diff options
author | Darren Tucker <dtucker@zip.com.au> | 2013-06-02 07:31:17 +1000 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2013-06-02 07:31:17 +1000 |
commit | a627d42e51ffa71e014d7b2d2c07118122fd3ec3 (patch) | |
tree | 7bda769de81f509e28d800916fa20abd37906d79 /dns.c | |
parent | c7aad0058c957afeb26a3f703e8cb0eddeb62365 (diff) |
- djm@cvs.openbsd.org 2013/05/17 00:13:13
[xmalloc.h cipher.c sftp-glob.c ssh-keyscan.c ssh.c sftp-common.c
ssh-ecdsa.c auth2-chall.c compat.c readconf.c kexgexs.c monitor.c
gss-genr.c cipher-3des1.c kex.c monitor_wrap.c ssh-pkcs11-client.c
auth-options.c rsa.c auth2-pubkey.c sftp.c hostfile.c auth2.c
servconf.c auth.c authfile.c xmalloc.c uuencode.c sftp-client.c
auth2-gss.c sftp-server.c bufaux.c mac.c session.c jpake.c kexgexc.c
sshconnect.c auth-chall.c auth2-passwd.c sshconnect1.c buffer.c
kexecdhs.c kexdhs.c ssh-rsa.c auth1.c ssh-pkcs11.c auth2-kbdint.c
kexdhc.c sshd.c umac.c ssh-dss.c auth2-jpake.c bufbn.c clientloop.c
monitor_mm.c scp.c roaming_client.c serverloop.c key.c auth-rsa.c
ssh-pkcs11-helper.c ssh-keysign.c ssh-keygen.c match.c channels.c
sshconnect2.c addrmatch.c mux.c canohost.c kexecdhc.c schnorr.c
ssh-add.c misc.c auth2-hostbased.c ssh-agent.c bufec.c groupaccess.c
dns.c packet.c readpass.c authfd.c moduli.c]
bye, bye xfree(); ok markus@
Diffstat (limited to 'dns.c')
-rw-r--r-- | dns.c | 10 |
1 files changed, 5 insertions, 5 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: dns.c,v 1.28 2012/05/23 03:28:28 djm Exp $ */ | 1 | /* $OpenBSD: dns.c,v 1.29 2013/05/17 00:13:13 djm Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright (c) 2003 Wesley Griffin. All rights reserved. | 4 | * Copyright (c) 2003 Wesley Griffin. All rights reserved. |
@@ -261,7 +261,7 @@ verify_host_key_dns(const char *hostname, struct sockaddr *address, | |||
261 | 261 | ||
262 | if (hostkey_digest_type != dnskey_digest_type) { | 262 | if (hostkey_digest_type != dnskey_digest_type) { |
263 | hostkey_digest_type = dnskey_digest_type; | 263 | hostkey_digest_type = dnskey_digest_type; |
264 | xfree(hostkey_digest); | 264 | free(hostkey_digest); |
265 | 265 | ||
266 | /* Initialize host key parameters */ | 266 | /* Initialize host key parameters */ |
267 | if (!dns_read_key(&hostkey_algorithm, | 267 | if (!dns_read_key(&hostkey_algorithm, |
@@ -281,10 +281,10 @@ verify_host_key_dns(const char *hostname, struct sockaddr *address, | |||
281 | hostkey_digest_len) == 0) | 281 | hostkey_digest_len) == 0) |
282 | *flags |= DNS_VERIFY_MATCH; | 282 | *flags |= DNS_VERIFY_MATCH; |
283 | } | 283 | } |
284 | xfree(dnskey_digest); | 284 | free(dnskey_digest); |
285 | } | 285 | } |
286 | 286 | ||
287 | xfree(hostkey_digest); /* from key_fingerprint_raw() */ | 287 | free(hostkey_digest); /* from key_fingerprint_raw() */ |
288 | freerrset(fingerprints); | 288 | freerrset(fingerprints); |
289 | 289 | ||
290 | if (*flags & DNS_VERIFY_FOUND) | 290 | if (*flags & DNS_VERIFY_FOUND) |
@@ -327,7 +327,7 @@ export_dns_rr(const char *hostname, Key *key, FILE *f, int generic) | |||
327 | for (i = 0; i < rdata_digest_len; i++) | 327 | for (i = 0; i < rdata_digest_len; i++) |
328 | fprintf(f, "%02x", rdata_digest[i]); | 328 | fprintf(f, "%02x", rdata_digest[i]); |
329 | fprintf(f, "\n"); | 329 | fprintf(f, "\n"); |
330 | xfree(rdata_digest); /* from key_fingerprint_raw() */ | 330 | free(rdata_digest); /* from key_fingerprint_raw() */ |
331 | success = 1; | 331 | success = 1; |
332 | } | 332 | } |
333 | } | 333 | } |