@@ -196,9 +196,7 @@ int pkcs7_add_signed_data(CBB *out,
196
196
}
197
197
198
198
int PKCS7_set_type (PKCS7 * p7 , int type ) {
199
- ASN1_OBJECT * obj ;
200
-
201
- obj = OBJ_nid2obj (type );
199
+ ASN1_OBJECT * obj = OBJ_nid2obj (type );
202
200
if (obj == NULL ) {
203
201
OPENSSL_PUT_ERROR (PKCS7 , PKCS7_R_UNSUPPORTED_CONTENT_TYPE );
204
202
return 0 ;
@@ -276,11 +274,8 @@ int PKCS7_set_type(PKCS7 *p7, int type) {
276
274
277
275
int PKCS7_set_cipher (PKCS7 * p7 , const EVP_CIPHER * cipher )
278
276
{
279
- int i ;
280
277
PKCS7_ENC_CONTENT * ec ;
281
-
282
- i = OBJ_obj2nid (p7 -> type );
283
- switch (i ) {
278
+ switch (OBJ_obj2nid (p7 -> type )) {
284
279
case NID_pkcs7_signedAndEnveloped :
285
280
ec = p7 -> d .signed_and_enveloped -> enc_data ;
286
281
break ;
@@ -304,8 +299,7 @@ int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher)
304
299
305
300
int PKCS7_set_content (PKCS7 * p7 , PKCS7 * p7_data )
306
301
{
307
- int i = OBJ_obj2nid (p7 -> type );
308
- switch (i ) {
302
+ switch (OBJ_obj2nid (p7 -> type )) {
309
303
case NID_pkcs7_signed :
310
304
PKCS7_free (p7 -> d .sign -> contents );
311
305
p7 -> d .sign -> contents = p7_data ;
@@ -344,11 +338,8 @@ int PKCS7_content_new(PKCS7 *p7, int type)
344
338
}
345
339
346
340
int PKCS7_add_recipient_info (PKCS7 * p7 , PKCS7_RECIP_INFO * ri ) {
347
- int i ;
348
341
STACK_OF (PKCS7_RECIP_INFO ) * sk ;
349
-
350
- i = OBJ_obj2nid (p7 -> type );
351
- switch (i ) {
342
+ switch (OBJ_obj2nid (p7 -> type )) {
352
343
case NID_pkcs7_signedAndEnveloped :
353
344
sk = p7 -> d .signed_and_enveloped -> recipientinfo ;
354
345
break ;
@@ -360,8 +351,9 @@ int PKCS7_add_recipient_info(PKCS7 *p7, PKCS7_RECIP_INFO *ri) {
360
351
return 0 ;
361
352
}
362
353
363
- if (!sk_PKCS7_RECIP_INFO_push (sk , ri ))
354
+ if (!sk_PKCS7_RECIP_INFO_push (sk , ri )) {
364
355
return 0 ;
356
+ }
365
357
return 1 ;
366
358
}
367
359
@@ -397,8 +389,6 @@ int PKCS7_add_signer(PKCS7 *p7, PKCS7_SIGNER_INFO *p7i) {
397
389
}
398
390
}
399
391
if (!alg_found ) {
400
- int nid ;
401
-
402
392
if ((alg = X509_ALGOR_new ()) == NULL
403
393
|| (alg -> parameter = ASN1_TYPE_new ()) == NULL ) {
404
394
X509_ALGOR_free (alg );
@@ -409,7 +399,7 @@ int PKCS7_add_signer(PKCS7 *p7, PKCS7_SIGNER_INFO *p7i) {
409
399
* If there is a constant copy of the ASN1 OBJECT in libcrypto, then
410
400
* use that. Otherwise, use a dynamically duplicated copy
411
401
*/
412
- nid = OBJ_obj2nid (obj );
402
+ int nid = OBJ_obj2nid (obj );
413
403
if (nid != NID_undef ) {
414
404
alg -> algorithm = OBJ_nid2obj (nid );
415
405
