diff options
Diffstat (limited to 'src/lib/libssl/ssl_sess.c')
-rw-r--r-- | src/lib/libssl/ssl_sess.c | 32 |
1 files changed, 16 insertions, 16 deletions
diff --git a/src/lib/libssl/ssl_sess.c b/src/lib/libssl/ssl_sess.c index 0b1c655820..f9f6ee5ecb 100644 --- a/src/lib/libssl/ssl_sess.c +++ b/src/lib/libssl/ssl_sess.c | |||
@@ -195,7 +195,7 @@ SSL_SESSION | |||
195 | { | 195 | { |
196 | SSL_SESSION *ss; | 196 | SSL_SESSION *ss; |
197 | 197 | ||
198 | ss = (SSL_SESSION *)OPENSSL_malloc(sizeof(SSL_SESSION)); | 198 | ss = (SSL_SESSION *)malloc(sizeof(SSL_SESSION)); |
199 | if (ss == NULL) { | 199 | if (ss == NULL) { |
200 | SSLerr(SSL_F_SSL_SESSION_NEW, ERR_R_MALLOC_FAILURE); | 200 | SSLerr(SSL_F_SSL_SESSION_NEW, ERR_R_MALLOC_FAILURE); |
201 | return (0); | 201 | return (0); |
@@ -371,8 +371,8 @@ ssl_get_new_session(SSL *s, int session) | |||
371 | #ifndef OPENSSL_NO_EC | 371 | #ifndef OPENSSL_NO_EC |
372 | if (s->tlsext_ecpointformatlist) { | 372 | if (s->tlsext_ecpointformatlist) { |
373 | if (ss->tlsext_ecpointformatlist != NULL) | 373 | if (ss->tlsext_ecpointformatlist != NULL) |
374 | OPENSSL_free(ss->tlsext_ecpointformatlist); | 374 | free(ss->tlsext_ecpointformatlist); |
375 | if ((ss->tlsext_ecpointformatlist = OPENSSL_malloc(s->tlsext_ecpointformatlist_length)) == NULL) { | 375 | if ((ss->tlsext_ecpointformatlist = malloc(s->tlsext_ecpointformatlist_length)) == NULL) { |
376 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); | 376 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); |
377 | SSL_SESSION_free(ss); | 377 | SSL_SESSION_free(ss); |
378 | return 0; | 378 | return 0; |
@@ -382,8 +382,8 @@ ssl_get_new_session(SSL *s, int session) | |||
382 | } | 382 | } |
383 | if (s->tlsext_ellipticcurvelist) { | 383 | if (s->tlsext_ellipticcurvelist) { |
384 | if (ss->tlsext_ellipticcurvelist != NULL) | 384 | if (ss->tlsext_ellipticcurvelist != NULL) |
385 | OPENSSL_free(ss->tlsext_ellipticcurvelist); | 385 | free(ss->tlsext_ellipticcurvelist); |
386 | if ((ss->tlsext_ellipticcurvelist = OPENSSL_malloc(s->tlsext_ellipticcurvelist_length)) == NULL) { | 386 | if ((ss->tlsext_ellipticcurvelist = malloc(s->tlsext_ellipticcurvelist_length)) == NULL) { |
387 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); | 387 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); |
388 | SSL_SESSION_free(ss); | 388 | SSL_SESSION_free(ss); |
389 | return 0; | 389 | return 0; |
@@ -719,30 +719,30 @@ SSL_SESSION_free(SSL_SESSION *ss) | |||
719 | sk_SSL_CIPHER_free(ss->ciphers); | 719 | sk_SSL_CIPHER_free(ss->ciphers); |
720 | #ifndef OPENSSL_NO_TLSEXT | 720 | #ifndef OPENSSL_NO_TLSEXT |
721 | if (ss->tlsext_hostname != NULL) | 721 | if (ss->tlsext_hostname != NULL) |
722 | OPENSSL_free(ss->tlsext_hostname); | 722 | free(ss->tlsext_hostname); |
723 | if (ss->tlsext_tick != NULL) | 723 | if (ss->tlsext_tick != NULL) |
724 | OPENSSL_free(ss->tlsext_tick); | 724 | free(ss->tlsext_tick); |
725 | #ifndef OPENSSL_NO_EC | 725 | #ifndef OPENSSL_NO_EC |
726 | ss->tlsext_ecpointformatlist_length = 0; | 726 | ss->tlsext_ecpointformatlist_length = 0; |
727 | if (ss->tlsext_ecpointformatlist != NULL) | 727 | if (ss->tlsext_ecpointformatlist != NULL) |
