gnutls_free(info->raw_certificate_list);
gnutls_free(info->raw_ocsp_list);
- info->raw_certificate_list = NULL;
- info->raw_ocsp_list = NULL;
info->ncerts = 0;
info->nocsp = 0;
}
gnutls_free(session->key.auth_info);
- session->key.auth_info = NULL;
session->key.auth_info_size = 0;
session->key.auth_info_type = 0;
ret = gnutls_rnd(GNUTLS_RND_NONCE, session->key.key.data,
GNUTLS_MASTER_SIZE);
if (ret < 0) {
- gnutls_free(session->key.key.data);
- session->key.key.data = NULL;
- session->key.key.size = 0;
+ gnutls_free(session->key.key.data);
+ session->key.key.size = 0;
gnutls_assert();
return ret;
}
("auth_rsa_psk: Possible PKCS #1 format attack\n");
if (ret >= 0) {
gnutls_free(plaintext.data);
- plaintext.data = NULL;
}
randomize_key = 1;
} else {
tmp = decode(tmpres, datrev);
if (tmp < 0) {
gnutls_free((*result));
- *result = NULL;
return tmp;
}
tmp = decode(tmpres, (uint8_t *) & data[i]);
if (tmp < 0) {
gnutls_free((*result));
- *result = NULL;
return tmp;
}
memcpy(&(*result)[j], tmpres, tmp);
gnutls_pcert_import_x509_list(pcerts, unsorted, &ncerts, GNUTLS_X509_CRT_LIST_SORT);
if (ret < 0) {
gnutls_free(pcerts);
- pcerts = NULL;
gnutls_assert();
goto cleanup;
}
goto cleanup;
}
gnutls_free(t.data);
- t.data = NULL;
}
ret = _gnutls_certificate_credential_append_keypair(res, key, names, ccert, count);
while (i--)
gnutls_x509_crt_deinit((*crt_list)[i]);
gnutls_free(*crt_list);
- *crt_list = NULL;
return gnutls_assert_val(ret);
}
for (j = 0; j < sc->certs[i].ocsp_data_length; j++) {
gnutls_free(sc->certs[i].ocsp_data[j].response.data);
- sc->certs[i].ocsp_data[j].response.data = NULL;
}
_gnutls_str_array_clear(&sc->certs[i].names);
gnutls_privkey_deinit(sc->certs[i].pkey);
gnutls_free(sc->certs);
gnutls_free(sc->sorted_cert_idx);
- sc->certs = NULL;
- sc->sorted_cert_idx = NULL;
sc->ncerts = 0;
}
continue;
if (extfunc[i]->free_struct != 0) {
- gnutls_free((void*)extfunc[i]->name);
- gnutls_free((void*)extfunc[i]);
- extfunc[i] = NULL;
+ gnutls_free(((hello_ext_entry_st *)extfunc[i])->name);
+ gnutls_free(extfunc[i]);
}
}
}
if (buf_release != 0) {
gnutls_free(buf);
- buf = NULL;
}
if (r != NULL) {
fail:
mpz_clear(TOMPZ(*w));
gnutls_free(*w);
- *w = NULL;
va_start(args, w);
if (next != last_failed) {
mpz_clear(TOMPZ(*next));
gnutls_free(*next);
- *next = NULL;
}
} while(next != last_failed);
if (_gnutls_mem_is_zero(out->data, out->size)) {
gnutls_free(out->data);
- out->data = NULL;
gnutls_assert();
ret = GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER;
goto cleanup;
params->params_nr = 0;
gnutls_free(params->raw_priv.data);
gnutls_free(params->raw_pub.data);
- params->raw_priv.data = NULL;
- params->raw_pub.data = NULL;
FAIL_IF_LIB_ERROR;
return ret;
nresp++;
gnutls_free(der.data);
- der.data = NULL;
p.data++;
p.size--;
}
gnutls_free(p->raw_priv.data);
gnutls_free(p->raw_pub.data);
- p->raw_priv.data = NULL;
- p->raw_pub.data = NULL;
p->params_nr = 0;
}
(*obj)->info = p11_kit_uri_new();
if ((*obj)->info == NULL) {
gnutls_free(*obj);
- *obj = NULL;
gnutls_assert();
return GNUTLS_E_MEMORY_ERROR;
}
}
gnutls_free(tmp.data);
- tmp.data = NULL;
} else {
signature->size = siglen;
signature->data = tmp.data;
memset(&pkey->sinfo, 0, sizeof(pkey->sinfo));
- if (pkey->url) {
+ if (pkey->url)
gnutls_free(pkey->url);
- pkey->url = NULL;
- }
if (pkey->uinfo) {
p11_kit_uri_free(pkey->uinfo);
pkey->uinfo = NULL;
}
gnutls_free(pkey->url);
- pkey->url = NULL;
return ret;
}
case CKA_EC_PARAMS:
case CKA_EC_POINT:
gnutls_free(a[i].value);
- a[i].value = NULL;
break;
}
}
gnutls_free(info->raw_certificate_list);
