Ensure buffer/length pairs are always in sync
authorMatt Caswell <matt@openssl.org>
Thu, 18 Mar 2021 16:52:10 +0000 (16:52 +0000)
committerMatt Caswell <matt@openssl.org>
Thu, 25 Mar 2021 09:43:33 +0000 (09:43 +0000)
commitd33c2a3d8453a75509bcc8d2cf7d2dc2a3a518d0
tree262eff6408a711711610c8c1682f6f5951ac8306
parentfb9fa6b51defd48157eeb207f52181f735d96148
Ensure buffer/length pairs are always in sync

Following on from CVE-2021-3449 which was caused by a non-zero length
associated with a NULL buffer, other buffer/length pairs are updated to
ensure that they too are always in sync.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
ssl/s3_lib.c
ssl/ssl_lib.c
ssl/statem/extensions.c
ssl/statem/extensions_clnt.c
ssl/statem/statem_clnt.c
ssl/statem/statem_srvr.c