summaryrefslogtreecommitdiffstats
path: root/src/lib/gssapi/krb5/add_cred.c
diff options
context:
space:
mode:
authorDanilo Almeida <dalmeida@mit.edu>2001-06-22 07:51:38 +0000
committerDanilo Almeida <dalmeida@mit.edu>2001-06-22 07:51:38 +0000
commita30fb4c4400f13a2690df7ef910b7ac0ccbcf194 (patch)
tree436593ebf24a093a3b5569f991480daf8adbdc45 /src/lib/gssapi/krb5/add_cred.c
parent0573a7bb339f68f0fa5556e71e46dfda6a149f98 (diff)
downloadkrb5-a30fb4c4400f13a2690df7ef910b7ac0ccbcf194.tar.gz
krb5-a30fb4c4400f13a2690df7ef910b7ac0ccbcf194.tar.xz
krb5-a30fb4c4400f13a2690df7ef910b7ac0ccbcf194.zip
Cleanup usage of memory free routines:
* util_crypt.c (kg_encrypt, kg_decrypt): Use free() instead of krb5_free_data_contents(). * util_cksum.c (kg_checksum_channel_bindings): Make sure that returned memory is allocated with xmalloc() so that caller can use xfree() on it. * k5unseal.c (kg_unseal_v1): Use krb5_free_data_contents() instead of xfree(). * k5seal.c (make_seal_token_v1): Use krb5_free_data_contents() instead of xfree(). * init_sec_context.c (make_ap_req_v1): Use xfree() instead of free() to be consistent with xmalloc() usage. Use krb5_free_data_contents() instead of xfree(). * disp_name.c (krb5_gss_display_name): Use krb5_free_unparsed_name() instead of xfree(). * add_cred.c (krb5_gss_add_cred): Use xfree() instead of free() to be consistent with xmalloc() usage. * accept_sec_context.c (krb5_gss_accept_sec_context): Remove variables that were effectively unused. Use krb5_free_data_contents() instead of xfree() where appropriate. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13482 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/gssapi/krb5/add_cred.c')
-rw-r--r--src/lib/gssapi/krb5/add_cred.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/src/lib/gssapi/krb5/add_cred.c b/src/lib/gssapi/krb5/add_cred.c
index 5cc1784870..ab393ee29a 100644
--- a/src/lib/gssapi/krb5/add_cred.c
+++ b/src/lib/gssapi/krb5/add_cred.c
@@ -184,7 +184,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle,
code = krb5_copy_principal(context, cred->princ, &new_cred->princ);
if (code) {
- free(new_cred);
+ xfree(new_cred);
*minor_status = code;
return(GSS_S_FAILURE);
@@ -194,7 +194,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle,
kttype = krb5_kt_get_type(context, cred->keytab);
if ((strlen(kttype)+2) > sizeof(ktboth)) {
krb5_free_principal(context, new_cred->princ);
- free(new_cred);
+ xfree(new_cred);
*minor_status = ENOMEM;
return(GSS_S_FAILURE);
@@ -209,7 +209,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle,
sizeof(ktboth)-strlen(ktboth));
if (code) {
krb5_free_principal(context, new_cred->princ);
- free(new_cred);
+ xfree(new_cred);
*minor_status = code;
return(GSS_S_FAILURE);
@@ -218,7 +218,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle,
code = krb5_kt_resolve(context, ktboth, &new_cred->keytab);
if (code) {
krb5_free_principal(context, new_cred->princ);
- free(new_cred);
+ xfree(new_cred);
*minor_status = code;
return(GSS_S_FAILURE);
@@ -235,7 +235,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle,
if (new_cred->keytab)
krb5_kt_close(context, new_cred->keytab);
krb5_free_principal(context, new_cred->princ);
- free(new_cred);
+ xfree(new_cred);
*minor_status = code;
return(GSS_S_FAILURE);
@@ -254,7 +254,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle,
if (new_cred->keytab)
krb5_kt_close(context, new_cred->keytab);
krb5_free_principal(context, new_cred->princ);
- free(new_cred);
+ xfree(new_cred);
*minor_status = ENOMEM;
return(GSS_S_FAILURE);
@@ -272,7 +272,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle,
if (new_cred->keytab)
krb5_kt_close(context, new_cred->keytab);
krb5_free_principal(context, new_cred->princ);
- free(new_cred);
+ xfree(new_cred);
*minor_status = code;
return(GSS_S_FAILURE);
@@ -291,7 +291,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle,
if (new_cred->keytab)
krb5_kt_close(context, new_cred->keytab);
krb5_free_principal(context, new_cred->princ);
- free(new_cred);
+ xfree(new_cred);
*minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_FAILURE);