From f5c1b608535aab58c97bf9623c08b479bc6dcf49 Mon Sep 17 00:00:00 2001 From: Fabian Keil Date: Thu, 14 Jan 2021 11:58:12 +0100 Subject: [PATCH] OpenSSL ssl_base64_encode(): Fix buffer size check In practice it didn't matter because Privoxy always provides a sufficiently-sized buffer. --- openssl.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/openssl.c b/openssl.c index 73aadebf..fe4da8fd 100644 --- a/openssl.c +++ b/openssl.c @@ -1287,7 +1287,7 @@ extern int ssl_base64_encode(unsigned char *dst, size_t dlen, size_t *olen, const unsigned char *src, size_t slen) { *olen = 4 * ((slen/3) + ((slen%3) ? 1 : 0)) + 1; - if (*olen < dlen) + if (*olen > dlen) { return ENOBUFS; } -- 2.39.2