HomePhabricator

dh-gex: Fix memory leak in DH GEX with OpenSSL

Authored by Anderson Toshiyuki Sasaki <ansasaki@redhat.com> on May 17 2019, 11:41 AM.

Description

dh-gex: Fix memory leak in DH GEX with OpenSSL

When using OpenSSL, the bignums generated during group exchange are
duplicated and don't transfer the memory management responsibility to
the back-end. The original generated bignums can be freed.

The leak was detectable by running:

$ valgrind --leak-check=full ./tests/pkd/pkd_hello -i1 \

-t torture_pkd_openssh_rsa_rsa_diffie_hellman_group_exchange_sha256

Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>

Details

Committed
asnMay 22 2019, 3:31 PM
Parents
rLIBSSH38f9802eec06: config: Add support for PubkeyAcceptedKeyTypes
Branches
Unknown
Tags
Unknown