[gnutls-devel] GnuTLS | OSCP: Fixed check null pointer OCSP resp to *_read_value() (!963)
Development of GNU's TLS library
gnutls-devel at lists.gnutls.org
Thu Apr 4 09:52:08 CEST 2019
Tim Rühsen started a new discussion on lib/x509/ocsp.c:
> uint8_t cdn_hash[MAX_HASH_SIZE];
> size_t t, hash_len;
>
> + if (resp == NULL) {
> + ret = gnutls_assert_val(GNUTLS_E_OCSP_RESPONSE_ERROR);
At this point, please just return directly. AFAICS, the return value should be GNUTLS_E_INVALID_REQUEST for invalid input params.
```
if (resp == NULL)
return gnutls_assert_val(GNUTLS_E_INVALID_REQUEST);
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/merge_requests/963#note_157269285
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20190404/afb38847/attachment.html>
More information about the Gnutls-devel
mailing list