Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
f404acfa
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
接近 2 年 前同步成功
通知
12
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
f404acfa
编写于
3月 22, 2012
作者:
D
Dr. Stephen Henson
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Submitted by: Markus Friedl <mfriedl@gmail.com>
Fix memory leaks in 'goto err' cases.
上级
7744ef1a
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
14 addition
and
2 deletion
+14
-2
crypto/pkcs7/pk7_doit.c
crypto/pkcs7/pk7_doit.c
+14
-2
未找到文件。
crypto/pkcs7/pk7_doit.c
浏览文件 @
f404acfa
...
@@ -430,6 +430,8 @@ BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert)
...
@@ -430,6 +430,8 @@ BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert)
STACK_OF
(
X509_ALGOR
)
*
md_sk
=
NULL
;
STACK_OF
(
X509_ALGOR
)
*
md_sk
=
NULL
;
STACK_OF
(
PKCS7_RECIP_INFO
)
*
rsk
=
NULL
;
STACK_OF
(
PKCS7_RECIP_INFO
)
*
rsk
=
NULL
;
PKCS7_RECIP_INFO
*
ri
=
NULL
;
PKCS7_RECIP_INFO
*
ri
=
NULL
;
unsigned
char
*
ek
=
NULL
,
*
tkey
=
NULL
;
int
eklen
=
0
,
tkeylen
=
0
;
i
=
OBJ_obj2nid
(
p7
->
type
);
i
=
OBJ_obj2nid
(
p7
->
type
);
p7
->
state
=
PKCS7_S_HEADER
;
p7
->
state
=
PKCS7_S_HEADER
;
...
@@ -507,8 +509,6 @@ BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert)
...
@@ -507,8 +509,6 @@ BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert)
int max;
int max;
X509_OBJECT ret;
X509_OBJECT ret;
#endif
#endif
unsigned
char
*
ek
=
NULL
,
*
tkey
=
NULL
;
int
eklen
,
tkeylen
;
if
((
etmp
=
BIO_new
(
BIO_f_cipher
()))
==
NULL
)
if
((
etmp
=
BIO_new
(
BIO_f_cipher
()))
==
NULL
)
{
{
...
@@ -609,11 +609,13 @@ BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert)
...
@@ -609,11 +609,13 @@ BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert)
{
{
OPENSSL_cleanse
(
ek
,
eklen
);
OPENSSL_cleanse
(
ek
,
eklen
);
OPENSSL_free
(
ek
);
OPENSSL_free
(
ek
);
ek
=
NULL
;
}
}
if
(
tkey
)
if
(
tkey
)
{
{
OPENSSL_cleanse
(
tkey
,
tkeylen
);
OPENSSL_cleanse
(
tkey
,
tkeylen
);
OPENSSL_free
(
tkey
);
OPENSSL_free
(
tkey
);
tkey
=
NULL
;
}
}
if
(
out
==
NULL
)
if
(
out
==
NULL
)
...
@@ -656,6 +658,16 @@ BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert)
...
@@ -656,6 +658,16 @@ BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert)
if
(
0
)
if
(
0
)
{
{
err:
err:
if
(
ek
)
{
OPENSSL_cleanse
(
ek
,
eklen
);
OPENSSL_free
(
ek
);
}
if
(
tkey
)
{
OPENSSL_cleanse
(
tkey
,
tkeylen
);
OPENSSL_free
(
tkey
);
}
if
(
out
!=
NULL
)
BIO_free_all
(
out
);
if
(
out
!=
NULL
)
BIO_free_all
(
out
);
if
(
btmp
!=
NULL
)
BIO_free_all
(
btmp
);
if
(
btmp
!=
NULL
)
BIO_free_all
(
btmp
);
if
(
etmp
!=
NULL
)
BIO_free_all
(
etmp
);
if
(
etmp
!=
NULL
)
BIO_free_all
(
etmp
);
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录