Fix a memleak in prepare_rsa_params
authorBernd Edlinger <bernd.edlinger@hotmail.de>
Mon, 11 Sep 2023 10:34:02 +0000 (12:34 +0200)
committerTomas Mraz <tomas@openssl.org>
Wed, 13 Sep 2023 05:47:19 +0000 (07:47 +0200)
commit76385c3766289e3399e852706dca7dc19509f364
tree167ac99cd16ea05ed5612a88c8104ba92e1ed0b8
parentff3d5bc2eadaede933f3a64bbf041253e1b52976
Fix a memleak in prepare_rsa_params

This affects only RSA-PSS keys with params using
negative salt legth, or in case of out of memory.
This fixes a memory leak reported in #22049.

Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22061)

(cherry picked from commit 46def829afa4d8bed8f53d484bdf842d65f0e176)
providers/implementations/encode_decode/encode_key2any.c