diff options
author | beck <> | 2014-04-17 13:37:50 +0000 |
---|---|---|
committer | beck <> | 2014-04-17 13:37:50 +0000 |
commit | bddb7c686e3d1aeb156722adc64b6c35ae720f87 (patch) | |
tree | 7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libcrypto/asn1/a_object.c | |
parent | ecec66222d758996a4ff2671ca5026d9ede5ef76 (diff) | |
download | openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.gz openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.bz2 openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.zip |
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes:
OPENSSL_malloc->malloc
OPENSSL_free->free
OPENSSL_relloc->realloc
OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libcrypto/asn1/a_object.c')
-rw-r--r-- | src/lib/libcrypto/asn1/a_object.c | 26 |
1 files changed, 13 insertions, 13 deletions
diff --git a/src/lib/libcrypto/asn1/a_object.c b/src/lib/libcrypto/asn1/a_object.c index 3978c9150d..c30f32442d 100644 --- a/src/lib/libcrypto/asn1/a_object.c +++ b/src/lib/libcrypto/asn1/a_object.c | |||
@@ -180,9 +180,9 @@ int a2d_ASN1_OBJECT(unsigned char *out, int olen, const char *buf, int num) | |||
180 | if (blsize > tmpsize) | 180 | if (blsize > tmpsize) |
181 | { | 181 | { |
182 | if (tmp != ftmp) | 182 | if (tmp != ftmp) |
183 | OPENSSL_free(tmp); | 183 | free(tmp); |
184 | tmpsize = blsize + 32; | 184 | tmpsize = blsize + 32; |
185 | tmp = OPENSSL_malloc(tmpsize); | 185 | tmp = malloc(tmpsize); |
186 | if (!tmp) | 186 | if (!tmp) |
187 | goto err; | 187 | goto err; |
188 | } | 188 | } |
@@ -215,13 +215,13 @@ int a2d_ASN1_OBJECT(unsigned char *out, int olen, const char *buf, int num) | |||
215 | len+=i; | 215 | len+=i; |
216 | } | 216 | } |
217 | if (tmp != ftmp) | 217 | if (tmp != ftmp) |
218 | OPENSSL_free(tmp); | 218 | free(tmp); |
219 | if (bl) | 219 | if (bl) |
220 | BN_free(bl); | 220 | BN_free(bl); |
221 | return(len); | 221 | return(len); |
222 | err: | 222 | err: |
223 | if (tmp != ftmp) | 223 | if (tmp != ftmp) |
224 | OPENSSL_free(tmp); | 224 | free(tmp); |
225 | if (bl) | 225 | if (bl) |
226 | BN_free(bl); | 226 | BN_free(bl); |
227 | return(0); | 227 | return(0); |
@@ -242,7 +242,7 @@ int i2a_ASN1_OBJECT(BIO *bp, ASN1_OBJECT *a) | |||
242 | i=i2t_ASN1_OBJECT(buf,sizeof buf,a); | 242 | i=i2t_ASN1_OBJECT(buf,sizeof buf,a); |
243 | if (i > (int)(sizeof(buf) - 1)) | 243 | if (i > (int)(sizeof(buf) - 1)) |
244 | { | 244 | { |
245 | p = OPENSSL_malloc(i + 1); | 245 | p = malloc(i + 1); |
246 | if (!p) | 246 | if (!p) |
247 | return -1; | 247 | return -1; |
248 | i2t_ASN1_OBJECT(p,i + 1,a); | 248 | i2t_ASN1_OBJECT(p,i + 1,a); |
@@ -251,7 +251,7 @@ int i2a_ASN1_OBJECT(BIO *bp, ASN1_OBJECT *a) | |||
251 | return BIO_write(bp, "<INVALID>", 9); | 251 | return BIO_write(bp, "<INVALID>", 9); |
252 | BIO_write(bp,p,i); | 252 | BIO_write(bp,p,i); |
