[sr #107539] Patch: crl.c: pointer targets differ in signedness

Simon Josefsson INVALID.NOREPLY at gnu.org
Thu Nov 25 19:00:48 CET 2010


Follow-up Comment #1, sr #107539 (project gnutls):

Re this code:

+  if (crl == NULL)
+    {
+      gnutls_assert ();
+      /* Need a GNUTLS_E_INVALID_PARAMETER */
+      return GNUTLS_E_SHORT_MEMORY_BUFFER;
+    }

The error typically used is GNUTLS_E_INVALID_REQUEST.

+      opaque *out = NULL;

What's the reason for this?  It is initialized later on.

+  if (buf == NULL || sizeof_buf == NULL)
+    {
+      gnutls_assert ();
+      return GNUTLS_E_INVALID_REQUEST;
+    }

This is quite wrong: read the documentation for the function, buf can be
NULL.  The same applies to a couple of more instance, and I stopped reading.

Some of the stuff is good, so please rework the patch and I'll review again.

/Simon


    _______________________________________________________

Reply to this item at:

  <http://savannah.gnu.org/support/?107539>

_______________________________________________
  Message sent via/by Savannah
  http://savannah.gnu.org/





More information about the Gnutls-devel mailing list