From b8e9f474e8736eb8266023fa083682d0aa984682 Mon Sep 17 00:00:00 2001 From: sumikawa Date: Mon, 22 Nov 2004 18:42:03 +0000 Subject: Fixed memory leak. --- security/racoon/Makefile | 1 + security/racoon/files/patch-crypto_openssl.c | 42 +++++++++++++++++++++++++++ security/racoon2/Makefile | 1 + security/racoon2/files/patch-crypto_openssl.c | 42 +++++++++++++++++++++++++++ 4 files changed, 86 insertions(+) create mode 100644 security/racoon/files/patch-crypto_openssl.c create mode 100644 security/racoon2/files/patch-crypto_openssl.c diff --git a/security/racoon/Makefile b/security/racoon/Makefile index 49bf69bee628..573cff96820d 100644 --- a/security/racoon/Makefile +++ b/security/racoon/Makefile @@ -7,6 +7,7 @@ PORTNAME= racoon PORTVERSION= 20040818a +PORTREVISION= 1 CATEGORIES= security net MASTER_SITES= ftp://ftp.kame.net/pub/kame/misc/ diff --git a/security/racoon/files/patch-crypto_openssl.c b/security/racoon/files/patch-crypto_openssl.c new file mode 100644 index 000000000000..3f243d19c8e2 --- /dev/null +++ b/security/racoon/files/patch-crypto_openssl.c @@ -0,0 +1,42 @@ +--- crypto_openssl.old.c 2004-04-09 22:25:56.000000000 +0530 ++++ crypto_openssl.c 2004-08-02 20:30:03.000000000 +0530 +@@ -1654,6 +1654,7 @@ + + HMAC_Final((HMAC_CTX *)c, res->v, &l); + res->l = l; ++ HMAC_cleanup((HMAC_CTX *)c); + (void)racoon_free(c); + + if (SHA512_DIGEST_LENGTH != res->l) { +@@ -1710,6 +1711,7 @@ + + HMAC_Final((HMAC_CTX *)c, res->v, &l); + res->l = l; ++ HMAC_cleanup((HMAC_CTX *)c); + (void)racoon_free(c); + + if (SHA384_DIGEST_LENGTH != res->l) { +@@ -1766,6 +1768,7 @@ + + HMAC_Final((HMAC_CTX *)c, res->v, &l); + res->l = l; ++ HMAC_cleanup((HMAC_CTX *)c); + (void)racoon_free(c); + + if (SHA256_DIGEST_LENGTH != res->l) { +@@ -1823,6 +1826,7 @@ + + HMAC_Final((HMAC_CTX *)c, res->v, &l); + res->l = l; ++ HMAC_cleanup((HMAC_CTX *)c); + (void)racoon_free(c); + + if (SHA_DIGEST_LENGTH != res->l) { +@@ -1879,6 +1883,7 @@ + + HMAC_Final((HMAC_CTX *)c, res->v, &l); + res->l = l; ++ HMAC_cleanup((HMAC_CTX *)c); + (void)racoon_free(c); + + if (MD5_DIGEST_LENGTH != res->l) { diff --git a/security/racoon2/Makefile b/security/racoon2/Makefile index 49bf69bee628..573cff96820d 100644 --- a/security/racoon2/Makefile +++ b/security/racoon2/Makefile @@ -7,6 +7,7 @@ PORTNAME= racoon PORTVERSION= 20040818a +PORTREVISION= 1 CATEGORIES= security net MASTER_SITES= ftp://ftp.kame.net/pub/kame/misc/ diff --git a/security/racoon2/files/patch-crypto_openssl.c b/security/racoon2/files/patch-crypto_openssl.c new file mode 100644 index 000000000000..3f243d19c8e2 --- /dev/null +++ b/security/racoon2/files/patch-crypto_openssl.c @@ -0,0 +1,42 @@ +--- crypto_openssl.old.c 2004-04-09 22:25:56.000000000 +0530 ++++ crypto_openssl.c 2004-08-02 20:30:03.000000000 +0530 +@@ -1654,6 +1654,7 @@ + + HMAC_Final((HMAC_CTX *)c, res->v, &l); + res->l = l; ++ HMAC_cleanup((HMAC_CTX *)c); + (void)racoon_free(c); + + if (SHA512_DIGEST_LENGTH != res->l) { +@@ -1710,6 +1711,7 @@ + + HMAC_Final((HMAC_CTX *)c, res->v, &l); + res->l = l; ++ HMAC_cleanup((HMAC_CTX *)c); + (void)racoon_free(c); + + if (SHA384_DIGEST_LENGTH != res->l) { +@@ -1766,6 +1768,7 @@ + + HMAC_Final((HMAC_CTX *)c, res->v, &l); + res->l = l; ++ HMAC_cleanup((HMAC_CTX *)c); + (void)racoon_free(c); + + if (SHA256_DIGEST_LENGTH != res->l) { +@@ -1823,6 +1826,7 @@ + + HMAC_Final((HMAC_CTX *)c, res->v, &l); + res->l = l; ++ HMAC_cleanup((HMAC_CTX *)c); + (void)racoon_free(c); + + if (SHA_DIGEST_LENGTH != res->l) { +@@ -1879,6 +1883,7 @@ + + HMAC_Final((HMAC_CTX *)c, res->v, &l); + res->l = l; ++ HMAC_cleanup((HMAC_CTX *)c); + (void)racoon_free(c); + + if (MD5_DIGEST_LENGTH != res->l) { -- cgit