Fix potential double free in rsa_keygen pairwise test.
authorShane Lontis <shane.lontis@oracle.com>
Wed, 17 Jun 2020 07:26:47 +0000 (17:26 +1000)
committerRichard Levitte <levitte@openssl.org>
Tue, 23 Jun 2020 10:28:48 +0000 (12:28 +0200)
commit7905806c94b17b1907d5352ceb047dd8d859288c
tree8f64ded43921bd29c4050bd75089b6df9bc6b4c1
parenta4e440d6477b40b04ce825dae14c7f27778ca8f1
Fix potential double free in rsa_keygen pairwise test.

It should never hit this branch of code, so there is no feasible test.
Found due to a similar issue in PR #12176.

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/12177)
crypto/rsa/rsa_gen.c