diff options
author | Shane Lontis <shane.lontis@oracle.com> | 2019-03-25 09:52:28 +1000 |
---|---|---|
committer | Pauli <paul.dale@oracle.com> | 2019-03-29 12:41:43 +1000 |
commit | 952abb152189715f7b035d5446af947ec41e8a4b (patch) | |
tree | da466f736a2ca1cb80abb483882091aaf8903849 | |
parent | 711a161f03ef9ed7cd149a22bf1203700c103e96 (diff) |
Fixed unmatched BN_CTX_start/end if an invalid exponent is used.
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8569)
-rw-r--r-- | crypto/rsa/rsa_sp800_56b_gen.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/rsa/rsa_sp800_56b_gen.c b/crypto/rsa/rsa_sp800_56b_gen.c index 221136bd0c..50c5bf14be 100644 --- a/crypto/rsa/rsa_sp800_56b_gen.c +++ b/crypto/rsa/rsa_sp800_56b_gen.c @@ -71,7 +71,7 @@ int rsa_fips186_4_gen_prob_primes(RSA *rsa, BIGNUM *p1, BIGNUM *p2, if (!rsa_check_public_exponent(e)) { RSAerr(RSA_F_RSA_FIPS186_4_GEN_PROB_PRIMES, RSA_R_PUB_EXPONENT_OUT_OF_RANGE); - goto err; + return 0; } /* (Step 3) Determine strength and check rand generator strength is ok - |