mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-27 22:03:31 +01:00
use the tor_malloc_zero wrapper
svn:r837
This commit is contained in:
parent
ec02f83f94
commit
ac56486bf6
@ -58,8 +58,7 @@ void circuit_remove(circuit_t *circ) {
|
|||||||
circuit_t *circuit_new(circ_id_t p_circ_id, connection_t *p_conn) {
|
circuit_t *circuit_new(circ_id_t p_circ_id, connection_t *p_conn) {
|
||||||
circuit_t *circ;
|
circuit_t *circ;
|
||||||
|
|
||||||
circ = (circuit_t *)tor_malloc(sizeof(circuit_t));
|
circ = tor_malloc_zero(sizeof(circuit_t));
|
||||||
memset(circ,0,sizeof(circuit_t)); /* zero it out */
|
|
||||||
|
|
||||||
circ->timestamp_created = time(NULL);
|
circ->timestamp_created = time(NULL);
|
||||||
|
|
||||||
|
@ -76,8 +76,7 @@ connection_t *connection_new(int type) {
|
|||||||
connection_t *conn;
|
connection_t *conn;
|
||||||
time_t now = time(NULL);
|
time_t now = time(NULL);
|
||||||
|
|
||||||
conn = (connection_t *)tor_malloc(sizeof(connection_t));
|
conn = tor_malloc_zero(sizeof(connection_t));
|
||||||
memset(conn,0,sizeof(connection_t)); /* zero it out to start */
|
|
||||||
conn->s = -1; /* give it a default of 'not used' */
|
conn->s = -1; /* give it a default of 'not used' */
|
||||||
|
|
||||||
conn->type = type;
|
conn->type = type;
|
||||||
@ -86,8 +85,7 @@ connection_t *connection_new(int type) {
|
|||||||
conn->outbuf = buf_new();
|
conn->outbuf = buf_new();
|
||||||
}
|
}
|
||||||
if (type == CONN_TYPE_AP) {
|
if (type == CONN_TYPE_AP) {
|
||||||
conn->socks_request = tor_malloc(sizeof(socks_request_t));
|
conn->socks_request = tor_malloc_zero(sizeof(socks_request_t));
|
||||||
memset(conn->socks_request, 0, sizeof(socks_request_t));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
conn->timestamp_created = now;
|
conn->timestamp_created = now;
|
||||||
@ -264,7 +262,7 @@ int connection_connect(connection_t *conn, char *address, uint32_t addr, uint16_
|
|||||||
}
|
}
|
||||||
set_socket_nonblocking(s);
|
set_socket_nonblocking(s);
|
||||||
|
|
||||||
memset((void *)&dest_addr,0,sizeof(dest_addr));
|
memset(&dest_addr,0,sizeof(dest_addr));
|
||||||
dest_addr.sin_family = AF_INET;
|
dest_addr.sin_family = AF_INET;
|
||||||
dest_addr.sin_port = htons(port);
|
dest_addr.sin_port = htons(port);
|
||||||
dest_addr.sin_addr.s_addr = htonl(addr);
|
dest_addr.sin_addr.s_addr = htonl(addr);
|
||||||
|
@ -672,7 +672,8 @@ static int connection_ap_handshake_socks_reply(connection_t *conn, char *reply,
|
|||||||
buf[1] = success ? SOCKS5_SUCCESS : SOCKS5_GENERIC_ERROR;
|
buf[1] = success ? SOCKS5_SUCCESS : SOCKS5_GENERIC_ERROR;
|
||||||
buf[2] = 0;
|
buf[2] = 0;
|
||||||
buf[3] = 1; /* ipv4 addr */
|
buf[3] = 1; /* ipv4 addr */
|
||||||
memset(buf+4,0,6); /* XXX set external addr/port to 0, see what breaks */
|
memset(buf+4,0,6); /* Set external addr/port to 0.
