Mercurial > dropbear
comparison tcp-accept.c @ 340:454a34b2dfd1
Fixes from Erik Hovland:
cli-authpubkey.c:
fix leak of keybuf
cli-kex.c:
fix leak of fingerprint fp
cli-service.c:
remove commented out code
dropbearkey.c:
don't attepmt to free NULL key on failure
common-kex.c:
only free key if it is initialised
keyimport.c:
remove dead encrypted-key code
don't leak a FILE* loading OpenSSH keys
rsa.c, dss.c:
check return values for some libtommath functions
svr-kex.c:
check return value retrieving DH kex mpint
svr-tcpfwd.c:
fix null-dereference if remote tcp forward request fails
tcp-accept.c:
don't incorrectly free the tcpinfo var
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Fri, 07 Jul 2006 09:17:18 +0000 |
parents | 3cea9d789cca |
children | a124aff0cbf1 |
comparison
equal
deleted
inserted
replaced
339:31743c9bdf78 | 340:454a34b2dfd1 |
---|---|
129 | 129 |
130 listener = new_listener(socks, nsocks, CHANNEL_ID_TCPFORWARDED, tcpinfo, | 130 listener = new_listener(socks, nsocks, CHANNEL_ID_TCPFORWARDED, tcpinfo, |
131 tcp_acceptor, cleanup_tcp); | 131 tcp_acceptor, cleanup_tcp); |
132 | 132 |
133 if (listener == NULL) { | 133 if (listener == NULL) { |
134 m_free(tcpinfo); | |
135 TRACE(("leave listen_tcpfwd: listener failed")) | 134 TRACE(("leave listen_tcpfwd: listener failed")) |
136 return DROPBEAR_FAILURE; | 135 return DROPBEAR_FAILURE; |
137 } | 136 } |
138 | 137 |
139 TRACE(("leave listen_tcpfwd: success")) | 138 TRACE(("leave listen_tcpfwd: success")) |