upstream commit
ssh_free checks for and handles NULL args, remove NULL checks from remaining callers. ok djm@ OpenBSD-Commit-ID: bb926825c53724c069df68a93a2597f9192f7e7b
This commit is contained in:
parent
aee49b2a89
commit
f1f047fb03
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: auth2-pubkey.c,v 1.75 2018/01/23 05:27:21 djm Exp $ */
|
/* $OpenBSD: auth2-pubkey.c,v 1.76 2018/02/07 22:52:45 dtucker Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
||||||
*
|
*
|
||||||
|
@ -471,8 +471,7 @@ check_authkeys_file(FILE *f, char *file, struct sshkey *key, struct passwd *pw)
|
||||||
/* Always consume entire file */
|
/* Always consume entire file */
|
||||||
if (found_key)
|
if (found_key)
|
||||||
continue;
|
continue;
|
||||||
if (found != NULL)
|
sshkey_free(found);
|
||||||
sshkey_free(found);
|
|
||||||
found = sshkey_new(sshkey_is_cert(key) ? KEY_UNSPEC : key->type);
|
found = sshkey_new(sshkey_is_cert(key) ? KEY_UNSPEC : key->type);
|
||||||
if (found == NULL)
|
if (found == NULL)
|
||||||
goto done;
|
goto done;
|
||||||
|
@ -563,8 +562,7 @@ check_authkeys_file(FILE *f, char *file, struct sshkey *key, struct passwd *pw)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
done:
|
done:
|
||||||
if (found != NULL)
|
sshkey_free(found);
|
||||||
sshkey_free(found);
|
|
||||||
if (!found_key)
|
if (!found_key)
|
||||||
debug2("key not found");
|
debug2("key not found");
|
||||||
return found_key;
|
return found_key;
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: ssh-keysign.c,v 1.52 2016/02/15 09:47:49 dtucker Exp $ */
|
/* $OpenBSD: ssh-keysign.c,v 1.53 2018/02/07 22:52:45 dtucker Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2002 Markus Friedl. All rights reserved.
|
* Copyright (c) 2002 Markus Friedl. All rights reserved.
|
||||||
*
|
*
|
||||||
|
@ -158,7 +158,7 @@ valid_request(struct passwd *pw, char *host, struct sshkey **ret,
|
||||||
|
|
||||||
debug3("%s: fail %d", __func__, fail);
|
debug3("%s: fail %d", __func__, fail);
|
||||||
|
|
||||||
if (fail && key != NULL)
|
if (fail)
|
||||||
sshkey_free(key);
|
sshkey_free(key);
|
||||||
else if (ret != NULL)
|
else if (ret != NULL)
|
||||||
*ret = key;
|
*ret = key;
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: sshconnect.c,v 1.292 2018/01/23 18:33:49 stsp Exp $ */
|
/* $OpenBSD: sshconnect.c,v 1.293 2018/02/07 22:52:45 dtucker Exp $ */
|
||||||
/*
|
/*
|
||||||
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
||||||
|
@ -1177,8 +1177,7 @@ fail:
|
||||||
host_key = raw_key;
|
host_key = raw_key;
|
||||||
goto retry;
|
goto retry;
|
||||||
}
|
}
|
||||||
if (raw_key != NULL)
|
sshkey_free(raw_key);
|
||||||
sshkey_free(raw_key);
|
|
||||||
free(ip);
|
free(ip);
|
||||||
free(host);
|
free(host);
|
||||||
if (host_hostkeys != NULL)
|
if (host_hostkeys != NULL)
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: sshconnect2.c,v 1.267 2018/01/23 05:27:21 djm Exp $ */
|
/* $OpenBSD: sshconnect2.c,v 1.268 2018/02/07 22:52:45 dtucker Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
||||||
* Copyright (c) 2008 Damien Miller. All rights reserved.
|
* Copyright (c) 2008 Damien Miller. All rights reserved.
|
||||||
|
@ -624,8 +624,7 @@ input_userauth_pk_ok(int type, u_int32_t seq, struct ssh *ssh)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
done:
|
done:
|
||||||
if (key != NULL)
|
key_free(key);
|
||||||
key_free(key);
|
|
||||||
free(pkalg);
|
free(pkalg);
|
||||||
free(pkblob);
|
free(pkblob);
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue