diff options
author | tb <> | 2023-11-09 08:29:53 +0000 |
---|---|---|
committer | tb <> | 2023-11-09 08:29:53 +0000 |
commit | f4de482637e4d61f59303836548839990a5d26a7 (patch) | |
tree | 52b20f9d43bbe50d322dc5f0371f87bf773e84a2 /src/lib/libcrypto/ec/ecx_methods.c | |
parent | 8971cd29872eb39b36b3eebd20ec60aa15b2c2b0 (diff) | |
download | openbsd-f4de482637e4d61f59303836548839990a5d26a7.tar.gz openbsd-f4de482637e4d61f59303836548839990a5d26a7.tar.bz2 openbsd-f4de482637e4d61f59303836548839990a5d26a7.zip |
Fix X509_ALGOR_set0() usage in rsa_alg_set_oaep_padding()
Replace X509_ALGOR_set0() with X509_ALGOR_set0_by_nid(). This way there
is no missing error checking for OBJ_nid2obj() and no nested functions.
Slightly more importantly, this plugs two long standing potential leaks
in this function (or previously rsa_cms_encrypt()) due to missing error
checking: in the unlikely event that X509_ALGOR_set0() failed, astr/ostr
would leak.
ok jsing
Diffstat (limited to 'src/lib/libcrypto/ec/ecx_methods.c')
0 files changed, 0 insertions, 0 deletions