ipsec: make sure pad_bytes does not exceed pad data size 40/28240/2
authorBenoît Ganne <bganne@cisco.com>
Sat, 7 Dec 2019 16:14:27 +0000 (09:14 -0700)
committerAndrew Yourtchenko <ayourtch@gmail.com>
Wed, 12 Aug 2020 07:43:14 +0000 (07:43 +0000)
commit299f9caae6975f1642462963e1df3deef343acfa
tree0d15ad13a203da4e115c19388128a5486f3b362c
parentb04bdd12e67c084a02ad6179c1e83173bee709b4
ipsec: make sure pad_bytes does not exceed pad data size

This helps GCC understand the memcpy will not overflow pad_data. GCC-6
(default on Debian 9) in particular got confused.

Type: fix

Change-Id: I176eb01531b9d5c7ebec40f015e510b2d56e77c4
Signed-off-by: Benoît Ganne <bganne@cisco.com>
(cherry picked from commit 4505f0154eaba59c432c869b65e2dc493837032a)
src/vnet/ipsec/esp_encrypt.c