diff options
author | job <> | 2021-09-02 21:12:28 +0000 |
---|---|---|
committer | job <> | 2021-09-02 21:12:28 +0000 |
commit | e8a968d1f886b9d85b50ba5e4a950721f0124e7e (patch) | |
tree | 0ab9eb4c93cb327d57f6c40f15a487488133f5fb /src/lib | |
parent | 194ee12c2b50394a1c0985daebb37c0908b61517 (diff) | |
download | openbsd-e8a968d1f886b9d85b50ba5e4a950721f0124e7e.tar.gz openbsd-e8a968d1f886b9d85b50ba5e4a950721f0124e7e.tar.bz2 openbsd-e8a968d1f886b9d85b50ba5e4a950721f0124e7e.zip |
Fix OPENSSL_assert() and assert()
OK tb@
Diffstat (limited to 'src/lib')
-rw-r--r-- | src/lib/libcrypto/x509/x509_addr.c | 13 | ||||
-rw-r--r-- | src/lib/libcrypto/x509/x509_asid.c | 39 |
2 files changed, 17 insertions, 35 deletions
diff --git a/src/lib/libcrypto/x509/x509_addr.c b/src/lib/libcrypto/x509/x509_addr.c index 7a35b21332..0781ce37a9 100644 --- a/src/lib/libcrypto/x509/x509_addr.c +++ b/src/lib/libcrypto/x509/x509_addr.c | |||
@@ -1063,8 +1063,7 @@ int X509v3_addr_canonize(IPAddrBlocks *addr) | |||
1063 | } | 1063 | } |
1064 | (void)sk_IPAddressFamily_set_cmp_func(addr, IPAddressFamily_cmp); | 1064 | (void)sk_IPAddressFamily_set_cmp_func(addr, IPAddressFamily_cmp); |
1065 | sk_IPAddressFamily_sort(addr); | 1065 | sk_IPAddressFamily_sort(addr); |
1066 | if (!OPENSSL_assert(X509v3_addr_is_canonical(addr))) | 1066 | OPENSSL_assert(X509v3_addr_is_canonical(addr)); |
1067 | return 0; | ||
1068 | return 1; | 1067 | return 1; |
1069 | } | 1068 | } |
1070 | 1069 | ||
@@ -1362,13 +1361,9 @@ static int addr_validate_path_internal(X509_STORE_CTX *ctx, | |||
1362 | int i, j, ret = 1; | 1361 | int i, j, ret = 1; |
1363 | X509 *x; | 1362 | X509 *x; |
1364 | 1363 | ||
1365 | if (!OPENSSL_assert(chain != NULL && sk_X509_num(chain) > 0) | 1364 | OPENSSL_assert(chain != NULL && sk_X509_num(chain) > 0); |
1366 | || !OPENSSL_assert(ctx != NULL || ext != NULL) | 1365 | OPENSSL_assert(ctx != NULL || ext != NULL); |
1367 | || !OPENSSL_assert(ctx == NULL || ctx->verify_cb != NULL)) { | 1366 | OPENSSL_assert(ctx == NULL || ctx->verify_cb != NULL); |
1368 | if (ctx != NULL) | ||
1369 | ctx->error = X509_V_ERR_UNSPECIFIED; | ||
1370 | return 0; | ||
1371 | } | ||
1372 | 1367 | ||
1373 | /* | 1368 | /* |
1374 | * Figure out where to start. If we don't have an extension to | 1369 | * Figure out where to start. If we don't have an extension to |
diff --git a/src/lib/libcrypto/x509/x509_asid.c b/src/lib/libcrypto/x509/x509_asid.c index 9a0992b8a6..e774b097dc 100644 --- a/src/lib/libcrypto/x509/x509_asid.c +++ b/src/lib/libcrypto/x509/x509_asid.c | |||
@@ -304,11 +304,11 @@ static int ASIdOrRange_cmp(const ASIdOrRange *const *a_, | |||
304 | const ASIdOrRange *a = *a_, *b = *b_; | 304 | const ASIdOrRange *a = *a_, *b = *b_; |
305 | 305 | ||
306 | /* XXX: these asserts need to be replaced */ | 306 | /* XXX: these asserts need to be replaced */ |
307 | assert((a->type == ASIdOrRange_id && a->u.id != NULL) || | 307 | OPENSSL_assert((a->type == ASIdOrRange_id && a->u.id != NULL) || |
308 | (a->type == ASIdOrRange_range && a->u.range != NULL && | 308 | (a->type == ASIdOrRange_range && a->u.range != NULL && |
309 | a->u.range->min != NULL && a->u.range->max != NULL)); | 309 | a->u.range->min != NULL && a->u.range->max != NULL)); |
310 | 310 | ||
311 | assert((b->type == ASIdOrRange_id && b->u.id != NULL) || | 311 | OPENSSL_assert((b->type == ASIdOrRange_id && b->u.id != NULL) || |
312 | (b->type == ASIdOrRange_range && b->u.range != NULL && | 312 | (b->type == ASIdOrRange_range && b->u.range != NULL && |
313 | b->u.range->min != NULL && b->u.range->max != NULL)); | 313 | b->u.range->min != NULL && b->u.range->max != NULL)); |
314 | 314 | ||
@@ -414,8 +414,8 @@ int X509v3_asid_add_id_or_range(ASIdentifiers *asid, | |||
