diff options
Diffstat (limited to 'src/lib/libssl/ssl_sess.c')
| -rw-r--r-- | src/lib/libssl/ssl_sess.c | 32 | 
1 files changed, 16 insertions, 16 deletions
| diff --git a/src/lib/libssl/ssl_sess.c b/src/lib/libssl/ssl_sess.c index 0b1c655820..f9f6ee5ecb 100644 --- a/src/lib/libssl/ssl_sess.c +++ b/src/lib/libssl/ssl_sess.c | |||
| @@ -195,7 +195,7 @@ SSL_SESSION | |||
| 195 | { | 195 | { | 
| 196 | SSL_SESSION *ss; | 196 | SSL_SESSION *ss; | 
| 197 | 197 | ||
| 198 | ss = (SSL_SESSION *)OPENSSL_malloc(sizeof(SSL_SESSION)); | 198 | ss = (SSL_SESSION *)malloc(sizeof(SSL_SESSION)); | 
| 199 | if (ss == NULL) { | 199 | if (ss == NULL) { | 
| 200 | SSLerr(SSL_F_SSL_SESSION_NEW, ERR_R_MALLOC_FAILURE); | 200 | SSLerr(SSL_F_SSL_SESSION_NEW, ERR_R_MALLOC_FAILURE); | 
| 201 | return (0); | 201 | return (0); | 
| @@ -371,8 +371,8 @@ ssl_get_new_session(SSL *s, int session) | |||
| 371 | #ifndef OPENSSL_NO_EC | 371 | #ifndef OPENSSL_NO_EC | 
| 372 | if (s->tlsext_ecpointformatlist) { | 372 | if (s->tlsext_ecpointformatlist) { | 
| 373 | if (ss->tlsext_ecpointformatlist != NULL) | 373 | if (ss->tlsext_ecpointformatlist != NULL) | 
| 374 | OPENSSL_free(ss->tlsext_ecpointformatlist); | 374 | free(ss->tlsext_ecpointformatlist); | 
| 375 | if ((ss->tlsext_ecpointformatlist = OPENSSL_malloc(s->tlsext_ecpointformatlist_length)) == NULL) { | 375 | if ((ss->tlsext_ecpointformatlist = malloc(s->tlsext_ecpointformatlist_length)) == NULL) { | 
| 376 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); | 376 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); | 
| 377 | SSL_SESSION_free(ss); | 377 | SSL_SESSION_free(ss); | 
| 378 | return 0; | 378 | return 0; | 
| @@ -382,8 +382,8 @@ ssl_get_new_session(SSL *s, int session) | |||
| 382 | } | 382 | } | 
| 383 | if (s->tlsext_ellipticcurvelist) { | 383 | if (s->tlsext_ellipticcurvelist) { | 
| 384 | if (ss->tlsext_ellipticcurvelist != NULL) | 384 | if (ss->tlsext_ellipticcurvelist != NULL) | 
| 385 | OPENSSL_free(ss->tlsext_ellipticcurvelist); | 385 | free(ss->tlsext_ellipticcurvelist); | 
| 386 | if ((ss->tlsext_ellipticcurvelist = OPENSSL_malloc(s->tlsext_ellipticcurvelist_length)) == NULL) { | 386 | if ((ss->tlsext_ellipticcurvelist = malloc(s->tlsext_ellipticcurvelist_length)) == NULL) { | 
| 387 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); | 387 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); | 
| 388 | SSL_SESSION_free(ss); | 388 | SSL_SESSION_free(ss); | 
| 389 | return 0; | 389 | return 0; | 
| @@ -719,30 +719,30 @@ SSL_SESSION_free(SSL_SESSION *ss) | |||
| 719 | sk_SSL_CIPHER_free(ss->ciphers); | 719 | sk_SSL_CIPHER_free(ss->ciphers); | 
| 720 | #ifndef OPENSSL_NO_TLSEXT | 720 | #ifndef OPENSSL_NO_TLSEXT | 
| 721 | if (ss->tlsext_hostname != NULL) | 721 | if (ss->tlsext_hostname != NULL) | 
| 722 | OPENSSL_free(ss->tlsext_hostname); | 722 | free(ss->tlsext_hostname); | 
| 723 | if (ss->tlsext_tick != NULL) | 723 | if (ss->tlsext_tick != NULL) | 
| 724 | OPENSSL_free(ss->tlsext_tick); | 724 | free(ss->tlsext_tick); | 
| 725 | #ifndef OPENSSL_NO_EC | 725 | #ifndef OPENSSL_NO_EC | 
| 726 | ss->tlsext_ecpointformatlist_length = 0; | 726 | ss->tlsext_ecpointformatlist_length = 0; | 
| 727 | if (ss->tlsext_ecpointformatlist != NULL) | 727 | if (ss->tlsext_ecpointformatlist != NULL) | 
