diff options
| author | Theodore Tso <tytso@mit.edu> | 1993-10-15 16:52:33 +0000 |
|---|---|---|
| committer | Theodore Tso <tytso@mit.edu> | 1993-10-15 16:52:33 +0000 |
| commit | 5bb27f267ab3039b23452595cf345eecd81acf4d (patch) | |
| tree | d2d3a8455fc8c53540fa8fc8ebad73cf42ff86a3 /src/lib/gssapi/init_sec.c | |
| parent | 3909e34b87a1a783d63e276568f2549cdc2d2795 (diff) | |
Change use of xfree to krb5_xfree to prevent namespace pollution
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@2670 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/gssapi/init_sec.c')
| -rw-r--r-- | src/lib/gssapi/init_sec.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/src/lib/gssapi/init_sec.c b/src/lib/gssapi/init_sec.c index 8078ae1d3..87f48d832 100644 --- a/src/lib/gssapi/init_sec.c +++ b/src/lib/gssapi/init_sec.c @@ -149,7 +149,7 @@ OM_uint32 gss_init_sec_context(minor_status, claimant_cred_handle, context->my_address.length = channel->initiator_address.length; if (!(context->my_address.contents = (krb5_octet *) malloc(context->my_address.length))) { - xfree(context); + krb5_xfree(context); return(GSS_S_FAILURE); } memcpy((char *) context->my_address.contents, @@ -159,8 +159,8 @@ OM_uint32 gss_init_sec_context(minor_status, claimant_cred_handle, context->his_address.length = channel->acceptor_address.length; if (!(context->his_address.contents = (krb5_octet *) malloc(context->my_address.length))) { - xfree(context->my_address.contents); - xfree(context); + krb5_xfree(context->my_address.contents); + krb5_xfree(context); return(GSS_S_FAILURE); } memcpy((char *) context->his_address.contents, @@ -172,8 +172,8 @@ OM_uint32 gss_init_sec_context(minor_status, claimant_cred_handle, if (*minor_status = krb5_generate_seq_number(&creds.keyblock, &context->my_seq_num)) { - xfree(context->his_address.contents); - xfree(context->my_address.contents); + krb5_xfree(context->his_address.contents); + krb5_xfree(context->my_address.contents); free((char *)context); return(GSS_S_FAILURE); } @@ -222,7 +222,7 @@ OM_uint32 gss_init_sec_context(minor_status, claimant_cred_handle, if (*minor_status = krb5_copy_keyblock(&creds.keyblock, &context->session_key)) { - xfree(outbuf.data); + krb5_xfree(outbuf.data); krb5_free_cred_contents(&creds); free((char *)context); return(GSS_S_FAILURE); @@ -234,7 +234,7 @@ OM_uint32 gss_init_sec_context(minor_status, claimant_cred_handle, outbuf.length, outbuf.data, output_token)) { - xfree(outbuf.data); + krb5_xfree(outbuf.data); krb5_free_cred_contents(&creds); free((char *) context); return(GSS_S_FAILURE); @@ -243,7 +243,7 @@ OM_uint32 gss_init_sec_context(minor_status, claimant_cred_handle, * Send over the requested flags information */ ((char *) output_token->value)[4] = context->flags; - xfree(outbuf.data); + krb5_xfree(outbuf.data); *context_handle = context; context->state = GSS_KRB_STATE_DOWN; *ret_flags = context->flags; |
