openssl/crypto/ocsp
Shane Lontis 5c10724387 Add some additional NULL checks to prevent segfaults.
Fixes #14809

PR #14752 attempted to pass the libctx, propq in a few places related to
X509 signing. There were a few places that needed additional NULL checks so that they behavethe same as they did before.

OCSP_basic_sign() was changed to call EVP_DigestSignInit_ex() which passed the parameter EVP_MD_name(dgst). Since dgst can be NULL EVP_MD_name() was segfaulting.
Adding an additional NULL check EVP_MD_name() resolves this issue.

The other NULL checks are required to produce errors rather than
segfaults if the certificate is NULL.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14826)
2021-04-14 16:05:00 +10:00
..
build.info
ocsp_asn.c
ocsp_cl.c Fix more certificate related lib_ctx settings. 2021-04-08 11:30:44 +10:00
ocsp_err.c ERR: Rebuild all generated error headers and source files 2020-11-24 15:22:33 +01:00
ocsp_ext.c Fix safestack issues in asn1.h 2020-09-13 11:10:40 +01:00
ocsp_http.c HTTP: Fix method_POST param by moving it to OSSL_HTTP_REQ_CTX_set_request_line() 2021-03-31 19:51:52 +02:00
ocsp_lib.c Convert all {NAME}err() in crypto/ to their corresponding ERR_raise() call 2020-11-13 09:35:02 +01:00
ocsp_local.h Fix more certificate related lib_ctx settings. 2021-04-08 11:30:44 +10:00
ocsp_prn.c Fix safestack issues in ocsp.h 2020-09-13 11:10:41 +01:00
ocsp_srv.c Add some additional NULL checks to prevent segfaults. 2021-04-14 16:05:00 +10:00
ocsp_vfy.c Fix more certificate related lib_ctx settings. 2021-04-08 11:30:44 +10:00
v3_ocsp.c Add ossl_v3 symbols 2021-03-18 17:52:37 +10:00