On Sun, Mar 29, 2009 at 5:01 PM, Neil <n...@parkwaycc.co.uk> wrote:
>
> Using the above criteria, I found the following allocator mismatches under
> security/*
>
> nsNSSCallbacks.cpp: HandshakeCallback calls Adopt(cipherName) instead of
> Assign and PORT_Free. In fact, it can leak cipherName.
>
> nsNSSCertificate.cpp: several times it Adopt()s the result of CERT_Hexify,
> when it should use PORT_Free.
>
> nsNSSIOLayer.cpp: both adopts the result of and allocates an outparam using
> nsCRT::strdup, when both times it should use NS_strdup, while SSL_RevealURL
> allocates with PL_strdup but charCleaner uses PR_FREEIF.
>
> nsSSLStatus.cpp: allocates an outparam using PL_strdup, when it should use
> ToNewCString.

For these four files under mozilla/security/manager, please file a bug
report for product=Core, component=Security: PSM, and cc Kai
Engert (:kaie) and Honza Bambas.

> pk12util.c: uses PR_Free for a string allocated with malloc, and PORT_ZFree
> for a string allocated with PL_strdup.

For this file, please file a bug for product=NSS, component=Tools.

Thanks,
Wan-Teh
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to