Skip to content

Comments

Coverity : various fixup#7359

Closed
FdaSilvaYY wants to merge 2 commits intoopenssl:masterfrom
FdaSilvaYY:coverty/fixup
Closed

Coverity : various fixup#7359
FdaSilvaYY wants to merge 2 commits intoopenssl:masterfrom
FdaSilvaYY:coverty/fixup

Conversation

@FdaSilvaYY
Copy link
Contributor

@FdaSilvaYY FdaSilvaYY commented Oct 7, 2018

Fix:
CID 1338183 (#1 of 1): Improper use of negative value (NEGATIVE_RETURNS)
CID 1371691 (#1 of 1): Improper use of negative value (NEGATIVE_RETURNS)
CID 1371692 (#1 of 1): Improper use of negative value (NEGATIVE_RETURNS)
and a recently introduced one:
CID 1440002 (#1 of 1): Use after free (USE_AFTER_FREE)

Checklist
  • documentation is added or updated
  • tests are added or updated

@FdaSilvaYY FdaSilvaYY changed the title Coverty : fews fixup Coverty : small fixup Oct 7, 2018
@FdaSilvaYY FdaSilvaYY changed the title Coverty : small fixup Coverty : various fixup Oct 7, 2018
@openssl-machine openssl-machine added the hold: cla required The contributor needs to submit a license agreement label Oct 8, 2018
@openssl-machine openssl-machine removed the hold: cla required The contributor needs to submit a license agreement label Oct 8, 2018
@FdaSilvaYY
Copy link
Contributor Author

Fix and rebased; CI's are green !
Ready for review ;)
The crypto/asn1 changes can be merged into 1.1.1 branch too.

@mspncp
Copy link
Contributor

mspncp commented Oct 8, 2018

Just two typos in the commit messages, which I happened to find en passant:

  • Coverty -> Coverity (2 instances)
  • eror -> error

@FdaSilvaYY FdaSilvaYY changed the title Coverty : various fixup Coverity : various fixup Oct 8, 2018
@mattcaswell
Copy link
Member

The crypto/asn1 changes can be merged into 1.1.1 branch too.

Doesn't that also apply to the ocsp change too?

@FdaSilvaYY
Copy link
Contributor Author

FdaSilvaYY commented Oct 9, 2018

The crypto/asn1 changes can be merged into 1.1.1 branch too.

Doesn't that also apply to the ocsp change too?

You are right : the 1st ocsp mem leak fix was merged to 1.1.1 too ;)
so the whole PR can be labeled maser and 1.1.1 .

BTW, is Coverity scanning the master branch only, or not ?

@FdaSilvaYY
Copy link
Contributor Author

Ping @openssl /commiters.
CI (with extended tests) are green, good for review !

@FdaSilvaYY
Copy link
Contributor Author

Ping @mattcaswell , @mspncp : is there something more to do ?

@mattcaswell mattcaswell added branch: master Applies to master branch branch: 1.1.1 Applies to OpenSSL_1_1_1-stable branch (EOL) labels Nov 6, 2018
@FdaSilvaYY FdaSilvaYY force-pushed the coverty/fixup branch 2 times, most recently from 371a55e to c2d1c39 Compare November 17, 2018 18:17
@FdaSilvaYY
Copy link
Contributor Author

Ping @mattcaswell , @mspncp : IMHO, issues are now fixed.

@FdaSilvaYY
Copy link
Contributor Author

Ping @openssl : fixed, and rebased.
Travis is failing on some 'external' tests, because of last changes on Master.

@mspncp
Copy link
Contributor

mspncp commented Dec 7, 2018

Sorry @FdaSilvaYY for letting you wait so long. I'll have a look at it today or tomorrow.

CID 1440002 (#1 of 1): Use after free (USE_AFTER_FREE)
Not a deadly error, because error was just before app exit.
Call to i2d method returns an int value.

Fix:
CID 1338183 (#1 of 1): Improper use of negative value (NEGATIVE_RETURNS)
CID 1371691 (#1 of 1): Improper use of negative value (NEGATIVE_RETURNS)
CID 1371692 (#1 of 1): Improper use of negative value (NEGATIVE_RETURNS)

[extended tests]
@FdaSilvaYY
Copy link
Contributor Author

Ping @openssl : please take a look ;)

@mattcaswell mattcaswell added the approval: done This pull request has the required number of approvals label Dec 14, 2018
levitte pushed a commit that referenced this pull request Dec 22, 2018
CID 1440002 (#1 of 1): Use after free (USE_AFTER_FREE)
Not a deadly error, because error was just before app exit.

Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from #7359)
levitte pushed a commit that referenced this pull request Dec 22, 2018
Call to i2d method returns an int value.

Fix:
CID 1338183 (#1 of 1): Improper use of negative value (NEGATIVE_RETURNS)
CID 1371691 (#1 of 1): Improper use of negative value (NEGATIVE_RETURNS)
CID 1371692 (#1 of 1): Improper use of negative value (NEGATIVE_RETURNS)

[extended tests]

Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from #7359)
levitte pushed a commit that referenced this pull request Dec 22, 2018
CID 1440002 (#1 of 1): Use after free (USE_AFTER_FREE)
Not a deadly error, because error was just before app exit.

Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from #7359)

(cherry picked from commit 39fc4c1)
levitte pushed a commit that referenced this pull request Dec 22, 2018
Call to i2d method returns an int value.

Fix:
CID 1338183 (#1 of 1): Improper use of negative value (NEGATIVE_RETURNS)
CID 1371691 (#1 of 1): Improper use of negative value (NEGATIVE_RETURNS)
CID 1371692 (#1 of 1): Improper use of negative value (NEGATIVE_RETURNS)

[extended tests]

Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from #7359)

(cherry picked from commit da84249)
@mspncp
Copy link
Contributor

mspncp commented Dec 22, 2018

Merged, thank you and sorry for the delay!

master
da84249 Coverity fix in some crypto/asn1 code
39fc4c1 Coverity fix in apps/oscp

1.1.1
7d55056 Coverity fix in some crypto/asn1 code
9318545 Coverity fix in apps/oscp

@mspncp mspncp closed this Dec 22, 2018
@mspncp mspncp added this to the 1.1.1b milestone Dec 23, 2018
@FdaSilvaYY FdaSilvaYY deleted the coverty/fixup branch December 23, 2018 14:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approval: done This pull request has the required number of approvals branch: master Applies to master branch branch: 1.1.1 Applies to OpenSSL_1_1_1-stable branch (EOL)

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants