BUG/MINOR: ssl: Memory leak of DH BIGNUM fields

When running HAProxy with OpenSSLv3, the two BIGNUMs used to build our
own DH parameters are not freed. It was not necessary previously because
ownership of those parameters was transferred to OpenSSL through the
DH_set0_pqg call.

This patch should be backported to 2.6.

(cherry picked from commit a2c21db155f52089b9474e9a13a8b270f55301b7)
Signed-off-by: Christopher Faulet <cfaulet@haproxy.com>
This commit is contained in:
Remi Tricot-Le Breton 2022-11-03 15:16:47 +01:00 committed by Christopher Faulet
parent b0c7490d4e
commit 6f57618877

View File

@ -3073,6 +3073,8 @@ end:
EVP_PKEY_CTX_free(ctx);
OSSL_PARAM_free(params);
OSSL_PARAM_BLD_free(tmpl);
BN_free(p);
BN_free(g);
return pkey;
#else