Displaying 2 results from an estimated 2 matches for "deattack_ok".
2003 Aug 22
0
[PATCH] memory leaked leaving scope
...r (d = buf; d < c; d += SSH_BLOCKSIZE) {
if (!CMP(c, d)) {
- if ((check_crc(c, buf, len, IV)))
+ if ((check_crc(c, buf, len, IV))) {
+ if (h)
+ xfree(h);
return (DEATTACK_DETECTED);
- else
+ } else
break;
}
}
}
+ if (h)
+ xfree(h);
return (DEATTACK_OK);
}
memset(h, HASH_UNUSEDCHAR, n * HASH_ENTRYSIZE);
@@ -138,19 +144,25 @@
i = (i + 1) & (n - 1)) {
if (h[i] == HASH_IV) {
if (!CMP(c, IV)) {
- if (check_crc(c, buf, len, IV))
+ if (check_crc(c, buf, len, IV)) {
+ if (h)
+ xfree(h);
return (DEATTACK_DETECT...
2002 Sep 23
19
Call for testing for 3.5 OpenSSH
OpenBSD tree is heading into a lock and this includes OpenSSH. So we are
winding up for a 3.5 release. If we can get people to test the current
snapshots and report any problems that would improve the odds that your
platform won't be broke for 3.5.
Issues I know off of right now.
1. I can't test NeXT. So I TRULY need someone in that community to test
for me. Last I heard there was