Fixed a couple of memory leaks in NTLM SSO support

This commit is contained in:
Dan Fandrich 2011-07-27 18:07:02 -07:00
Родитель dddf9aa610
Коммит 02e59579ef
1 изменённых файлов: 5 добавлений и 1 удалений

Просмотреть файл

@ -817,6 +817,7 @@ static CURLcode sso_ntlm_initiate(struct connectdata *conn,
conn->fd_helper = sockfds[0];
conn->pid = pid;
Curl_safefree(domain);
Curl_safefree(ntlm_auth_alloc);
return CURLE_OK;
done:
@ -962,9 +963,13 @@ CURLcode Curl_output_ntlm_sso(struct connectdata *conn,
break;
case NTLMSTATE_TYPE2:
input = aprintf("TT %s\n", conn->challenge_header);
if(!input)
return CURLE_OUT_OF_MEMORY;
res = sso_ntlm_response(conn,
input,
ntlm->state);
free(input);
input = NULL;
if(res)
return res;
@ -976,7 +981,6 @@ CURLcode Curl_output_ntlm_sso(struct connectdata *conn,
ntlm->state = NTLMSTATE_TYPE3; /* we sent a type-3 */
authp->done = TRUE;
sso_ntlm_close(conn);
free(input);
break;
case NTLMSTATE_TYPE3:
/* connection is already authenticated,