RT2849: Redundant check of "dsa" variable.
In the current code, the check isn't redundant. And in fact the REAL check was missing. This avoids a NULL-deref crash. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
This commit is contained in:
parent
551ed53b2a
commit
177118fc2b
@ -553,6 +553,11 @@ static void keypair(FILE *in, FILE *out)
|
||||
int n=atoi(value);
|
||||
|
||||
dsa = FIPS_dsa_new();
|
||||
if (!dsa)
|
||||
{
|
||||
fprintf(stderr, "DSA allocation error\n");
|
||||
exit(1);
|
||||
}
|
||||
if (!dsa2 && !dsa_builtin_paramgen(dsa, L, N, NULL, NULL, 0,
|
||||
NULL, NULL, NULL, NULL))
|
||||
{
|
||||
@ -579,8 +584,7 @@ static void keypair(FILE *in, FILE *out)
|
||||
do_bn_print_name(out, "Y",dsa->pub_key);
|
||||
fputs(RESP_EOL, out);
|
||||
}
|
||||
if (dsa)
|
||||
FIPS_dsa_free(dsa);
|
||||
FIPS_dsa_free(dsa);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user