On Mon August 15 2011 14:21:55 Daniel Stenberg wrote:
> I only have one comment that isn't even strictly on topic but I came to
> think of it now when reading the patch. This particular code is however
> now new.
> 
> > +    char *certpath = PR_smprintf("%s%s", use_sql ? "sql:" : "",
> > cert_dir);
> 
> The code doesn't check for failure, so in OOM situations the code following
> this will read from NULL. That made me think if you shouldn't rather use
> our own aprintf() instead of PR_smprintf() there as then we'd get that
> memory allocation tested in our torture tests.
> 
> Either way, it should check 'certpath' for NULL.

Daniel, thanks for spotting it.  I have fixed the memory allocation issues
and pushed the patch as d6f319f.

Kamil
-------------------------------------------------------------------
List admin: http://cool.haxx.se/list/listinfo/curl-library
Etiquette:  http://curl.haxx.se/mail/etiquette.html

Reply via email to