• A
    Make BUF_strndup() read-safe on arbitrary inputs · 110f7b37
    Alessandro Ghedini 提交于
    BUF_strndup was calling strlen through BUF_strlcpy, and ended up reading
    past the input if the input was not a C string.
    
    Make it explicitly part of BUF_strndup's contract to never read more
    than |siz| input bytes. This augments the standard strndup contract to
    be safer.
    
    The commit also adds a check for siz overflow and some brief documentation
    for BUF_strndup().
    Reviewed-by: NMatt Caswell <matt@openssl.org>
    110f7b37
buffer.h 5.0 KB