TLS client: Fix peer certificate event checking for probing
conn->cred might be NULL here, so check for that explicitly before checking whether conn->cred->cert_probe is set. This fixes a potential NULL pointer dereference when going through peer certificates with event_cb functionality enabled. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
		
							parent
							
								
									e5bffe1aa9
								
							
						
					
					
						commit
						fdd8a2f0b8
					
				
					 1 changed files with 1 additions and 1 deletions
				
			
		|  | @ -290,7 +290,7 @@ static void tls_peer_cert_event(struct tlsv1_client *conn, int depth, | ||||||
| 		return; | 		return; | ||||||
| 
 | 
 | ||||||
| 	os_memset(&ev, 0, sizeof(ev)); | 	os_memset(&ev, 0, sizeof(ev)); | ||||||
| 	if (conn->cred->cert_probe || conn->cert_in_cb) { | 	if ((conn->cred && conn->cred->cert_probe) || conn->cert_in_cb) { | ||||||
| 		cert_buf = wpabuf_alloc_copy(cert->cert_start, | 		cert_buf = wpabuf_alloc_copy(cert->cert_start, | ||||||
| 					     cert->cert_len); | 					     cert->cert_len); | ||||||
| 		ev.peer_cert.cert = cert_buf; | 		ev.peer_cert.cert = cert_buf; | ||||||
|  |  | ||||||
		Loading…
	
		Reference in a new issue
	
	 Jouni Malinen
						Jouni Malinen