DescriptionFix memory leaks in BoringSSL secure socket implementation
After running our tests with ASAN and inspecting the
BoringSSL code, it appears that the calls indicated
in the CL increment the reference count of the
objects passed in being added to the security context.
Therefore, to avoid a leak, we have to free() the
objects to decrement the reference count so that the
memory is freed when the context is destroyed.
R=asiva@google.com
Committed: https://github.com/dart-lang/sdk/commit/8808f853e37b72acbb2a705bb013ecbd6fbb8582
Patch Set 1 #Patch Set 2 : Fix another leak #
Total comments: 2
Patch Set 3 : Add comments #
Messages
Total messages: 7 (3 generated)
|