forked from wolfSSL/wolfssl
static analysis check of null dereference and memory management
This commit is contained in:
@ -9504,8 +9504,10 @@ int wolfSSL_set_compression(WOLFSSL* ssl)
|
||||
void wolfSSL_CTX_set_default_passwd_cb(WOLFSSL_CTX* ctx, pem_password_cb cb)
|
||||
{
|
||||
WOLFSSL_ENTER("SSL_CTX_set_default_passwd_cb");
|
||||
if (ctx != NULL) {
|
||||
ctx->passwd_cb = cb;
|
||||
}
|
||||
}
|
||||
|
||||
int wolfSSL_num_locks(void)
|
||||
{
|
||||
|
@ -166,8 +166,9 @@ int main(int argc, char** argv)
|
||||
|
||||
printf("Enter the interface number (1-%d): ", i);
|
||||
ret = scanf("%d", &inum);
|
||||
if (ret != 1)
|
||||
if (ret != 1) {
|
||||
printf("scanf port failed\n");
|
||||
}
|
||||
|
||||
if (inum < 1 || inum > i)
|
||||
err_sys("Interface number out of range");
|
||||
|
@ -1457,6 +1457,7 @@ static int wc_PKCS7_KariGenerateKEK(WC_PKCS7_KARI* kari,
|
||||
|
||||
} else {
|
||||
/* bad direction */
|
||||
XFREE(secret, kari->heap, DYNAMIC_TYPE_PKCS7);
|
||||
return BAD_FUNC_ARG;
|
||||
}
|
||||
|
||||
@ -2127,8 +2128,10 @@ static int wc_PKCS7_GenerateIV(WC_RNG* rng, byte* iv, word32 ivSz)
|
||||
return MEMORY_E;
|
||||
|
||||
ret = wc_InitRng(random);
|
||||
if (ret != 0)
|
||||
if (ret != 0) {
|
||||
XFREE(random, NULL, DYNAMIC_TYPE_RNG);
|
||||
return ret;
|
||||
}
|
||||
|
||||
} else {
|
||||
random = rng;
|
||||
|
@ -6675,6 +6675,9 @@ int openssl_test(void)
|
||||
{
|
||||
byte* p;
|
||||
p = (byte*)CRYPTO_malloc(10, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
if (p == NULL) {
|
||||
return -70;
|
||||
}
|
||||
XMEMSET(p, 0, 10);
|
||||
CRYPTO_free(p, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
}
|
||||
|
Reference in New Issue
Block a user