Andre Guibert de Bruet fixed a memory leak when PKCS #12 parsing failed

This commit is contained in:
Daniel Stenberg 2007-05-22 20:46:51 +00:00
parent a9d49769ff
commit 96c093f27c
3 changed files with 3 additions and 1 deletions

View File

@ -9,7 +9,7 @@ Daniel S (22 May 2007)
- Andre Guibert de Bruet fixed a memory leak in the function that verifies the - Andre Guibert de Bruet fixed a memory leak in the function that verifies the
peer's name in the SSL certificate when built for OpenSSL. The leak happens peer's name in the SSL certificate when built for OpenSSL. The leak happens
for libcurls with CURL_DOES_CONVERSIONS enabled that fail to convert the CN for libcurls with CURL_DOES_CONVERSIONS enabled that fail to convert the CN
name from UTF8. name from UTF8. He also fixed a leak when PKCS #12 parsing failed.
Daniel S (18 May 2007) Daniel S (18 May 2007)
- Feng Tu reported that curl -w did wrong on TFTP transfers in bug report - Feng Tu reported that curl -w did wrong on TFTP transfers in bug report

View File

@ -46,6 +46,7 @@ This release includes the following bugfixes:
o TFTP connect timouts less than 5 seconds o TFTP connect timouts less than 5 seconds
o improved curl -w for TFTP transfers o improved curl -w for TFTP transfers
o memory leak when failed OpenSSL certificate CN field checking o memory leak when failed OpenSSL certificate CN field checking
o memory leak when OpenSSL failed PKCS #12 parsing
This release includes the following known bugs: This release includes the following known bugs:

View File

@ -377,6 +377,7 @@ int cert_stuff(struct connectdata *conn,
failf(data, failf(data,
"could not parse PKCS12 file, check password, OpenSSL error %s", "could not parse PKCS12 file, check password, OpenSSL error %s",
ERR_error_string(ERR_get_error(), NULL) ); ERR_error_string(ERR_get_error(), NULL) );
PKCS12_free(p12);
return 0; return 0;
} }