diff options
author | Hubert Kario <hkario@redhat.com> | 2021-06-25 13:34:31 +0200 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2021-06-29 12:15:40 +0200 |
commit | b2eabccbe52d57f009b351700b472b42195380d9 (patch) | |
tree | 988938c7d863aa976715749b82078e18e08d3145 /doc | |
parent | f0b9e75e4f9d6ae74389cd1b019b77cf2bd01033 (diff) | |
download | openssl-new-b2eabccbe52d57f009b351700b472b42195380d9.tar.gz |
doc: make error checking in ticket handling code explicit
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15918)
Diffstat (limited to 'doc')
-rw-r--r-- | doc/man3/SSL_CTX_set_tlsext_ticket_key_cb.pod | 14 |
1 files changed, 10 insertions, 4 deletions
diff --git a/doc/man3/SSL_CTX_set_tlsext_ticket_key_cb.pod b/doc/man3/SSL_CTX_set_tlsext_ticket_key_cb.pod index e658e6c83e..f4730066fa 100644 --- a/doc/man3/SSL_CTX_set_tlsext_ticket_key_cb.pod +++ b/doc/man3/SSL_CTX_set_tlsext_ticket_key_cb.pod @@ -179,14 +179,17 @@ Reference Implementation: } memcpy(key_name, key->name, 16); - EVP_EncryptInit_ex(&ctx, EVP_aes_256_cbc(), NULL, key->aes_key, iv); + if (EVP_EncryptInit_ex(&ctx, EVP_aes_256_cbc(), NULL, key->aes_key, + iv) == 0) + return -1; /* error in cipher initialisation */ params[0] = OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_KEY, key->hmac_key, 32); params[1] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST, "sha256", 0); params[2] = OSSL_PARAM_construct_end(); - EVP_MAC_CTX_set_params(hctx, params); + if (EVP_MAC_CTX_set_params(hctx, params) == 0) + return -1; /* error in mac initialisation */ return 1; @@ -202,9 +205,12 @@ Reference Implementation: params[1] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST, "sha256", 0); params[2] = OSSL_PARAM_construct_end(); - EVP_MAC_CTX_set_params(hctx, params); + if (EVP_MAC_CTX_set_params(hctx, params) == 0) + return -1; /* error in mac initialisation */ - EVP_DecryptInit_ex(&ctx, EVP_aes_256_cbc(), NULL, key->aes_key, iv); + if (EVP_DecryptInit_ex(&ctx, EVP_aes_256_cbc(), NULL, key->aes_key, + iv) == 0) + return -1; /* error in cipher initialisation */ if (key->expire < t - RENEW_TIME) { /* RENEW_TIME: implement */ /* |