From: Howard Chu Date: Fri, 31 Mar 2006 21:59:39 +0000 (+0000) Subject: plug leaks X-Git-Tag: OPENLDAP_REL_ENG_2_4_BP~70 X-Git-Url: https://git.sur5r.net/?a=commitdiff_plain;h=8c990ff2e959a2f862740c774c99ced093f88cee;p=openldap plug leaks --- diff --git a/servers/slapd/aclparse.c b/servers/slapd/aclparse.c index 567e2b63f3..230dcdace2 100644 --- a/servers/slapd/aclparse.c +++ b/servers/slapd/aclparse.c @@ -58,6 +58,7 @@ char *style_strings[] = { static void split(char *line, int splitchar, char **left, char **right); static void access_append(Access **l, Access *a); +static void access_free( Access *a ); static int acl_usage(void); static void acl_regex_normalized_dn(const char *src, struct berval *pat); @@ -327,12 +328,11 @@ parse_acl( int i; char *left, *right, *style; struct berval bv; - AccessControl *a; - Access *b; + AccessControl *a = NULL; + Access *b = NULL; int rc; const char *text; - a = NULL; for ( i = 1; i < argc; i++ ) { /* to clause - select which entries are protected */ if ( strcasecmp( argv[i], "to" ) == 0 ) { @@ -357,7 +357,7 @@ parse_acl( "%s: line %d: dn pattern" " already specified in to clause.\n", fname, lineno, 0 ); - return acl_usage(); + goto fail; } ber_str2bv( "*", STRLENOF( "*" ), 1, &a->acl_dn_pat ); @@ -371,7 +371,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: " "missing \"=\" in \"%s\" in to clause\n", fname, lineno, left ); - return acl_usage(); + goto fail; } if ( strcasecmp( left, "dn" ) == 0 ) { @@ -382,7 +382,7 @@ parse_acl( "%s: line %d: dn pattern" " already specified in to clause.\n", fname, lineno, 0 ); - return acl_usage(); + goto fail; } if ( style == NULL || *style == '\0' || @@ -440,7 +440,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: " "unknown dn style \"%s\" in to clause\n", fname, lineno, style ); - return acl_usage(); + goto fail; } continue; @@ -451,7 +451,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: bad filter \"%s\" in to clause\n", fname, lineno, right ); - return acl_usage(); + goto fail; } } else if ( strcasecmp( left, "attr" ) == 0 /* TOLERATED */ @@ -471,7 +471,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: unknown attr \"%s\" in to clause\n", fname, lineno, right ); - return acl_usage(); + goto fail; } } else if ( strncasecmp( left, "val", 3 ) == 0 ) { @@ -482,14 +482,14 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: attr val already specified in to clause.\n", fname, lineno, 0 ); - return acl_usage(); + goto fail; } if ( a->acl_attrs == NULL || !BER_BVISEMPTY( &a->acl_attrs[1].an_name ) ) { Debug( LDAP_DEBUG_ANY, "%s: line %d: attr val requires a single attribute.\n", fname, lineno, 0 ); - return acl_usage(); + goto fail; } ber_str2bv( right, 0, 0, &bv ); @@ -505,7 +505,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: " "invalid matching rule \"%s\".\n", fname, lineno, mr ); - return acl_usage(); + goto fail; } if( !mr_usable_with_at( a->acl_attrval_mr, a->acl_attrs[ 0 ].an_desc->ad_type ) ) @@ -520,7 +520,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: %s\n", fname, lineno, buf ); - return acl_usage(); + goto fail; } } @@ -540,7 +540,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: %s\n", fname, lineno, buf ); - return acl_usage(); + goto fail; } a->acl_attrval_style = ACL_STYLE_REGEX; @@ -571,8 +571,6 @@ parse_acl( } else { char buf[ SLAP_TEXT_BUFLEN ]; - /* FIXME: should be an error */ - snprintf( buf, sizeof( buf ), "unknown val.