| 728 | OPENSSL_free(ss->tlsext_ecpointformatlist); | 728 | free(ss->tlsext_ecpointformatlist); | 
| 729 | ss->tlsext_ellipticcurvelist_length = 0; | 729 | ss->tlsext_ellipticcurvelist_length = 0; | 
| 730 | if (ss->tlsext_ellipticcurvelist != NULL) | 730 | if (ss->tlsext_ellipticcurvelist != NULL) | 
| 731 | OPENSSL_free(ss->tlsext_ellipticcurvelist); | 731 | free(ss->tlsext_ellipticcurvelist); | 
| 732 | #endif /* OPENSSL_NO_EC */ | 732 | #endif /* OPENSSL_NO_EC */ | 
| 733 | #endif | 733 | #endif | 
| 734 | #ifndef OPENSSL_NO_PSK | 734 | #ifndef OPENSSL_NO_PSK | 
| 735 | if (ss->psk_identity_hint != NULL) | 735 | if (ss->psk_identity_hint != NULL) | 
| 736 | OPENSSL_free(ss->psk_identity_hint); | 736 | free(ss->psk_identity_hint); | 
| 737 | if (ss->psk_identity != NULL) | 737 | if (ss->psk_identity != NULL) | 
| 738 | OPENSSL_free(ss->psk_identity); | 738 | free(ss->psk_identity); | 
| 739 | #endif | 739 | #endif | 
| 740 | #ifndef OPENSSL_NO_SRP | 740 | #ifndef OPENSSL_NO_SRP | 
| 741 | if (ss->srp_username != NULL) | 741 | if (ss->srp_username != NULL) | 
| 742 | OPENSSL_free(ss->srp_username); | 742 | free(ss->srp_username); | 
| 743 | #endif | 743 | #endif | 
| 744 | OPENSSL_cleanse(ss, sizeof(*ss)); | 744 | OPENSSL_cleanse(ss, sizeof(*ss)); | 
| 745 | OPENSSL_free(ss); | 745 | free(ss); | 
| 746 | } | 746 | } | 
| 747 | 747 | ||
| 748 | int | 748 | int | 
| @@ -768,7 +768,7 @@ SSL_set_session(SSL *s, SSL_SESSION *session) | |||
| 768 | #ifndef OPENSSL_NO_KRB5 | 768 | #ifndef OPENSSL_NO_KRB5 | 
| 769 | if (s->kssl_ctx && !s->kssl_ctx->client_princ && | 769 | if (s->kssl_ctx && !s->kssl_ctx->client_princ && | 
| 770 | session->krb5_client_princ_len > 0) { | 770 | session->krb5_client_princ_len > 0) { | 
| 771 | s->kssl_ctx->client_princ = (char *)OPENSSL_malloc(session->krb5_client_princ_len + 1); | 771 | s->kssl_ctx->client_princ = (char *)malloc(session->krb5_client_princ_len + 1); | 
| 772 | memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ, | 772 | memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ, | 
| 773 | session->krb5_client_princ_len); | 773 | session->krb5_client_princ_len); | 
| 774 | s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0'; | 774 | s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0'; | 
| @@ -900,11 +900,11 @@ SSL_set_session_ticket_ext(SSL *s, void *ext_data, int ext_len) | |||
| 900 | { | 900 | { | 
| 901 | if (s->version >= TLS1_VERSION) { | 901 | if (s->version >= TLS1_VERSION) { | 
| 902 | if (s->tlsext_session_ticket) { | 902 | if (s->tlsext_session_ticket) { | 
| 903 | OPENSSL_free(s->tlsext_session_ticket); | 903 | free(s->tlsext_session_ticket); | 
| 904 | s->tlsext_session_ticket = NULL; | 904 | s->tlsext_session_ticket = NULL; | 
| 905 | } | 905 | } | 
| 906 | 906 | ||
| 907 | s->tlsext_session_ticket = OPENSSL_malloc(sizeof(TLS_SESSION_TICKET_EXT) + ext_len); | 907 | s->tlsext_session_ticket = malloc(sizeof(TLS_SESSION_TICKET_EXT) + ext_len); | 
| 908 | if (!s->tlsext_session_ticket) { | 908 | if (!s->tlsext_session_ticket) { | 
| 909 | SSLerr(SSL_F_SSL_SET_SESSION_TICKET_EXT, ERR_R_MALLOC_FAILURE); | 909 | SSLerr(SSL_F_SSL_SET_SESSION_TICKET_EXT, ERR_R_MALLOC_FAILURE); | 
| 910 | return 0; | 910 | return 0; | 
