Fix overly strict bounds check in ssl_parse_certificate_request()
This commit is contained in:
parent
9eb78b4dab
commit
78d5d8225e
1 changed files with 1 additions and 1 deletions
|
@ -2725,7 +2725,7 @@ static int ssl_parse_certificate_request( mbedtls_ssl_context *ssl )
|
||||||
* therefore the buffer length at this point must be greater than that
|
* therefore the buffer length at this point must be greater than that
|
||||||
* regardless of the actual code path.
|
* regardless of the actual code path.
|
||||||
*/
|
*/
|
||||||
if( ssl->in_hslen <= mbedtls_ssl_hs_hdr_len( ssl ) + 3 + n )
|
if( ssl->in_hslen <= mbedtls_ssl_hs_hdr_len( ssl ) + 2 + n )
|
||||||
{
|
{
|
||||||
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
|
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad certificate request message" ) );
|
||||||
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
mbedtls_ssl_send_alert_message( ssl, MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue