Ensure all EVP calls have their returns checked where appropriate
There are lots of calls to EVP functions from within libssl There were various places where we should probably check the return value but don't. This adds these checks. Reviewed-by: Richard Levitte <levitte@openssl.org>
This commit is contained in:
@@ -376,10 +376,11 @@ static int get_optional_pkey_id(const char *pkey_name)
|
||||
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||
int pkey_id = 0;
|
||||
ameth = EVP_PKEY_asn1_find_str(NULL, pkey_name, -1);
|
||||
if (ameth) {
|
||||
EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, ameth);
|
||||
if (ameth && EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL,
|
||||
ameth) > 0) {
|
||||
return pkey_id;
|
||||
}
|
||||
return pkey_id;
|
||||
return 0;
|
||||
}
|
||||
|
||||
#else
|
||||
@@ -391,7 +392,9 @@ static int get_optional_pkey_id(const char *pkey_name)
|
||||
int pkey_id = 0;
|
||||
ameth = EVP_PKEY_asn1_find_str(&tmpeng, pkey_name, -1);
|
||||
if (ameth) {
|
||||
EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, ameth);
|
||||
if (EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL,
|
||||
ameth) <= 0)
|
||||
pkey_id = 0;
|
||||
}
|
||||
if (tmpeng)
|
||||
ENGINE_finish(tmpeng);
|
||||
|
Reference in New Issue
Block a user