diff options
author | beck <> | 2014-04-17 13:37:50 +0000 |
---|---|---|
committer | beck <> | 2014-04-17 13:37:50 +0000 |
commit | bddb7c686e3d1aeb156722adc64b6c35ae720f87 (patch) | |
tree | 7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libcrypto/asn1 | |
parent | ecec66222d758996a4ff2671ca5026d9ede5ef76 (diff) | |
download | openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.gz openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.bz2 openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.zip |
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes:
OPENSSL_malloc->malloc
OPENSSL_free->free
OPENSSL_relloc->realloc
OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libcrypto/asn1')
43 files changed, 146 insertions, 146 deletions
diff --git a/src/lib/libcrypto/asn1/a_bitstr.c b/src/lib/libcrypto/asn1/a_bitstr.c index 34179960b8..e2b65bf2ac 100644 --- a/src/lib/libcrypto/asn1/a_bitstr.c +++ b/src/lib/libcrypto/asn1/a_bitstr.c | |||
@@ -144,7 +144,7 @@ ASN1_BIT_STRING *c2i_ASN1_BIT_STRING(ASN1_BIT_STRING **a, | |||
144 | 144 | ||
145 | if (len-- > 1) /* using one because of the bits left byte */ | 145 | if (len-- > 1) /* using one because of the bits left byte */ |
146 | { | 146 | { |
147 | s=(unsigned char *)OPENSSL_malloc((int)len); | 147 | s=(unsigned char *)malloc((int)len); |
148 | if (s == NULL) | 148 | if (s == NULL) |
149 | { | 149 | { |
150 | i=ERR_R_MALLOC_FAILURE; | 150 | i=ERR_R_MALLOC_FAILURE; |
@@ -158,7 +158,7 @@ ASN1_BIT_STRING *c2i_ASN1_BIT_STRING(ASN1_BIT_STRING **a, | |||
158 | s=NULL; | 158 | s=NULL; |
159 | 159 | ||
160 | ret->length=(int)len; | 160 | ret->length=(int)len; |
161 | if (ret->data != NULL) OPENSSL_free(ret->data); | 161 | if (ret->data != NULL) free(ret->data); |
162 | ret->data=s; | 162 | ret->data=s; |
163 | ret->type=V_ASN1_BIT_STRING; | 163 | ret->type=V_ASN1_BIT_STRING; |
164 | if (a != NULL) (*a)=ret; | 164 | if (a != NULL) (*a)=ret; |
@@ -192,7 +192,7 @@ int ASN1_BIT_STRING_set_bit(ASN1_BIT_STRING *a, int n, int value) | |||
192 | { | 192 | { |
193 | if (!value) return(1); /* Don't need to set */ | 193 | if (!value) return(1); /* Don't need to set */ |
194 | if (a->data == NULL) | 194 | if (a->data == NULL) |
195 | c=(unsigned char *)OPENSSL_malloc(w+1); | 195 | c=(unsigned char *)malloc(w+1); |
196 | else | 196 | else |
197 | c=(unsigned char *)OPENSSL_realloc_clean(a->data, | 197 | c=(unsigned char *)OPENSSL_realloc_clean(a->data, |
198 | a->length, | 198 | a->length, |
diff --git a/src/lib/libcrypto/asn1/a_bytes.c b/src/lib/libcrypto/asn1/a_bytes.c index 92d630cdba..8431d89edf 100644 --- a/src/lib/libcrypto/asn1/a_bytes.c +++ b/src/lib/libcrypto/asn1/a_bytes.c | |||
