summaryrefslogtreecommitdiff
path: root/sys/netinet
diff options
context:
space:
mode:
authorKenneth R Westerback <krw@cvs.openbsd.org>2007-10-06 02:18:40 +0000
committerKenneth R Westerback <krw@cvs.openbsd.org>2007-10-06 02:18:40 +0000
commit8ff920388972b1de9474c6e452d5af0e09f86477 (patch)
treed093baa8a24a654d8a456f72387740773add92db /sys/netinet
parent231e9b6545a8d0924bcf5930a81ec9eec2649b92 (diff)
Oops. Forgot to do FREE -> free when I did MALLOC -> malloc.
Diffstat (limited to 'sys/netinet')
-rw-r--r--sys/netinet/ip_esp.c20
-rw-r--r--sys/netinet/ip_ipcomp.c20
2 files changed, 20 insertions, 20 deletions
diff --git a/sys/netinet/ip_esp.c b/sys/netinet/ip_esp.c
index cfd1148b1d5..d4607b9e65d 100644
--- a/sys/netinet/ip_esp.c
+++ b/sys/netinet/ip_esp.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ip_esp.c,v 1.101 2007/10/03 10:52:11 krw Exp $ */
+/* $OpenBSD: ip_esp.c,v 1.102 2007/10/06 02:18:38 krw Exp $ */
/*
* The authors of this code are John Ioannidis (ji@tla.org),
* Angelos D. Keromytis (kermit@csd.uch.gr) and
@@ -511,7 +511,7 @@ esp_input_cb(void *op)
m = (struct mbuf *) crp->crp_buf;
if (m == NULL) {
/* Shouldn't happen... */
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
crypto_freereq(crp);
espstat.esps_crypto++;
DPRINTF(("esp_input_cb(): bogus returned buffer from crypto\n"));
@@ -522,7 +522,7 @@ esp_input_cb(void *op)
tdb = gettdb(tc->tc_spi, &tc->tc_dst, tc->tc_proto);
if (tdb == NULL) {
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
espstat.esps_notdb++;
DPRINTF(("esp_input_cb(): TDB is expired while in crypto"));
error = EPERM;
@@ -540,7 +540,7 @@ esp_input_cb(void *op)
splx(s);
return crypto_dispatch(crp);
}
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
espstat.esps_noxform++;
DPRINTF(("esp_input_cb(): crypto error %d\n", crp->crp_etype));
error = crp->crp_etype;
@@ -562,7 +562,7 @@ esp_input_cb(void *op)
/* Verify authenticator */
if (bcmp(ptr, aalg, esph->authsize)) {
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
DPRINTF(("esp_input_cb(): authentication failed for packet in SA %s/%08x\n", ipsp_address(tdb->tdb_dst), ntohl(tdb->tdb_spi)));
espstat.esps_badauth++;
error = EACCES;
@@ -573,7 +573,7 @@ esp_input_cb(void *op)
/* Remove trailing authenticator */
m_adj(m, -(esph->authsize));
}
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
/* Replay window checking, if appropriate */
if ((tdb->tdb_wnd > 0) && (!(tdb->tdb_flags & TDBF_NOREPLAY))) {
@@ -1014,7 +1014,7 @@ esp_output_cb(void *op)
m = (struct mbuf *) crp->crp_buf;
if (m == NULL) {
/* Shouldn't happen... */
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
crypto_freereq(crp);
espstat.esps_crypto++;
DPRINTF(("esp_output_cb(): bogus returned buffer from "
@@ -1027,7 +1027,7 @@ esp_output_cb(void *op)
tdb = gettdb(tc->tc_spi, &tc->tc_dst, tc->tc_proto);
if (tdb == NULL) {
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
espstat.esps_notdb++;
DPRINTF(("esp_output_cb(): TDB is expired while in crypto\n"));
error = EPERM;
@@ -1043,14 +1043,14 @@ esp_output_cb(void *op)
splx(s);
return crypto_dispatch(crp);
}
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
espstat.esps_noxform++;
DPRINTF(("esp_output_cb(): crypto error %d\n",
crp->crp_etype));
error = crp->crp_etype;
goto baddone;
}
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
/* Release crypto descriptors. */
crypto_freereq(crp);
diff --git a/sys/netinet/ip_ipcomp.c b/sys/netinet/ip_ipcomp.c
index 8f23dc0a906..2af0d22e61f 100644
--- a/sys/netinet/ip_ipcomp.c
+++ b/sys/netinet/ip_ipcomp.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ip_ipcomp.c,v 1.21 2007/10/03 10:52:11 krw Exp $ */
+/* $OpenBSD: ip_ipcomp.c,v 1.22 2007/10/06 02:18:38 krw Exp $ */
/*
* Copyright (c) 2001 Jean-Jacques Bernard-Gundol (jj@wabbitt.org)
@@ -228,7 +228,7 @@ ipcomp_input_cb(op)
m = (struct mbuf *) crp->crp_buf;
if (m == NULL) {
/* Shouldn't happen... */
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
crypto_freereq(crp);
ipcompstat.ipcomps_crypto++;
DPRINTF(("ipcomp_input_cb(): bogus returned buffer from crypto\n"));
@@ -239,7 +239,7 @@ ipcomp_input_cb(op)
tdb = gettdb(tc->tc_spi, &tc->tc_dst, tc->tc_proto);
if (tdb == NULL) {
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
ipcompstat.ipcomps_notdb++;
DPRINTF(("ipcomp_input_cb(): TDB expired while in crypto"));
error = EPERM;
@@ -254,7 +254,7 @@ ipcomp_input_cb(op)
/* Hard expiration */
if ((tdb->tdb_flags & TDBF_BYTES) &&
(tdb->tdb_cur_bytes >= tdb->tdb_exp_bytes)) {
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
pfkeyv2_expire(tdb, SADB_EXT_LIFETIME_HARD);
tdb_delete(tdb);
error = ENXIO;
@@ -276,14 +276,14 @@ ipcomp_input_cb(op)
splx(s);
return crypto_dispatch(crp);
}
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
ipcompstat.ipcomps_noxform++;
DPRINTF(("ipcomp_input_cb(): crypto error %d\n",
crp->crp_etype));
error = crp->crp_etype;
goto baddone;
}
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
/* Length of data after processing */
clen = crp->crp_olen;
@@ -566,7 +566,7 @@ ipcomp_output_cb(cp)
m = (struct mbuf *) crp->crp_buf;
if (m == NULL) {
/* Shouldn't happen... */
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
crypto_freereq(crp);
ipcompstat.ipcomps_crypto++;
DPRINTF(("ipcomp_output_cb(): bogus returned buffer from "
@@ -578,7 +578,7 @@ ipcomp_output_cb(cp)
tdb = gettdb(tc->tc_spi, &tc->tc_dst, tc->tc_proto);
if (tdb == NULL) {
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
ipcompstat.ipcomps_notdb++;
DPRINTF(("ipcomp_output_cb(): TDB expired while in crypto\n"));
error = EPERM;
@@ -594,14 +594,14 @@ ipcomp_output_cb(cp)
splx(s);
return crypto_dispatch(crp);
}
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
ipcompstat.ipcomps_noxform++;
DPRINTF(("ipcomp_output_cb(): crypto error %d\n",
crp->crp_etype));
error = crp->crp_etype;
goto baddone;
}
- FREE(tc, M_XDATA);
+ free(tc, M_XDATA);
/* Check sizes. */
if (rlen < crp->crp_olen) {