diff options
author | Andreas Schneider <asn@cryptomilk.org> | 2020-01-23 09:15:29 +0100 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2020-01-23 09:50:41 +0100 |
commit | 402c922a9e29515e2546231c091560e360ff2fc7 (patch) | |
tree | 79b7953bd01f3ef8a0f0208e0ed9d9908f566eb8 | |
parent | 112e32ba8627d66e920ef40181a8cecacfdcd8c3 (diff) | |
download | libssh-402c922a9e29515e2546231c091560e360ff2fc7.tar.gz libssh-402c922a9e29515e2546231c091560e360ff2fc7.tar.xz libssh-402c922a9e29515e2546231c091560e360ff2fc7.zip |
pki_crypto: Fix possible memory leak on error
CID #1409680
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
Reviewed-by: Jakub Jelen <jjelen@redhat.com>
(cherry picked from commit 72498bac5fcaf92b11ccb58798ad8c6c0fcbee71)
-rw-r--r-- | src/pki_crypto.c | 7 |
1 files changed, 4 insertions, 3 deletions
diff --git a/src/pki_crypto.c b/src/pki_crypto.c index 920c8c7f..03511929 100644 --- a/src/pki_crypto.c +++ b/src/pki_crypto.c @@ -1569,9 +1569,9 @@ static int pki_signature_from_rsa_blob(const ssh_key pubkey, ssh_signature sig) { uint32_t pad_len = 0; - char *blob_orig; - char *blob_padded_data; - ssh_string sig_blob_padded; + char *blob_orig = NULL; + char *blob_padded_data = NULL; + ssh_string sig_blob_padded = NULL; size_t rsalen = 0; size_t len = ssh_string_len(sig_blob); @@ -1629,6 +1629,7 @@ static int pki_signature_from_rsa_blob(const ssh_key pubkey, return SSH_OK; errout: + SSH_STRING_FREE(sig_blob_padded); return SSH_ERROR; } |