diff options
author | Daiki Ueno <ueno@gnu.org> | 2020-06-05 16:26:33 +0200 |
---|---|---|
committer | Daiki Ueno <ueno@gnu.org> | 2020-06-05 19:32:39 +0200 |
commit | 6fbff7fc8aabeee2254405f254220bbe8c05c67d (patch) | |
tree | 54a9008ca28332372048b81f51a988f1c47652cf /lib/accelerated/x86/aes-gcm-x86-pclmul.c | |
parent | eb5e7eb210fbeb1933e476f4421288d4e87cff85 (diff) | |
download | gnutls-tmp-iov-memleak.tar.gz |
crypto-api: always allocate memory when serializing iovec_ttmp-iov-memleak
The AEAD iov interface falls back to serializing the input buffers if
the low-level cipher doesn't support scatter/gather encryption.
However, there was a bug in the functions used for the serialization,
which causes memory leaks under a certain condition (i.e. the number
of input buffers is 1).
This patch makes the logic of the functions simpler, by removing a
micro-optimization that tries to minimize the number of calls to
malloc/free.
The original problem was reported by Marius Steffen in:
https://bugzilla.samba.org/show_bug.cgi?id=14399
and the cause was investigated by Alexander Haase in:
https://gitlab.com/gnutls/gnutls/-/merge_requests/1277
Signed-off-by: Daiki Ueno <ueno@gnu.org>
Diffstat (limited to 'lib/accelerated/x86/aes-gcm-x86-pclmul.c')
0 files changed, 0 insertions, 0 deletions