commit | 3139c1b198bbcc14c6940f214234afd004110387 | [log] [tgz] |
---|---|---|
author | Frédéric Lécaille <flecaille@haproxy.com> | Fri Jan 24 14:56:18 2020 +0100 |
committer | Olivier Houchard <cognet@ci0.org> | Fri Jan 24 15:12:21 2020 +0100 |
tree | b0dee6fef786d47a5aaa5f6a8e0a2466b46148c8 | |
parent | fa10ffdd12d7334ef306dfb41e0c261ff9bb0c7b [diff] |
BUG/MINOR: ssl: Possible memleak when allowing the 0RTT data buffer. As the server early data buffer is allocated in the middle of the loop used to allocate the SSL session without being freed before retrying, this leads to a memory leak. To fix this we move the section of code responsible of this early data buffer alloction after the one reponsible of allocating the SSL session. Must be backported to 2.1 and 2.0.