Standardise our style for checking malloc failures
if we have a malloc |x = OPENSSL_malloc(...)| sometimes we check |x| for NULL and sometimes we treat it as a boolean |if(!x) ...|. Standardise the approach in libssl. Reviewed-by: Kurt Roeckx <kurt@openssl.org>
This commit is contained in:
@@ -311,7 +311,7 @@ SSL *SSL_new(SSL_CTX *ctx)
|
||||
s->generate_session_id = ctx->generate_session_id;
|
||||
|
||||
s->param = X509_VERIFY_PARAM_new();
|
||||
if (!s->param)
|
||||
if (s->param == NULL)
|
||||
goto err;
|
||||
X509_VERIFY_PARAM_inherit(s->param, ctx->param);
|
||||
s->quiet_shutdown = ctx->quiet_shutdown;
|
||||
@@ -1547,7 +1547,7 @@ int SSL_CTX_set_alpn_protos(SSL_CTX *ctx, const unsigned char *protos,
|
||||
{
|
||||
OPENSSL_free(ctx->alpn_client_proto_list);
|
||||
ctx->alpn_client_proto_list = OPENSSL_malloc(protos_len);
|
||||
if (!ctx->alpn_client_proto_list)
|
||||
if (ctx->alpn_client_proto_list == NULL)
|
||||
return 1;
|
||||
memcpy(ctx->alpn_client_proto_list, protos, protos_len);
|
||||
ctx->alpn_client_proto_list_len = protos_len;
|
||||
@@ -1565,7 +1565,7 @@ int SSL_set_alpn_protos(SSL *ssl, const unsigned char *protos,
|
||||
{
|
||||
OPENSSL_free(ssl->alpn_client_proto_list);
|
||||
ssl->alpn_client_proto_list = OPENSSL_malloc(protos_len);
|
||||
if (!ssl->alpn_client_proto_list)
|
||||
if (ssl->alpn_client_proto_list == NULL)
|
||||
return 1;
|
||||
memcpy(ssl->alpn_client_proto_list, protos, protos_len);
|
||||
ssl->alpn_client_proto_list_len = protos_len;
|
||||
@@ -1708,7 +1708,7 @@ SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth)
|
||||
}
|
||||
|
||||
ret->param = X509_VERIFY_PARAM_new();
|
||||
if (!ret->param)
|
||||
if (ret->param == NULL)
|
||||
goto err;
|
||||
|
||||
if ((ret->md5 = EVP_get_digestbyname("ssl3-md5")) == NULL) {
|
||||
|
Reference in New Issue
Block a user