Commit 8404749e authored by Hirokazu Yamamoto's avatar Hirokazu Yamamoto

Fixed memory leak on failure. This is related to issue5403 but won't crash on py3k.

parent 45ed72dd
...@@ -526,13 +526,18 @@ MD5_new(PyObject *self, PyObject *args, PyObject *kwdict) ...@@ -526,13 +526,18 @@ MD5_new(PyObject *self, PyObject *args, PyObject *kwdict)
if (data_obj) if (data_obj)
GET_BUFFER_VIEW_OR_ERROUT(data_obj, &buf); GET_BUFFER_VIEW_OR_ERROUT(data_obj, &buf);
if ((new = newMD5object()) == NULL) if ((new = newMD5object()) == NULL) {
if (data_obj)
PyBuffer_Release(&buf);
return NULL; return NULL;
}
md5_init(&new->hash_state); md5_init(&new->hash_state);
if (PyErr_Occurred()) { if (PyErr_Occurred()) {
Py_DECREF(new); Py_DECREF(new);
if (data_obj)
PyBuffer_Release(&buf);
return NULL; return NULL;
} }
if (data_obj) { if (data_obj) {
......
...@@ -502,13 +502,18 @@ SHA1_new(PyObject *self, PyObject *args, PyObject *kwdict) ...@@ -502,13 +502,18 @@ SHA1_new(PyObject *self, PyObject *args, PyObject *kwdict)
if (data_obj) if (data_obj)
GET_BUFFER_VIEW_OR_ERROUT(data_obj, &buf); GET_BUFFER_VIEW_OR_ERROUT(data_obj, &buf);
if ((new = newSHA1object()) == NULL) if ((new = newSHA1object()) == NULL) {
if (data_obj)
PyBuffer_Release(&buf);
return NULL; return NULL;
}
sha1_init(&new->hash_state); sha1_init(&new->hash_state);
if (PyErr_Occurred()) { if (PyErr_Occurred()) {
Py_DECREF(new); Py_DECREF(new);
if (data_obj)
PyBuffer_Release(&buf);
return NULL; return NULL;
} }
if (data_obj) { if (data_obj) {
......
...@@ -629,13 +629,18 @@ SHA256_new(PyObject *self, PyObject *args, PyObject *kwdict) ...@@ -629,13 +629,18 @@ SHA256_new(PyObject *self, PyObject *args, PyObject *kwdict)
if (data_obj) if (data_obj)
GET_BUFFER_VIEW_OR_ERROUT(data_obj, &buf); GET_BUFFER_VIEW_OR_ERROUT(data_obj, &buf);
if ((new = newSHA256object()) == NULL) if ((new = newSHA256object()) == NULL) {
if (data_obj)
PyBuffer_Release(&buf);
return NULL; return NULL;
}
sha_init(new); sha_init(new);
if (PyErr_Occurred()) { if (PyErr_Occurred()) {
Py_DECREF(new); Py_DECREF(new);
if (data_obj)
PyBuffer_Release(&buf);
return NULL; return NULL;
} }
if (data_obj) { if (data_obj) {
...@@ -665,13 +670,18 @@ SHA224_new(PyObject *self, PyObject *args, PyObject *kwdict) ...@@ -665,13 +670,18 @@ SHA224_new(PyObject *self, PyObject *args, PyObject *kwdict)
if (data_obj) if (data_obj)
GET_BUFFER_VIEW_OR_ERROUT(data_obj, &buf); GET_BUFFER_VIEW_OR_ERROUT(data_obj, &buf);
if ((new = newSHA224object()) == NULL) if ((new = newSHA224object()) == NULL) {
if (data_obj)
PyBuffer_Release(&buf);
return NULL; return NULL;
}
sha224_init(new); sha224_init(new);
if (PyErr_Occurred()) { if (PyErr_Occurred()) {
Py_DECREF(new); Py_DECREF(new);
if (data_obj)
PyBuffer_Release(&buf);
return NULL; return NULL;
} }
if (data_obj) { if (data_obj) {
......
...@@ -695,13 +695,18 @@ SHA512_new(PyObject *self, PyObject *args, PyObject *kwdict) ...@@ -695,13 +695,18 @@ SHA512_new(PyObject *self, PyObject *args, PyObject *kwdict)
if (data_obj) if (data_obj)
GET_BUFFER_VIEW_OR_ERROUT(data_obj, &buf); GET_BUFFER_VIEW_OR_ERROUT(data_obj, &buf);
if ((new = newSHA512object()) == NULL) if ((new = newSHA512object()) == NULL) {
if (data_obj)
PyBuffer_Release(&buf);
return NULL; return NULL;
}
sha512_init(new); sha512_init(new);
if (PyErr_Occurred()) { if (PyErr_Occurred()) {
Py_DECREF(new); Py_DECREF(new);
if (data_obj)
PyBuffer_Release(&buf);
return NULL; return NULL;
} }
if (data_obj) { if (data_obj) {
...@@ -731,13 +736,18 @@ SHA384_new(PyObject *self, PyObject *args, PyObject *kwdict) ...@@ -731,13 +736,18 @@ SHA384_new(PyObject *self, PyObject *args, PyObject *kwdict)
if (data_obj) if (data_obj)
GET_BUFFER_VIEW_OR_ERROUT(data_obj, &buf); GET_BUFFER_VIEW_OR_ERROUT(data_obj, &buf);
if ((new = newSHA384object()) == NULL) if ((new = newSHA384object()) == NULL) {
if (data_obj)
PyBuffer_Release(&buf);
return NULL; return NULL;
}
sha384_init(new); sha384_init(new);
if (PyErr_Occurred()) { if (PyErr_Occurred()) {
Py_DECREF(new); Py_DECREF(new);
if (data_obj)
PyBuffer_Release(&buf);
return NULL; return NULL;
} }
if (data_obj) { if (data_obj) {
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment