comparison tcp-accept.c @ 340:454a34b2dfd1

Fixes from Erik Hovland: cli-authpubkey.c: fix leak of keybuf cli-kex.c: fix leak of fingerprint fp cli-service.c: remove commented out code dropbearkey.c: don't attepmt to free NULL key on failure common-kex.c: only free key if it is initialised keyimport.c: remove dead encrypted-key code don't leak a FILE* loading OpenSSH keys rsa.c, dss.c: check return values for some libtommath functions svr-kex.c: check return value retrieving DH kex mpint svr-tcpfwd.c: fix null-dereference if remote tcp forward request fails tcp-accept.c: don't incorrectly free the tcpinfo var
author Matt Johnston <matt@ucc.asn.au>
date Fri, 07 Jul 2006 09:17:18 +0000
parents 3cea9d789cca
children a124aff0cbf1
comparison
equal deleted inserted replaced
339:31743c9bdf78 340:454a34b2dfd1
129 129
130 listener = new_listener(socks, nsocks, CHANNEL_ID_TCPFORWARDED, tcpinfo, 130 listener = new_listener(socks, nsocks, CHANNEL_ID_TCPFORWARDED, tcpinfo,
131 tcp_acceptor, cleanup_tcp); 131 tcp_acceptor, cleanup_tcp);
132 132
133 if (listener == NULL) { 133 if (listener == NULL) {
134 m_free(tcpinfo);
135 TRACE(("leave listen_tcpfwd: listener failed")) 134 TRACE(("leave listen_tcpfwd: listener failed"))
136 return DROPBEAR_FAILURE; 135 return DROPBEAR_FAILURE;
137 } 136 }
138 137
139 TRACE(("leave listen_tcpfwd: success")) 138 TRACE(("leave listen_tcpfwd: success"))