openssl/crypto/ts
Rich Salz b4faea50c3 Use safer sizeof variant in malloc
For a local variable:
        TYPE *p;
Allocations like this are "risky":
        p = OPENSSL_malloc(sizeof(TYPE));
if the type of p changes, and the malloc call isn't updated, you
could get memory corruption.  Instead do this:
        p = OPENSSL_malloc(sizeof(*p));
Also fixed a few memset() calls that I noticed while doing this.

Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-05-04 15:00:13 -04:00
..
Makefile Remove EXHEADER, TEST, APPS, links:, install: and uninstall: where relevant 2015-03-31 20:16:01 +02:00
ts_asn1.c free NULL cleanup 11 2015-05-01 10:15:18 -04:00
ts_conf.c free NULL cleanup 11 2015-05-01 10:15:18 -04:00
ts_err.c Run util/openssl-format-source -v -c . 2015-01-22 09:20:09 +00:00
ts_lib.c make X509_EXTENSION opaque 2015-03-23 18:27:04 +00:00
ts_req_print.c Run util/openssl-format-source -v -c . 2015-01-22 09:20:09 +00:00
ts_req_utils.c Run util/openssl-format-source -v -c . 2015-01-22 09:20:09 +00:00
ts_rsp_print.c Add OSSL_NELEM macro. 2015-05-03 12:53:08 +01:00
ts_rsp_sign.c Use safer sizeof variant in malloc 2015-05-04 15:00:13 -04:00
ts_rsp_utils.c Remove old ASN.1 code. 2015-03-23 13:15:06 +00:00
ts_rsp_verify.c Add OSSL_NELEM macro. 2015-05-03 12:53:08 +01:00
ts_verify_ctx.c Use safer sizeof variant in malloc 2015-05-04 15:00:13 -04:00