Session serialization: Fail with BAD_INPUT_DATA if buffer too small

This commit is contained in:
Hanno Becker 2019-05-28 13:59:44 +01:00
parent cb9ba0f43c
commit 1d8b6d7b12

View file

@ -9088,7 +9088,7 @@ static int ssl_session_load( mbedtls_ssl_session *session,
*/ */
if( (size_t)( end - p ) < sizeof( ssl_serialized_session_header ) ) if( (size_t)( end - p ) < sizeof( ssl_serialized_session_header ) )
return( MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL ); return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );
if( memcmp( p, ssl_serialized_session_header, if( memcmp( p, ssl_serialized_session_header,
sizeof( ssl_serialized_session_header ) ) != 0 ) sizeof( ssl_serialized_session_header ) ) != 0 )