[openssl-commits] [openssl] master update

2017-09-17 Thread paul . dale
The branch master has been updated
   via  d2ef6e4ecc517de9d3d7f71180a6855f1f4d3243 (commit)
  from  9be34ee5c8576539a929d5b396ad071aed525f43 (commit)


- Log -
commit d2ef6e4ecc517de9d3d7f71180a6855f1f4d3243
Author: Pauli 
Date:   Mon Sep 18 12:17:18 2017 +1000

Stack sorting safety

Use the defined typechecking stack method to sort the compression methods 
stack
rather than using the generic function and apply type casts.

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/4382)

---

Summary of changes:
 fuzz/client.c | 2 +-
 fuzz/server.c | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/fuzz/client.c b/fuzz/client.c
index 1f4a411..ce6d8cc 100644
--- a/fuzz/client.c
+++ b/fuzz/client.c
@@ -49,7 +49,7 @@ int FuzzerInitialize(int *argc, char ***argv)
 idx = SSL_get_ex_data_X509_STORE_CTX_idx();
 FuzzerSetRand();
 comp_methods = SSL_COMP_get_compression_methods();
-OPENSSL_sk_sort((OPENSSL_STACK *)comp_methods);
+sk_SSL_COMP_sort(comp_methods);
 
 
 return 1;
diff --git a/fuzz/server.c b/fuzz/server.c
index e51ce10..c31cf7f 100644
--- a/fuzz/server.c
+++ b/fuzz/server.c
@@ -496,7 +496,7 @@ int FuzzerInitialize(int *argc, char ***argv)
 idx = SSL_get_ex_data_X509_STORE_CTX_idx();
 FuzzerSetRand();
 comp_methods = SSL_COMP_get_compression_methods();
-OPENSSL_sk_sort((OPENSSL_STACK *)comp_methods);
+sk_SSL_COMP_sort(comp_methods);
 
 
 return 1;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2017-09-17 Thread paul . dale
The branch OpenSSL_1_1_0-stable has been updated
   via  de6db95d7bc9a0f8993d4e125028a02a7ec46e96 (commit)
  from  af51a74ade8bbab5ed49a3560dcb70d89896dc29 (commit)


- Log -
commit de6db95d7bc9a0f8993d4e125028a02a7ec46e96
Author: Pauli 
Date:   Mon Sep 18 06:52:13 2017 +1000

Null pointer used.
Address coverity report of null pointer being dereferenced.

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/4381)

(cherry picked from commit 9be34ee5c8576539a929d5b396ad071aed525f43)

---

Summary of changes:
 crypto/ct/ct_log.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/ct/ct_log.c b/crypto/ct/ct_log.c
index ec6fa38..d442322 100644
--- a/crypto/ct/ct_log.c
+++ b/crypto/ct/ct_log.c
@@ -199,7 +199,7 @@ int CTLOG_STORE_load_file(CTLOG_STORE *store, const char 
*file)
 CTLOG_STORE_LOAD_CTX* load_ctx = ctlog_store_load_ctx_new();
 
 if (load_ctx == NULL)
-goto end;
+return 0;
 load_ctx->log_store = store;
 load_ctx->conf = NCONF_new(NULL);
 if (load_ctx->conf == NULL)
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2017-09-17 Thread paul . dale
The branch master has been updated
   via  9be34ee5c8576539a929d5b396ad071aed525f43 (commit)
  from  3edabd3ccb7aac89af5a63cfb2378e33a8be05d7 (commit)


- Log -
commit 9be34ee5c8576539a929d5b396ad071aed525f43
Author: Pauli 
Date:   Mon Sep 18 06:52:13 2017 +1000

Null pointer used.
Address coverity report of null pointer being dereferenced.

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/4381)

---

Summary of changes:
 crypto/ct/ct_log.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/ct/ct_log.c b/crypto/ct/ct_log.c
index ec6fa38..d442322 100644
--- a/crypto/ct/ct_log.c
+++ b/crypto/ct/ct_log.c
@@ -199,7 +199,7 @@ int CTLOG_STORE_load_file(CTLOG_STORE *store, const char 
*file)
 CTLOG_STORE_LOAD_CTX* load_ctx = ctlog_store_load_ctx_new();
 
 if (load_ctx == NULL)
-goto end;
+return 0;
 load_ctx->log_store = store;
 load_ctx->conf = NCONF_new(NULL);
 if (load_ctx->conf == NULL)
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Coverity Scan: Analysis completed for openssl/openssl

2017-09-17 Thread scan-admin

Your request for analysis of openssl/openssl has been completed 
successfully.
The results are available at 
https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRakUl6QyjujEohY7rPpoYUEcf-2B75FkFkxwwFKGZV8c1xA-3D-3D_19DGMz38yO7VfzGQuXkecdlEmzBoDG4v8Dvyanv-2F1I0Q9rJS9hZWvFMG7qksvOOyjVbCIuU3GLMNSXSQ-2BWHomMK1UifCO-2FxpNg2C-2FPZDMrojY4oiXyWYLqfMgH9L-2BoH13ZabGWFQ-2F0ZLX5HHtOomosWfXCmA1aeHB51MqMgAeMDDGX1AQQg1kzlrD325XrFCUFtYI2PvLJp8TKbVJLjgz08Eg8WDA-2BXINPrFlamAwxM-3D

Analysis Summary:
   New defects found: 1
   Defects eliminated: 0

If you have difficulty understanding any defects, email us at 
scan-ad...@coverity.com,
or post your question to StackOverflow
at 
https://u2389337.ct.sendgrid.net/wf/click?upn=OgIsEqWzmIl4S-2FzEUMxLXL-2BukuZt9UUdRZhgmgzAKchwAzH1nH3073xDEXNRgHN6q227lMNIWoOb8ZgSjAjKcg-3D-3D_19DGMz38yO7VfzGQuXkecdlEmzBoDG4v8Dvyanv-2F1I0Q9rJS9hZWvFMG7qksvOOyjVbCIuU3GLMNSXSQ-2BWHomKG1IAyRI7ZR3-2BhN2S4kfGHSbPPMlZk-2BMTXE8AtIwinY2gMGFQ1UsjBtiLMpfom6RgdnLsZ0p96LO-2F5ikn4OORWm3VjpZflpHJvoWKLHSPbolNwLy4ClNRyr799NxOJym-2FgjgTGSv3FJdC0zgtLlYxc-3D
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits