Check length to avoid XSTRNCMP accessing memory after list
This commit is contained in:
parent
420e597c16
commit
fe9a876895
@ -33160,7 +33160,8 @@ static int populate_groups(int* groups, int max_count, char *list)
|
||||
return -1;
|
||||
}
|
||||
for (nist_name = kNistCurves; nist_name->name != NULL; nist_name++) {
|
||||
if (XSTRNCMP(list, nist_name->name, nist_name->name_len) == 0) {
|
||||
if (len == nist_name->name_len &&
|
||||
XSTRNCMP(list, nist_name->name, nist_name->name_len) == 0) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
@ -4239,7 +4239,7 @@ static const byte tls_server[FINISHED_LABEL_SZ + 1] = "server finished";
|
||||
|
||||
#ifdef OPENSSL_EXTRA
|
||||
typedef struct {
|
||||
int name_len;
|
||||
size_t name_len;
|
||||
const char *name;
|
||||
int nid;
|
||||
} WOLF_EC_NIST_NAME;
|
||||
|
Loading…
x
Reference in New Issue
Block a user