Fix memory leak that can occur when decoding rtps message with origin authentication being used
Signed-off-by: Dennis Potman <dennis.potman@adlinktech.com>
This commit is contained in:
parent
680c2ebf8c
commit
c89f858b73
1 changed files with 3 additions and 0 deletions
|
@ -3248,7 +3248,10 @@ static bool q_omg_security_decode_rtps_message (struct proxy_participant *proxyp
|
|||
if (!sc->crypto_context->crypto_transform->decode_rtps_message (sc->crypto_context->crypto_transform, &plain_buffer, &encoded_buffer, pm->pp_crypto_handle, proxypp->sec_attr->crypto_handle, &ex))
|
||||
{
|
||||
if (ex.code == DDS_SECURITY_ERR_INVALID_CRYPTO_RECEIVER_SIGN_CODE)
|
||||
{
|
||||
DDS_Security_Exception_reset (&ex);
|
||||
continue; /* Could be caused by 'with_origin_authentication' being used, so try next match */
|
||||
}
|
||||
GVTRACE ("decoding rtps message from remote participant "PGUIDFMT" failed: %s\n", PGUID (proxypp->e.guid), ex.message ? ex.message : "Unknown error");
|
||||
DDS_Security_Exception_reset (&ex);
|
||||
ddsrt_mutex_unlock (&proxypp->sec_attr->lock);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue