Hi,

On 22/07/18 17:53, Steffan Karger wrote:
>>> +    uint8_t *dst_data = buf_write_alloc(dst, data_read_len);
>>> +    if (!dst_data)
>>> +    {
>>> +        dmsg(D_CRYPT_ERRORS, "%s: dst too small (%i, needs %li)", __func__,
>>> +             BCAP(dst), data_read_len);
>>> +        goto cleanup;
>>
>> Am I wrong or we are leaking dst_data in case of failure? or are we
>> assuming that this memory is now owned by dst and therefore its owner
>> (the caller) will take care of this?
> 
> I don't think this leaks data; buf_write_alloc returns NULL if there is
> not enough space available in dst, and won't change dst in that case.
> So nothing to clean up in that case?
> 

Right. The name *_alloc() fooled me, but actually there is nothing being
allocated here so nothing to clean up.

Cheers,

-- 
Antonio Quartulli

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to