summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_sess.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl_sess.c')
-rw-r--r--src/lib/libssl/ssl_sess.c32
1 files changed, 16 insertions, 16 deletions
diff --git a/src/lib/libssl/ssl_sess.c b/src/lib/libssl/ssl_sess.c
index 0b1c655820..f9f6ee5ecb 100644
--- a/src/lib/libssl/ssl_sess.c
+++ b/src/lib/libssl/ssl_sess.c
@@ -195,7 +195,7 @@ SSL_SESSION
195{ 195{
196 SSL_SESSION *ss; 196 SSL_SESSION *ss;
197 197
198 ss = (SSL_SESSION *)OPENSSL_malloc(sizeof(SSL_SESSION)); 198 ss = (SSL_SESSION *)malloc(sizeof(SSL_SESSION));
199 if (ss == NULL) { 199 if (ss == NULL) {
200 SSLerr(SSL_F_SSL_SESSION_NEW, ERR_R_MALLOC_FAILURE); 200 SSLerr(SSL_F_SSL_SESSION_NEW, ERR_R_MALLOC_FAILURE);
201 return (0); 201 return (0);
@@ -371,8 +371,8 @@ ssl_get_new_session(SSL *s, int session)
371#ifndef OPENSSL_NO_EC 371#ifndef OPENSSL_NO_EC
372 if (s->tlsext_ecpointformatlist) { 372 if (s->tlsext_ecpointformatlist) {
373 if (ss->tlsext_ecpointformatlist != NULL) 373 if (ss->tlsext_ecpointformatlist != NULL)
374 OPENSSL_free(ss->tlsext_ecpointformatlist); 374 free(ss->tlsext_ecpointformatlist);
375 if ((ss->tlsext_ecpointformatlist = OPENSSL_malloc(s->tlsext_ecpointformatlist_length)) == NULL) { 375 if ((ss->tlsext_ecpointformatlist = malloc(s->tlsext_ecpointformatlist_length)) == NULL) {
376 SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); 376 SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE);
377 SSL_SESSION_free(ss); 377 SSL_SESSION_free(ss);
378 return 0; 378 return 0;
@@ -382,8 +382,8 @@ ssl_get_new_session(SSL *s, int session)
382 } 382 }
383 if (s->tlsext_ellipticcurvelist) { 383 if (s->tlsext_ellipticcurvelist) {
384 if (ss->tlsext_ellipticcurvelist != NULL) 384 if (ss->tlsext_ellipticcurvelist != NULL)
385 OPENSSL_free(ss->tlsext_ellipticcurvelist); 385 free(ss->tlsext_ellipticcurvelist);
386 if ((ss->tlsext_ellipticcurvelist = OPENSSL_malloc(s->tlsext_ellipticcurvelist_length)) == NULL) { 386 if ((ss->tlsext_ellipticcurvelist = malloc(s->tlsext_ellipticcurvelist_length)) == NULL) {
387 SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); 387 SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE);
388 SSL_SESSION_free(ss); 388 SSL_SESSION_free(ss);
389 return 0; 389 return 0;
@@ -719,30 +719,30 @@ SSL_SESSION_free(SSL_SESSION *ss)
719 sk_SSL_CIPHER_free(ss->ciphers); 719 sk_SSL_CIPHER_free(ss->ciphers);
720#ifndef OPENSSL_NO_TLSEXT 720#ifndef OPENSSL_NO_TLSEXT
721 if (ss->tlsext_hostname != NULL) 721 if (ss->tlsext_hostname != NULL)
722 OPENSSL_free(ss->tlsext_hostname); 722 free(ss->tlsext_hostname);
723 if (ss->tlsext_tick != NULL) 723 if (ss->tlsext_tick != NULL)
724 OPENSSL_free(ss->tlsext_tick); 724 free(ss->tlsext_tick);
725#ifndef OPENSSL_NO_EC 725#ifndef OPENSSL_NO_EC
726 ss->tlsext_ecpointformatlist_length = 0; 726 ss->tlsext_ecpointformatlist_length = 0;
