Blame SOURCES/nss-3.67-fix-coverity-issues.patch

c2a015
diff -up ./lib/pk11wrap/pk11cxt.c.coverity ./lib/pk11wrap/pk11cxt.c
c2a015
--- ./lib/pk11wrap/pk11cxt.c.coverity	2021-06-18 09:36:19.499203028 -0700
c2a015
+++ ./lib/pk11wrap/pk11cxt.c	2021-06-18 09:37:57.993765299 -0700
c2a015
@@ -382,7 +382,7 @@ pk11_CreateNewContextInSlot(CK_MECHANISM
c2a015
      * of the connection.*/
c2a015
     context->fortezzaHack = PR_FALSE;
c2a015
     if (type == CKM_SKIPJACK_CBC64) {
c2a015
-        if (symKey->origin == PK11_OriginFortezzaHack) {
c2a015
+        if (symKey && (symKey->origin == PK11_OriginFortezzaHack)) {
c2a015
             context->fortezzaHack = PR_TRUE;
c2a015
         }
c2a015
     }
c2a015
diff -up ./lib/pk11wrap/pk11hpke.c.coverity ./lib/pk11wrap/pk11hpke.c
c2a015
--- ./lib/pk11wrap/pk11hpke.c.coverity	2021-06-18 13:40:05.410644464 -0700
c2a015
+++ ./lib/pk11wrap/pk11hpke.c	2021-06-18 13:42:40.627606469 -0700
c2a015
@@ -1164,8 +1164,6 @@ PK11_HPKE_Seal(HpkeContext *cx, const SE
c2a015
     unsigned char tagBuf[HASH_LENGTH_MAX];
c2a015
     size_t tagLen;
c2a015
     unsigned int fixedBits;
c2a015
-    PORT_Assert(cx->baseNonce->len == sizeof(ivOut));
c2a015
-    PORT_Memcpy(ivOut, cx->baseNonce->data, cx->baseNonce->len);
c2a015
 
c2a015
     /* aad may be NULL, PT may be zero-length but not NULL. */
c2a015
     if (!cx || !cx->aeadContext ||
c2a015
@@ -1176,6 +1174,9 @@ PK11_HPKE_Seal(HpkeContext *cx, const SE
c2a015
         return SECFailure;
c2a015
     }
c2a015
 
c2a015
+    PORT_Assert(cx->baseNonce->len == sizeof(ivOut));
c2a015
+    PORT_Memcpy(ivOut, cx->baseNonce->data, cx->baseNonce->len);
c2a015
+
c2a015
     tagLen = cx->aeadParams->tagLen;
c2a015
     maxOut = pt->len + tagLen;
c2a015
     fixedBits = (cx->baseNonce->len - 8) * 8;
c2a015
diff -up ./lib/softoken/sftkike.c.coverity ./lib/softoken/sftkike.c
c2a015
--- ./lib/softoken/sftkike.c.coverity	2021-06-18 09:33:59.633405513 -0700
c2a015
+++ ./lib/softoken/sftkike.c	2021-06-18 09:34:20.305523382 -0700
c2a015
@@ -1411,7 +1411,6 @@ sftk_fips_IKE_PowerUpSelfTests(void)
c2a015
         (outKeySize != sizeof(ike_known_sha256_prf_plus)) ||
c2a015
         (PORT_Memcmp(outKeyData, ike_known_sha256_prf_plus,
c2a015
                      sizeof(ike_known_sha256_prf_plus)) != 0)) {
c2a015
-        PORT_ZFree(outKeyData, outKeySize);
c2a015
         PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
c2a015
         return SECFailure;
c2a015
     }