Merge pull request #6484 from JacobBarthelmeh/cov

coverity scan fixes
This commit is contained in:
Sean Parkinson
2023-06-08 10:06:18 +10:00
committed by GitHub
4 changed files with 29 additions and 11 deletions

View File

@@ -2375,6 +2375,7 @@ int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
if (err == 1) {
wolfSSL_free(ssl);
wolfSSL_BIO_free(sslBio);
sslBio = NULL;
wolfSSL_BIO_free(connBio);
}

View File

@@ -360,8 +360,7 @@ static int der_to_enc_pem_alloc(unsigned char* der, int derSz,
DYNAMIC_TYPE_TMP_BUFFER);
if (tmpBuf == NULL) {
WOLFSSL_ERROR_MSG("Extending DER buffer failed");
XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
ret = 0;
ret = 0; /* der buffer is free'd at the end of the function */
}
else {
der = tmpBuf;

View File

@@ -223,9 +223,26 @@ WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_new(void)
return newExt;
}
/* Clear out and free internal pointers of ASN.1 STRING object.
*
* @param [in] asn1 ASN.1 STRING object.
*/
static void wolfSSL_ASN1_STRING_clear(WOLFSSL_ASN1_STRING* asn1)
{
/* Check we have an object to free. */
if (asn1 != NULL) {
/* Dispose of dynamic data. */
if ((asn1->length > 0) && asn1->isDynamic) {
XFREE(asn1->data, NULL, DYNAMIC_TYPE_OPENSSL);
}
XMEMSET(asn1, 0, sizeof(WOLFSSL_ASN1_STRING));
}
}
void wolfSSL_X509_EXTENSION_free(WOLFSSL_X509_EXTENSION* x)
{
WOLFSSL_ASN1_STRING asn1;
WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_free");
if (x == NULL)
return;
@@ -234,10 +251,7 @@ void wolfSSL_X509_EXTENSION_free(WOLFSSL_X509_EXTENSION* x)
wolfSSL_ASN1_OBJECT_free(x->obj);
}
asn1 = x->value;
if (asn1.length > 0 && asn1.data != NULL && asn1.isDynamic)
XFREE(asn1.data, NULL, DYNAMIC_TYPE_OPENSSL);
wolfSSL_ASN1_STRING_clear(&x->value);
wolfSSL_sk_pop_free(x->ext_sk, NULL);
XFREE(x, NULL, DYNAMIC_TYPE_X509_EXT);
@@ -304,7 +318,7 @@ WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_create_by_OBJ(
/* Prevent potential memory leaks and dangling pointers. */
wolfSSL_ASN1_OBJECT_free(ret->obj);
ret->obj = NULL;
wolfSSL_ASN1_STRING_free(&ret->value);
wolfSSL_ASN1_STRING_clear(&ret->value);
}
if (err == 0) {
@@ -586,6 +600,7 @@ static int wolfssl_dns_entry_othername_to_gn(DNS_entry* dns,
/* Next is: [0]. Check tag and length. */
if (GetASNTag(p, &idx, &tag, (word32)len) < 0) {
wolfSSL_ASN1_OBJECT_free(obj);
goto err;
}
if (tag != (ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED | 0)) {
@@ -1218,6 +1233,7 @@ WOLFSSL_X509_EXTENSION* wolfSSL_X509_set_ext(WOLFSSL_X509* x509, int loc)
x509->ext_sk = wolfSSL_sk_new_x509_ext();
if (wolfSSL_sk_X509_EXTENSION_push(x509->ext_sk, ext) == WOLFSSL_FAILURE) {
wolfSSL_X509_EXTENSION_free(ext);
ext = NULL;
}
FreeDecodedCert(cert);
@@ -13949,7 +13965,9 @@ int wolfSSL_X509_REQ_add1_attr_by_NID(WOLFSSL_X509 *req,
else {
if (req->reqAttributes == NULL) {
req->reqAttributes = wolfSSL_sk_new_node(req->heap);
req->reqAttributes->type = STACK_TYPE_X509_REQ_ATTR;
if (req->reqAttributes != NULL) {
req->reqAttributes->type = STACK_TYPE_X509_REQ_ATTR;
}
}
ret = wolfSSL_sk_push(req->reqAttributes, attr);
}

View File

@@ -16694,8 +16694,8 @@ static int DecodeSEP(ASNGetData* dataASN, DecodedCert* cert)
cert->hwTypeSz = (int)oidLen;
/* TODO: check this is the HW serial number OID - no test data. */
/* Allocate space for HW serial number. */
cert->hwSerialNum = (byte*)XMALLOC(serialLen, cert->heap,
/* Allocate space for HW serial number, +1 for null terminator. */
cert->hwSerialNum = (byte*)XMALLOC(serialLen + 1, cert->heap,
DYNAMIC_TYPE_X509_EXT);
if (cert->hwSerialNum == NULL) {
WOLFSSL_MSG("\tOut of Memory");