Fix too late check of fread() return in interface.c

pull/609/head
jsteube 8 years ago
parent 7249366667
commit 7f1dbf5a33

@ -2746,7 +2746,7 @@ int psafe2_parse_hash (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAYBE_UNU
memset (&buf, 0, sizeof (psafe2_hdr));
size_t n = fread (&buf, sizeof (psafe2_hdr), 1, fp);
const size_t n = fread (&buf, sizeof (psafe2_hdr), 1, fp);
fclose (fp);
@ -2781,14 +2781,14 @@ int psafe3_parse_hash (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAYBE_UNU
psafe3_t in;
size_t n = fread (&in, sizeof (psafe3_t), 1, fp);
const size_t n = fread (&in, sizeof (psafe3_t), 1, fp);
fclose (fp);
if (memcmp (SIGNATURE_PSAFE3, in.signature, 4)) return (PARSER_SIGNATURE_UNMATCHED);
if (n != 1) return (PARSER_PSAFE3_FILE_SIZE);
if (memcmp (SIGNATURE_PSAFE3, in.signature, 4)) return (PARSER_SIGNATURE_UNMATCHED);
salt->salt_iter = in.iterations + 1;
salt->salt_buf[0] = in.salt_buf[0];
@ -5057,11 +5057,11 @@ int truecrypt_parse_hash_1k (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAY
char buf[512] = { 0 };
size_t n = fread (buf, 1, sizeof (buf), fp);
const size_t n = fread (buf, 1, sizeof (buf), fp);
fclose (fp);
if (n != 512) return (PARSER_TC_FILE_SIZE);
if (n != sizeof (buf)) return (PARSER_TC_FILE_SIZE);
memcpy (tc->salt_buf, buf, 64);
@ -5096,11 +5096,11 @@ int truecrypt_parse_hash_2k (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAY
char buf[512] = { 0 };
size_t n = fread (buf, 1, sizeof (buf), fp);
const size_t n = fread (buf, 1, sizeof (buf), fp);
fclose (fp);
if (n != 512) return (PARSER_TC_FILE_SIZE);
if (n != sizeof (buf)) return (PARSER_TC_FILE_SIZE);
memcpy (tc->salt_buf, buf, 64);
@ -5135,11 +5135,11 @@ int veracrypt_parse_hash_200000 (u8 *input_buf, u32 input_len, hash_t *hash_buf,
char buf[512] = { 0 };
size_t n = fread (buf, 1, sizeof (buf), fp);
const size_t n = fread (buf, 1, sizeof (buf), fp);
fclose (fp);
if (n != 512) return (PARSER_VC_FILE_SIZE);
if (n != sizeof (buf)) return (PARSER_VC_FILE_SIZE);
memcpy (tc->salt_buf, buf, 64);
@ -5174,11 +5174,11 @@ int veracrypt_parse_hash_500000 (u8 *input_buf, u32 input_len, hash_t *hash_buf,
char buf[512] = { 0 };
size_t n = fread (buf, 1, sizeof (buf), fp);
const size_t n = fread (buf, 1, sizeof (buf), fp);
fclose (fp);
if (n != 512) return (PARSER_VC_FILE_SIZE);
if (n != sizeof (buf)) return (PARSER_VC_FILE_SIZE);
memcpy (tc->salt_buf, buf, 64);
@ -5213,11 +5213,11 @@ int veracrypt_parse_hash_327661 (u8 *input_buf, u32 input_len, hash_t *hash_buf,
char buf[512] = { 0 };
size_t n = fread (buf, 1, sizeof (buf), fp);
const size_t n = fread (buf, 1, sizeof (buf), fp);
fclose (fp);
if (n != 512) return (PARSER_VC_FILE_SIZE);
if (n != sizeof (buf)) return (PARSER_VC_FILE_SIZE);
memcpy (tc->salt_buf, buf, 64);
@ -5252,11 +5252,11 @@ int veracrypt_parse_hash_655331 (u8 *input_buf, u32 input_len, hash_t *hash_buf,
char buf[512] = { 0 };
size_t n = fread (buf, 1, sizeof (buf), fp);
const size_t n = fread (buf, 1, sizeof (buf), fp);
fclose (fp);
if (n != 512) return (PARSER_VC_FILE_SIZE);
if (n != sizeof (buf)) return (PARSER_VC_FILE_SIZE);
memcpy (tc->salt_buf, buf, 64);

Loading…
Cancel
Save