mirror of
https://github.com/openssl/openssl.git
synced 2024-12-01 05:55:11 +08:00
Add some additional NULL checks to prevent segfaults.
Fixes #14809 PR #14752 attempted to pass the libctx, propq in a few places related to X509 signing. There were a few places that needed additional NULL checks so that they behavethe same as they did before. OCSP_basic_sign() was changed to call EVP_DigestSignInit_ex() which passed the parameter EVP_MD_name(dgst). Since dgst can be NULL EVP_MD_name() was segfaulting. Adding an additional NULL check EVP_MD_name() resolves this issue. The other NULL checks are required to produce errors rather than segfaults if the certificate is NULL. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/14826)
This commit is contained in:
parent
46eee7104d
commit
5c10724387
@ -701,6 +701,8 @@ const char *EVP_MD_description(const EVP_MD *md)
|
||||
|
||||
const char *EVP_MD_name(const EVP_MD *md)
|
||||
{
|
||||
if (md == NULL)
|
||||
return NULL;
|
||||
if (md->prov != NULL)
|
||||
return evp_first_name(md->prov, md->name_id);
|
||||
#ifndef FIPS_MODULE
|
||||
|
@ -278,6 +278,8 @@ int OCSP_RESPID_set_by_key_ex(OCSP_RESPID *respid, X509 *cert,
|
||||
|
||||
int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert)
|
||||
{
|
||||
if (cert == NULL)
|
||||
return 0;
|
||||
return OCSP_RESPID_set_by_key_ex(respid, cert, cert->libctx, cert->propq);
|
||||
}
|
||||
|
||||
@ -319,5 +321,7 @@ int OCSP_RESPID_match_ex(OCSP_RESPID *respid, X509 *cert, OSSL_LIB_CTX *libctx,
|
||||
|
||||
int OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert)
|
||||
{
|
||||
if (cert == NULL)
|
||||
return 0;
|
||||
return OCSP_RESPID_match_ex(respid, cert, cert->libctx, cert->propq);
|
||||
}
|
||||
|
@ -393,9 +393,9 @@ int X509_CRL_get0_by_cert(X509_CRL *crl, X509_REVOKED **ret, X509 *x)
|
||||
|
||||
static int def_crl_verify(X509_CRL *crl, EVP_PKEY *r)
|
||||
{
|
||||
return (ASN1_item_verify_ex(ASN1_ITEM_rptr(X509_CRL_INFO),
|
||||
&crl->sig_alg, &crl->signature, &crl->crl, NULL,
|
||||
r, crl->libctx, crl->propq));
|
||||
return ASN1_item_verify_ex(ASN1_ITEM_rptr(X509_CRL_INFO),
|
||||
&crl->sig_alg, &crl->signature, &crl->crl, NULL,
|
||||
r, crl->libctx, crl->propq);
|
||||
}
|
||||
|
||||
static int crl_revoked_issuer_match(X509_CRL *crl, const X509_NAME *nm,
|
||||
|
Loading…
Reference in New Issue
Block a user