sctp: correct bounds check in sctp_setsockopt_auth_key
authorVlad Yasevich <vladislav.yasevich@hp.com>
Wed, 27 Aug 2008 23:08:54 +0000 (16:08 -0700)
committerDavid S. Miller <davem@davemloft.net>
Wed, 27 Aug 2008 23:08:54 +0000 (16:08 -0700)
commit328fc47ea0bcc27d9afa69c3ad6e52431cadd76c
tree5969688468a63ee01db68be4adff671bd9aa85c8
parentf2455eb176ac87081bbfc9a44b21c7cd2bc1967e
sctp: correct bounds check in sctp_setsockopt_auth_key

The bonds check to prevent buffer overlflow was not exactly
right.  It still allowed overflow of up to 8 bytes which is
sizeof(struct sctp_authkey).

Since optlen is already checked against the size of that struct,
we are guaranteed not to cause interger overflow either.

Signed-off-by: Vlad Yasevich <vladislav.yasevich@hp.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/sctp/socket.c