[gnutls-devel] GnuTLS | OSCP: Fixed check null pointer OCSP resp to *_read_value() (!963)

Development of GNU's TLS library gnutls-devel at lists.gnutls.org
Thu Apr 4 15:32:04 CEST 2019




Elta Koepp commented on a discussion on lib/x509/ocsp.c:

>  	time_t rtime, vtime, ntime, now;
>  	int ret;
>  
> +	if (resp == NULL) {

@rockdaboot , this is a internal function and checked,
```c
static int
_ocsp_resp_verify_direct(gnutls_ocsp_resp_t resp,
			 gnutls_x509_crt_t signercert,
			 unsigned int *verify, unsigned int flags)
{
	... SKIP

	if (resp == NULL || signercert == NULL) {
		gnutls_assert();
		return GNUTLS_E_INVALID_REQUEST;
	}
       ... SKIP
```

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/merge_requests/963#note_157435252
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20190404/9fe3387a/attachment-0001.html>


More information about the Gnutls-devel mailing list