From 8c89633a45939838a10d2056df8077007acfda9f Mon Sep 17 00:00:00 2001 From: Jakub Jelen Date: Tue, 29 Jul 2025 15:39:33 +0200 Subject: [PATCH] pki: Avoid possible memory leak Actually the condition was duplicated at the beginning of the function and this one could not be hit (again), but it is an error to be fixed anyway. Thanks Coverity! CID 1618865 CID 1618864 Signed-off-by: Jakub Jelen Reviewed-by: Andreas Schneider --- src/pki.c | 6 ------ 1 file changed, 6 deletions(-) diff --git a/src/pki.c b/src/pki.c index 36dee299..e2224bfd 100644 --- a/src/pki.c +++ b/src/pki.c @@ -3221,12 +3221,6 @@ int sshsig_verify(const void *data, SSH_LOG(SSH_LOG_TRACE, "Signature verification failed"); goto cleanup; } - if (strlen(sig_namespace) == 0) { - SSH_LOG(SSH_LOG_TRACE, - "Invalid parameters provided to sshsig_verify: empty namespace " - "string"); - return SSH_ERROR; - } if (sign_key != NULL) { *sign_key = key;