Add a missing SSLfatal call
authorMatt Caswell <matt@openssl.org>
Thu, 8 Nov 2018 14:03:17 +0000 (14:03 +0000)
committerMatt Caswell <matt@openssl.org>
Thu, 15 Nov 2018 11:48:08 +0000 (11:48 +0000)
A missing SSLfatal call can result in an assertion failed error if the
condition gets triggered.

Reviewed-by: Tim Hudson <tjh@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7594)

ssl/s3_msg.c
ssl/t1_enc.c

index 42382547fb2abbed9d411e08bffa2af3d5a7c13c..040a7284b0b5ce1ca6765f77efc069668f9755a5 100644 (file)
@@ -26,12 +26,16 @@ int ssl3_do_change_cipher_spec(SSL *s)
         }
 
         s->session->cipher = s->s3->tmp.new_cipher;
-        if (!s->method->ssl3_enc->setup_key_block(s))
+        if (!s->method->ssl3_enc->setup_key_block(s)) {
+            /* SSLfatal() already called */
             return 0;
+        }
     }
 
-    if (!s->method->ssl3_enc->change_cipher_state(s, i))
+    if (!s->method->ssl3_enc->change_cipher_state(s, i)) {
+        /* SSLfatal() already called */
         return 0;
+    }
 
     return 1;
 }
index 2db913fb0687fd010efccd5744b2fece94df999c..2be37c76b23fbc6a73167aaa5921a8656bd630bf 100644 (file)
@@ -131,8 +131,11 @@ int tls1_change_cipher_state(SSL *s, int which)
         }
         dd = s->enc_read_ctx;
         mac_ctx = ssl_replace_hash(&s->read_hash, NULL);
-        if (mac_ctx == NULL)
+        if (mac_ctx == NULL) {
+            SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS1_CHANGE_CIPHER_STATE,
+                     ERR_R_INTERNAL_ERROR);
             goto err;
+        }
 #ifndef OPENSSL_NO_COMP
         COMP_CTX_free(s->expand);
         s->expand = NULL;