summaryrefslogtreecommitdiffstats
path: root/crypto/x509
diff options
context:
space:
mode:
authorShane Lontis <shane.lontis@oracle.com>2021-04-12 03:19:21 +0200
committerShane Lontis <shane.lontis@oracle.com>2021-04-14 08:05:00 +0200
commit5c107243877121f84037a5aaf19457f87458e8ed (patch)
tree8b3ef6e620890f5c1cb4ec1e1cdad9ca74c9888e /crypto/x509
parentAdd domain parameter match check for DH and ECDH key exchange. (diff)
downloadopenssl-5c107243877121f84037a5aaf19457f87458e8ed.tar.xz
openssl-5c107243877121f84037a5aaf19457f87458e8ed.zip
Add some additional NULL checks to prevent segfaults.
Fixes #14809 PR #14752 attempted to pass the libctx, propq in a few places related to X509 signing. There were a few places that needed additional NULL checks so that they behavethe same as they did before. OCSP_basic_sign() was changed to call EVP_DigestSignInit_ex() which passed the parameter EVP_MD_name(dgst). Since dgst can be NULL EVP_MD_name() was segfaulting. Adding an additional NULL check EVP_MD_name() resolves this issue. The other NULL checks are required to produce errors rather than segfaults if the certificate is NULL. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14826)
Diffstat (limited to 'crypto/x509')
-rw-r--r--crypto/x509/x_crl.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/crypto/x509/x_crl.c b/crypto/x509/x_crl.c
index 4b90e5b756..d77746a2b2 100644
--- a/crypto/x509/x_crl.c
+++ b/crypto/x509/x_crl.c
@@ -393,9 +393,9 @@ int X509_CRL_get0_by_cert(X509_CRL *crl, X509_REVOKED **ret, X509 *x)
static int def_crl_verify(X509_CRL *crl, EVP_PKEY *r)
{
- return (ASN1_item_verify_ex(ASN1_ITEM_rptr(X509_CRL_INFO),
- &crl->sig_alg, &crl->signature, &crl->crl, NULL,
- r, crl->libctx, crl->propq));
+ return ASN1_item_verify_ex(ASN1_ITEM_rptr(X509_CRL_INFO),
+ &crl->sig_alg, &crl->signature, &crl->crl, NULL,
+ r, crl->libctx, crl->propq);
}
static int crl_revoked_issuer_match(X509_CRL *crl, const X509_NAME *nm,