From c39f7578765859d7416e4140c92d034c8cae3341 Mon Sep 17 00:00:00 2001 From: Jakub Jelen Date: Wed, 8 Nov 2017 15:35:08 +0100 Subject: [PATCH] pki_crypto: Avoid potential memory leak Signed-off-by: Jakub Jelen Reviewed-by: Andreas Schneider --- src/pki_crypto.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/src/pki_crypto.c b/src/pki_crypto.c index 30f49a81..d9f7753a 100644 --- a/src/pki_crypto.c +++ b/src/pki_crypto.c @@ -453,7 +453,7 @@ int pki_key_generate_dss(ssh_key key, int parameter){ int rc; #if OPENSSL_VERSION_NUMBER > 0x10100000L key->dsa = DSA_new(); - if (!key->dsa) { + if (key->dsa == NULL) { return SSH_ERROR; } rc = DSA_generate_parameters_ex(key->dsa, @@ -464,6 +464,8 @@ int pki_key_generate_dss(ssh_key key, int parameter){ NULL, /* h_ret */ NULL); /* cb */ if (rc != 1) { + DSA_free(key->dsa); + key->dsa = NULL; return SSH_ERROR; } #else -- 2.19.1