From a30fb4c4400f13a2690df7ef910b7ac0ccbcf194 Mon Sep 17 00:00:00 2001 From: Danilo Almeida Date: Fri, 22 Jun 2001 07:51:38 +0000 Subject: Cleanup usage of memory free routines: * util_crypt.c (kg_encrypt, kg_decrypt): Use free() instead of krb5_free_data_contents(). * util_cksum.c (kg_checksum_channel_bindings): Make sure that returned memory is allocated with xmalloc() so that caller can use xfree() on it. * k5unseal.c (kg_unseal_v1): Use krb5_free_data_contents() instead of xfree(). * k5seal.c (make_seal_token_v1): Use krb5_free_data_contents() instead of xfree(). * init_sec_context.c (make_ap_req_v1): Use xfree() instead of free() to be consistent with xmalloc() usage. Use krb5_free_data_contents() instead of xfree(). * disp_name.c (krb5_gss_display_name): Use krb5_free_unparsed_name() instead of xfree(). * add_cred.c (krb5_gss_add_cred): Use xfree() instead of free() to be consistent with xmalloc() usage. * accept_sec_context.c (krb5_gss_accept_sec_context): Remove variables that were effectively unused. Use krb5_free_data_contents() instead of xfree() where appropriate. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13482 dc483132-0cff-0310-8789-dd5450dbe970 --- src/lib/gssapi/krb5/add_cred.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) (limited to 'src/lib/gssapi/krb5/add_cred.c') diff --git a/src/lib/gssapi/krb5/add_cred.c b/src/lib/gssapi/krb5/add_cred.c index 5cc1784870..ab393ee29a 100644 --- a/src/lib/gssapi/krb5/add_cred.c +++ b/src/lib/gssapi/krb5/add_cred.c @@ -184,7 +184,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, code = krb5_copy_principal(context, cred->princ, &new_cred->princ); if (code) { - free(new_cred); + xfree(new_cred); *minor_status = code; return(GSS_S_FAILURE); @@ -194,7 +194,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, kttype = krb5_kt_get_type(context, cred->keytab); if ((strlen(kttype)+2) > sizeof(ktboth)) { krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = ENOMEM; return(GSS_S_FAILURE); @@ -209,7 +209,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, sizeof(ktboth)-strlen(ktboth)); if (code) { krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = code; return(GSS_S_FAILURE); @@ -218,7 +218,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, code = krb5_kt_resolve(context, ktboth, &new_cred->keytab); if (code) { krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = code; return(GSS_S_FAILURE); @@ -235,7 +235,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, if (new_cred->keytab) krb5_kt_close(context, new_cred->keytab); krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = code; return(GSS_S_FAILURE); @@ -254,7 +254,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, if (new_cred->keytab) krb5_kt_close(context, new_cred->keytab); krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = ENOMEM; return(GSS_S_FAILURE); @@ -272,7 +272,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, if (new_cred->keytab) krb5_kt_close(context, new_cred->keytab); krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = code; return(GSS_S_FAILURE); @@ -291,7 +291,7 @@ krb5_gss_add_cred(minor_status, input_cred_handle, if (new_cred->keytab) krb5_kt_close(context, new_cred->keytab); krb5_free_principal(context, new_cred->princ); - free(new_cred); + xfree(new_cred); *minor_status = (OM_uint32) G_VALIDATE_FAILED; return(GSS_S_FAILURE); -- cgit