summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_sess.c
diff options
context:
space:
mode:
authorderaadt <>2014-04-21 16:34:43 +0000
committerderaadt <>2014-04-21 16:34:43 +0000
commit852fcec6fe7cfa5d7c83e2f494208588dd4b4031 (patch)
treedb931d37021e7a614e9fe59092bb1351fc69273f /src/lib/libssl/ssl_sess.c
parentdbe50a7f3c84521e4543ad2e5292244bd0b81414 (diff)
downloadopenbsd-852fcec6fe7cfa5d7c83e2f494208588dd4b4031.tar.gz
openbsd-852fcec6fe7cfa5d7c83e2f494208588dd4b4031.tar.bz2
openbsd-852fcec6fe7cfa5d7c83e2f494208588dd4b4031.zip
more malloc/realloc/calloc cleanups; ok beck kettenis
Diffstat (limited to 'src/lib/libssl/ssl_sess.c')
-rw-r--r--src/lib/libssl/ssl_sess.c5
1 files changed, 2 insertions, 3 deletions
diff --git a/src/lib/libssl/ssl_sess.c b/src/lib/libssl/ssl_sess.c
index c032154d48..cc8e66b49d 100644
--- a/src/lib/libssl/ssl_sess.c
+++ b/src/lib/libssl/ssl_sess.c
@@ -195,12 +195,11 @@ SSL_SESSION_new(void)
195{ 195{
196 SSL_SESSION *ss; 196 SSL_SESSION *ss;
197 197
198 ss = (SSL_SESSION *)malloc(sizeof(SSL_SESSION)); 198 ss = calloc(1, sizeof(SSL_SESSION));
199 if (ss == NULL) { 199 if (ss == NULL) {
200 SSLerr(SSL_F_SSL_SESSION_NEW, ERR_R_MALLOC_FAILURE); 200 SSLerr(SSL_F_SSL_SESSION_NEW, ERR_R_MALLOC_FAILURE);
201 return (0); 201 return (0);
202 } 202 }
203 memset(ss, 0, sizeof(SSL_SESSION));
204 203
205 ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ 204 ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */
206 ss->references = 1; 205 ss->references = 1;
@@ -758,7 +757,7 @@ SSL_set_session(SSL *s, SSL_SESSION *session)
758#ifndef OPENSSL_NO_KRB5 757#ifndef OPENSSL_NO_KRB5
759 if (s->kssl_ctx && !s->kssl_ctx->client_princ && 758 if (s->kssl_ctx && !s->kssl_ctx->client_princ &&
760 session->krb5_client_princ_len > 0) { 759 session->krb5_client_princ_len > 0) {
761 s->kssl_ctx->client_princ = (char *)malloc(session->krb5_client_princ_len + 1); 760 s->kssl_ctx->client_princ = malloc(session->krb5_client_princ_len + 1);
762 memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ, 761 memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ,
763 session->krb5_client_princ_len); 762 session->krb5_client_princ_len);
764 s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0'; 763 s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0';