The branch master has been updated via 952abb152189715f7b035d5446af947ec41e8a4b (commit) from 711a161f03ef9ed7cd149a22bf1203700c103e96 (commit)
- Log ----------------------------------------------------------------- commit 952abb152189715f7b035d5446af947ec41e8a4b Author: Shane Lontis <shane.lon...@oracle.com> Date: Mon Mar 25 09:52:28 2019 +1000 Fixed unmatched BN_CTX_start/end if an invalid exponent is used. Reviewed-by: Tim Hudson <t...@openssl.org> Reviewed-by: Kurt Roeckx <k...@roeckx.be> Reviewed-by: Paul Dale <paul.d...@oracle.com> (Merged from https://github.com/openssl/openssl/pull/8569) ----------------------------------------------------------------------- Summary of changes: crypto/rsa/rsa_sp800_56b_gen.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/rsa/rsa_sp800_56b_gen.c b/crypto/rsa/rsa_sp800_56b_gen.c index 221136b..50c5bf1 100644 --- a/crypto/rsa/rsa_sp800_56b_gen.c +++ b/crypto/rsa/rsa_sp800_56b_gen.c @@ -71,7 +71,7 @@ int rsa_fips186_4_gen_prob_primes(RSA *rsa, BIGNUM *p1, BIGNUM *p2, if (!rsa_check_public_exponent(e)) { RSAerr(RSA_F_RSA_FIPS186_4_GEN_PROB_PRIMES, RSA_R_PUB_EXPONENT_OUT_OF_RANGE); - goto err; + return 0; } /* (Step 3) Determine strength and check rand generator strength is ok -