Blame SOURCES/openssl-fips-0.9.8e-cve-2013-0166.patch

c4366c
diff -up openssl-fips-0.9.8e/CHANGES.ocsp-dos openssl-fips-0.9.8e/CHANGES
c4366c
diff -up openssl-fips-0.9.8e/crypto/asn1/a_verify.c.ocsp-dos openssl-fips-0.9.8e/crypto/asn1/a_verify.c
c4366c
--- openssl-fips-0.9.8e/crypto/asn1/a_verify.c.ocsp-dos	2005-05-09 02:27:32.000000000 +0200
c4366c
+++ openssl-fips-0.9.8e/crypto/asn1/a_verify.c	2013-02-25 11:34:37.011201995 +0100
c4366c
@@ -133,6 +133,12 @@ int ASN1_item_verify(const ASN1_ITEM *it
c4366c
 	unsigned char *buf_in=NULL;
c4366c
 	int ret= -1,i,inl;
c4366c
 
c4366c
+	if (!pkey)
c4366c
+		{
c4366c
+		ASN1err(ASN1_F_ASN1_ITEM_VERIFY, ERR_R_PASSED_NULL_PARAMETER);
c4366c
+		return -1;
c4366c
+		}
c4366c
+
c4366c
 	EVP_MD_CTX_init(&ctx;;
c4366c
 	i=OBJ_obj2nid(a->algorithm);
c4366c
 	type=EVP_get_digestbyname(OBJ_nid2sn(i));
c4366c
diff -up openssl-fips-0.9.8e/crypto/ocsp/ocsp_vfy.c.ocsp-dos openssl-fips-0.9.8e/crypto/ocsp/ocsp_vfy.c
c4366c
--- openssl-fips-0.9.8e/crypto/ocsp/ocsp_vfy.c.ocsp-dos	2006-11-13 14:23:05.000000000 +0100
c4366c
+++ openssl-fips-0.9.8e/crypto/ocsp/ocsp_vfy.c	2013-02-25 11:34:38.363204929 +0100
c4366c
@@ -91,9 +91,12 @@ int OCSP_basic_verify(OCSP_BASICRESP *bs
c4366c
 		{
c4366c
 		EVP_PKEY *skey;
c4366c
 		skey = X509_get_pubkey(signer);
c4366c
-		ret = OCSP_BASICRESP_verify(bs, skey, 0);
c4366c
-		EVP_PKEY_free(skey);
c4366c
-		if(ret <= 0)
c4366c
+		if (skey)
c4366c
+			{
c4366c
+			ret = OCSP_BASICRESP_verify(bs, skey, 0);
c4366c
+			EVP_PKEY_free(skey);
c4366c
+			}
c4366c
+		if(!skey || ret <= 0)
c4366c
 			{
c4366c
 			OCSPerr(OCSP_F_OCSP_BASIC_VERIFY, OCSP_R_SIGNATURE_FAILURE);
c4366c
 			goto end;