@@ -101,7 +101,7 @@ ASN1_STRING *d2i_ASN1_type_bytes(ASN1_STRING **a, const unsigned char **pp, | |||
101 | 101 | ||
102 | if (len != 0) | 102 | if (len != 0) |
103 | { | 103 | { |
104 | s=(unsigned char *)OPENSSL_malloc((int)len+1); | 104 | s=(unsigned char *)malloc((int)len+1); |
105 | if (s == NULL) | 105 | if (s == NULL) |
106 | { | 106 | { |
107 | i=ERR_R_MALLOC_FAILURE; | 107 | i=ERR_R_MALLOC_FAILURE; |
@@ -114,7 +114,7 @@ ASN1_STRING *d2i_ASN1_type_bytes(ASN1_STRING **a, const unsigned char **pp, | |||
114 | else | 114 | else |
115 | s=NULL; | 115 | s=NULL; |
116 | 116 | ||
117 | if (ret->data != NULL) OPENSSL_free(ret->data); | 117 | if (ret->data != NULL) free(ret->data); |
118 | ret->length=(int)len; | 118 | ret->length=(int)len; |
119 | ret->data=s; | 119 | ret->data=s; |
120 | ret->type=tag; | 120 | ret->type=tag; |
@@ -209,8 +209,8 @@ ASN1_STRING *d2i_ASN1_bytes(ASN1_STRING **a, const unsigned char **pp, | |||
209 | { | 209 | { |
210 | if ((ret->length < len) || (ret->data == NULL)) | 210 | if ((ret->length < len) || (ret->data == NULL)) |
211 | { | 211 | { |
212 | if (ret->data != NULL) OPENSSL_free(ret->data); | 212 | if (ret->data != NULL) free(ret->data); |
213 | s=(unsigned char *)OPENSSL_malloc((int)len + 1); | 213 | s=(unsigned char *)malloc((int)len + 1); |
214 | if (s == NULL) | 214 | if (s == NULL) |
215 | { | 215 | { |
216 | i=ERR_R_MALLOC_FAILURE; | 216 | i=ERR_R_MALLOC_FAILURE; |
@@ -226,7 +226,7 @@ ASN1_STRING *d2i_ASN1_bytes(ASN1_STRING **a, const unsigned char **pp, | |||
226 | else | 226 | else |
227 | { | 227 | { |
228 | s=NULL; | 228 | s=NULL; |
229 | if (ret->data != NULL) OPENSSL_free(ret->data); | 229 | if (ret->data != NULL) free(ret->data); |
230 | } | 230 | } |
231 | 231 | ||
232 | ret->length=(int)len; | 232 | ret->length=(int)len; |
@@ -301,14 +301,14 @@ static int asn1_collate_primitive(ASN1_STRING *a, ASN1_const_CTX *c) | |||
301 | if (!asn1_const_Finish(c)) goto err; | 301 | if (!asn1_const_Finish(c)) goto err; |
302 | 302 | ||
303 | a->length=num; | 303 | a->length=num; |
304 | if (a->data != NULL) OPENSSL_free(a->data); | 304 | if (a->data != NULL) free(a->data); |
305 | a->data=(unsigned char *)b.data; | 305 | a->data=(unsigned char *)b.data; |
306 | if (os != NULL) ASN1_STRING_free(os); | 306 | if (os != NULL) ASN1_STRING_free(os); |
307 | return(1); | 307 | return(1); |
308 | err: | 308 | err: |
309 | ASN1err(ASN1_F_ASN1_COLLATE_PRIMITIVE,c->error); | 309 | ASN1err(ASN1_F_ASN1_COLLATE_PRIMITIVE,c->error); |
310 | if (os != NULL) ASN1_STRING_free(os); | 310 | if (os != NULL) ASN1_STRING_free(os); |
311 | if (b.data != NULL) OPENSSL_free(b.data); | 311 | if (b.data != NULL) free(b.data); |
