summaryrefslogtreecommitdiff
path: root/ext/openssl/ossl_x509revoked.c
diff options
context:
space:
mode:
authorKazuki Yamaguchi <[email protected]>2025-01-07 02:14:46 +0900
committergit <[email protected]>2025-02-11 16:42:25 +0000
commit8888ad6902b0bb12bab0a1d16389e30f4916f413 (patch)
tree12640c770b8af5af31e6f0632abbf58cb36bae78 /ext/openssl/ossl_x509revoked.c
parentdedd05e9c81c210b201f5569ce83d9748f8bb2ab (diff)
[ruby/openssl] ossl.c: avoid using sk_*() functions with NULL
Always use explicit NULL checks before interacting with STACK_OF(*). Even though most OpenSSL functions named sk_*() do not crash if we pass NULL as the receiver object, depending on this behavior would be a bad idea. Checks for a negative number return from sk_*_num() are removed. This can only happen when the stack is NULL. ossl_*_sk2ary() must no longer be called with NULL. https://github.com/ruby/openssl/commit/84cffd4f77
Diffstat (limited to 'ext/openssl/ossl_x509revoked.c')
0 files changed, 0 insertions, 0 deletions