diff options
author | Danilo Almeida <dalmeida@mit.edu> | 2001-06-22 07:51:38 +0000 |
---|---|---|
committer | Danilo Almeida <dalmeida@mit.edu> | 2001-06-22 07:51:38 +0000 |
commit | a30fb4c4400f13a2690df7ef910b7ac0ccbcf194 (patch) | |
tree | 436593ebf24a093a3b5569f991480daf8adbdc45 /src/lib/gssapi/krb5/add_cred.c | |
parent | 0573a7bb339f68f0fa5556e71e46dfda6a149f98 (diff) | |
download | krb5-a30fb4c4400f13a2690df7ef910b7ac0ccbcf194.tar.gz krb5-a30fb4c4400f13a2690df7ef910b7ac0ccbcf194.tar.xz krb5-a30fb4c4400f13a2690df7ef910b7ac0ccbcf194.zip |
Cleanup usage of memory free routines:
* util_crypt.c (kg_encrypt, kg_decrypt): Use free() instead of
krb5_free_data_contents().
* util_cksum.c (kg_checksum_channel_bindings): Make sure that
returned memory is allocated with xmalloc() so that caller can use
xfree() on it.
* k5unseal.c (kg_unseal_v1): Use krb5_free_data_contents()
instead of xfree().
* k5seal.c (make_seal_token_v1): Use krb5_free_data_contents()
instead of xfree().
* init_sec_context.c (make_ap_req_v1): Use xfree() instead of
free() to be consistent with xmalloc() usage. Use
krb5_free_data_contents() instead of xfree().
* disp_name.c (krb5_gss_display_name): Use
krb5_free_unparsed_name() instead of xfree().
* add_cred.c (krb5_gss_add_cred): Use xfree() instead of free() to
be consistent with xmalloc() usage.
* accept_sec_context.c (krb5_gss_accept_sec_context): Remove
variables that were effectively unused. Use
krb5_free_data_contents() instead of xfree() where appropriate.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13482 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/gssapi/krb5/add_cred.c')
-rw-r--r-- | src/lib/gssapi/krb5/add_cred.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/src/lib/gssapi/krb5/add_cred.c b/src/lib/gssapi/krb5/add_cred.c index 5cc1784870..ab393ee29a 100644 --- a/src/lib/gssapi/krb5/add_cred.c +++ b/src/lib/gssapi/krb5/add_cred.c @@ -184,7 +184,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, code = krb5_copy_principal(context, cred->princ, &new_cred->princ); if (code) { - free(new_cred); + xfree(new_cred); *minor_status = code; return(GSS_S_FAILURE); @@ -194,7 +194,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, kttype = krb5_kt_get_type(context, cred->keytab); if ((strlen(kttype)+2) > sizeof(ktboth)) { krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = ENOMEM; return(GSS_S_FAILURE); @@ -209,7 +209,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, sizeof(ktboth)-strlen(ktboth)); if (code) { krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = code; return(GSS_S_FAILURE); @@ -218,7 +218,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, code = krb5_kt_resolve(context, ktboth, &new_cred->keytab); if (code) { krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = code; return(GSS_S_FAILURE); @@ -235,7 +235,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, if (new_cred->keytab) krb5_kt_close(context, new_cred->keytab); krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = code; return(GSS_S_FAILURE); @@ -254,7 +254,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, if (new_cred->keytab) krb5_kt_close(context, new_cred->keytab); krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = ENOMEM; return(GSS_S_FAILURE); @@ -272,7 +272,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, if (new_cred->keytab) krb5_kt_close(context, new_cred->keytab); krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = code; return(GSS_S_FAILURE); @@ -291,7 +291,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, if (new_cred->keytab) krb5_kt_close(context, new_cred->keytab); krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = (OM_uint32) G_VALIDATE_FAILED; return(GSS_S_FAILURE); |