summaryrefslogtreecommitdiff
path: root/auth2.c
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2013-06-02 07:31:17 +1000
committerDarren Tucker <dtucker@zip.com.au>2013-06-02 07:31:17 +1000
commita627d42e51ffa71e014d7b2d2c07118122fd3ec3 (patch)
tree7bda769de81f509e28d800916fa20abd37906d79 /auth2.c
parentc7aad0058c957afeb26a3f703e8cb0eddeb62365 (diff)
- djm@cvs.openbsd.org 2013/05/17 00:13:13
[xmalloc.h cipher.c sftp-glob.c ssh-keyscan.c ssh.c sftp-common.c ssh-ecdsa.c auth2-chall.c compat.c readconf.c kexgexs.c monitor.c gss-genr.c cipher-3des1.c kex.c monitor_wrap.c ssh-pkcs11-client.c auth-options.c rsa.c auth2-pubkey.c sftp.c hostfile.c auth2.c servconf.c auth.c authfile.c xmalloc.c uuencode.c sftp-client.c auth2-gss.c sftp-server.c bufaux.c mac.c session.c jpake.c kexgexc.c sshconnect.c auth-chall.c auth2-passwd.c sshconnect1.c buffer.c kexecdhs.c kexdhs.c ssh-rsa.c auth1.c ssh-pkcs11.c auth2-kbdint.c kexdhc.c sshd.c umac.c ssh-dss.c auth2-jpake.c bufbn.c clientloop.c monitor_mm.c scp.c roaming_client.c serverloop.c key.c auth-rsa.c ssh-pkcs11-helper.c ssh-keysign.c ssh-keygen.c match.c channels.c sshconnect2.c addrmatch.c mux.c canohost.c kexecdhc.c schnorr.c ssh-add.c misc.c auth2-hostbased.c ssh-agent.c bufec.c groupaccess.c dns.c packet.c readpass.c authfd.c moduli.c] bye, bye xfree(); ok markus@
Diffstat (limited to 'auth2.c')
-rw-r--r--auth2.c17
1 files changed, 8 insertions, 9 deletions
diff --git a/auth2.c b/auth2.c
index e44482164..5f136ce09 100644
--- a/auth2.c
+++ b/auth2.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: auth2.c,v 1.127 2013/03/07 19:27:25 markus Exp $ */ 1/* $OpenBSD: auth2.c,v 1.128 2013/05/17 00:13:13 djm Exp $ */
2/* 2/*
3 * Copyright (c) 2000 Markus Friedl. All rights reserved. 3 * Copyright (c) 2000 Markus Friedl. All rights reserved.
4 * 4 *
@@ -130,7 +130,7 @@ auth2_read_banner(void)
130 close(fd); 130 close(fd);
131 131
132 if (n != len) { 132 if (n != len) {
133 xfree(banner); 133 free(banner);
134 return (NULL); 134 return (NULL);
135 } 135 }
136 banner[n] = '\0'; 136 banner[n] = '\0';
@@ -166,8 +166,7 @@ userauth_banner(void)
166 userauth_send_banner(banner); 166 userauth_send_banner(banner);
167 167
168done: 168done:
169 if (banner) 169 free(banner);
170 xfree(banner);
171} 170}
172 171
173/* 172/*
@@ -212,7 +211,7 @@ input_service_request(int type, u_int32_t seq, void *ctxt)
212 debug("bad service request %s", service); 211 debug("bad service request %s", service);
213 packet_disconnect("bad service request %s", service); 212 packet_disconnect("bad service request %s", service);
214 } 213 }
215 xfree(service); 214 free(service);
216} 215}
217 216
218/*ARGSUSED*/ 217/*ARGSUSED*/
@@ -292,9 +291,9 @@ input_userauth_request(int type, u_int32_t seq, void *ctxt)
292 } 291 }
293 userauth_finish(authctxt, authenticated, method, NULL); 292 userauth_finish(authctxt, authenticated, method, NULL);
294 293
295 xfree(service); 294 free(service);
296 xfree(user); 295 free(user);
297 xfree(method); 296 free(method);
298} 297}
299 298
300void 299void
@@ -382,7 +381,7 @@ userauth_finish(Authctxt *authctxt, int authenticated, const char *method,
382 packet_put_char(partial); 381 packet_put_char(partial);
383 packet_send(); 382 packet_send();
384 packet_write_wait(); 383 packet_write_wait();
385 xfree(methods); 384 free(methods);
386 } 385 }
387} 386}
388 387