mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 12:23:32 +01:00
Don't leak an extend_info_t in rend_client_any_intro_points_usable
This commit is contained in:
parent
972564630e
commit
65a0d7e7ef
6
changes/bug4424
Normal file
6
changes/bug4424
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
o Major bugfixes
|
||||||
|
|
||||||
|
- Don't leak memory when we check whether a hidden service
|
||||||
|
descriptor has any usable introduction points left. Fixes bug
|
||||||
|
4424. Bugfix on 0.2.2.25-alpha; found by frosty_un.
|
||||||
|
|
@ -952,8 +952,14 @@ rend_client_get_random_intro_impl(const rend_cache_entry_t *entry,
|
|||||||
int
|
int
|
||||||
rend_client_any_intro_points_usable(const rend_cache_entry_t *entry)
|
rend_client_any_intro_points_usable(const rend_cache_entry_t *entry)
|
||||||
{
|
{
|
||||||
return rend_client_get_random_intro_impl(
|
extend_info_t *extend_info =
|
||||||
entry, get_options()->StrictNodes, 0) != NULL;
|
rend_client_get_random_intro_impl(entry, get_options()->StrictNodes, 0);
|
||||||
|
int rv = extend_info != NULL;
|
||||||
|
|
||||||
|
if (extend_info != NULL)
|
||||||
|
extend_info_free(extend_info);
|
||||||
|
|
||||||
|
return rv;
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Client-side authorizations for hidden services; map of onion address to
|
/** Client-side authorizations for hidden services; map of onion address to
|
||||||
|
Loading…
Reference in New Issue
Block a user