Commit e4fb0edb authored by Jeff Layton's avatar Jeff Layton Committed by Steve French

cifs: free blkcipher in smbhash

This is currently leaked in the rc == 0 case.
Reported-by: default avatarJ. Bruce Fields <bfields@fieldses.org>
Signed-off-by: default avatarJeff Layton <jlayton@redhat.com>
Reviewed-by: default avatarShirish Pargaonkar <shirishpargaonkar@gmail.com>
Signed-off-by: default avatarSteve French <sfrench@us.ibm.com>
parent 5220cc93
...@@ -90,12 +90,10 @@ smbhash(unsigned char *out, const unsigned char *in, unsigned char *key) ...@@ -90,12 +90,10 @@ smbhash(unsigned char *out, const unsigned char *in, unsigned char *key)
sg_init_one(&sgout, out, 8); sg_init_one(&sgout, out, 8);
rc = crypto_blkcipher_encrypt(&desc, &sgout, &sgin, 8); rc = crypto_blkcipher_encrypt(&desc, &sgout, &sgin, 8);
if (rc) { if (rc)
cERROR(1, "could not encrypt crypt key rc: %d\n", rc); cERROR(1, "could not encrypt crypt key rc: %d\n", rc);
crypto_free_blkcipher(tfm_des);
goto smbhash_err;
}
crypto_free_blkcipher(tfm_des);
smbhash_err: smbhash_err:
return rc; return rc;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment