From nobody Sat May 18 23:23:37 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1693571599; cv=none; d=zohomail.com; s=zohoarc; b=RuenkG3+QmitjW7qutExhwdkSbvfRTbNZ0l7CoBRcQfFKn5jxP89dzMYzsCIS3CQNqqoSGYd2DUADZZZU7k8xxYRo2oWIZ88HEJT4dhTFQJThjiN2RA/oY7k02aLgtYn0unlQXFdpkdKGiDTvfGqifzbhGVDRTlRljkoyjFcd3g= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1693571599; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To; bh=4qjcwZML5WNcqa2TqT8DipTZtsUBetYmXXLYlwc2OtE=; b=llJHgu5PrZqG3FETs5h5bQn+zpO3loK9YiVkLvvNW6ElNvXgDB8P/A4pkv4Q6s5DcNg9KfTwCRx1a5QdztZhqele1ji5PpS/vctKOW00MqQa/VRF9CjS7OA25JUagPHNMMecX+357s/PN97mcSRT48Ahl1sdGIrWnOVjt7tH9so= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1693571599874678.9112490336612; Fri, 1 Sep 2023 05:33:19 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1qc3KH-0006P3-Va; Fri, 01 Sep 2023 08:32:37 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1qc3KG-0006Og-25 for qemu-devel@nongnu.org; Fri, 01 Sep 2023 08:32:36 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1qc3KC-0000uc-KA for qemu-devel@nongnu.org; Fri, 01 Sep 2023 08:32:35 -0400 Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-660-Nu1OyHSkM_GVPAdt1G6xtw-1; Fri, 01 Sep 2023 08:32:27 -0400 Received: from smtp.corp.redhat.com (int-mx09.intmail.prod.int.rdu2.redhat.com [10.11.54.9]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 9302810264F3; Fri, 1 Sep 2023 12:32:27 +0000 (UTC) Received: from blackfin.pond.sub.org (unknown [10.39.192.30]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 40F7C493110; Fri, 1 Sep 2023 12:32:27 +0000 (UTC) Received: by blackfin.pond.sub.org (Postfix, from userid 1000) id 3BA0221E692A; Fri, 1 Sep 2023 14:32:26 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1693571551; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=4qjcwZML5WNcqa2TqT8DipTZtsUBetYmXXLYlwc2OtE=; b=ga0KkUA27VyuyoHxhIzlGqOyqGJUTpJgEBMqPQiTU1iiS43KaWdOzprO2FnH3UmU6N0wRM oQUdFJyyeR53+Vs+AAIt3SmgyXeJNn4du0VbTm0hP7Fr5bVGIMwKuqiPJMow92IgazeOI+ Rfzt7XqJ9XyHPC/ftAomqJBoreLnYsQ= X-MC-Unique: Nu1OyHSkM_GVPAdt1G6xtw-1 From: Markus Armbruster To: qemu-devel@nongnu.org Cc: helei.sig11@bytedance.com, pizhenwei@bytedance.com, berrange@redhat.com Subject: [PATCH] crypto/rsakey-builtin.c.inc: Clean up two error paths Date: Fri, 1 Sep 2023 14:32:26 +0200 Message-ID: <20230901123226.3656164-1-armbru@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.1 on 10.11.54.9 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.133.124; envelope-from=armbru@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1693571601788100001 Content-Type: text/plain; charset="utf-8" When qcrypto_builtin_rsa_public_key_parse() is about to fail, but no error has been set, it makes one up. Actually, there's just one way to fail without setting an error. Set it there instead. Same for qcrypto_builtin_rsa_private_key_parse(). Signed-off-by: Markus Armbruster Reviewed-by: Daniel P. Berrang=C3=A9 --- crypto/rsakey-builtin.c.inc | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/crypto/rsakey-builtin.c.inc b/crypto/rsakey-builtin.c.inc index aeeacc8f9b..46cc7afe87 100644 --- a/crypto/rsakey-builtin.c.inc +++ b/crypto/rsakey-builtin.c.inc @@ -88,15 +88,13 @@ static QCryptoAkCipherRSAKey *qcrypto_builtin_rsa_publi= c_key_parse( goto error; } if (seq_length !=3D 0) { + error_setg(errp, "Invalid RSA public key"); goto error; } =20 return rsa; =20 error: - if (errp && !*errp) { - error_setg(errp, "Invalid RSA public key"); - } qcrypto_akcipher_rsakey_free(rsa); return NULL; } @@ -169,15 +167,13 @@ static QCryptoAkCipherRSAKey *qcrypto_builtin_rsa_pri= vate_key_parse( return rsa; } if (seq_length !=3D 0) { + error_setg(errp, "Invalid RSA private key"); goto error; } =20 return rsa; =20 error: - if (errp && !*errp) { - error_setg(errp, "Invalid RSA private key"); - } qcrypto_akcipher_rsakey_free(rsa); return NULL; } --=20 2.41.0