if (!client_only) {
if (cert && !SSL_CTX_use_certificate(*ctx,cert))
goto error;
+ X509_free(cert); /* We just added a reference to cert. */
+ cert=NULL;
if (idcert && !SSL_CTX_add_extra_chain_cert(*ctx,idcert))
goto error;
+ idcert=NULL; /* The context now owns the reference to idcert */
}
SSL_CTX_set_session_cache_mode(*ctx, SSL_SESS_CACHE_OFF);
if (isServer && !client_only) {
goto error;
EVP_PKEY_free(pkey);
pkey = NULL;
- if (cert) {
- if (!SSL_CTX_check_private_key(*ctx))
- goto error;
- }
+ if (!SSL_CTX_check_private_key(*ctx))
+ goto error;
}
dh = crypto_dh_new();
SSL_CTX_set_tmp_dh(*ctx, _crypto_dh_env_get_dh(dh));
if (cert)
X509_free(cert);
if (idcert)
- X509_free(cert);
+ X509_free(idcert);
return -1;
}
log_fn(LOG_WARN, "Peer certificate nickname has illegal characters.");
goto error;
}
+ X509_free(cert);
+
return 0;
error:
if (cert)
X509_free(cert);
- if (name)
- X509_NAME_free(name);
return -1;
}
s = smartlist_join_strings(elements, verbose?" ":",", 0, NULL);
SMARTLIST_FOREACH(elements, char*, cp, tor_free(cp));
+ smartlist_free(elements);
return s;
}