options.push_back(nullptr);
/* Initialize the CivetWeb right now. */
struct mg_callbacks cb;
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset((void *)&cb, 0, sizeof(cb));
cb.begin_request = civetweb_callback;
cb.log_message = rgw_civetweb_log_callback;
static bool parse_rfc850(const char *s, struct tm *t)
{
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(t, 0, sizeof(*t));
return check_gmt_end(strptime(s, "%A, %d-%b-%y %H:%M:%S ", t));
}
static bool parse_asctime(const char *s, struct tm *t)
{
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(t, 0, sizeof(*t));
return check_str_end(strptime(s, "%a %b %d %H:%M:%S %Y", t));
}
static bool parse_rfc1123(const char *s, struct tm *t)
{
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(t, 0, sizeof(*t));
return check_gmt_end(strptime(s, "%a, %d %b %Y %H:%M:%S ", t));
}
static bool parse_rfc1123_alt(const char *s, struct tm *t)
{
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(t, 0, sizeof(*t));
return check_str_end(strptime(s, "%a, %d %b %Y %H:%M:%S %z", t));
}
bool parse_iso8601(const char *s, struct tm *t, uint32_t *pns, bool extended_format)
{
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(t, 0, sizeof(*t));
const char *p;
public:
HexTable() {
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(table, -1, sizeof(table));
int i;
for (i = '0'; i<='9'; i++)
int stat(struct stat* st, uint32_t flags = FLAG_NONE) {
/* partial Unix attrs */
+ /* FIPS zeroization audit 20191115: this memset is not security
+ * related. */
memset(st, 0, sizeof(struct stat));
st->st_dev = state.dev;
st->st_ino = fh.fh_hk.object; // XXX
std::unique_ptr<Completion> completion;
rgw_http_req_data() : id(-1), lock("rgw_http_req_data::lock") {
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(error_buf, 0, sizeof(error_buf));
}
<< __func__ << " LDAP auth no rgw_ldap_secret file found in conf"
<< dendl;
} else {
+ // FIPS zeroization audit 20191116: this memset is not intended to
+ // wipe out a secret after use.
char bindpw[1024];
memset(bindpw, 0, 1024);
int pwlen = safe_read_file("" /* base */, ldap_secret.c_str(),
dout(20) << "build_token token=" << buf << dendl;
char k[CEPH_CRYPTO_HMACSHA1_DIGESTSIZE];
+ // FIPS zeroization audit 20191116: this memset is not intended to
+ // wipe out a secret after use.
memset(k, 0, sizeof(k));
const char *s = key.c_str();
for (int i = 0; i < (int)key.length(); i++, s++) {
/* get sha1 */
for (off_t i = 0; i < num; i++)
{
+ // FIPS zeroization audit 20191116: this memset is not intended to
+ // wipe out a secret after use.
memset(sha, 0x00, sizeof(sha));
h->Update((unsigned char *)pstr, info.piece_length);
h->Final((unsigned char *)sha);
/* process remain */
if (0 != remain)
{
+ // FIPS zeroization audit 20191116: this memset is not intended to
+ // wipe out a secret after use.
memset(sha, 0x00, sizeof(sha));
h->Update((unsigned char *)pstr, remain);
h->Final((unsigned char *)sha);