# HG changeset patch # User Matt Johnston # Date 1302179420 0 # Node ID 1aee049681bd68aed03cbd926f309064a706df89 # Parent 870c635197578ab9a9ce7221f70260a324bb0be7 Tidy error handling and get rid of some commented out code diff -r 870c63519757 -r 1aee049681bd cli-agentfwd.c --- a/cli-agentfwd.c Thu Apr 07 11:18:35 2011 +0000 +++ b/cli-agentfwd.c Thu Apr 07 12:30:20 2011 +0000 @@ -258,8 +258,8 @@ void agent_buf_sign(buffer *sigblob, sign_key *key, const unsigned char *data, unsigned int len) { - buffer *request_data = buf_new(MAX_PUBKEY_SIZE + len + 12); - buffer *response; + buffer *request_data = NULL; + buffer *response = NULL; unsigned int keylen, siglen; int packet_type; @@ -269,19 +269,14 @@ string data uint32 flags */ - /* We write the key, then figure how long it was and write that */ - //buf_putint(request_data, 0); + request_data = buf_new(MAX_PUBKEY_SIZE + len + 12); buf_put_pub_key(request_data, key, key->type); keylen = request_data->len - 4; - //buf_setpos(request_data, 0); - //buf_putint(request_data, keylen); - //buf_setpos(request_data, request_data->len); buf_putstring(request_data, data, len); buf_putint(request_data, 0); response = agent_request(SSH2_AGENTC_SIGN_REQUEST, request_data); - buf_free(request_data); if (!response) { goto fail; @@ -298,14 +293,21 @@ */ siglen = buf_getint(response); buf_putbytes(sigblob, buf_getptr(response, siglen), siglen); - buf_free(response); + goto cleanup; - return; fail: /* XXX don't fail badly here. instead propagate a failure code back up to the cli auth pubkey code, and just remove this key from the list of ones to try. */ dropbear_exit("Agent failed signing key"); + +cleanup: + if (request_data) { + buf_free(request_data); + } + if (response) { + buf_free(response); + } } #endif