openssl/crypto/dsa
Matt Caswell 1ff7425d61 Fix a missing NULL check in dsa_builtin_paramgen
We should check the last BN_CTX_get() call to ensure that it isn't NULL
before we try and use any of the allocated BIGNUMs.

Issue reported by Shi Lei.

Reviewed-by: Richard Levitte <levitte@openssl.org>
2016-09-21 13:32:30 +01:00
..
build.info
dsa_ameth.c Constify private key decode. 2016-08-17 12:01:29 +01:00
dsa_asn1.c Don't allocate r/s in DSA_SIG and ECDSA_SIG 2016-07-20 14:02:54 +01:00
dsa_depr.c Useless header include of openssl/rand.h 2016-06-18 16:30:24 -04:00
dsa_err.c Check for errors allocating the error strings. 2016-07-20 19:20:53 +02:00
dsa_gen.c Fix a missing NULL check in dsa_builtin_paramgen 2016-09-21 13:32:30 +01:00
dsa_key.c Useless header include of openssl/rand.h 2016-06-18 16:30:24 -04:00
dsa_lib.c Add DSA_bits() function. 2016-08-01 19:37:42 +01:00
dsa_locl.h Deal with API changes. 2016-06-24 14:40:33 +01:00
dsa_meth.c Deal with API changes. 2016-06-24 14:40:33 +01:00
dsa_ossl.c Don't allocate r/s in DSA_SIG and ECDSA_SIG 2016-07-20 14:02:54 +01:00
dsa_pmeth.c Copyright consolidation 07/10 2016-05-17 14:51:26 -04:00
dsa_prn.c Copyright consolidation 07/10 2016-05-17 14:51:26 -04:00
dsa_sign.c Useless header include of openssl/rand.h 2016-06-18 16:30:24 -04:00
dsa_vrf.c Copyright consolidation 07/10 2016-05-17 14:51:26 -04:00