auth: Don't overflow buffer in CompFindUser
authorSimon Wilkinson <sxw@your-file-system.com>
Sat, 2 Mar 2013 13:01:14 +0000 (13:01 +0000)
committerDerrick Brashear <shadow@your-file-system.com>
Mon, 11 Mar 2013 14:27:17 +0000 (07:27 -0700)
commitcc95fca8e16f83d7dda3f09a5133dc9294299d61
treeef9db53fb23b1dc05c32e18b72e7eb3b84b00479
parent8c664a8c0f25e472bd3ba30f31fbbf707fa4e873
auth: Don't overflow buffer in CompFindUser

The fullname buffer in CompFindUser is theoretically big enough
to take the data usually supplied to it. However, play it safe by
using strlcat and strlcpy to catch buffer overflows.

Caught by coverity (#985771)

Change-Id: Icc80d012b61ae90e1a62a814f7a6d552bb264294
Reviewed-on: http://gerrit.openafs.org/9543
Tested-by: BuildBot <buildbot@rampaginggeek.com>
Reviewed-by: Jeffrey Altman <jaltman@your-file-system.com>
Reviewed-by: Derrick Brashear <shadow@your-file-system.com>
src/auth/userok.c