forked from wolfSSL/wolfssl
Check length to avoid XSTRNCMP accessing memory after list
This commit is contained in:
@@ -33160,7 +33160,8 @@ static int populate_groups(int* groups, int max_count, char *list)
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
for (nist_name = kNistCurves; nist_name->name != NULL; nist_name++) {
|
for (nist_name = kNistCurves; nist_name->name != NULL; nist_name++) {
|
||||||
if (XSTRNCMP(list, nist_name->name, nist_name->name_len) == 0) {
|
if (len == nist_name->name_len &&
|
||||||
|
XSTRNCMP(list, nist_name->name, nist_name->name_len) == 0) {
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -4239,7 +4239,7 @@ static const byte tls_server[FINISHED_LABEL_SZ + 1] = "server finished";
|
|||||||
|
|
||||||
#ifdef OPENSSL_EXTRA
|
#ifdef OPENSSL_EXTRA
|
||||||
typedef struct {
|
typedef struct {
|
||||||
int name_len;
|
size_t name_len;
|
||||||
const char *name;
|
const char *name;
|
||||||
int nid;
|
int nid;
|
||||||
} WOLF_EC_NIST_NAME;
|
} WOLF_EC_NIST_NAME;
|
||||||
|
Reference in New Issue
Block a user