mirror of
https://github.com/openssl/openssl.git
synced 2025-04-06 20:20:50 +08:00
Fix a memleak in prepare_rsa_params
This affects only RSA-PSS keys with params using negative salt legth, or in case of out of memory. This fixes a memory leak reported in #22049. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22061)
This commit is contained in:
parent
123c85864f
commit
46def829af
@ -856,14 +856,17 @@ static int prepare_rsa_params(const void *rsa, int nid, int save,
|
||||
case 1:
|
||||
if ((str = OPENSSL_malloc(str_sz)) == NULL
|
||||
|| !WPACKET_init_der(&pkt, str, str_sz)) {
|
||||
WPACKET_cleanup(&pkt);
|
||||
goto err;
|
||||
}
|
||||
break;
|
||||
}
|
||||
if (!ossl_DER_w_RSASSA_PSS_params(&pkt, -1, pss)
|
||||
|| !WPACKET_finish(&pkt)
|
||||
|| !WPACKET_get_total_written(&pkt, &str_sz))
|
||||
|| !WPACKET_get_total_written(&pkt, &str_sz)) {
|
||||
WPACKET_cleanup(&pkt);
|
||||
goto err;
|
||||
}
|
||||
WPACKET_cleanup(&pkt);
|
||||
|
||||
/*
|
||||
|
Loading…
x
Reference in New Issue
Block a user