-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 01/10/2011 09:40 AM, Martin Kosek wrote:
> On Fri, 2011-01-07 at 11:26 -0500, Adam Young wrote:
>> Is there any chance that the point-to-a-pointer parameters will have
>> valid values other than null passed in?  Almost seems that by
>> initializing them to null, you might be masking a memory leak.  
>>
>> If not, then ACK
> 
> Hello Adam,
> 
> it is safe as these pointers are initialized to NULL in function
> join(...) and then passed without any change to functions join_ldap() or
> join_krb5().
> 
> If these pointers did held some allocated memory we would have had a
> leak anyway - xmlrpc_read_string() function overwrites the pointers with
> own allocated memory holding the desired output.
> 
> Martin
> 

Nack,

if(ptr) free(ptr);

is redundant, freeing a NULL pointer is a no-op. Other that that, looks
fine.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk0q9dcACgkQHsardTLnvCWf4wCgxy9LKqZzwuUaXMOD1agggkLq
8MIAnAqTxX2CZhate0kp4HAcUOcNyQc6
=uBSK
-----END PGP SIGNATURE-----

_______________________________________________
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel

Reply via email to