From 952abb152189715f7b035d5446af947ec41e8a4b Mon Sep 17 00:00:00 2001 From: Shane Lontis Date: Mon, 25 Mar 2019 09:52:28 +1000 Subject: [PATCH] Fixed unmatched BN_CTX_start/end if an invalid exponent is used. Reviewed-by: Tim Hudson Reviewed-by: Kurt Roeckx Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/8569) --- crypto/rsa/rsa_sp800_56b_gen.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/rsa/rsa_sp800_56b_gen.c b/crypto/rsa/rsa_sp800_56b_gen.c index 221136bd0c..50c5bf14be 100644 --- a/crypto/rsa/rsa_sp800_56b_gen.c +++ b/crypto/rsa/rsa_sp800_56b_gen.c @@ -71,7 +71,7 @@ int rsa_fips186_4_gen_prob_primes(RSA *rsa, BIGNUM *p1, BIGNUM *p2, if (!rsa_check_public_exponent(e)) { RSAerr(RSA_F_RSA_FIPS186_4_GEN_PROB_PRIMES, RSA_R_PUB_EXPONENT_OUT_OF_RANGE); - goto err; + return 0; } /* (Step 3) Determine strength and check rand generator strength is ok - -- 2.25.1