt_len); - memset(&ctx, '\0', sizeof(ctx)); - memset(&alt_ctx, '\0', sizeof(alt_ctx)); return buffer; } diff --git a/cpukit/libcrypt/crypt-sha512.c b/cpukit/libcrypt/crypt-sha512.c index 6d680348a6..da8acd7790 100644 --- a/cpukit/libcrypt/crypt-sha512.c +++ b/cpukit/libcrypt/crypt-sha512.c @@ -269,8 +269,6 @@ crypt_sha512_r(const char *key, const char *salt, struct crypt_data *data) memset(temp_result, '\0', sizeof(temp_result)); memset(p_bytes, '\0', key_len); memset(s_bytes, '\0', salt_len); - memset(&ctx, '\0', sizeof(ctx)); - memset(&alt_ctx, '\0', sizeof(alt_ctx)); return buffer; } -- 2.35.3 _______________________________________________ devel mailing list devel@rtems.org http://lists.rtems.org/mailman/listinfo/devel