From patchwork Tue Apr 19 10:32:38 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: MurphyZhao X-Patchwork-Id: 1618806 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=O6fHRPLX; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=163.com header.i=@163.com header.a=rsa-sha256 header.s=s110527 header.b=iAML+hGT; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:e::133; helo=bombadil.infradead.org; envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org; receiver=) Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4KjKsj3Cvcz9sG0 for ; Tue, 19 Apr 2022 20:34:01 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:Message-ID:MIME-Version: Content-Type:Subject:To:From:Date:Reply-To:Cc:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Owner; bh=vSDgDC0N3/Xzqce8WoKBVysTUJxivFP5+ETwYTb1zhs=; b=O6fHRPLXUh/pvdJnPiwbKyQT/Z BVpCct60WosUi8KHVLofEuJnoNukLHHs2jwVIwGWDCbzeeQhqlL5YTHhjLUNPSU+qifF8Pe8JaAmk SEFBTwfJzmsorVDykroPyWz9xxNudIbSm1ikixZIcLTsdeBwe60xXRCv9dPxsHOf6yMLCQ6j0McVZ KT08B8+sNWvkZAO/Y1mmS4EECmNNPz7o0igoC5v6SnX2rVtOIbUYd9lik7Nn/CpFpaBwSdR/CSgmx AQK6jiy1ZlSIGBmDsZzdrYrJ3JMZSLadtR+rbEIIe03aY0LU3NT3mYQ4hvGczx+VaF0gRAlAHUcIj JJb5Nu4w==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1nglA8-002o1q-FR; Tue, 19 Apr 2022 10:32:48 +0000 Received: from m13120.mail.163.com ([220.181.13.120]) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1nglA4-002nzx-VS for hostap@lists.infradead.org; Tue, 19 Apr 2022 10:32:46 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=163.com; s=s110527; h=Date:From:Subject:MIME-Version:Message-ID; bh=MSLp/ i2yOY51V18W2kOv+vZ6+iklyZjT6uSp1gyc9pU=; b=iAML+hGT2W+erTpYcwFj9 qmAuxI13qxoekE+Pf7iLKGaIxb+tff0UPbIwVaeUlrVQMfPNAi/iDoYITplrc07U nI9HXxMmJOfV3lgROpwYTunsgz/r3s4ItQpHa8J7vcKrrcbAR+gz7orZxC5JxhT5 nov7It/ZhJCd0MV21vxQnc= Received: from d2014zjt$163.com ( [183.195.4.49] ) by ajax-webmail-wmsvr120 (Coremail) ; Tue, 19 Apr 2022 18:32:38 +0800 (CST) X-Originating-IP: [183.195.4.49] Date: Tue, 19 Apr 2022 18:32:38 +0800 (CST) From: MurphyZhao To: hostap@lists.infradead.org Subject: [PATCH] wolfSSL: Fix the memory leak of crypto_ec_point_compute_y_sqr() X-Priority: 3 X-Mailer: Coremail Webmail Server Version XT5.0.13 build 20210622(1d4788a8) Copyright (c) 2002-2022 www.mailtech.cn 163com MIME-Version: 1.0 Message-ID: <1e0d1a61.4a81.18041619f51.Coremail.d2014zjt@163.com> X-Coremail-Locale: zh_CN X-CM-TRANSID: eMGowAA3P1PGj15iGBEVAA--.11767W X-CM-SenderInfo: jgsqikx2mwqiywtou0bp/1tbiJw3nxF5vBaJHowABs6 X-Coremail-Antispam: 1U5529EdanIXcx71UUUUU7vcSsGvfC2KfnxnUU== X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220419_033245_456215_74227543 X-CRM114-Status: UNSURE ( 6.95 ) X-CRM114-Notice: Please train this message. X-Spam-Score: -0.2 (/) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: From 545ff6e7b5fa8c4d82a5cd08a1958c8914f9d71f Mon Sep 17 00:00:00 2001 From: =?utf-8?b?6LW15Yab5rab?= Date: Tue, 19 Apr 2022 17:31:35 +0800 Subject: [PATCH] wolfSSL: Fix the memory le [...] Content analysis details: (-0.2 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at https://www.dnswl.org/, no trust [220.181.13.120 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider [d2014zjt[at]163.com] -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain X-BeenThere: hostap@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "Hostap" Errors-To: hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org From 545ff6e7b5fa8c4d82a5cd08a1958c8914f9d71f Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E8=B5=B5=E5=86=9B=E6=B6=9B?= Date: Tue, 19 Apr 2022 17:31:35 +0800 Subject: [PATCH] wolfSSL: Fix the memory leak of crypto_ec_point_compute_y_sqr() MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Local variable "t" needs to be cleared whether "calced" is 0 or 1. Signed-off-by: 赵军涛 --- src/crypto/crypto_wolfssl.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/crypto/crypto_wolfssl.c b/src/crypto/crypto_wolfssl.c index dba4dee82..5dc6ec665 100644 --- a/src/crypto/crypto_wolfssl.c +++ b/src/crypto/crypto_wolfssl.c @@ -1676,9 +1676,9 @@ done: mp_clear(y2); os_free(y2); } - mp_clear(&t); } + mp_clear(&t); return (struct crypto_bignum *) y2; }