summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--apps/pkcs12.c6
-rw-r--r--test/recipes/80-test_pkcs12.t14
2 files changed, 18 insertions, 2 deletions
diff --git a/apps/pkcs12.c b/apps/pkcs12.c
index b442d358f8..af4f9fce04 100644
--- a/apps/pkcs12.c
+++ b/apps/pkcs12.c
@@ -855,7 +855,11 @@ int dump_certs_keys_p12(BIO *out, const PKCS12 *p12, const char *pass,
} else if (bagnid == NID_pkcs7_encrypted) {
if (options & INFO) {
BIO_printf(bio_err, "PKCS7 Encrypted data: ");
- alg_print(p7->d.encrypted->enc_data->algorithm);
+ if (p7->d.encrypted == NULL) {
+ BIO_printf(bio_err, "<no data>\n");
+ } else {
+ alg_print(p7->d.encrypted->enc_data->algorithm);
+ }
}
bags = PKCS12_unpack_p7encdata(p7, pass, passlen);
} else {
diff --git a/test/recipes/80-test_pkcs12.t b/test/recipes/80-test_pkcs12.t
index 4c5bb5744b..de26cbdca4 100644
--- a/test/recipes/80-test_pkcs12.t
+++ b/test/recipes/80-test_pkcs12.t
@@ -54,7 +54,7 @@ if (eval { require Win32::API; 1; }) {
}
$ENV{OPENSSL_WIN32_UTF8}=1;
-plan tests => 17;
+plan tests => 20;
# Test different PKCS#12 formats
ok(run(test(["pkcs12_format_test"])), "test pkcs12 formats");
@@ -162,11 +162,23 @@ with({ exit_checker => sub { return shift == 1; } },
"-nomacver"])),
"test bad pkcs12 file 1 (nomacver)");
+ ok(run(app(["openssl", "pkcs12", "-in", $bad1, "-password", "pass:",
+ "-info"])),
+ "test bad pkcs12 file 1 (info)");
+
ok(run(app(["openssl", "pkcs12", "-in", $bad2, "-password", "pass:"])),
"test bad pkcs12 file 2");
+ ok(run(app(["openssl", "pkcs12", "-in", $bad2, "-password", "pass:",
+ "-info"])),
+ "test bad pkcs12 file 2 (info)");
+
ok(run(app(["openssl", "pkcs12", "-in", $bad3, "-password", "pass:"])),
"test bad pkcs12 file 3");
+
+ ok(run(app(["openssl", "pkcs12", "-in", $bad3, "-password", "pass:",
+ "-info"])),
+ "test bad pkcs12 file 3 (info)");
});
SetConsoleOutputCP($savedcp) if (defined($savedcp));