debug.c: ecryptfs_dump_auth_tok () : salt and sig arrays initialized so as to 
avoid adding null terminator explicitly.

Signed-off-by: Abhijit Pawar <abhi.c.pa...@gmail.com>
---
 fs/ecryptfs/debug.c |    6 ++----
 1 files changed, 2 insertions(+), 4 deletions(-)

diff --git a/fs/ecryptfs/debug.c b/fs/ecryptfs/debug.c
index 3d2bdf5..480e3b5 100644
--- a/fs/ecryptfs/debug.c
+++ b/fs/ecryptfs/debug.c
@@ -31,8 +31,8 @@
  */
 void ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok *auth_tok)
 {
-       char salt[ECRYPTFS_SALT_SIZE * 2 + 1];
-       char sig[ECRYPTFS_SIG_SIZE_HEX + 1];
+       char salt[ECRYPTFS_SALT_SIZE * 2 + 1] = {'\0'};
+       char sig[ECRYPTFS_SIG_SIZE_HEX + 1] = {'\0'};
 
        ecryptfs_printk(KERN_DEBUG, "Auth tok at mem loc [%p]:\n",
                        auth_tok);
@@ -42,7 +42,6 @@ void ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok 
*auth_tok)
                ecryptfs_printk(KERN_DEBUG, " * passphrase type\n");
                ecryptfs_to_hex(salt, auth_tok->token.password.salt,
                                ECRYPTFS_SALT_SIZE);
-               salt[ECRYPTFS_SALT_SIZE * 2] = '\0';
                ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt);
                if (auth_tok->token.password.flags &
                    ECRYPTFS_PERSISTENT_PASSWORD) {
@@ -50,7 +49,6 @@ void ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok 
*auth_tok)
                }
                memcpy(sig, auth_tok->token.password.signature,
                       ECRYPTFS_SIG_SIZE_HEX);
-               sig[ECRYPTFS_SIG_SIZE_HEX] = '\0';
                ecryptfs_printk(KERN_DEBUG, " * signature = [%s]\n", sig);
        }
        ecryptfs_printk(KERN_DEBUG, " * session_key.flags = [0x%x]\n",
-- 
1.7.7.6

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to