312 | return(0); | 312 | return(0); |
313 | } | 313 | } |
314 | 314 | ||
diff --git a/src/lib/libcrypto/asn1/a_digest.c b/src/lib/libcrypto/asn1/a_digest.c index 8a4b24a06b..0d463d409b 100644 --- a/src/lib/libcrypto/asn1/a_digest.c +++ b/src/lib/libcrypto/asn1/a_digest.c | |||
@@ -81,6 +81,6 @@ int ASN1_item_digest(const ASN1_ITEM *it, const EVP_MD *type, void *asn, | |||
81 | 81 | ||
82 | if (!EVP_Digest(str, i, md, len, type, NULL)) | 82 | if (!EVP_Digest(str, i, md, len, type, NULL)) |
83 | return 0; | 83 | return 0; |
84 | OPENSSL_free(str); | 84 | free(str); |
85 | return(1); | 85 | return(1); |
86 | } | 86 | } |
diff --git a/src/lib/libcrypto/asn1/a_dup.c b/src/lib/libcrypto/asn1/a_dup.c index d98992548a..e825b9c2d4 100644 --- a/src/lib/libcrypto/asn1/a_dup.c +++ b/src/lib/libcrypto/asn1/a_dup.c | |||
@@ -72,14 +72,14 @@ void *ASN1_dup(i2d_of_void *i2d, d2i_of_void *d2i, void *x) | |||
72 | if (x == NULL) return(NULL); | 72 | if (x == NULL) return(NULL); |
73 | 73 | ||
74 | i=i2d(x,NULL); | 74 | i=i2d(x,NULL); |
75 | b=OPENSSL_malloc(i+10); | 75 | b=malloc(i+10); |
76 | if (b == NULL) | 76 | if (b == NULL) |
77 | { ASN1err(ASN1_F_ASN1_DUP,ERR_R_MALLOC_FAILURE); return(NULL); } | 77 | { ASN1err(ASN1_F_ASN1_DUP,ERR_R_MALLOC_FAILURE); return(NULL); } |
78 | p= b; | 78 | p= b; |
79 | i=i2d(x,&p); | 79 | i=i2d(x,&p); |
80 | p2= b; | 80 | p2= b; |
81 | ret=d2i(NULL,&p2,i); | 81 | ret=d2i(NULL,&p2,i); |
82 | OPENSSL_free(b); | 82 | free(b); |
83 | return(ret); | 83 | return(ret); |
84 | } | 84 | } |
85 | 85 | ||
@@ -104,6 +104,6 @@ void *ASN1_item_dup(const ASN1_ITEM *it, void *x) | |||
104 | { ASN1err(ASN1_F_ASN1_ITEM_DUP,ERR_R_MALLOC_FAILURE); return(NULL); } | 104 | { ASN1err(ASN1_F_ASN1_ITEM_DUP,ERR_R_MALLOC_FAILURE); return(NULL); } |
105 | p= b; | 105 | p= b; |
106 | ret=ASN1_item_d2i(NULL,&p,i, it); | 106 | ret=ASN1_item_d2i(NULL,&p,i, it); |
107 | OPENSSL_free(b); | 107 | free(b); |
108 | return(ret); | 108 | return(ret); |
109 | } | 109 | } |
diff --git a/src/lib/libcrypto/asn1/a_enum.c b/src/lib/libcrypto/asn1/a_enum.c index fe9aa13b9c..c1154dde0a 100644 --- a/src/lib/libcrypto/asn1/a_enum.c +++ b/src/lib/libcrypto/asn1/a_enum.c | |||
@@ -77,8 +77,8 @@ int ASN1_ENUMERATED_set(ASN1_ENUMERATED *a, long v) | |||
77 | if (a->length < (int)(sizeof(long)+1)) | 77 | if (a->length < (int)(sizeof(long)+1)) |
78 | { | 78 | { |
79 | if (a->data != NULL) | 79 | if (a->data != NULL) |
80 | OPENSSL_free(a->data); | 80 | free(a->data); |
81 | if ((a->data=(unsigned char *)OPENSSL_malloc(sizeof(long)+1)) != NULL) | 81 | if ((a->data=(unsigned char *)malloc(sizeof(long)+1)) != NULL) |
