mirror of https://github.com/openssl/openssl.git
coverity 1497107: dereference after null check
Add null checks to avoid dereferencing a pointer that could be null. Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/17488)
This commit is contained in:
parent
941c877bdb
commit
2ee3e38f8f
|
|
@ -696,10 +696,13 @@ int load_cert_certs(const char *uri,
|
|||
if (ret) {
|
||||
if (pcert != NULL)
|
||||
warn_cert(uri, *pcert, 0, vpm);
|
||||
warn_certs(uri, *pcerts, 1, vpm);
|
||||
if (pcerts != NULL)
|
||||
warn_certs(uri, *pcerts, 1, vpm);
|
||||
} else {
|
||||
sk_X509_pop_free(*pcerts, X509_free);
|
||||
*pcerts = NULL;
|
||||
if (pcerts != NULL) {
|
||||
sk_X509_pop_free(*pcerts, X509_free);
|
||||
*pcerts = NULL;
|
||||
}
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
|
|
|
|||
Loading…
Reference in New Issue