gnutls_free(info->raw_ocsp_list);
- info->raw_certificate_list = NULL;
- info->raw_ocsp_list = NULL;
}
return ret;
if (res->password_conf_file == NULL) {
gnutls_assert();
gnutls_free(res->password_file);
- res->password_file = NULL;
return GNUTLS_E_MEMORY_ERROR;
}
return;
gnutls_free(str->allocd);
- str->data = str->allocd = NULL;
+ str->data = NULL;
str->max_length = 0;
str->length = 0;
}
return gnutls_assert_val(ret);
gnutls_free(session->internals.post_handshake_cr_context.data);
- session->internals.post_handshake_cr_context.data = NULL;
ret = _gnutls_set_datum(&session->internals.post_handshake_cr_context,
context.data, context.size);
if (ret < 0)
}
gnutls_free(session->internals.post_handshake_cr_context.data);
- session->internals.post_handshake_cr_context.data = NULL;
ret = _gnutls_set_datum(&session->internals.post_handshake_cr_context,
rnd, sizeof(rnd));
if (ret < 0) {
gnutls_pubkey_deinit(pub);
privkey_cleanup:
gnutls_free(privkey->data);
- privkey->data = NULL;
cleanup:
gnutls_free(tmpkey.data);
- tmpkey.data = NULL;
err_sa:
pTspi_Context_CloseObject(s.tpm_ctx, key_ctx);
err_cc:
asn1_delete_structure(&resp->basicresp);
resp->resp = NULL;
- resp->response_type_oid.data = NULL;
resp->basicresp = NULL;
gnutls_free(resp->der.data);
}
gnutls_free(resp->der.data);
- resp->der.data = NULL;
}
resp->init = 1;
return GNUTLS_E_SUCCESS;
fail:
- if (issuer_name_hash) {
+ if (issuer_name_hash)
gnutls_free(issuer_name_hash->data);
- issuer_name_hash->data = NULL;
- }
- if (issuer_key_hash) {
+ if (issuer_key_hash)
gnutls_free(issuer_key_hash->data);
- issuer_key_hash->data = NULL;
- }
- if (serial_number) {
+ if (serial_number)
gnutls_free(serial_number->data);
- serial_number->data = NULL;
- }
return ret;
}
}
gnutls_free(c.data);
- c.data = NULL;
}
tmpcerts[ctr] = NULL;
_gnutls_free_datum(&bag->element[i].data);
_gnutls_free_datum(&bag->element[i].local_key_id);
gnutls_free(bag->element[i].friendly_name);
- bag->element[i].friendly_name = NULL;
bag->element[i].type = 0;
}
_gnutls_cipher_init(&ch, ce, &dkey, &d_iv, 0);
gnutls_free(key);
- key = NULL;
if (ret < 0) {
gnutls_assert();
ret = gnutls_pkcs7_add_attr(&info->signed_attrs, oid, &tmp, 0);
gnutls_free(tmp.data);
- tmp.data = NULL;
if (ret < 0) {
gnutls_assert();
ret =
gnutls_pkcs7_add_attr(&info->unsigned_attrs, oid, &tmp, 0);
gnutls_free(tmp.data);
- tmp.data = NULL;
if (ret < 0) {
gnutls_assert();
}
gnutls_free(tmp.data);
- tmp.data = NULL;
gnutls_free(tmp2.data);
- tmp2.data = NULL;
}
if (msg_digest_ok)
gnutls_x509_crt_deinit(issuer);
issuer = NULL;
gnutls_free(tmp.data);
- tmp.data = NULL;
continue;
}
gnutls_x509_crt_deinit(crt);
crt = NULL;
gnutls_free(tmpdata.data);
- tmpdata.data = NULL;
continue;
}
} else {
cleanup:
if (ret != GNUTLS_E_UNKNOWN_CIPHER_TYPE && oid) {
gnutls_free(*oid);
- *oid = NULL;
}
if (need_free)
_gnutls_free_datum(&_data);
{
if (strcmp(ca_file, list->pkcs11_token) == 0) {
gnutls_free(list->pkcs11_token);
- list->pkcs11_token = NULL;
}
return 0;
}
if (ret < 0)
return gnutls_assert_val(ret);
gnutls_free(san->data);
- san->data = NULL;
if (othername_oid) {
name->othername_oid.data = (uint8_t *) othername_oid;
if (ret >= 0) {
ret = gnutls_x509_ext_import_subject_alt_names(&tmpder, cert->san, 0);
gnutls_free(tmpder.data);
- tmpder.data = NULL;
if (ret < 0)
return gnutls_assert_val(ret);
}
if (ret < 0) {
gnutls_free(*certs);
- *certs = NULL;
return ret;
}
if (gnutls_x509_crt_equals2(crts[i-1], &issuer)) {
gnutls_free(issuer.data);
- issuer.data = NULL;
break;
}
}
gnutls_free(issuer.data);
