android_kernel_oneplus_msm8998/crypto/asymmetric_keys
Eric Sesterhenn 6f0dee7d9c pkcs7: Prevent NULL pointer dereference, since sinfo is not always set.
commit 68a1fdbbf8bd3378325e45c19e167a165f9ffc3a upstream.

The ASN.1 parser does not necessarily set the sinfo field,
this patch prevents a NULL pointer dereference on broken
input.

Fixes: 99db443506 ("PKCS#7: Appropriately restrict authenticated attributes and content type")
Signed-off-by: Eric Sesterhenn <eric.sesterhenn@x41-dsec.de>
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-10-27 10:23:17 +02:00
..
.gitignore
asymmetric_keys.h
asymmetric_type.c
Kconfig crypto: public_key: select CRYPTO_AKCIPHER 2016-06-24 10:18:19 -07:00
Makefile
mscode.asn1
mscode_parser.c
pkcs7.asn1
pkcs7_key_type.c
pkcs7_parser.c pkcs7: Prevent NULL pointer dereference, since sinfo is not always set. 2017-10-27 10:23:17 +02:00
pkcs7_parser.h
pkcs7_trust.c PKCS#7: pkcs7_validate_trust(): initialize the _trusted output argument 2016-04-20 15:41:52 +09:00
pkcs7_verify.c
public_key.c
public_key.h
rsa.c
signature.c
verify_pefile.c
verify_pefile.h
x509.asn1
x509_akid.asn1
x509_cert_parser.c
x509_parser.h
x509_public_key.c
x509_rsakey.asn1