diff options
author | Joakim Tjernlund <joakim.tjernlund@transmode.se> | 2009-11-26 12:23:07 +0000 |
---|---|---|
committer | David Lamparter <equinox@diac24.net> | 2010-02-04 01:18:21 +0100 |
commit | f03edb371c3e0b389f15600ceb283055033085e6 (patch) | |
tree | d72732ab8130358e4618452ddfa24c6552516472 /ospfd/ospf_vty.c | |
parent | 69dd8e5692bc22967b5508f763be7d056fffa9de (diff) | |
download | quagga-f03edb371c3e0b389f15600ceb283055033085e6.tar.bz2 quagga-f03edb371c3e0b389f15600ceb283055033085e6.tar.xz |
ospfd: invalid MD5 auth_key?
This looks fishy in ospf_make_md5_digest()
if (list_isempty (OSPF_IF_PARAM (oi, auth_crypt)))
auth_key = (const u_int8_t *) "";
...
MD5Update(&ctx, auth_key, OSPF_AUTH_MD5_SIZE);
auth_key points to a "" string of len 1 which is a lot
smaller that OSPF_AUTH_MD5_SIZE. Is this intentional to
get some random data or just a plain bug?
Anyone using MD5 should have a closer look and decide
what to do.
Diffstat (limited to 'ospfd/ospf_vty.c')
0 files changed, 0 insertions, 0 deletions