Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/crypto/external/bsd/openssl/dist/ssl fix bug introduced by l...



details:   https://anonhg.NetBSD.org/src/rev/7f534bdffd85
branches:  trunk
changeset: 759369:7f534bdffd85
user:      drochner <drochner%NetBSD.org@localhost>
date:      Tue Dec 07 10:03:29 2010 +0000

description:
fix bug introduced by last security patch, from upstream CVS:
Don't assume a decode error if session tlsext_ecpointformatlist is
not NULL: it can be legitimately set elsewhere.

diffstat:

 crypto/external/bsd/openssl/dist/ssl/t1_lib.c |  4 ++--
 1 files changed, 2 insertions(+), 2 deletions(-)

diffs (14 lines):

diff -r 8405606338f9 -r 7f534bdffd85 crypto/external/bsd/openssl/dist/ssl/t1_lib.c
--- a/crypto/external/bsd/openssl/dist/ssl/t1_lib.c     Tue Dec 07 09:10:21 2010 +0000
+++ b/crypto/external/bsd/openssl/dist/ssl/t1_lib.c     Tue Dec 07 10:03:29 2010 +0000
@@ -778,8 +778,8 @@
                                {
                                if(s->session->tlsext_ecpointformatlist)
                                        {
-                                       *al = TLS1_AD_DECODE_ERROR;
-                                       return 0;
+                                       OPENSSL_free(s->session->tlsext_ecpointformatlist);
+                                       s->session->tlsext_ecpointformatlist = NULL;
                                        }
                                s->session->tlsext_ecpointformatlist_length = 0;
                                if ((s->session->tlsext_ecpointformatlist = OPENSSL_malloc(ecpointformatlist_length)) == NULL)



Home | Main Index | Thread Index | Old Index