Skip to content

Conversation

@stanhu
Copy link
Contributor

@stanhu stanhu commented Oct 21, 2025

In OpenSSL <= 1.1.1, EVP_PKEY_get0() always returned a valid object, so a NULL check was not necessary. In OpenSSL 3.0, the function can return NULL (https://docs.openssl.org/3.0/man7/migration_guide/#deprecated-function-mappings), so guard against this issue.

In OpenSSL <= 1.1.1, EVP_PKEY_get0() always returned a valid object, so
a NULL check was not necessary. In OpenSSL 3.0, the function can return
NULL (https://docs.openssl.org/3.0/man7/migration_guide/#deprecated-function-mappings),
so guard against this issue.
@rhenium rhenium changed the base branch from master to maint-3.1 October 27, 2025 05:55
@rhenium rhenium force-pushed the sh-check-null-evp-pkey-get branch from 49ad23e to dc90b9c Compare October 27, 2025 05:55
@rhenium
Copy link
Member

rhenium commented Oct 27, 2025

Fixed indentation and rebased on top of the oldest maintenance branch.

@rhenium rhenium linked an issue Oct 27, 2025 that may be closed by this pull request
Copy link
Member

@rhenium rhenium left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks!

@rhenium rhenium merged commit b9834f6 into ruby:maint-3.1 Oct 27, 2025
47 of 56 checks passed
@rhenium
Copy link
Member

rhenium commented Oct 27, 2025

I've pushed v3.1.3, v3.2.3, and v3.3.2 with this fix.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Operating on provider keys causes an immediate crash

2 participants