Make sure a bad parameter to RSA_verify_PKCS1_PSS() doesn't lead to a crash.
[openssl.git] / ssl / s3_pkt.c
index 561ba5cf255a9aa611254bac5599c0608293c11f..330918a78aabfde2e893cf96c30f6a262d2fceae 100644 (file)
@@ -412,6 +412,7 @@ printf("\n");
 
        if (!clear)
                {
+               /* !clear => s->read_hash != NULL => mac_size != -1 */
                mac_size=EVP_MD_CTX_size(s->read_hash);
 
                if (rr->length > SSL3_RT_MAX_COMPRESSED_LENGTH+extra+mac_size)