82 | memset((char *)a->data,0,sizeof(long)+1); | 82 | memset((char *)a->data,0,sizeof(long)+1); |
83 | } | 83 | } |
84 | if (a->data == NULL) | 84 | if (a->data == NULL) |
@@ -155,7 +155,7 @@ ASN1_ENUMERATED *BN_to_ASN1_ENUMERATED(BIGNUM *bn, ASN1_ENUMERATED *ai) | |||
155 | len=((j == 0)?0:((j/8)+1)); | 155 | len=((j == 0)?0:((j/8)+1)); |
156 | if (ret->length < len+4) | 156 | if (ret->length < len+4) |
157 | { | 157 | { |
158 | unsigned char *new_data=OPENSSL_realloc(ret->data, len+4); | 158 | unsigned char *new_data=realloc(ret->data, len+4); |
159 | if (!new_data) | 159 | if (!new_data) |
160 | { | 160 | { |
161 | ASN1err(ASN1_F_BN_TO_ASN1_ENUMERATED,ERR_R_MALLOC_FAILURE); | 161 | ASN1err(ASN1_F_BN_TO_ASN1_ENUMERATED,ERR_R_MALLOC_FAILURE); |
diff --git a/src/lib/libcrypto/asn1/a_gentm.c b/src/lib/libcrypto/asn1/a_gentm.c index 4f312ee6c9..86666e7a20 100644 --- a/src/lib/libcrypto/asn1/a_gentm.c +++ b/src/lib/libcrypto/asn1/a_gentm.c | |||
@@ -225,7 +225,7 @@ ASN1_GENERALIZEDTIME *ASN1_GENERALIZEDTIME_adj(ASN1_GENERALIZEDTIME *s, | |||
225 | p=(char *)s->data; | 225 | p=(char *)s->data; |
226 | if ((p == NULL) || ((size_t)s->length < len)) | 226 | if ((p == NULL) || ((size_t)s->length < len)) |
227 | { | 227 | { |
228 | p=OPENSSL_malloc(len); | 228 | p=malloc(len); |
229 | if (p == NULL) | 229 | if (p == NULL) |
230 | { | 230 | { |
231 | ASN1err(ASN1_F_ASN1_GENERALIZEDTIME_ADJ, | 231 | ASN1err(ASN1_F_ASN1_GENERALIZEDTIME_ADJ, |
@@ -233,7 +233,7 @@ ASN1_GENERALIZEDTIME *ASN1_GENERALIZEDTIME_adj(ASN1_GENERALIZEDTIME *s, | |||
233 | return(NULL); | 233 | return(NULL); |
234 | } | 234 | } |
235 | if (s->data != NULL) | 235 | if (s->data != NULL) |
236 | OPENSSL_free(s->data); | 236 | free(s->data); |
237 | s->data=(unsigned char *)p; | 237 | s->data=(unsigned char *)p; |
238 | } | 238 | } |
239 | 239 | ||
diff --git a/src/lib/libcrypto/asn1/a_i2d_fp.c b/src/lib/libcrypto/asn1/a_i2d_fp.c index a3ad76d356..484bcd66eb 100644 --- a/src/lib/libcrypto/asn1/a_i2d_fp.c +++ b/src/lib/libcrypto/asn1/a_i2d_fp.c | |||
@@ -88,7 +88,7 @@ int ASN1_i2d_bio(i2d_of_void *i2d, BIO *out, unsigned char *x) | |||
88 | int i,j=0,n,ret=1; | 88 | int i,j=0,n,ret=1; |
89 | 89 | ||
90 | n=i2d(x,NULL); | 90 | n=i2d(x,NULL); |
91 | b=(char *)OPENSSL_malloc(n); | 91 | b=(char *)malloc(n); |
92 | if (b == NULL) | 92 | if (b == NULL) |
93 | { | 93 | { |
94 | ASN1err(ASN1_F_ASN1_I2D_BIO,ERR_R_MALLOC_FAILURE); | 94 | ASN1err(ASN1_F_ASN1_I2D_BIO,ERR_R_MALLOC_FAILURE); |
@@ -110,7 +110,7 @@ int ASN1_i2d_bio(i2d_of_void *i2d, BIO *out, unsigned char *x) | |||
110 | j+=i; | 110 | j+=i; |
111 | n-=i; | 111 | n-=i; |
112 | } | 112 | } |
113 | OPENSSL_free(b); | 113 | free(b); |