- issuer.data = NULL;
}
*certs = gnutls_malloc(total*sizeof(gnutls_x509_crt_t));
ret =
decode_user_notice(td.data, td.size, &txt);
gnutls_free(td.data);
- td.data = NULL;
if (ret < 0) {
gnutls_assert();
fail:
gnutls_free(result->data);
- result->data = NULL;
cleanup:
gnutls_free(pdata.data);
*exp_ret = atoi((char*)local.data);
success("expecting error code %d\n", *exp_ret);
gnutls_free(local.data);
- local.data = NULL;
}
return 0;
gnutls_x509_crt_deinit(cert);
gnutls_free(der.data);
- der.data = NULL;
der.size = 0;
exp_ret = -1;
}
gnutls_certificate_free_credentials(clientx509cred);
gnutls_free(dbdata.data);
- dbdata.data = NULL;
dbdata.size = 0;
}
static void parse_cidr(const char* cidr, gnutls_datum_t *datum) {
if (datum->data != NULL) {
gnutls_free(datum->data);
- datum->data = NULL;
}
int ret = gnutls_x509_cidr_to_rfc5280(cidr, datum);
check_for_error(ret);
gnutls_free(test_vars->ip.data);
gnutls_x509_name_constraints_deinit(test_vars->nc);
gnutls_x509_name_constraints_deinit(test_vars->nc2);
- gnutls_free(test_vars);
+ gnutls_free(*state);
return 0;
}
for (i=0;i<obj_list_size;i++)
gnutls_pkcs11_obj_deinit(obj_list[i]);
gnutls_free(obj_list);
- obj_list = NULL;
obj_list_size = 0;
#ifndef _WIN32
for (i=0;i<obj_list_size;i++)
gnutls_pkcs11_obj_deinit(obj_list[i]);
gnutls_free(obj_list);
- obj_list = NULL;
obj_list_size = 0;
}
#endif
pin_called = 0;
gnutls_free(sig.data);
- sig.data = NULL;
/* call again - should re-authenticate */
ret = gnutls_privkey_sign_hash(key, GNUTLS_DIG_SHA1, 0, &data, &sig);
pin_called = 0;
gnutls_free(sig.data);
- sig.data = NULL;
if (debug)
printf("done\n\n\n");
}
gnutls_free(sig.data);
- sig.data = NULL;
pid = fork();
if (pid != 0) {
}
gnutls_free(sig.data);
- sig.data = NULL;
pid = fork();
if (pid != 0) {
pin_called = 0;
gnutls_free(sig.data);
- sig.data = NULL;
/* call again - should re-authenticate */
ret = gnutls_privkey_sign_hash(key, GNUTLS_DIG_SHA1, 0, &data, &sig);
pin_called = 0;
gnutls_free(sig.data);
- sig.data = NULL;
if (debug)
printf("done\n\n\n");
*exp_ret = atoi((char*)local.data);
success("expecting error code %d\n", *exp_ret);
gnutls_free(local.data);
- local.data = NULL;
}
return 0;
gnutls_pkcs7_deinit(cert);
gnutls_free(der.data);
- der.data = NULL;
der.size = 0;
exp_ret = -1;
}
}
gnutls_free(session_ticket_key.data);
- session_ticket_key.data = NULL;
gnutls_anon_free_server_credentials(anoncred);
if (debug)
}
gnutls_free(session_ticket_key.data);
- session_ticket_key.data = NULL;
if (debug)
success("server: finished\n");
/* test the raw interface */
gnutls_free(signature.data);
- signature.data = NULL;
gnutls_free(signature.data);
gnutls_x509_crt_deinit(crt);
/* test the raw interface */
gnutls_free(signature.data);
- signature.data = NULL;
gnutls_free(signature2.data);
- signature2.data = NULL;
if (gnutls_pubkey_get_pk_algorithm(pubkey, NULL) ==
GNUTLS_PK_RSA) {
testfail("gnutls_pubkey_verify_data2\n");
gnutls_free(signature.data);
- signature.data = NULL;
if (!tests[i].data_only) {
testfail("gnutls_pubkey_verify_hash2-1 (hashed data)\n");
gnutls_free(signature2.data);
- signature2.data = NULL;
}
if (gnutls_pubkey_get_pk_algorithm(pubkey, NULL) ==
/* test the raw interface */
gnutls_free(signature.data);
- signature.data = NULL;
if (gnutls_pubkey_get_pk_algorithm(pubkey, NULL) ==
GNUTLS_PK_RSA) {
}
}
gnutls_free(ext.data);
- ext.data = NULL;
}
if (debug)
fail("gnutls_privkey_sign_hash\n");
gnutls_free(signature2.data);
- signature2.data = NULL;
_gnutls_lib_simulate_error();
ret = gnutls_privkey_sign_hash(privkey, GNUTLS_DIG_SHA1, 0,