Ensure buffer/length pairs are always in sync
authorMatt Caswell <matt@openssl.org>
Thu, 18 Mar 2021 16:52:10 +0000 (16:52 +0000)
committerMatt Caswell <matt@openssl.org>
Thu, 25 Mar 2021 09:48:08 +0000 (09:48 +0000)
commit39a140597d874e554b736885ac4dea16ac40a87a
tree4111ade117e62d5eb609109e6c47d7a866660046
parent02b1636fe3db274497304a3e95a4e32ced7e841b
Ensure buffer/length pairs are always in sync

Following on from CVE-2021-3449 which was caused by a non-zero length
associated with a NULL buffer, other buffer/length pairs are updated to
ensure that they too are always in sync.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
ssl/s3_lib.c
ssl/ssl_lib.c
ssl/statem/extensions.c
ssl/statem/extensions_clnt.c
ssl/statem/statem_clnt.c
ssl/statem/statem_srvr.c