summaryrefslogtreecommitdiffstats
path: root/sys/netinet/ip_ipcomp.c
diff options
context:
space:
mode:
authortedu <tedu@openbsd.org>2014-07-12 18:44:22 +0000
committertedu <tedu@openbsd.org>2014-07-12 18:44:22 +0000
commitdd168dc2dbd0498445c205acd3a92d235cbcb6af (patch)
tree7468232c146a34628a98058ec363c774cbe975e5 /sys/netinet/ip_ipcomp.c
parentadd a size argument to free. will be used soon, but for now default to 0. (diff)
downloadwireguard-openbsd-dd168dc2dbd0498445c205acd3a92d235cbcb6af.tar.xz
wireguard-openbsd-dd168dc2dbd0498445c205acd3a92d235cbcb6af.zip
add a size argument to free. will be used soon, but for now default to 0.
after discussions with beck deraadt kettenis.
Diffstat (limited to 'sys/netinet/ip_ipcomp.c')
-rw-r--r--sys/netinet/ip_ipcomp.c20
1 files changed, 10 insertions, 10 deletions
diff --git a/sys/netinet/ip_ipcomp.c b/sys/netinet/ip_ipcomp.c
index 6e753eb8d51..021ff99c095 100644
--- a/sys/netinet/ip_ipcomp.c
+++ b/sys/netinet/ip_ipcomp.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ip_ipcomp.c,v 1.34 2014/07/09 09:30:49 henning Exp $ */
+/* $OpenBSD: ip_ipcomp.c,v 1.35 2014/07/12 18:44:23 tedu Exp $ */
/*
* Copyright (c) 2001 Jean-Jacques Bernard-Gundol (jj@wabbitt.org)
@@ -230,7 +230,7 @@ ipcomp_input_cb(op)
m = (struct mbuf *) crp->crp_buf;
if (m == NULL) {
/* Shouldn't happen... */
- free(tc, M_XDATA);
+ free(tc, M_XDATA, 0);
crypto_freereq(crp);
ipcompstat.ipcomps_crypto++;
DPRINTF(("ipcomp_input_cb(): bogus returned buffer from crypto\n"));
@@ -241,7 +241,7 @@ ipcomp_input_cb(op)
tdb = gettdb(tc->tc_rdomain, tc->tc_spi, &tc->tc_dst, tc->tc_proto);
if (tdb == NULL) {
- free(tc, M_XDATA);
+ free(tc, M_XDATA, 0);
ipcompstat.ipcomps_notdb++;
DPRINTF(("ipcomp_input_cb(): TDB expired while in crypto"));
error = EPERM;
@@ -255,7 +255,7 @@ ipcomp_input_cb(op)
/* Hard expiration */
if ((tdb->tdb_flags & TDBF_BYTES) &&
(tdb->tdb_cur_bytes >= tdb->tdb_exp_bytes)) {
- free(tc, M_XDATA);
+ free(tc, M_XDATA, 0);
pfkeyv2_expire(tdb, SADB_EXT_LIFETIME_HARD);
tdb_delete(tdb);
error = ENXIO;
@@ -277,14 +277,14 @@ ipcomp_input_cb(op)
splx(s);
return crypto_dispatch(crp);
}
- free(tc, M_XDATA);
+ free(tc, M_XDATA, 0);
ipcompstat.ipcomps_noxform++;
DPRINTF(("ipcomp_input_cb(): crypto error %d\n",
crp->crp_etype));
error = crp->crp_etype;
goto baddone;
}
- free(tc, M_XDATA);
+ free(tc, M_XDATA, 0);
/* Length of data after processing */
clen = crp->crp_olen;
@@ -573,7 +573,7 @@ ipcomp_output_cb(cp)
m = (struct mbuf *) crp->crp_buf;
if (m == NULL) {
/* Shouldn't happen... */
- free(tc, M_XDATA);
+ free(tc, M_XDATA, 0);
crypto_freereq(crp);
ipcompstat.ipcomps_crypto++;
DPRINTF(("ipcomp_output_cb(): bogus returned buffer from "
@@ -585,7 +585,7 @@ ipcomp_output_cb(cp)
tdb = gettdb(tc->tc_rdomain, tc->tc_spi, &tc->tc_dst, tc->tc_proto);
if (tdb == NULL) {
- free(tc, M_XDATA);
+ free(tc, M_XDATA, 0);
ipcompstat.ipcomps_notdb++;
DPRINTF(("ipcomp_output_cb(): TDB expired while in crypto\n"));
error = EPERM;
@@ -601,14 +601,14 @@ ipcomp_output_cb(cp)
splx(s);
return crypto_dispatch(crp);
}
- free(tc, M_XDATA);
+ free(tc, M_XDATA, 0);
ipcompstat.ipcomps_noxform++;
DPRINTF(("ipcomp_output_cb(): crypto error %d\n",
crp->crp_etype));
error = crp->crp_etype;
goto baddone;
}
- free(tc, M_XDATA);
+ free(tc, M_XDATA, 0);
/* Check sizes. */
if (rlen < crp->crp_olen) {