414 | static int extract_min_max(ASIdOrRange *aor, | 414 | static int extract_min_max(ASIdOrRange *aor, |
415 | ASN1_INTEGER **min, ASN1_INTEGER **max) | 415 | ASN1_INTEGER **min, ASN1_INTEGER **max) |
416 | { | 416 | { |
417 | if (!OPENSSL_assert(aor != NULL)) | 417 | OPENSSL_assert(aor != NULL); |
418 | return 0; | 418 | |
419 | switch (aor->type) { | 419 | switch (aor->type) { |
420 | case ASIdOrRange_id: | 420 | case ASIdOrRange_id: |
421 | *min = aor->u.id; | 421 | *min = aor->u.id; |
@@ -577,8 +577,7 @@ static int ASIdentifierChoice_canonize(ASIdentifierChoice *choice) | |||
577 | /* | 577 | /* |
578 | * Make sure we're properly sorted (paranoia). | 578 | * Make sure we're properly sorted (paranoia). |
579 | */ | 579 | */ |
580 | if (!OPENSSL_assert(ASN1_INTEGER_cmp(a_min, b_min) <= 0)) | 580 | OPENSSL_assert(ASN1_INTEGER_cmp(a_min, b_min) <= 0); |
581 | goto done; | ||
582 | 581 | ||
583 | /* | 582 | /* |
584 | * Punt inverted ranges. | 583 | * Punt inverted ranges. |
@@ -663,8 +662,7 @@ static int ASIdentifierChoice_canonize(ASIdentifierChoice *choice) | |||
663 | } | 662 | } |
664 | 663 | ||
665 | /* Paranoia */ | 664 | /* Paranoia */ |
666 | if (!OPENSSL_assert(ASIdentifierChoice_is_canonical(choice))) | 665 | OPENSSL_assert(ASIdentifierChoice_is_canonical(choice)); |
667 | goto done; | ||
668 | 666 | ||
669 | ret = 1; | 667 | ret = 1; |
670 | 668 | ||
@@ -907,14 +905,9 @@ static int asid_validate_path_internal(X509_STORE_CTX *ctx, | |||
907 | int i, ret = 1, inherit_as = 0, inherit_rdi = 0; | 905 | int i, ret = 1, inherit_as = 0, inherit_rdi = 0; |
908 | X509 *x; | 906 | X509 *x; |
909 | 907 | ||
910 | if (!OPENSSL_assert(chain != NULL && sk_X509_num(chain) > 0) | 908 | OPENSSL_assert(chain != NULL && sk_X509_num(chain) > 0); |
911 | || !OPENSSL_assert(ctx != NULL || ext != NULL) | 909 | OPENSSL_assert(ctx != NULL || ext != NULL); |
912 | || !OPENSSL_assert(ctx == NULL || ctx->verify_cb != NULL)) { | 910 | OPENSSL_assert(ctx == NULL || ctx->verify_cb != NULL); |
913 | if (ctx != NULL) | ||
914 | ctx->error = X509_V_ERR_UNSPECIFIED; | ||
915 | return 0; | ||
916 | } | ||
917 | |||
918 | 911 | ||
919 | /* | 912 | /* |
920 | * Figure out where to start. If we don't have an extension to | 913 | * Figure out where to start. If we don't have an extension to |
@@ -959,11 +952,8 @@ static int asid_validate_path_internal(X509_STORE_CTX *ctx, | |||
959 | */ | 952 | */ |
960 | for (i++; i < sk_X509_num(chain); i++) { | 953 | for (i++; i < sk_X509_num(chain); i++) { |
961 | x = sk_X509_value(chain, i); | 954 | x = sk_X509_value(chain, i); |
962 | if (!OPENSSL_assert(x != NULL)) { | 955 | OPENSSL_assert(x != NULL); |
963 | if (ctx != NULL) | 956 | |
964 | ctx->error = X509_V_ERR_UNSPECIFIED; | ||
965 | return 0; | ||
966 | } | ||
967 | if (x->rfc3779_asid == NULL) { | 957 | if (x->rfc3779_asid == NULL) { |
968 | if (child_as != NULL || child_rdi != NULL) | 958 | if (child_as != NULL || child_rdi != NULL) |
969 | validation_err(X509_V_ERR_UNNESTED_RESOURCE); | 959 | validation_err(X509_V_ERR_UNNESTED_RESOURCE); |
@@ -1009,11 +999,8 @@ static int asid_validate_path_internal(X509_STORE_CTX *ctx, | |||
1009 | /* | 999 | /* |
1010 | * Trust anchor can't inherit. | 1000 | * Trust anchor can't inherit. |
1011 | */ | 1001 | */ |
1012 | if (!OPENSSL_assert(x != NULL)) { | 1002 | OPENSSL_assert(x != NULL); |
1013 | if (ctx != NULL) | 1003 | |
1014 | ctx->error = X509_V_ERR_UNSPECIFIED; | ||
1015 | return 0; | ||
1016 | } | ||
1017 | if (x->rfc3779_asid != NULL) { | 1004 | if (x->rfc3779_asid != NULL) { |
1018 | if (x->rfc3779_asid->asnum != NULL && | 1005 | if (x->rfc3779_asid->asnum != NULL && |
1019 | x->rfc3779_asid->asnum->type == ASIdentifierChoice_inherit) | 1006 | x->rfc3779_asid->asnum->type == ASIdentifierChoice_inherit) |