728 | OPENSSL_free(ss->tlsext_ecpointformatlist); | 728 | free(ss->tlsext_ecpointformatlist); |
729 | ss->tlsext_ellipticcurvelist_length = 0; | 729 | ss->tlsext_ellipticcurvelist_length = 0; |
730 | if (ss->tlsext_ellipticcurvelist != NULL) | 730 | if (ss->tlsext_ellipticcurvelist != NULL) |
731 | OPENSSL_free(ss->tlsext_ellipticcurvelist); | 731 | free(ss->tlsext_ellipticcurvelist); |
732 | #endif /* OPENSSL_NO_EC */ | 732 | #endif /* OPENSSL_NO_EC */ |
733 | #endif | 733 | #endif |
734 | #ifndef OPENSSL_NO_PSK | 734 | #ifndef OPENSSL_NO_PSK |
735 | if (ss->psk_identity_hint != NULL) | 735 | if (ss->psk_identity_hint != NULL) |
736 | OPENSSL_free(ss->psk_identity_hint); | 736 | free(ss->psk_identity_hint); |
737 | if (ss->psk_identity != NULL) | 737 | if (ss->psk_identity != NULL) |
738 | OPENSSL_free(ss->psk_identity); | 738 | free(ss->psk_identity); |
739 | #endif | 739 | #endif |
740 | #ifndef OPENSSL_NO_SRP | 740 | #ifndef OPENSSL_NO_SRP |
741 | if (ss->srp_username != NULL) | 741 | if (ss->srp_username != NULL) |
742 | OPENSSL_free(ss->srp_username); | 742 | free(ss->srp_username); |
743 | #endif | 743 | #endif |
744 | OPENSSL_cleanse(ss, sizeof(*ss)); | 744 | OPENSSL_cleanse(ss, sizeof(*ss)); |
745 | OPENSSL_free(ss); | 745 | free(ss); |
746 | } | 746 | } |
747 | 747 | ||
748 | int | 748 | int |
@@ -768,7 +768,7 @@ SSL_set_session(SSL *s, SSL_SESSION *session) | |||
768 | #ifndef OPENSSL_NO_KRB5 | 768 | #ifndef OPENSSL_NO_KRB5 |
769 | if (s->kssl_ctx && !s->kssl_ctx->client_princ && | 769 | if (s->kssl_ctx && !s->kssl_ctx->client_princ && |
770 | session->krb5_client_princ_len > 0) { | 770 | session->krb5_client_princ_len > 0) { |
771 | s->kssl_ctx->client_princ = (char *)OPENSSL_malloc(session->krb5_client_princ_len + 1); | 771 | s->kssl_ctx->client_princ = (char *)malloc(session->krb5_client_princ_len + 1); |
772 | memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ, | 772 | memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ, |
773 | session->krb5_client_princ_len); | 773 | session->krb5_client_princ_len); |
774 | s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0'; | 774 | s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0'; |
@@ -900,11 +900,11 @@ SSL_set_session_ticket_ext(SSL *s, void *ext_data, int ext_len) | |||
900 | { | 900 | { |
901 | if (s->version >= TLS1_VERSION) { | 901 | if (s->version >= TLS1_VERSION) { |
902 | if (s->tlsext_session_ticket) { | 902 | if (s->tlsext_session_ticket) { |
903 | OPENSSL_free(s->tlsext_session_ticket); | 903 | free(s->tlsext_session_ticket); |
904 | s->tlsext_session_ticket = NULL; | 904 | s->tlsext_session_ticket = NULL; |
905 | } | 905 | } |
906 | 906 | ||
907 | s->tlsext_session_ticket = OPENSSL_malloc(sizeof(TLS_SESSION_TICKET_EXT) + ext_len); | 907 | s->tlsext_session_ticket = malloc(sizeof(TLS_SESSION_TICKET_EXT) + ext_len); |
908 | if (!s->tlsext_session_ticket) { | 908 | if (!s->tlsext_session_ticket) { |
909 | SSLerr(SSL_F_SSL_SET_SESSION_TICKET_EXT, ERR_R_MALLOC_FAILURE); | 909 | SSLerr(SSL_F_SSL_SET_SESSION_TICKET_EXT, ERR_R_MALLOC_FAILURE); |
910 | return 0; | 910 | return 0; |