From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=0.0 required=5.0 tests=none autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 12659 invoked from network); 15 Nov 2022 09:46:55 -0000 Received: from 9front.inri.net (168.235.81.73) by inbox.vuxu.org with ESMTPUTF8; 15 Nov 2022 09:46:55 -0000 Received: from vultr.musolino.id.au ([45.76.123.158]) by 9front; Tue Nov 15 04:45:07 -0500 2022 Received: from smtpclient.apple ([2.198.154.50]) by vultr; Tue Nov 15 20:44:11 +1100 2022 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable From: Alex Musolino Mime-Version: 1.0 (1.0) Date: Tue, 15 Nov 2022 10:44:07 +0100 Message-Id: References: In-Reply-To: To: 9front@9front.org X-Mailer: iPhone Mail (19G82) List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: decentralized element-aware database Subject: Re: [9front] auth_getkey: Fix a memory leak Reply-To: 9front@9front.org Precedence: bulk > if(0) if(d->type !=3D '/'){ > ^^^^^ > werrstr("auth_getkey: /factotum may be bad: didn't get key %s", par= ams); > return -1; > } >=20 > Should that part be removed? Oh, I didn=E2=80=99t even notice the if(0) way over there. Perhaps we can ju= st remove the dead code?=