[gnutls-devel] GnuTLS | OSCP: Fixed check null pointer OCSP resp to *_read_value() (!963)

Development of GNU's TLS library gnutls-devel at lists.gnutls.org
Thu Apr 4 09:52:08 CEST 2019




Tim Rühsen started a new discussion on lib/x509/ocsp.c:

>  	uint8_t cdn_hash[MAX_HASH_SIZE];
>  	size_t t, hash_len;
>  
> +	if (resp == NULL) {
> +		ret = gnutls_assert_val(GNUTLS_E_OCSP_RESPONSE_ERROR);

At this point, please just return directly. AFAICS, the return value should be GNUTLS_E_INVALID_REQUEST for invalid input params.
```
if (resp == NULL)
	return gnutls_assert_val(GNUTLS_E_INVALID_REQUEST);

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/merge_requests/963#note_157269285
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20190404/afb38847/attachment.html>


More information about the Gnutls-devel mailing list