diff options
author | Kevin Cadieux <kevca@microsoft.com> | 2021-03-16 20:23:38 -0700 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2021-03-18 10:56:28 +0100 |
commit | 628d2d3a7f2318b6a6a1c36f9d8d12032c69a9dd (patch) | |
tree | ae8b4d9ba3c8dcce6edd754bb3d9006f8d47fb55 | |
parent | c8830891e6cb8d0782986662ca50b8fa7c97f49f (diff) |
Fixing stack buffer overflow error caused by incorrectly sized array.
CLA: trivial
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14582)
-rw-r--r-- | test/params_api_test.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/test/params_api_test.c b/test/params_api_test.c index 38d6913ec5..c1dbdad129 100644 --- a/test/params_api_test.c +++ b/test/params_api_test.c @@ -390,8 +390,8 @@ static int test_param_size_t(int n) static int test_param_time_t(int n) { time_t in, out; - unsigned char buf[MAX_LEN], cmp[sizeof(size_t)]; - const size_t len = raw_values[n].len >= sizeof(size_t) + unsigned char buf[MAX_LEN], cmp[sizeof(time_t)]; + const size_t len = raw_values[n].len >= sizeof(time_t) ? sizeof(time_t) : raw_values[n].len; OSSL_PARAM param = OSSL_PARAM_time_t("a", NULL); |