Fix name length limit check.
authorDr. Stephen Henson <steve@openssl.org>
Wed, 4 May 2016 15:09:06 +0000 (16:09 +0100)
committerDr. Stephen Henson <steve@openssl.org>
Wed, 4 May 2016 16:40:53 +0000 (17:40 +0100)
commita1eef756cc1948ed4d1f175d97367aa2b24d962d
treefe3b01a44de9921ab36e1f412c20a15c2cf6d278
parentb8c75aab217842e527bd6dbe21d1908484edfb03
Fix name length limit check.

The name length limit check in x509_name_ex_d2i() includes
the containing structure as well as the actual X509_NAME. This will
cause large CRLs to be rejected.

Fix by limiting the length passed to ASN1_item_ex_d2i() which will
then return an error if the passed X509_NAME exceeds the length.

RT#4531

Reviewed-by: Rich Salz <rsalz@openssl.org>
(cherry picked from commit 4e0d184ac1dde845ba9574872e2ae5c903c81dff)
crypto/asn1/x_name.c