diff options
author | jsing <> | 2018-06-14 17:14:12 +0000 |
---|---|---|
committer | jsing <> | 2018-06-14 17:14:12 +0000 |
commit | 79620b4c52c925d67e045a74f684717cb6cc0856 (patch) | |
tree | 935d43e6234c1286ace54aa96d3c1845135a1904 /src/lib/libcrypto/dsa/dsa_err.c | |
parent | e5b20cdab05d12e65e8a92db59c2a96ef66cce0a (diff) | |
download | openbsd-79620b4c52c925d67e045a74f684717cb6cc0856.tar.gz openbsd-79620b4c52c925d67e045a74f684717cb6cc0856.tar.bz2 openbsd-79620b4c52c925d67e045a74f684717cb6cc0856.zip |
Fix a potential leak/incorrect return value in DSA signature generation.
In the very unlikely case where we have to repeat the signature generation,
the DSA_SIG return value has already been allocated. This will either
result in a leak when we allocate again on the next iteration, or it
will give a false success (with missing signature values) if any error
occurs on the next iteration.
ok tb@
Diffstat (limited to 'src/lib/libcrypto/dsa/dsa_err.c')
0 files changed, 0 insertions, 0 deletions