diff options
author | Dr. Stephen Henson <steve@openssl.org> | 2011-05-25 17:05:39 +0200 |
---|---|---|
committer | Dr. Stephen Henson <steve@openssl.org> | 2011-05-25 17:05:39 +0200 |
commit | be1242cbd11f01a9915bf4b79f5647fab9a826b6 (patch) | |
tree | 328a75839821b44591a183ad50712e204348b323 /apps | |
parent | Fix the ECDSA timing attack mentioned in the paper at: (diff) | |
download | openssl-be1242cbd11f01a9915bf4b79f5647fab9a826b6.tar.xz openssl-be1242cbd11f01a9915bf4b79f5647fab9a826b6.zip |
PR: 2527
Submitted by: Marcus Meissner <meissner@suse.de>
Reviewed by: steve
Set cnf to NULL to avoid possible double free.
Diffstat (limited to 'apps')
-rw-r--r-- | apps/asn1pars.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/apps/asn1pars.c b/apps/asn1pars.c index b5d65e725b..0d6607071f 100644 --- a/apps/asn1pars.c +++ b/apps/asn1pars.c @@ -408,6 +408,7 @@ static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf) atyp = ASN1_generate_nconf(genstr, cnf); NCONF_free(cnf); + cnf = NULL; if (!atyp) return -1; |