[dpdk-dev] [PATCH] l2fwd-crypto: fix coverity defect

2016-04-07 Thread Thomas Monjalon
> > When parsing crypto device type, the string was being copied > > with strcpy(), which could overflow the destination buffer > > (which is 32 byte long), so snprintf() should be used instead. > > > > This fixes coverity issue 124575: [...] > > Fixes: commit 49f79e86480d ("examples/l2fwd-crypto:

[dpdk-dev] [PATCH] l2fwd-crypto: fix coverity defect

2016-04-07 Thread Declan Doherty
On 07/04/16 14:23, Pablo de Lara wrote: > When parsing crypto device type, the string was being copied > with strcpy(), which could overflow the destination buffer > (which is 32 byte long), so snprintf() should be used instead. > > This fixes coverity issue 124575: > >

[dpdk-dev] [PATCH] l2fwd-crypto: fix coverity defect

2016-04-07 Thread Pablo de Lara
When parsing crypto device type, the string was being copied with strcpy(), which could overflow the destination buffer (which is 32 byte long), so snprintf() should be used instead. This fixes coverity issue 124575: /examples/l2fwd-crypto/main.c: 1005 in l2fwd_crypto_parse_args_long_options()