Fixed unmatched BN_CTX_start/end if an invalid exponent is used.
authorShane Lontis <shane.lontis@oracle.com>
Sun, 24 Mar 2019 23:52:28 +0000 (09:52 +1000)
committerPauli <paul.dale@oracle.com>
Fri, 29 Mar 2019 02:41:43 +0000 (12:41 +1000)
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8569)

crypto/rsa/rsa_sp800_56b_gen.c

index 221136bd0c500712a6d35b2452fa279f101585d0..50c5bf14bea20aa65733add915e740303d565660 100644 (file)
@@ -71,7 +71,7 @@ int rsa_fips186_4_gen_prob_primes(RSA *rsa, BIGNUM *p1, BIGNUM *p2,
     if (!rsa_check_public_exponent(e)) {
         RSAerr(RSA_F_RSA_FIPS186_4_GEN_PROB_PRIMES,
                RSA_R_PUB_EXPONENT_OUT_OF_RANGE);
-        goto err;
+        return 0;
     }
 
     /* (Step 3) Determine strength and check rand generator strength is ok -