mirror of https://github.com/openssl/openssl.git
				
				
				
			coverity 1497107: dereference after null check
Add null checks to avoid dereferencing a pointer that could be null. Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/17488)
This commit is contained in:
		
							parent
							
								
									941c877bdb
								
							
						
					
					
						commit
						2ee3e38f8f
					
				| 
						 | 
				
			
			@ -696,10 +696,13 @@ int load_cert_certs(const char *uri,
 | 
			
		|||
    if (ret) {
 | 
			
		||||
        if (pcert != NULL)
 | 
			
		||||
            warn_cert(uri, *pcert, 0, vpm);
 | 
			
		||||
        warn_certs(uri, *pcerts, 1, vpm);
 | 
			
		||||
        if (pcerts != NULL)
 | 
			
		||||
            warn_certs(uri, *pcerts, 1, vpm);
 | 
			
		||||
    } else {
 | 
			
		||||
        sk_X509_pop_free(*pcerts, X509_free);
 | 
			
		||||
        *pcerts = NULL;
 | 
			
		||||
        if (pcerts != NULL) {
 | 
			
		||||
            sk_X509_pop_free(*pcerts, X509_free);
 | 
			
		||||
            *pcerts = NULL;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
    return ret;
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue