Rick Macklem 22f085c43b Fix a potential memory leak in the NFS over TLS handling code.
For the TLS case where there is a "user@domain" name specified in the
X.509 v3 certificate presented by the client in the otherName component
of subjectAltName, a gid list is allocated via mem_alloc().
This needs to be free'd. Otherwise xp_gidp == NULL and free() handles that.
(The size argument to mem_free() is not used by FreeBSD, so it can be 0.)

This leak would not have occurred for any other case than NFS over TLS
with the "user@domain" in the client's certificate.
2020-09-05 00:50:52 +00:00
..
2020-09-03 22:40:51 +00:00
2020-08-22 03:57:55 +00:00
2020-08-22 03:57:55 +00:00
2020-08-22 03:57:55 +00:00
2020-08-22 03:57:55 +00:00
2020-08-22 03:57:55 +00:00
2020-08-22 03:57:55 +00:00
2020-08-22 03:57:55 +00:00
2020-08-22 03:57:55 +00:00