Fix a bug of buffer-size using when checking tizen-id validation 36/136936/1
authorKunhoon Baik <knhoon.baik@samsung.com>
Mon, 3 Jul 2017 23:33:26 +0000 (08:33 +0900)
committerKunhoon Baik <knhoon.baik@samsung.com>
Mon, 3 Jul 2017 23:36:00 +0000 (08:36 +0900)
It should be ID_LEN(28)+4 because 32 byte is maximum.

Change-Id: I0a877b9b01c7fa1184308598f0ce21c03f1707d9

src/tizenid/tizenid.c

index f0a07a0bc1f1582f0493a167979494ee81978b1c..3902415c5a9cec17b07a1e77edac1a6926a7cc8f 100755 (executable)
@@ -121,7 +121,7 @@ static int check_tizen_id_content(void)
 {
        FILE *fp;
        int ret;
-       char id[ID_LEN + 1] = {0, };
+       char id[ID_LEN + 4 + 1] = {0, };
        int len;
 
        fp = fopen(TIZEN_ID_PATH, "r");