提交 8cab4e9b 编写于 作者: E Emilia Kasper

Fix memory leak in library deinit

ENGINE_cleanup calls CRYPTO_free_ex_data and therefore,
CRYPTO_cleanup_all_ex_data - which cleans up the method pointers - must
run after ENGINE_cleanup.

Additionally, don't needlessly initialize the EX_CALLBACKS stack during
e.g. CRYPTO_free_ex_data. The only time this is actually needed is when
reserving the first ex data index. Specifically, since sk_num returns -1
on NULL input, the rest of the code already handles a NULL method stack
correctly.
Reviewed-by: NRich Salz <rsalz@openssl.org>
上级 36cc1390
...@@ -161,17 +161,6 @@ static EX_CALLBACKS *get_and_lock(int class_index) ...@@ -161,17 +161,6 @@ static EX_CALLBACKS *get_and_lock(int class_index)
ip = &ex_data[class_index]; ip = &ex_data[class_index];
CRYPTO_THREAD_write_lock(ex_data_lock); CRYPTO_THREAD_write_lock(ex_data_lock);
if (ip->meth == NULL) {
ip->meth = sk_EX_CALLBACK_new_null();
/* We push an initial value on the stack because the SSL
* "app_data" routines use ex_data index zero. See RT 3710. */
if (ip->meth == NULL
|| !sk_EX_CALLBACK_push(ip->meth, NULL)) {
CRYPTOerr(CRYPTO_F_GET_AND_LOCK, ERR_R_MALLOC_FAILURE);
CRYPTO_THREAD_unlock(ex_data_lock);
return NULL;
}
}
return ip; return ip;
} }
...@@ -255,6 +244,18 @@ int CRYPTO_get_ex_new_index(int class_index, long argl, void *argp, ...@@ -255,6 +244,18 @@ int CRYPTO_get_ex_new_index(int class_index, long argl, void *argp,
if (ip == NULL) if (ip == NULL)
return -1; return -1;
if (ip->meth == NULL) {
ip->meth = sk_EX_CALLBACK_new_null();
/* We push an initial value on the stack because the SSL
* "app_data" routines use ex_data index zero. See RT 3710. */
if (ip->meth == NULL
|| !sk_EX_CALLBACK_push(ip->meth, NULL)) {
CRYPTOerr(CRYPTO_F_GET_AND_LOCK, ERR_R_MALLOC_FAILURE);
goto err;
}
}
a = (EX_CALLBACK *)OPENSSL_malloc(sizeof(*a)); a = (EX_CALLBACK *)OPENSSL_malloc(sizeof(*a));
if (a == NULL) { if (a == NULL) {
CRYPTOerr(CRYPTO_F_CRYPTO_GET_EX_NEW_INDEX, ERR_R_MALLOC_FAILURE); CRYPTOerr(CRYPTO_F_CRYPTO_GET_EX_NEW_INDEX, ERR_R_MALLOC_FAILURE);
......
...@@ -474,12 +474,17 @@ void OPENSSL_cleanup(void) ...@@ -474,12 +474,17 @@ void OPENSSL_cleanup(void)
"RAND_cleanup()\n"); "RAND_cleanup()\n");
#endif #endif
CRYPTO_cleanup_all_ex_data(); /*
EVP_cleanup(); * Note that cleanup order is important.
CONF_modules_free(); * For example, ENGINEs use CRYPTO_EX_DATA and therefore, must be cleaned up
* before the ex data handlers are wiped in CRYPTO_cleanup_all_ex_data().
*/
#ifndef OPENSSL_NO_ENGINE #ifndef OPENSSL_NO_ENGINE
ENGINE_cleanup(); ENGINE_cleanup();
#endif #endif
CRYPTO_cleanup_all_ex_data();
EVP_cleanup();
CONF_modules_free();
RAND_cleanup(); RAND_cleanup();
base_inited = 0; base_inited = 0;
} }
...@@ -628,5 +633,3 @@ int OPENSSL_atexit(void (*handler)(void)) ...@@ -628,5 +633,3 @@ int OPENSSL_atexit(void (*handler)(void))
return 1; return 1;
} }
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册