} else {
@@ -430,6 +420,7 @@ int PKCS7_add_signer(PKCS7 *p7, PKCS7_SIGNER_INFO *p7i) {
430
420
431
421
ASN1_TYPE * PKCS7_get_signed_attribute (const PKCS7_SIGNER_INFO * si , int nid ) {
432
422
if (si == NULL ) {
423
+ OPENSSL_PUT_ERROR (PKCS7 , ERR_R_PASSED_NULL_PARAMETER );
433
424
return NULL ;
434
425
}
435
426
for (size_t i = 0 ; i < sk_X509_ATTRIBUTE_num (si -> auth_attr ); i ++ ) {
@@ -444,6 +435,7 @@ ASN1_TYPE *PKCS7_get_signed_attribute(const PKCS7_SIGNER_INFO *si, int nid) {
444
435
445
436
STACK_OF (PKCS7_SIGNER_INFO ) * PKCS7_get_signer_info (PKCS7 * p7 ) {
446
437
if (p7 == NULL || p7 -> d .ptr == NULL ) {
438
+ OPENSSL_PUT_ERROR (PKCS7 , ERR_R_PASSED_NULL_PARAMETER );
447
439
return NULL ;
448
440
} else if (PKCS7_type_is_signed (p7 )) {
449
441
return p7 -> d .sign -> signer_info ;
@@ -457,6 +449,7 @@ int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey,
457
449
const EVP_MD * dgst ) {
458
450
/* We now need to add another PKCS7_SIGNER_INFO entry */
459
451
if (!p7i || !dgst || !pkey || !dgst ) {
452
+ OPENSSL_PUT_ERROR (PKCS7 , ERR_R_PASSED_NULL_PARAMETER );
460
453
return 0 ;
461
454
} else if (!ASN1_INTEGER_set (p7i -> version , 1 )) {
462
455
return 0 ;
@@ -518,9 +511,9 @@ int PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey,
518
511
519
512
int PKCS7_RECIP_INFO_set (PKCS7_RECIP_INFO * p7i , X509 * x509 ) {
520
513
if (!p7i || !x509 ) {
514
+ OPENSSL_PUT_ERROR (PKCS7 , ERR_R_PASSED_NULL_PARAMETER );
521
515
return 0 ;
522
516
}
523
- EVP_PKEY * pkey = NULL ;
524
517
if (!ASN1_INTEGER_set (p7i -> version , 0 )) {
525
518
return 0 ;
526
519
} else if (!X509_NAME_set (& p7i -> issuer_and_serial -> issuer ,
@@ -534,7 +527,7 @@ int PKCS7_RECIP_INFO_set(PKCS7_RECIP_INFO *p7i, X509 *x509) {
534
527
return 0 ;
535
528
}
536
529
537
- pkey = X509_get0_pubkey (x509 );
530
+ EVP_PKEY * pkey = X509_get0_pubkey (x509 );
538
531
if (pkey == NULL ) {
539
532
return 0 ;
540
533
}
@@ -559,6 +552,9 @@ int PKCS7_RECIP_INFO_set(PKCS7_RECIP_INFO *p7i, X509 *x509) {
559
552
void PKCS7_SIGNER_INFO_get0_algs (PKCS7_SIGNER_INFO * si , EVP_PKEY * * pk ,
560
553
X509_ALGOR * * pdig , X509_ALGOR * * psig )
561
554
{
555
+ if (!si ) {
556
+ return ;
557
+ }
562
558
if (pk ) {
563
559
* pk = si -> pkey ;
564
560
}
@@ -572,6 +568,9 @@ void PKCS7_SIGNER_INFO_get0_algs(PKCS7_SIGNER_INFO *si, EVP_PKEY **pk,
572
568
573
569
void PKCS7_RECIP_INFO_get0_alg (PKCS7_RECIP_INFO * ri , X509_ALGOR * * penc )
574
570
{
571
+ if (!ri ) {
572
+ return ;
573
+ }
575
574
if (penc ) {
576
575
* penc = ri -> key_enc_algor ;
577
576
}
0 commit comments