diff options
author | deraadt <> | 2014-04-21 16:34:43 +0000 |
---|---|---|
committer | deraadt <> | 2014-04-21 16:34:43 +0000 |
commit | 852fcec6fe7cfa5d7c83e2f494208588dd4b4031 (patch) | |
tree | db931d37021e7a614e9fe59092bb1351fc69273f /src/lib/libssl/ssl_sess.c | |
parent | dbe50a7f3c84521e4543ad2e5292244bd0b81414 (diff) | |
download | openbsd-852fcec6fe7cfa5d7c83e2f494208588dd4b4031.tar.gz openbsd-852fcec6fe7cfa5d7c83e2f494208588dd4b4031.tar.bz2 openbsd-852fcec6fe7cfa5d7c83e2f494208588dd4b4031.zip |
more malloc/realloc/calloc cleanups; ok beck kettenis
Diffstat (limited to 'src/lib/libssl/ssl_sess.c')
-rw-r--r-- | src/lib/libssl/ssl_sess.c | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/src/lib/libssl/ssl_sess.c b/src/lib/libssl/ssl_sess.c index c032154d48..cc8e66b49d 100644 --- a/src/lib/libssl/ssl_sess.c +++ b/src/lib/libssl/ssl_sess.c | |||
@@ -195,12 +195,11 @@ SSL_SESSION_new(void) | |||
195 | { | 195 | { |
196 | SSL_SESSION *ss; | 196 | SSL_SESSION *ss; |
197 | 197 | ||
198 | ss = (SSL_SESSION *)malloc(sizeof(SSL_SESSION)); | 198 | ss = calloc(1, sizeof(SSL_SESSION)); |
199 | if (ss == NULL) { | 199 | if (ss == NULL) { |
200 | SSLerr(SSL_F_SSL_SESSION_NEW, ERR_R_MALLOC_FAILURE); | 200 | SSLerr(SSL_F_SSL_SESSION_NEW, ERR_R_MALLOC_FAILURE); |
201 | return (0); | 201 | return (0); |
202 | } | 202 | } |
203 | memset(ss, 0, sizeof(SSL_SESSION)); | ||
204 | 203 | ||
205 | ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ | 204 | ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ |
206 | ss->references = 1; | 205 | ss->references = 1; |
@@ -758,7 +757,7 @@ SSL_set_session(SSL *s, SSL_SESSION *session) | |||
758 | #ifndef OPENSSL_NO_KRB5 | 757 | #ifndef OPENSSL_NO_KRB5 |
759 | if (s->kssl_ctx && !s->kssl_ctx->client_princ && | 758 | if (s->kssl_ctx && !s->kssl_ctx->client_princ && |
760 | session->krb5_client_princ_len > 0) { | 759 | session->krb5_client_princ_len > 0) { |
761 | s->kssl_ctx->client_princ = (char *)malloc(session->krb5_client_princ_len + 1); | 760 | s->kssl_ctx->client_princ = malloc(session->krb5_client_princ_len + 1); |
762 | memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ, | 761 | memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ, |
763 | session->krb5_client_princ_len); | 762 | session->krb5_client_princ_len); |
764 | s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0'; | 763 | s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0'; |