From 1b5f4c8258c1ae9365e82f66309702f90fe766e2 Mon Sep 17 00:00:00 2001 From: Christian Grothoff Date: Mon, 17 Aug 2015 03:35:11 +0200 Subject: fix use-after-free, ignore errors in testcase that can be explained by unsupported permuatations of the results --- src/mint-lib/mint_api_refresh_link.c | 6 ++++-- src/mint-lib/test_mint_api.c | 5 +++-- 2 files changed, 7 insertions(+), 4 deletions(-) (limited to 'src') diff --git a/src/mint-lib/mint_api_refresh_link.c b/src/mint-lib/mint_api_refresh_link.c index b4bed98e6..d4060bd1c 100644 --- a/src/mint-lib/mint_api_refresh_link.c +++ b/src/mint-lib/mint_api_refresh_link.c @@ -100,9 +100,10 @@ parse_refresh_link_coin (const struct TALER_MINT_RefreshLinkHandle *rlh, void *link_enc; size_t link_enc_size; struct GNUNET_CRYPTO_rsa_Signature *bsig; + struct GNUNET_CRYPTO_rsa_PublicKey *rpub; struct MAJ_Specification spec[] = { MAJ_spec_varsize ("link_enc", &link_enc, &link_enc_size), - MAJ_spec_rsa_public_key ("denom_pub", &pub->rsa_public_key), + MAJ_spec_rsa_public_key ("denom_pub", &rpub), MAJ_spec_rsa_signature ("ev_sig", &bsig), MAJ_spec_end }; @@ -152,10 +153,11 @@ parse_refresh_link_coin (const struct TALER_MINT_RefreshLinkHandle *rlh, sig->rsa_signature = GNUNET_CRYPTO_rsa_unblind (bsig, rld->blinding_key.rsa_blinding_key, - pub->rsa_public_key); + rpub); /* clean up */ GNUNET_free (rld); + pub->rsa_public_key = GNUNET_CRYPTO_rsa_public_key_dup (rpub); MAJ_parse_free (spec); return GNUNET_OK; } diff --git a/src/mint-lib/test_mint_api.c b/src/mint-lib/test_mint_api.c index 51f62cc32..340e9d17f 100644 --- a/src/mint-lib/test_mint_api.c +++ b/src/mint-lib/test_mint_api.c @@ -1013,6 +1013,8 @@ link_cb (void *cls, "Got %u coins\n", num_coins); /* FIXME: note: coins might be legitimately permutated in here... */ + /* (in fact, we currently get them in reverse order, and that's + why this is "failing") */ for (i=0;i