diff options
author | Jakub Jelen <[email protected]> | 2021-04-12 12:05:17 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2021-05-20 11:51:47 +0000 |
commit | e6132bc9f41727ea1abe2d6298610223c11639a2 (patch) | |
tree | 6d76b81dc687c9dd7627e5495dd1cf815ad3be09 /sm/certcheck.c | |
parent | g10: Fix memory leaks (diff) | |
download | gnupg-e6132bc9f41727ea1abe2d6298610223c11639a2.tar.gz gnupg-e6132bc9f41727ea1abe2d6298610223c11639a2.zip |
sm: Avoid memory leaks and double double-free
* sm/certcheck.c (extract_pss_params): Avoid double free
* sm/decrypt.c (gpgsm_decrypt): goto leave instead of return
* sm/encrypt.c (encrypt_dek): release s_pkey
* sm/server.c (cmd_export): free list
(do_listkeys): free lists
--
Signed-off-by: Jakub Jelen <[email protected]>
GnuPG-bug-id: 5393
Diffstat (limited to 'sm/certcheck.c')
-rw-r--r-- | sm/certcheck.c | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/sm/certcheck.c b/sm/certcheck.c index fca45759b..f4db858c3 100644 --- a/sm/certcheck.c +++ b/sm/certcheck.c @@ -294,7 +294,6 @@ extract_pss_params (gcry_sexp_t s_sig, int *r_algo, unsigned int *r_saltlen) if (*r_saltlen < 20) { log_error ("length of PSS salt too short\n"); - gcry_sexp_release (s_sig); return gpg_error (GPG_ERR_DIGEST_ALGO); } if (!*r_algo) |