diff options
author | Matt Caswell <matt@openssl.org> | 2018-05-11 10:28:47 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2018-05-12 09:59:02 +0100 |
commit | a925e7dbf4c3bb01365c961df86da3ebfa1a6c27 (patch) | |
tree | 2d356ec27903a90d25fabfb735c20433408c64c0 /ssl/t1_lib.c | |
parent | c82c3462267afdbbaa53e11da0508ce4e03c02b3 (diff) |
Don't memcpy the contents of an empty fragment
In DTLS if we have buffered a fragment for a zero length message (e.g.
ServerHelloDone) then, when we unbuffered the fragment, we were attempting
to memcpy the contents of the fragment which is zero length and a NULL
pointer. This is undefined behaviour. We should check first whether we
have a zero length fragment.
Fixes a travis issue.
[extended tests]
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6223)
Diffstat (limited to 'ssl/t1_lib.c')
0 files changed, 0 insertions, 0 deletions