mirror of
https://github.com/openssl/openssl.git
synced 2025-04-06 20:20:50 +08:00
speed: Fix memory leaks
Free the PKEYs created for KEM and signature algorithms. Free the encrypt/decrypt PKEY contexts for RSA. Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Todd Short <todd.short@me.com> (Merged from https://github.com/openssl/openssl/pull/22399)
This commit is contained in:
parent
66f4782f14
commit
4e09305ee0
@ -3828,10 +3828,13 @@ skip_hmac:
|
||||
loopargs[i].kem_out[testnum] = out;
|
||||
loopargs[i].kem_send_secret[testnum] = send_secret;
|
||||
loopargs[i].kem_rcv_secret[testnum] = rcv_secret;
|
||||
EVP_PKEY_free(pkey);
|
||||
pkey = NULL;
|
||||
break;
|
||||
|
||||
kem_err_break:
|
||||
ERR_print_errors(bio_err);
|
||||
EVP_PKEY_free(pkey);
|
||||
op_count = 1;
|
||||
kem_checks = 0;
|
||||
break;
|
||||
@ -4005,10 +4008,13 @@ skip_hmac:
|
||||
loopargs[i].sig_max_sig_len[testnum] = max_sig_len;
|
||||
loopargs[i].sig_act_sig_len[testnum] = sig_len;
|
||||
loopargs[i].sig_sig[testnum] = sig;
|
||||
EVP_PKEY_free(pkey);
|
||||
pkey = NULL;
|
||||
break;
|
||||
|
||||
sig_err_break:
|
||||
ERR_print_errors(bio_err);
|
||||
EVP_PKEY_free(pkey);
|
||||
op_count = 1;
|
||||
sig_checks = 0;
|
||||
break;
|
||||
@ -4295,6 +4301,8 @@ skip_hmac:
|
||||
for (k = 0; k < RSA_NUM; k++) {
|
||||
EVP_PKEY_CTX_free(loopargs[i].rsa_sign_ctx[k]);
|
||||
EVP_PKEY_CTX_free(loopargs[i].rsa_verify_ctx[k]);
|
||||
EVP_PKEY_CTX_free(loopargs[i].rsa_encrypt_ctx[k]);
|
||||
EVP_PKEY_CTX_free(loopargs[i].rsa_decrypt_ctx[k]);
|
||||
}
|
||||
#ifndef OPENSSL_NO_DH
|
||||
OPENSSL_free(loopargs[i].secret_ff_a);
|
||||
|
Loading…
x
Reference in New Issue
Block a user