253 | if (p != buf) | 253 | if (p != buf) |
254 | OPENSSL_free(p); | 254 | free(p); |
255 | return(i); | 255 | return(i); |
256 | } | 256 | } |
257 | 257 | ||
@@ -319,8 +319,8 @@ ASN1_OBJECT *c2i_ASN1_OBJECT(ASN1_OBJECT **a, const unsigned char **pp, | |||
319 | if ((data == NULL) || (ret->length < len)) | 319 | if ((data == NULL) || (ret->length < len)) |
320 | { | 320 | { |
321 | ret->length=0; | 321 | ret->length=0; |
322 | if (data != NULL) OPENSSL_free(data); | 322 | if (data != NULL) free(data); |
323 | data=(unsigned char *)OPENSSL_malloc(len ? (int)len : 1); | 323 | data=(unsigned char *)malloc(len ? (int)len : 1); |
324 | if (data == NULL) | 324 | if (data == NULL) |
325 | { i=ERR_R_MALLOC_FAILURE; goto err; } | 325 | { i=ERR_R_MALLOC_FAILURE; goto err; } |
326 | ret->flags|=ASN1_OBJECT_FLAG_DYNAMIC_DATA; | 326 | ret->flags|=ASN1_OBJECT_FLAG_DYNAMIC_DATA; |
@@ -348,7 +348,7 @@ ASN1_OBJECT *ASN1_OBJECT_new(void) | |||
348 | { | 348 | { |
349 | ASN1_OBJECT *ret; | 349 | ASN1_OBJECT *ret; |
350 | 350 | ||
351 | ret=(ASN1_OBJECT *)OPENSSL_malloc(sizeof(ASN1_OBJECT)); | 351 | ret=(ASN1_OBJECT *)malloc(sizeof(ASN1_OBJECT)); |
352 | if (ret == NULL) | 352 | if (ret == NULL) |
353 | { | 353 | { |
354 | ASN1err(ASN1_F_ASN1_OBJECT_NEW,ERR_R_MALLOC_FAILURE); | 354 | ASN1err(ASN1_F_ASN1_OBJECT_NEW,ERR_R_MALLOC_FAILURE); |
@@ -369,19 +369,19 @@ void ASN1_OBJECT_free(ASN1_OBJECT *a) | |||
369 | if (a->flags & ASN1_OBJECT_FLAG_DYNAMIC_STRINGS) | 369 | if (a->flags & ASN1_OBJECT_FLAG_DYNAMIC_STRINGS) |
370 | { | 370 | { |
371 | #ifndef CONST_STRICT /* disable purely for compile-time strict const checking. Doing this on a "real" compile will cause memory leaks */ | 371 | #ifndef CONST_STRICT /* disable purely for compile-time strict const checking. Doing this on a "real" compile will cause memory leaks */ |
372 | if (a->sn != NULL) OPENSSL_free((void *)a->sn); | 372 | if (a->sn != NULL) free((void *)a->sn); |
373 | if (a->ln != NULL) OPENSSL_free((void *)a->ln); | 373 | if (a->ln != NULL) free((void *)a->ln); |
374 | #endif | 374 | #endif |
375 | a->sn=a->ln=NULL; | 375 | a->sn=a->ln=NULL; |
376 | } | 376 | } |
377 | if (a->flags & ASN1_OBJECT_FLAG_DYNAMIC_DATA) | 377 | if (a->flags & ASN1_OBJECT_FLAG_DYNAMIC_DATA) |
378 | { | 378 | { |
379 | if (a->data != NULL) OPENSSL_free((void *)a->data); | 379 | if (a->data != NULL) free((void *)a->data); |
380 | a->data=NULL; | 380 | a->data=NULL; |
381 | a->length=0; | 381 | a->length=0; |
382 | } | 382 | } |
383 | if (a->flags & ASN1_OBJECT_FLAG_DYNAMIC) | 383 | if (a->flags & ASN1_OBJECT_FLAG_DYNAMIC) |
384 | OPENSSL_free(a); | 384 | free(a); |
385 | } | 385 | } |
386 | 386 | ||
387 | ASN1_OBJECT *ASN1_OBJECT_create(int nid, unsigned char *data, int len, | 387 | ASN1_OBJECT *ASN1_OBJECT_create(int nid, unsigned char *data, int len, |