727 if (ss->tlsext_ecpointformatlist != NULL) 727 if (ss->tlsext_ecpointformatlist != NULL)
728 OPENSSL_free(ss->tlsext_ecpointformatlist); 728 free(ss->tlsext_ecpointformatlist);
729 ss->tlsext_ellipticcurvelist_length = 0; 729 ss->tlsext_ellipticcurvelist_length = 0;
730 if (ss->tlsext_ellipticcurvelist != NULL) 730 if (ss->tlsext_ellipticcurvelist != NULL)
731 OPENSSL_free(ss->tlsext_ellipticcurvelist); 731 free(ss->tlsext_ellipticcurvelist);
732#endif /* OPENSSL_NO_EC */ 732#endif /* OPENSSL_NO_EC */
733#endif 733#endif
734#ifndef OPENSSL_NO_PSK 734#ifndef OPENSSL_NO_PSK
735 if (ss->psk_identity_hint != NULL) 735 if (ss->psk_identity_hint != NULL)
736 OPENSSL_free(ss->psk_identity_hint); 736 free(ss->psk_identity_hint);
737 if (ss->psk_identity != NULL) 737 if (ss->psk_identity != NULL)
738 OPENSSL_free(ss->psk_identity); 738 free(ss->psk_identity);
739#endif 739#endif
740#ifndef OPENSSL_NO_SRP 740#ifndef OPENSSL_NO_SRP
741 if (ss->srp_username != NULL) 741 if (ss->srp_username != NULL)
742 OPENSSL_free(ss->srp_username); 742 free(ss->srp_username);
743#endif 743#endif
744 OPENSSL_cleanse(ss, sizeof(*ss)); 744 OPENSSL_cleanse(ss, sizeof(*ss));
745 OPENSSL_free(ss); 745 free(ss);
746} 746}
747 747
748int 748int
@@ -768,7 +768,7 @@ SSL_set_session(SSL *s, SSL_SESSION *session)
768#ifndef OPENSSL_NO_KRB5 768#ifndef OPENSSL_NO_KRB5
769 if (s->kssl_ctx && !s->kssl_ctx->client_princ && 769 if (s->kssl_ctx && !s->kssl_ctx->client_princ &&
770 session->krb5_client_princ_len > 0) { 770 session->krb5_client_princ_len > 0) {
771 s->kssl_ctx->client_princ = (char *)OPENSSL_malloc(session->krb5_client_princ_len + 1); 771 s->kssl_ctx->client_princ = (char *)malloc(session->krb5_client_princ_len + 1);
772 memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ, 772 memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ,
773 session->krb5_client_princ_len); 773 session->krb5_client_princ_len);
774 s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0'; 774 s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0';
@@ -900,11 +900,11 @@ SSL_set_session_ticket_ext(SSL *s, void *ext_data, int ext_len)
900{ 900{
901 if (s->version >= TLS1_VERSION) { 901 if (s->version >= TLS1_VERSION) {
902 if (s->tlsext_session_ticket) { 902 if (s->tlsext_session_ticket) {
903 OPENSSL_free(s->tlsext_session_ticket); 903 free(s->tlsext_session_ticket);
904 s->tlsext_session_ticket = NULL; 904 s->tlsext_session_ticket = NULL;
905 } 905 }
906 906
907 s->tlsext_session_ticket = OPENSSL_malloc(sizeof(TLS_SESSION_TICKET_EXT) + ext_len); 907 s->tlsext_session_ticket = malloc(sizeof(TLS_SESSION_TICKET_EXT) + ext_len);
908 if (!s->tlsext_session_ticket) { 908 if (!s->tlsext_session_ticket) {
909 SSLerr(SSL_F_SSL_SET_SESSION_TICKET_EXT, ERR_R_MALLOC_FAILURE); 909 SSLerr(SSL_F_SSL_SET_SESSION_TICKET_EXT, ERR_R_MALLOC_FAILURE);
910 return 0; 910 return 0;