Re: Indy9: EAccessViolation in TIdHashMessageDigest (MD2, MD4 and MD5) with BCB6

Giganews Newsgroups
Subject: Re: Indy9: EAccessViolation in TIdHashMessageDigest (MD2, MD4 and MD5) with BCB6
Posted by:  Remy Lebeau (TeamB) (no.spam@no.spam.com)
Date: Fri, 14 Oct 2005

"Jean-Baptiste DEFOSSEZ" <nospam@free.fr> wrote in message
news:MPG.1dba09fe127247fa9896…@news.atozedsoftware.com...

> The bug is located in IdHashMessageDigest.pas, about line 195:
>
>  Move(FX[0], result[0], 16);

There is nothing wrong with that line.  The Result is 16 bytes in size, and
the FX member is 48 bytes in size.  Both are valid, and there is no invalid
memory being accessed in that line.

Gambit

Replies

In response to

Indy9: EAccessViolation in TIdHashMessageDigest (MD2, MD4 and MD5) with BCB6 posted by Jean-Baptiste DEFOSSEZ on Fri, 14 Oct 2005