summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/dsa/dsa_err.c
diff options
context:
space:
mode:
authorjsing <>2018-06-14 17:14:12 +0000
committerjsing <>2018-06-14 17:14:12 +0000
commit79620b4c52c925d67e045a74f684717cb6cc0856 (patch)
tree935d43e6234c1286ace54aa96d3c1845135a1904 /src/lib/libcrypto/dsa/dsa_err.c
parente5b20cdab05d12e65e8a92db59c2a96ef66cce0a (diff)
downloadopenbsd-79620b4c52c925d67e045a74f684717cb6cc0856.tar.gz
openbsd-79620b4c52c925d67e045a74f684717cb6cc0856.tar.bz2
openbsd-79620b4c52c925d67e045a74f684717cb6cc0856.zip
Fix a potential leak/incorrect return value in DSA signature generation.
In the very unlikely case where we have to repeat the signature generation, the DSA_SIG return value has already been allocated. This will either result in a leak when we allocate again on the next iteration, or it will give a false success (with missing signature values) if any error occurs on the next iteration. ok tb@
Diffstat (limited to 'src/lib/libcrypto/dsa/dsa_err.c')
0 files changed, 0 insertions, 0 deletions