evp: fix coverity 1473380 Copy into fixed size buffer (STRING_OVERFLOW)

Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15943)
master
Pauli 2 years ago
parent 98431c4313
commit 5e56f4587d

@ -1353,7 +1353,9 @@ static int fix_rsa_pss_saltlen(enum state state,
if (i == OSSL_NELEM(str_value_map)) {
BIO_snprintf(ctx->name_buf, sizeof(ctx->name_buf), "%d", ctx->p1);
} else {
strcpy(ctx->name_buf, str_value_map[i].ptr);
strncpy(ctx->name_buf, str_value_map[i].ptr, sizeof(ctx->name_buf));
/* This won't truncate but it will quiet static analysers */
ctx->name_buf[sizeof(ctx->name_buf) - 1] = '\0';
}
ctx->p2 = ctx->name_buf;
ctx->p1 = strlen(ctx->p2);

Loading…
Cancel
Save