зеркало из https://github.com/mozilla/gecko-dev.git
c4dab46f9c
In reimplementing the OCSP fetching code in bug 1456489, we improperly translated an assertion that relied on the nullness of a pointer to rely on the length of a data structure that was populated by reference. It turns out that this made the assertion invalid because we could return a successful result and have filled the data structure with zero-length data and it still would be valid to operate on (the decoding code returns a malformed input result in this case). To fix this, we can simply remove the assertion. This patch also adds a test to exercise this case. Differential Revision: https://phabricator.services.mozilla.com/D8883 --HG-- extra : moz-landing-system : lando |
||
---|---|---|
.. | ||
tests/gtest | ||
BRNameMatchingPolicy.cpp | ||
BRNameMatchingPolicy.h | ||
CertVerifier.cpp | ||
CertVerifier.h | ||
ExtendedValidation.cpp | ||
ExtendedValidation.h | ||
NSSCertDBTrustDomain.cpp | ||
NSSCertDBTrustDomain.h | ||
OCSPCache.cpp | ||
OCSPCache.h | ||
OCSPVerificationTrustDomain.cpp | ||
OCSPVerificationTrustDomain.h | ||
TrustOverride-AppleGoogleDigiCertData.inc | ||
TrustOverride-GlobalSignData.inc | ||
TrustOverride-StartComAndWoSignData.inc | ||
TrustOverride-SymantecData.inc | ||
TrustOverride-TestImminentDistrustData.inc | ||
TrustOverrideUtils.h | ||
moz.build |