|
@@ -1259,16 +1259,16 @@ load_client_keys(hs_service_t *service)
|
|
client_key_file_path = hs_path_from_filename(client_keys_dir_path,
|
|
client_key_file_path = hs_path_from_filename(client_keys_dir_path,
|
|
filename);
|
|
filename);
|
|
client_key_str = read_file_to_str(client_key_file_path, 0, NULL);
|
|
client_key_str = read_file_to_str(client_key_file_path, 0, NULL);
|
|
-
|
|
|
|
- tor_free(client_key_file_path);
|
|
|
|
|
|
|
|
|
|
|
|
if (!client_key_str) {
|
|
if (!client_key_str) {
|
|
log_warn(LD_REND, "Client authorization file %s can't be read. "
|
|
log_warn(LD_REND, "Client authorization file %s can't be read. "
|
|
"Corrupted or verify permission? Ignoring.",
|
|
"Corrupted or verify permission? Ignoring.",
|
|
client_key_file_path);
|
|
client_key_file_path);
|
|
|
|
+ tor_free(client_key_file_path);
|
|
continue;
|
|
continue;
|
|
}
|
|
}
|
|
|
|
+ tor_free(client_key_file_path);
|
|
|
|
|
|
client = parse_authorized_client(client_key_str);
|
|
client = parse_authorized_client(client_key_str);
|
|
|
|
|