diff options
author | Tom Gundersen <teg@jklm.no> | 2015-07-23 12:57:58 +0200 |
---|---|---|
committer | Tom Gundersen <teg@jklm.no> | 2015-07-23 18:01:17 +0200 |
commit | f1d178cce1ada81346fb864c8f95aa2163b37a56 (patch) | |
tree | 3e7de30afaac0da775323b57994145b56847eda9 /test/exec-personality-x86.service | |
parent | 20330324e3dd95e1a5951d154cbf2b9f8627d818 (diff) |
resolved: packet - fail on invalid zero-length data
Most blobs (keys, signatures, ...) should have a specific size given by
the relevant algorithm. However, as we don't use/verify the algorithms
yet, let's just ensure that we don't read out zero-length data in cases
where this does not make sense.
The only exceptions, where zero-length data is allowed are in the NSEC3
salt field, and the generic data (which we don't know anything about,
so better not make any assumptions).
Diffstat (limited to 'test/exec-personality-x86.service')
0 files changed, 0 insertions, 0 deletions