diff options
author | slontis <shane.lontis@oracle.com> | 2022-11-27 22:49:17 +0100 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2022-11-29 13:58:19 +0100 |
commit | 450f96e965f0d5e89737755364df5933b5085639 (patch) | |
tree | 9b2e71e8e9d884abed8bfb998b7d041d801a5352 /test/hpke_test.c | |
parent | Fix occasional assertion failure when storing properties (diff) | |
download | openssl-450f96e965f0d5e89737755364df5933b5085639.tar.xz openssl-450f96e965f0d5e89737755364df5933b5085639.zip |
Fix Coverity issues in HPKE
CID 1517043 and 1517038: (Forward NULL) - Removed redundant check that is already
done by the caller. It was complaining that it checked for ctlen == NULL
and then did a goto that used this *ctlen.
CID 1517042 and 1517041: (Forward NULL) - Similar to above for ptlen in
hpke_aead_dec()
CID 1517040: Remove unneeded logging. This gets rid of the warning
related to taking the sizeof(&)
CID 1517039: Check returned value of RAND_bytes_ex() in hpke_test
CID 1517038: Check return result of KEM_INFO_find() in
OSSL_HPKE_get_recomended_ikmelen. Even though this is a false positive,
it should not rely on the internals of other function calls.
Changed some goto's into returns to match OpenSSL coding guidelines.
Removed Raises from calls to _new which fail from malloc calls.
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/19774)
Diffstat (limited to 'test/hpke_test.c')
-rw-r--r-- | test/hpke_test.c | 19 |
1 files changed, 4 insertions, 15 deletions
diff --git a/test/hpke_test.c b/test/hpke_test.c index 1d334f09ad..80fe6dea50 100644 --- a/test/hpke_test.c +++ b/test/hpke_test.c @@ -1008,11 +1008,10 @@ static int test_hpke_modes_suites(void) overallresult = 0; } if (COIN_IS_HEADS) { - RAND_bytes_ex(testctx, - (unsigned char *) &startseq, - sizeof(startseq), - RAND_DRBG_STRENGTH); - if (!TEST_true(OSSL_HPKE_CTX_set_seq(ctx, startseq))) + if (!TEST_int_eq(1, RAND_bytes_ex(testctx, + (unsigned char *) &startseq, + sizeof(startseq), 0)) + || !TEST_true(OSSL_HPKE_CTX_set_seq(ctx, startseq))) overallresult = 0; } else { startseq = 0; @@ -1207,8 +1206,6 @@ static int test_hpke_suite_strs(void) char sstr[128]; OSSL_HPKE_SUITE stirred; char giant[2048]; - size_t suitesize; - size_t ptr_suitesize; for (kemind = 0; kemind != OSSL_NELEM(kem_str_list); kemind++) { for (kdfind = 0; kdfind != OSSL_NELEM(kdf_str_list); kdfind++) { @@ -1245,14 +1242,6 @@ static int test_hpke_suite_strs(void) if (!TEST_false(OSSL_HPKE_str2suite(giant, &stirred))) overallresult = 0; - /* we'll check the size of a suite just to see what we get */ - suitesize = sizeof(stirred); - ptr_suitesize = sizeof(&stirred); - if (verbose) { - TEST_note("Size of OSSL_HPKE_SUITE is %d, size of ptr is %d", - (int) suitesize, (int) ptr_suitesize); - } - return overallresult; } |