diff options
author | Jouni Malinen <jouni@qca.qualcomm.com> | 2016-02-16 16:30:55 (GMT) |
---|---|---|
committer | Jouni Malinen <j@w1.fi> | 2016-02-16 16:30:55 (GMT) |
commit | 3a583e0023e3390e149d74e0c45ef917a6cf6909 (patch) | |
tree | 361c62a0cc9e29042d0c36b3b7352fed012a1df6 /hostapd | |
parent | ddd0032e0320b78e34244f20e6fdf73d89bf00c8 (diff) | |
download | hostap-3a583e0023e3390e149d74e0c45ef917a6cf6909.zip hostap-3a583e0023e3390e149d74e0c45ef917a6cf6909.tar.gz hostap-3a583e0023e3390e149d74e0c45ef917a6cf6909.tar.bz2 |
OpenSSL: Fix PKCS#12 parsing of extra certificates with OpenSSL 1.0.1
Commit 8bcf8de827e841a35841034edd6f8281a7a3aeba ('OpenSSL: Fix memory
leak in PKCS12 additional certificate parsing') tried to fix a memory
leak in both the 1.0.2(and newer) and 1.0.1 branches of PKCS12 parsing.
However, the 1.0.1 case was not properly tested and freeing of the
certificate after a successful SSL_CTX_add_extra_chain_cert() call
resulted in use of freed memory when going through the TLS handshake.
Fix this by not freeing the certificate in that specific case.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Diffstat (limited to 'hostapd')
0 files changed, 0 insertions, 0 deletions