From: Matt Caswell Date: Thu, 7 Dec 2017 14:41:21 +0000 (+0000) Subject: Fix the buffer sizing in the fatalerrtest X-Git-Tag: OpenSSL_1_0_2o~66 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=6957d91f0eed10859dff26311592b326a07a1d73;p=openssl Fix the buffer sizing in the fatalerrtest Fixes #4865 Reviewed-by: Rich Salz (Merged from https://github.com/openssl/openssl/pull/4866) --- diff --git a/ssl/fatalerrtest.c b/ssl/fatalerrtest.c index 749bc3697e..f9d66e27b3 100644 --- a/ssl/fatalerrtest.c +++ b/ssl/fatalerrtest.c @@ -76,7 +76,7 @@ int main(int argc, char *argv[]) } /* SSL_read()/SSL_write should fail because of a previous fatal error */ - if ((len = SSL_read(sssl, buf, sizeof(buf - 1))) > 0) { + if ((len = SSL_read(sssl, buf, sizeof(buf) - 1)) > 0) { buf[len] = '\0'; printf("Unexpected success reading data: %s\n", buf); goto err;