[Commits] [SCM] claws branch, master, updated. 4.3.1-29-g112daeb1b
wwp at claws-mail.org
wwp at claws-mail.org
Wed Mar 5 20:18:44 UTC 2025
The branch, master has been updated
via 112daeb1bbc0233809f79d61efbb49ba35821d4a (commit)
from 1e87622ac8f04e1f4bf00cf8516425bff141a911 (commit)
Summary of changes:
src/common/ssl.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
- Log -----------------------------------------------------------------
commit 112daeb1bbc0233809f79d61efbb49ba35821d4a
Author: wwp <subscript at free.fr>
Date: Wed Mar 5 21:18:22 2025 +0100
Fix CID 1220354: Overflowed constant (INTEGER_OVERFLOW)
diff --git a/src/common/ssl.c b/src/common/ssl.c
index 1eafe3f6e..15745ca09 100644
--- a/src/common/ssl.c
+++ b/src/common/ssl.c
@@ -337,19 +337,19 @@ static gint SSL_connect_nb(gnutls_session_t ssl)
#endif
}
-gnutls_x509_crt_t *ssl_get_certificate_chain(gnutls_session_t session, gint *list_len)
+gnutls_x509_crt_t *ssl_get_certificate_chain(gnutls_session_t session, unsigned int *list_len)
{
const gnutls_datum_t *raw_cert_list;
gnutls_x509_crt_t *certs = NULL;
gboolean result = TRUE;
- *list_len = -1;
+ *list_len = 0;
if (!session)
return NULL;
raw_cert_list = gnutls_certificate_get_peers(session, list_len);
- if (raw_cert_list && gnutls_certificate_type_get(session) == GNUTLS_CRT_X509) {
+ if (raw_cert_list && (*list_len>0) && gnutls_certificate_type_get(session) == GNUTLS_CRT_X509) {
int i = 0;
if (*list_len > 128)
-----------------------------------------------------------------------
hooks/post-receive
--
Claws Mail
More information about the Commits
mailing list