Fixing stack buffer overflow error caused by incorrectly sized array.

CLA: trivial

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14582)
This commit is contained in:
Kevin Cadieux 2021-03-16 20:23:38 -07:00 committed by Tomas Mraz
parent c8830891e6
commit 628d2d3a7f

View File

@ -390,8 +390,8 @@ static int test_param_size_t(int n)
static int test_param_time_t(int n)
{
time_t in, out;
unsigned char buf[MAX_LEN], cmp[sizeof(size_t)];
const size_t len = raw_values[n].len >= sizeof(size_t)
unsigned char buf[MAX_LEN], cmp[sizeof(time_t)];
const size_t len = raw_values[n].len >= sizeof(time_t)
? sizeof(time_t) : raw_values[n].len;
OSSL_PARAM param = OSSL_PARAM_time_t("a", NULL);