mirror of
https://github.com/moparisthebest/curl
synced 2024-12-21 23:58:49 -05:00
nss: do not leak PKCS #11 slot while loading a key
It could prevent nss-pem from being unloaded later on. Bug: https://bugzilla.redhat.com/1444860
This commit is contained in:
parent
9c5aed1852
commit
c8ea86f377
@ -603,7 +603,7 @@ fail:
|
||||
static CURLcode nss_load_key(struct connectdata *conn, int sockindex,
|
||||
char *key_file)
|
||||
{
|
||||
PK11SlotInfo *slot;
|
||||
PK11SlotInfo *slot, *tmp;
|
||||
SECStatus status;
|
||||
CURLcode result;
|
||||
struct ssl_connect_data *ssl = conn->ssl;
|
||||
@ -622,7 +622,9 @@ static CURLcode nss_load_key(struct connectdata *conn, int sockindex,
|
||||
return CURLE_SSL_CERTPROBLEM;
|
||||
|
||||
/* This will force the token to be seen as re-inserted */
|
||||
SECMOD_WaitForAnyTokenEvent(mod, 0, 0);
|
||||
tmp = SECMOD_WaitForAnyTokenEvent(mod, 0, 0);
|
||||
if(tmp)
|
||||
PK11_FreeSlot(tmp);
|
||||
PK11_IsPresent(slot);
|
||||
|
||||
status = PK11_Authenticate(slot, PR_TRUE, SSL_SET_OPTION(key_passwd));
|
||||
|
Loading…
Reference in New Issue
Block a user