From 3f203037021d2f656249565e81cf0f4aa93060e9 Mon Sep 17 00:00:00 2001 From: Daniel Stenberg Date: Tue, 6 Nov 2012 22:55:22 +0100 Subject: [PATCH] OpenSSL/servercert: use correct buffer size, not size of pointer Bug: http://curl.haxx.se/bug/view.cgi?id=3579286 --- lib/ssluse.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lib/ssluse.c b/lib/ssluse.c index 745fc88f9..6f0e6bf6b 100644 --- a/lib/ssluse.c +++ b/lib/ssluse.c @@ -2303,11 +2303,11 @@ static CURLcode servercert(struct connectdata *conn, infof(data, "\t subject: %s\n", buffer); certdate = X509_get_notBefore(connssl->server_cert); - asn1_output(certdate, buffer, sizeof(buffer)); + asn1_output(certdate, buffer, BUFSIZE); infof(data, "\t start date: %s\n", buffer); certdate = X509_get_notAfter(connssl->server_cert); - asn1_output(certdate, buffer, sizeof(buffer)); + asn1_output(certdate, buffer, BUFSIZE); infof(data, "\t expire date: %s\n", buffer); if(data->set.ssl.verifyhost) { @@ -2320,7 +2320,7 @@ static CURLcode servercert(struct connectdata *conn, } rc = x509_name_oneline(X509_get_issuer_name(connssl->server_cert), - buffer, sizeof(buffer)); + buffer, BUFSIZE); if(rc) { if(strict) failf(data, "SSL: couldn't get X509-issuer name!");