Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752324AbbKYTE3 (ORCPT ); Wed, 25 Nov 2015 14:04:29 -0500 Received: from mail-wm0-f68.google.com ([74.125.82.68]:35755 "EHLO mail-wm0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751270AbbKYTEW (ORCPT ); Wed, 25 Nov 2015 14:04:22 -0500 From: Ameen X-Google-Original-From: Ameen To: herbert@gondor.apana.org.au, davem@davemloft.net, dhowells@redhat.com Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Ameen Subject: [PATCH 2/2] updating for keypayload null check. Date: Wed, 25 Nov 2015 21:04:15 +0200 Message-Id: <1448478255-5443-1-git-send-email-AmeenAli023@gmail.com> X-Mailer: git-send-email 2.5.0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 957 Lines: 30 adding NULL check to make it fail safe. Signed-Off-By : Ameen Ali --- crypto/asymmetric_keys/x509_public_key.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/crypto/asymmetric_keys/x509_public_key.c b/crypto/asymmetric_keys/x509_public_key.c index 2a44b37..76610cc 100644 --- a/crypto/asymmetric_keys/x509_public_key.c +++ b/crypto/asymmetric_keys/x509_public_key.c @@ -286,6 +286,10 @@ static int x509_key_preparse(struct key_preparsed_payload *prep) char *desc = NULL, *p; int ret; + if(prep == NULL){ + pr_debug("NULL payload"); + return PTR_ERR(prep); + } cert = x509_cert_parse(prep->data, prep->datalen); if (IS_ERR(cert)) return PTR_ERR(cert); -- 2.5.0 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/