[gnutls-dev] [PATCH] Fix off-by-one in TLS 1.2 handshake.
Ludovic Courtès
ludo at chbouib.org
Wed Jun 13 19:41:57 CEST 2007
* lib/auth_cert.c (_gnutls_gen_cert_server_cert_req): Before invoking
`gnutls_malloc ()', increment SIZE when using TLS 1.2 so that the
allocated buffer is large-enough to contain the list of supported
hashes. Don't change SIZE later on.
---
lib/auth_cert.c | 7 ++++++-
1 files changed, 6 insertions(+), 1 deletions(-)
diff --git a/lib/auth_cert.c b/lib/auth_cert.c
index 9114f09..f91c71c 100644
--- a/lib/auth_cert.c
+++ b/lib/auth_cert.c
@@ -1417,6 +1417,11 @@ _gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data)
session->internals.ignore_rdn_sequence == 0)
size += cred->x509_rdn_sequence.size;
+ if (ver == GNUTLS_TLS1_2)
+ /* Need at least one byte to announce the number of supported hash
+ functions (see below). */
+ size += 1;
+
(*data) = gnutls_malloc (size);
pdata = (*data);
@@ -1436,7 +1441,7 @@ _gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data)
{
/* Supported hashes (nothing for now -- FIXME). */
*pdata = 0;
- pdata++, size++;
+ pdata++;
}
if (session->security_parameters.cert_type == GNUTLS_CRT_X509 &&
--
1.4.4.4
More information about the Gnutls-dev
mailing list