Re: [HACKERS] SCRAM authentication, take three - Mailing list pgsql-hackers

From Michael Paquier
Subject Re: [HACKERS] SCRAM authentication, take three
Date
Msg-id CAB7nPqS1Kk0G1E+EJEEaLEWqVNt66ER_-YZQsWk=E_m=OMe44g@mail.gmail.com
Whole thread Raw
In response to Re: [HACKERS] SCRAM authentication, take three  (Aleksander Alekseev <a.alekseev@postgrespro.ru>)
Responses Re: [HACKERS] SCRAM authentication, take three
List pgsql-hackers
On Mon, Feb 20, 2017 at 9:41 PM, Aleksander Alekseev
<a.alekseev@postgrespro.ru> wrote:
>> Speaking about flaws, it looks like there is a memory leak in
>> array_to_utf procedure - result is allocated twice.

Pushed a fix for this one on my branch.

> And a few more things I've noticed after a closer look:
>
> * build_client_first_message does not free `state->client_nonce` if
>   second malloc (for `buf`) fails
> * same for `state->client_first_message_bare`
> * ... and most other procedures declared in fe-auth-scram.c file
>   (see malloc and strdup calls)

You are visibly missing pg_fe_scram_free().

> * scram_Normalize doesn't check malloc return value

Yes, I am aware of this one. This makes the interface utterly ugly
though because an error log message needs to be handled across many
API layers. We could just assume anything returning NULL is equivalent
to an OOM and nothing else though.
-- 
Michael



pgsql-hackers by date:

Previous
From: Bruce Momjian
Date:
Subject: Re: [HACKERS] Multivariate statistics and expression indexes
Next
From: "Ideriha, Takeshi"
Date:
Subject: Re: [WIP] RE: [HACKERS] DECLARE STATEMENT setting up a connectionin ECPG