<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style type="text/css" style="display:none;"> P {margin-top:0;margin-bottom:0;} </style>
</head>
<body dir="ltr">
<div style="font-family: "Sitka Text", Cochin, serif; font-size: 11pt; color: rgb(0, 0, 0);" class="elementToProof ContentPasted0">
Acked-by: Kai Ji <<a href="mailto:kai.ji@intel.com" class="ContentPasted0" data-loopstyle="linkonly">kai.ji@intel.com</a>><br>
</div>
<div class="BodyFragment"><font size="2"><span style="font-size:11pt">
<div class="PlainText elementToProof"><br>
<br>
> -----Original Message-----<br>
> From: Didier Pallard <didier.pallard@6wind.com><br>
> Sent: Tuesday 18 April 2023 15:26<br>
> To: dev@dpdk.org<br>
> Cc: stable@dpdk.org; Ji, Kai <kai.ji@intel.com>; Akhil Goyal<br>
> <gakhil@marvell.com>; Fan Zhang <fanzhang.oss@gmail.com>; Ashwin<br>
> Sekhar T K <asekhar@marvell.com><br>
> Subject: [PATCH] crypto/openssl: fix memory leak in auth processing<br>
> function<br>
> <br>
> Contexts allocated with EVP_MAC_CTX_new calls are leaking, they are<br>
> created then overwritten by the return value of EVP_MAC_CTX_dup call.<br>
> <br>
> Fixes: 75adf1eae44f ("crypto/openssl: update HMAC routine with 3.0 EVP<br>
> API")<br>
> Fixes: 2b9c693f6ef5 ("crypto/openssl: support AES-CMAC operations")<br>
> Signed-off-by: Didier Pallard <didier.pallard@6wind.com><br>
> Cc: stable@dpdk.org<br>
> ---<br>
> --<br>
> 2.30.2<br>
<br>
</div>
</span></font></div>
</body>
</html>