|
||||||
|
The spec doesn't seem to say what to do here. -RD */
|
||||||
connection_write_to_buf(buf,10,conn);
|
connection_write_to_buf(buf,10,conn);
|
||||||
return flush_buf(conn->s, conn->outbuf, &conn->outbuf_flushlen); /* try to flush it */
|
return flush_buf(conn->s, conn->outbuf, &conn->outbuf_flushlen); /* try to flush it */
|
||||||
}
|
}
|
||||||
|
@ -340,9 +340,8 @@ list_running_servers(char **nicknames_out)
|
|||||||
for (i = 0; i<n; ++i) {
|
for (i = 0; i<n; ++i) {
|
||||||
length += strlen(nickname_lst[i]);
|
length += strlen(nickname_lst[i]);
|
||||||
}
|
}
|
||||||
*nicknames_out = tor_malloc(length);
|
*nicknames_out = tor_malloc_zero(length);
|
||||||
cp = *nicknames_out;
|
cp = *nicknames_out;
|
||||||
memset(cp,0,length);
|
|
||||||
for (i = 0; i<n; ++i) {
|
for (i = 0; i<n; ++i) {
|
||||||
if (i)
|
if (i)
|
||||||
strcat(cp, " ");
|
strcat(cp, " ");
|
||||||
|
@ -127,8 +127,7 @@ int dns_resolve(connection_t *exitconn) {
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
} else { /* need to add it */
|
} else { /* need to add it */
|
||||||
resolve = tor_malloc(sizeof(struct cached_resolve));
|
resolve = tor_malloc_zero(sizeof(struct cached_resolve));
|
||||||
memset(resolve, 0, sizeof(struct cached_resolve));
|
|
||||||
resolve->state = CACHE_STATE_PENDING;
|
resolve->state = CACHE_STATE_PENDING;
|
||||||
resolve->expire = now + 15*60; /* 15 minutes */
|
resolve->expire = now + 15*60; /* 15 minutes */
|
||||||
strncpy(resolve->question, exitconn->address, MAX_ADDRESSLEN);
|
strncpy(resolve->question, exitconn->address, MAX_ADDRESSLEN);
|
||||||
|
@ -34,8 +34,7 @@ static int ol_length=0;
|
|||||||
int onion_pending_add(circuit_t *circ) {
|
int onion_pending_add(circuit_t *circ) {
|
||||||
struct onion_queue_t *tmp;
|
struct onion_queue_t *tmp;
|
||||||
|
|
||||||
tmp = tor_malloc(sizeof(struct onion_queue_t));
|
tmp = tor_malloc_zero(sizeof(struct onion_queue_t));
|
||||||
memset(tmp, 0, sizeof(struct onion_queue_t));
|
|
||||||
tmp->circ = circ;
|
tmp->circ = circ;
|
||||||
|
|
||||||
if(!ol_tail) {
|
if(!ol_tail) {
|
||||||
@ -460,8 +459,7 @@ int onion_extend_cpath(crypt_path_t **head_ptr, cpath_build_state_t *state, rout
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Okay, so we haven't used 'choice' before. */
|
/* Okay, so we haven't used 'choice' before. */
|
||||||
hop = (crypt_path_t *)tor_malloc(sizeof(crypt_path_t));
|
hop = (crypt_path_t *)tor_malloc_zero(sizeof(crypt_path_t));
|
||||||
memset(hop, 0, sizeof(crypt_path_t));
|
|
||||||
|
|
||||||
/* link hop into the cpath, at the end. */
|
/* link hop into the cpath, at the end. */
|
||||||
if (*head_ptr) {
|
if (*head_ptr) {
|
||||||
|
@ -763,8 +763,7 @@ routerinfo_t *router_get_entry_from_string(char**s) {
|
|||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
router = tor_malloc(sizeof(routerinfo_t));
|
router = tor_malloc_zero(sizeof(routerinfo_t));
|
||||||
memset(router,0,sizeof(routerinfo_t)); /* zero it out first */
|
|
||||||
router->onion_pkey = router->identity_pkey = router->link_pkey = NULL;
|
router->onion_pkey = router->identity_pkey = router->link_pkey = NULL;
|
||||||
|
|
||||||
if (tok->val.cmd.n_args != 6) {
|
if (tok->val.cmd.n_args != 6) {
|
||||||
@ -970,9 +969,8 @@ static int router_add_exit_policy(routerinfo_t *router,
|
|||||||
return -1;
|
return -1;
|
||||||
arg = tok->val.cmd.args[0];
|
arg = tok->val.cmd.args[0];
|
||||||
|
|
||||||
newe = tor_malloc(sizeof(struct exit_policy_t));
|
newe = tor_malloc_zero(sizeof(struct exit_policy_t));
|
||||||
memset(newe,0,sizeof(struct exit_policy_t));
|
|
||||||
|
|
||||||
newe->string = tor_malloc(8+strlen(arg));
|
newe->string = tor_malloc(8+strlen(arg));
|
||||||
if (tok->tp == K_REJECT) {
|
if (tok->tp == K_REJECT) {
|
||||||
strcpy(newe->string, "reject ");
|
strcpy(newe->string, "reject ");
|
||||||
|
Loading…
Reference in New Issue
Block a user