ERR_ cleanup
[openssl.git] / ssl / ssl_cert.c
index cbfe7bb416c0996e4410cf667ef37b511b8baedb..d6401b43d2476c2c3e5c57588c0a3417c6759f68 100644 (file)
@@ -402,10 +402,8 @@ void ssl_cert_clear_certs(CERT *c)
             X509_free(cpk->x509);
             cpk->x509 = NULL;
         }
-        if (cpk->privatekey) {
-            EVP_PKEY_free(cpk->privatekey);
-            cpk->privatekey = NULL;
-        }
+        EVP_PKEY_free(cpk->privatekey);
+        cpk->privatekey = NULL;
         if (cpk->chain) {
             sk_X509_pop_free(cpk->chain, X509_free);
             cpk->chain = NULL;
@@ -449,8 +447,7 @@ void ssl_cert_free(CERT *c)
     DH_free(c->dh_tmp);
 #endif
 #ifndef OPENSSL_NO_EC
-    if (c->ecdh_tmp)
-        EC_KEY_free(c->ecdh_tmp);
+    EC_KEY_free(c->ecdh_tmp);
 #endif
 
     ssl_cert_clear_certs(c);
@@ -655,8 +652,7 @@ void ssl_sess_cert_free(SESS_CERT *sc)
     DH_free(sc->peer_dh_tmp);
 #endif
 #ifndef OPENSSL_NO_EC
-    if (sc->peer_ecdh_tmp != NULL)
-        EC_KEY_free(sc->peer_ecdh_tmp);
+    EC_KEY_free(sc->peer_ecdh_tmp);
 #endif
 
     OPENSSL_free(sc);
@@ -877,8 +873,7 @@ STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file)
     }
     if (sk != NULL)
         sk_X509_NAME_free(sk);
-    if (in != NULL)
-        BIO_free(in);
+    BIO_free(in);
     if (x != NULL)
         X509_free(x);
     if (ret != NULL)
@@ -938,8 +933,7 @@ int SSL_add_file_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack,
  err:
         ret = 0;
     }
-    if (in != NULL)
-        BIO_free(in);
+    BIO_free(in);
     if (x != NULL)
         X509_free(x);