diff options
| author | l17zhou <cynthia.zhou@nokia-sbell.com.cn> | 2019-11-04 08:45:52 +0200 | 
|---|---|---|
| committer | MOHIT AGRAWAL <moagrawa@redhat.com> | 2020-07-13 06:13:47 +0000 | 
| commit | 86bce52b86d54295a3f00fe04592f40a40b599f6 (patch) | |
| tree | e422433788499812980c5672f1cbb96f721a8e45 /rpc/rpc-transport | |
| parent | 36d972d537d4eec4af8a22eca8eab5b12a2a8e65 (diff) | |
rpc: Cleanup SSL specific data at the time of freeing rpc object
Problem: At the time of cleanup rpc object ssl specific data
         is not freeing so it has become a leak.
Solution: To avoid the leak cleanup ssl specific data at the
          time of cleanup rpc object
> Credits: l17zhou <cynthia.zhou@nokia-sbell.com.cn>
> Fixes: bz#1768407
> Change-Id: I37f598673ae2d7a33c75f39eb8843ccc6dffaaf0
> (cherry picked from commit 54ed71dba174385ab0d8fa415e09262f6250430c)
Change-Id: I37f598673ae2d7a33c75f39eb8843ccc6dffaaf0
Fixes: #1016
Signed-off-by: Mohit Agrawal <moagrawa@redhat.com>
Diffstat (limited to 'rpc/rpc-transport')
| -rw-r--r-- | rpc/rpc-transport/socket/src/socket.c | 22 | 
1 files changed, 20 insertions, 2 deletions
diff --git a/rpc/rpc-transport/socket/src/socket.c b/rpc/rpc-transport/socket/src/socket.c index 3d6f754b398..bd94d8d33ae 100644 --- a/rpc/rpc-transport/socket/src/socket.c +++ b/rpc/rpc-transport/socket/src/socket.c @@ -446,6 +446,7 @@ ssl_setup_connection_postfix(rpc_transport_t *this)      gf_log(this->name, GF_LOG_DEBUG,             "SSL verification succeeded (client: %s) (server: %s)",             this->peerinfo.identifier, this->myinfo.identifier); +    X509_free(peer);      return gf_strdup(peer_CN);      /* Error paths. */ @@ -1187,7 +1188,15 @@ __socket_reset(rpc_transport_t *this)      memset(&priv->incoming, 0, sizeof(priv->incoming));      gf_event_unregister_close(this->ctx->event_pool, priv->sock, priv->idx); - +    if (priv->use_ssl && priv->ssl_ssl) { +        SSL_clear(priv->ssl_ssl); +        SSL_free(priv->ssl_ssl); +        priv->ssl_ssl = NULL; +    } +    if (priv->use_ssl && priv->ssl_ctx) { +        SSL_CTX_free(priv->ssl_ctx); +        priv->ssl_ctx = NULL; +    }      priv->sock = -1;      priv->idx = -1;      priv->connected = -1; @@ -3247,7 +3256,6 @@ socket_server_event_handler(int fd, int idx, int gen, void *data, int poll_in,          new_priv->sock = new_sock;          new_priv->ssl_enabled = priv->ssl_enabled; -        new_priv->ssl_ctx = priv->ssl_ctx;          new_priv->connected = 1;          new_priv->is_server = _gf_true; @@ -4695,6 +4703,16 @@ fini(rpc_transport_t *this)          pthread_mutex_destroy(&priv->out_lock);          pthread_mutex_destroy(&priv->cond_lock);          pthread_cond_destroy(&priv->cond); +        if (priv->use_ssl && priv->ssl_ssl) { +            SSL_clear(priv->ssl_ssl); +            SSL_free(priv->ssl_ssl); +            priv->ssl_ssl = NULL; +        } +        if (priv->use_ssl && priv->ssl_ctx) { +            SSL_CTX_free(priv->ssl_ctx); +            priv->ssl_ctx = NULL; +        } +          if (priv->ssl_private_key) {              GF_FREE(priv->ssl_private_key);          }  | 
