diff options
author | Matt Caswell <matt@openssl.org> | 2015-03-12 12:54:44 +0000 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2015-03-17 13:48:04 +0000 |
commit | b2b81639640e84046cdd5d869009eacef22448f5 (patch) | |
tree | 427702bc659f77341c84f14ec5c36ec735f8a17c /crypto/stack | |
parent | 56490fc26ff9dc2da162e6dc0675762edf607c1d (diff) |
Fix memset call in stack.c
The function sk_zero is supposed to zero the elements held within a stack.
It uses memset to do this. However it calculates the size of each element
as being sizeof(char **) instead of sizeof(char *). This probably doesn't
make much practical difference in most cases, but isn't a portable
assumption.
Reviewed-by: Richard Levitte <levitte@openssl.org>
(cherry picked from commit 7132ac830fa08d9a936e011d7c541b0c52115b33)
Diffstat (limited to 'crypto/stack')
-rw-r--r-- | crypto/stack/stack.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/stack/stack.c b/crypto/stack/stack.c index 47457c722d..de437acf6a 100644 --- a/crypto/stack/stack.c +++ b/crypto/stack/stack.c @@ -312,7 +312,7 @@ void sk_zero(_STACK *st) return; if (st->num <= 0) return; - memset((char *)st->data, 0, sizeof(st->data) * st->num); + memset((char *)st->data, 0, sizeof(*st->data) * st->num); st->num = 0; } |