[tor-commits] [tor/master] Stop leaking 'sig' at each call of router_append_dirobj_signature()

nickm at torproject.org nickm at torproject.org
Sun Mar 23 19:57:50 UTC 2014


commit eff16e834b409fbd46087b303a4982b4f8b3fefa
Author: Roger Dingledine <arma at torproject.org>
Date:   Sun Mar 23 00:42:18 2014 -0400

    Stop leaking 'sig' at each call of router_append_dirobj_signature()
    
    The refactoring in commit cb75519b (tor 0.2.4.13-alpha) introduced
    this leak.
---
 src/or/routerparse.c |    3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/src/or/routerparse.c b/src/or/routerparse.c
index 3aa4bdf..a6ba669 100644
--- a/src/or/routerparse.c
+++ b/src/or/routerparse.c
@@ -728,7 +728,7 @@ router_get_dirobj_signature(const char *digest,
 
 /** Helper: used to generate signatures for routers, directories and
  * network-status objects.  Given a digest in <b>digest</b> and a secret
- * <b>private_key</b>, generate an PKCS1-padded signature, BASE64-encode it,
+ * <b>private_key</b>, generate a PKCS1-padded signature, BASE64-encode it,
  * surround it with -----BEGIN/END----- pairs, and write it to the
  * <b>buf_len</b>-byte buffer at <b>buf</b>.  Return 0 on success, -1 on
  * failure.
@@ -751,6 +751,7 @@ router_append_dirobj_signature(char *buf, size_t buf_len, const char *digest,
     return -1;
   }
   memcpy(buf+s_len, sig, sig_len+1);
+  tor_free(sig);
   return 0;
 }
 





More information about the tor-commits mailing list