diff options
author | jsing <> | 2021-05-02 16:00:33 +0000 |
---|---|---|
committer | jsing <> | 2021-05-02 16:00:33 +0000 |
commit | 00bc6c73637e1a664708ad0a6fd34c5b904543de (patch) | |
tree | 4377b53e0d791f96203b97539d53c44bbb21a39b /src/lib/libssl/ssl_clnt.c | |
parent | 95894891643b71343cea462391dd9b572d549079 (diff) | |
download | openbsd-00bc6c73637e1a664708ad0a6fd34c5b904543de.tar.gz openbsd-00bc6c73637e1a664708ad0a6fd34c5b904543de.tar.bz2 openbsd-00bc6c73637e1a664708ad0a6fd34c5b904543de.zip |
Ensure that handshake hash is non-NULL in tls1_transcript_hash_value().
There are several paths where a subtle bug could result in
tls1_transcript_hash_value() being called with a NULL handshake hash - add
an explicit check for this case. As noted by tb@, due to the wonders of
the libcrypto EVP APIs, combined with integer promotion, we already have
a NULL check - this one is just more obvious.
ok tb@
Diffstat (limited to 'src/lib/libssl/ssl_clnt.c')
0 files changed, 0 insertions, 0 deletions