From: Emilia Kasper Date: Mon, 31 Aug 2015 11:57:44 +0000 (+0200) Subject: Fix spurious bntest failures. X-Git-Tag: OpenSSL_1_1_0-pre1~765 X-Git-Url: https://git.librecmc.org/?a=commitdiff_plain;h=4d04226c2ec7e7f69f6234def63631648e35e828;p=oweals%2Fopenssl.git Fix spurious bntest failures. BN_bntest_rand generates a single-word zero BIGNUM with quite a large probability. A zero BIGNUM in turn will end up having a NULL |d|-buffer, which we shouldn't dereference without checking. Reviewed-by: Richard Levitte --- diff --git a/test/bntest.c b/test/bntest.c index cf4d2ab3a6..430d2a02b8 100644 --- a/test/bntest.c +++ b/test/bntest.c @@ -526,9 +526,9 @@ int test_div_word(BIO *bp) do { BN_bntest_rand(a, 512, -1, 0); BN_bntest_rand(b, BN_BITS2, -1, 0); - s = b->d[0]; - } while (!s); + } while (BN_is_zero(b)); + s = b->d[0]; BN_copy(b, a); r = BN_div_word(b, s);