[openssl] openssl-3.0 update

tomas at openssl.org tomas at openssl.org
Tue Jan 25 17:16:14 UTC 2022


The branch openssl-3.0 has been updated
       via  27ee6e252d04b587e98228c81ecc3e62a34bae26 (commit)
       via  7ae540d59a01f2765b7868c0887be9bc3c0596c6 (commit)
      from  e293979b2c23712769bf9c655e8a440bf2d3d44f (commit)


- Log -----------------------------------------------------------------
commit 27ee6e252d04b587e98228c81ecc3e62a34bae26
Author: Jiasheng Jiang <jiasheng at iscas.ac.cn>
Date:   Mon Jan 24 11:18:38 2022 +0800

    test/ct_test.c: Add the missing check after calling sk_SCT_new_null
    
    As the potential failure of the allocation, the sk_SCT_new_null() could
    return NULL pointer if fails.
    And then sk_SCT_push() uses the 'fixture->sct_list' and returns -1 if
    fails.
    But the return value of the sk_SCT_push() is not checked.
    I think it is better to check it just after the allocation.
    
    CLA: trivial
    
    Signed-off-by: Jiasheng Jiang <jiasheng at iscas.ac.cn>
    
    Reviewed-by: Paul Dale <pauli at openssl.org>
    Reviewed-by: Tomas Mraz <tomas at openssl.org>
    (Merged from https://github.com/openssl/openssl/pull/17571)
    
    (cherry picked from commit 7625d70ad9e7be0588dd9453e89892c2b24b8175)

commit 7ae540d59a01f2765b7868c0887be9bc3c0596c6
Author: Jiasheng Jiang <jiasheng at iscas.ac.cn>
Date:   Mon Jan 24 11:06:34 2022 +0800

    evp_test: Add the missing check after calling OPENSSL_malloc
    
    The OPENSSL_zalloc() could return NULL pointer if fails.
    Add the check for it does make sense, like how digest_test_init() deals
    with.
    
    CLA: trivial
    
    Signed-off-by: Jiasheng Jiang <jiasheng at iscas.ac.cn>
    
    Reviewed-by: Paul Dale <pauli at openssl.org>
    Reviewed-by: Tomas Mraz <tomas at openssl.org>
    (Merged from https://github.com/openssl/openssl/pull/17571)
    
    (cherry picked from commit 2208ba56ebefe4cf7d924e2ac7044ccd3307250b)

-----------------------------------------------------------------------

Summary of changes:
 test/ct_test.c  | 3 +++
 test/evp_test.c | 8 ++++++--
 2 files changed, 9 insertions(+), 2 deletions(-)

diff --git a/test/ct_test.c b/test/ct_test.c
index d1799fa7a2..f914ee514a 100644
--- a/test/ct_test.c
+++ b/test/ct_test.c
@@ -449,6 +449,9 @@ static int test_encode_tls_sct(void)
     SETUP_CT_TEST_FIXTURE();
 
     fixture->sct_list = sk_SCT_new_null();
+    if (fixture->sct_list == NULL)
+	    return 0;
+
     if (!TEST_ptr(sct = SCT_new_from_base64(SCT_VERSION_V1, log_id,
                                             CT_LOG_ENTRY_TYPE_X509, timestamp,
                                             extensions, signature)))
diff --git a/test/evp_test.c b/test/evp_test.c
index 47d4e6c878..f2b0924e2f 100644
--- a/test/evp_test.c
+++ b/test/evp_test.c
@@ -574,7 +574,9 @@ static int cipher_test_init(EVP_TEST *t, const char *alg)
     }
     ERR_clear_last_mark();
 
-    cdat = OPENSSL_zalloc(sizeof(*cdat));
+    if (!TEST_ptr(cdat = OPENSSL_zalloc(sizeof(*cdat))))
+        return 0;
+
     cdat->cipher = cipher;
     cdat->fetched_cipher = fetched_cipher;
     cdat->enc = -1;
@@ -1175,7 +1177,9 @@ static int mac_test_init(EVP_TEST *t, const char *alg)
             return 0;
     }
 
-    mdat = OPENSSL_zalloc(sizeof(*mdat));
+    if (!TEST_ptr(mdat = OPENSSL_zalloc(sizeof(*mdat))))
+        return 0;
+
     mdat->type = type;
     mdat->mac_name = OPENSSL_strdup(alg);
     mdat->mac = mac;


More information about the openssl-commits mailing list