BUG/MINOR: ssl: Memory leak of DH BIGNUM fields
When running HAProxy with OpenSSLv3, the two BIGNUMs used to build our own DH parameters are not freed. It was not necessary previously because ownership of those parameters was transferred to OpenSSL through the DH_set0_pqg call. This patch should be backported to 2.6.
This commit is contained in:
parent
a2ec192de3
commit
a2c21db155
@ -3073,6 +3073,8 @@ end:
|
||||
EVP_PKEY_CTX_free(ctx);
|
||||
OSSL_PARAM_free(params);
|
||||
OSSL_PARAM_BLD_free(tmpl);
|
||||
BN_free(p);
|
||||
BN_free(g);
|
||||
return pkey;
|
||||
#else
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user