BUG/MINOR: ssl: Memory leak of DH BIGNUM fields
When running HAProxy with OpenSSLv3, the two BIGNUMs used to build our own DH parameters are not freed. It was not necessary previously because ownership of those parameters was transferred to OpenSSL through the DH_set0_pqg call. This patch should be backported to 2.6. (cherry picked from commit a2c21db155f52089b9474e9a13a8b270f55301b7) Signed-off-by: Christopher Faulet <cfaulet@haproxy.com>
This commit is contained in:
parent
b0c7490d4e
commit
6f57618877
@ -3073,6 +3073,8 @@ end:
|
||||
EVP_PKEY_CTX_free(ctx);
|
||||
OSSL_PARAM_free(params);
|
||||
OSSL_PARAM_BLD_free(tmpl);
|
||||
BN_free(p);
|
||||
BN_free(g);
|
||||
return pkey;
|
||||
#else
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user