From 628d2d3a7f2318b6a6a1c36f9d8d12032c69a9dd Mon Sep 17 00:00:00 2001 From: Kevin Cadieux Date: Tue, 16 Mar 2021 20:23:38 -0700 Subject: Fixing stack buffer overflow error caused by incorrectly sized array. CLA: trivial Reviewed-by: Matt Caswell Reviewed-by: Paul Dale Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/14582) --- test/params_api_test.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/test/params_api_test.c b/test/params_api_test.c index 38d6913ec5..c1dbdad129 100644 --- a/test/params_api_test.c +++ b/test/params_api_test.c @@ -390,8 +390,8 @@ static int test_param_size_t(int n) static int test_param_time_t(int n) { time_t in, out; - unsigned char buf[MAX_LEN], cmp[sizeof(size_t)]; - const size_t len = raw_values[n].len >= sizeof(size_t) + unsigned char buf[MAX_LEN], cmp[sizeof(time_t)]; + const size_t len = raw_values[n].len >= sizeof(time_t) ? sizeof(time_t) : raw_values[n].len; OSSL_PARAM param = OSSL_PARAM_time_t("a", NULL); -- cgit v1.2.3