Blame SOURCES/coverity_scan.patch
|
|
b5c9dc |
diff --git a/src/dh_crypto.c b/src/dh_crypto.c
|
|
|
b5c9dc |
index a847c6a2..1eb94307 100644
|
|
|
b5c9dc |
--- a/src/dh_crypto.c
|
|
|
b5c9dc |
+++ b/src/dh_crypto.c
|
|
|
b5c9dc |
@@ -341,8 +341,16 @@ int ssh_dh_set_parameters(struct dh_ctx *ctx,
|
|
|
b5c9dc |
goto done;
|
|
|
b5c9dc |
}
|
|
|
b5c9dc |
|
|
|
b5c9dc |
- OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_P, modulus);
|
|
|
b5c9dc |
- OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_G, generator);
|
|
|
b5c9dc |
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_P, modulus);
|
|
|
b5c9dc |
+ if (rc != 1) {
|
|
|
b5c9dc |
+ rc = SSH_ERROR;
|
|
|
b5c9dc |
+ goto done;
|
|
|
b5c9dc |
+ }
|
|
|
b5c9dc |
+ rc = OSSL_PARAM_BLD_push_BN(param_bld, OSSL_PKEY_PARAM_FFC_G, generator);
|
|
|
b5c9dc |
+ if (rc != 1) {
|
|
|
b5c9dc |
+ rc = SSH_ERROR;
|
|
|
b5c9dc |
+ goto done;
|
|
|
b5c9dc |
+ }
|
|
|
b5c9dc |
params = OSSL_PARAM_BLD_to_param(param_bld);
|
|
|
b5c9dc |
if (params == NULL) {
|
|
|
b5c9dc |
OSSL_PARAM_BLD_free(param_bld);
|