add a check for the return of sk_SRP_gN_new_null() so that capture the potential memory error in time

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/19435)
This commit is contained in:
xkernel 2022-10-19 00:54:26 +08:00 committed by Pauli
parent fdc5043d58
commit f44d32fdfb

View File

@ -391,7 +391,7 @@ static BIGNUM *SRP_gN_place_bn(STACK_OF(SRP_gN_cache) *gN_cache, char *ch)
int SRP_VBASE_init(SRP_VBASE *vb, char *verifier_file)
{
int error_code;
int error_code = SRP_ERR_MEMORY;
STACK_OF(SRP_gN) *SRP_gN_tab = sk_SRP_gN_new_null();
char *last_index = NULL;
int i;
@ -403,6 +403,9 @@ int SRP_VBASE_init(SRP_VBASE *vb, char *verifier_file)
TXT_DB *tmpdb = NULL;
BIO *in = BIO_new(BIO_s_file());
if (SRP_gN_tab == NULL)
goto err;
error_code = SRP_ERR_OPEN_FILE;
if (in == NULL || BIO_read_filename(in, verifier_file) <= 0)