114 | return(ret); | 114 | return(ret); |
115 | } | 115 | } |
116 | 116 | ||
@@ -158,6 +158,6 @@ int ASN1_item_i2d_bio(const ASN1_ITEM *it, BIO *out, void *x) | |||
158 | j+=i; | 158 | j+=i; |
159 | n-=i; | 159 | n-=i; |
160 | } | 160 | } |
161 | OPENSSL_free(b); | 161 | free(b); |
162 | return(ret); | 162 | return(ret); |
163 | } | 163 | } |
diff --git a/src/lib/libcrypto/asn1/a_int.c b/src/lib/libcrypto/asn1/a_int.c index 297c45a9ff..6c38ace8f9 100644 --- a/src/lib/libcrypto/asn1/a_int.c +++ b/src/lib/libcrypto/asn1/a_int.c | |||
@@ -194,9 +194,9 @@ ASN1_INTEGER *c2i_ASN1_INTEGER(ASN1_INTEGER **a, const unsigned char **pp, | |||
194 | p= *pp; | 194 | p= *pp; |
195 | pend = p + len; | 195 | pend = p + len; |
196 | 196 | ||
197 | /* We must OPENSSL_malloc stuff, even for 0 bytes otherwise it | 197 | /* We must malloc stuff, even for 0 bytes otherwise it |
198 | * signifies a missing NULL parameter. */ | 198 | * signifies a missing NULL parameter. */ |
199 | s=(unsigned char *)OPENSSL_malloc((int)len+1); | 199 | s=(unsigned char *)malloc((int)len+1); |
200 | if (s == NULL) | 200 | if (s == NULL) |
201 | { | 201 | { |
202 | i=ERR_R_MALLOC_FAILURE; | 202 | i=ERR_R_MALLOC_FAILURE; |
@@ -249,7 +249,7 @@ ASN1_INTEGER *c2i_ASN1_INTEGER(ASN1_INTEGER **a, const unsigned char **pp, | |||
249 | memcpy(s,p,(int)len); | 249 | memcpy(s,p,(int)len); |
250 | } | 250 | } |
251 | 251 | ||
252 | if (ret->data != NULL) OPENSSL_free(ret->data); | 252 | if (ret->data != NULL) free(ret->data); |
253 | ret->data=s; | 253 | ret->data=s; |
254 | ret->length=(int)len; | 254 | ret->length=(int)len; |
255 | if (a != NULL) (*a)=ret; | 255 | if (a != NULL) (*a)=ret; |
@@ -300,9 +300,9 @@ ASN1_INTEGER *d2i_ASN1_UINTEGER(ASN1_INTEGER **a, const unsigned char **pp, | |||
300 | goto err; | 300 | goto err; |
301 | } | 301 | } |
302 | 302 | ||
303 | /* We must OPENSSL_malloc stuff, even for 0 bytes otherwise it | 303 | /* We must malloc stuff, even for 0 bytes otherwise it |
304 | * signifies a missing NULL parameter. */ | 304 | * signifies a missing NULL parameter. */ |
305 | s=(unsigned char *)OPENSSL_malloc((int)len+1); | 305 | s=(unsigned char *)malloc((int)len+1); |
306 | if (s == NULL) | 306 | if (s == NULL) |
307 | { | 307 | { |
308 | i=ERR_R_MALLOC_FAILURE; | 308 | i=ERR_R_MALLOC_FAILURE; |
@@ -319,7 +319,7 @@ ASN1_INTEGER *d2i_ASN1_UINTEGER(ASN1_INTEGER **a, const unsigned char **pp, | |||
319 | p+=len; | 319 | p+=len; |
320 | } | 320 | } |
321 | 321 | ||
322 | if (ret->data != NULL) OPENSSL_free(ret->data); | 322 | if (ret->data != NULL) free(ret->data); |
323 | ret->data=s; | 323 | ret->data=s; |
324 | ret->length=(int)len; | 324 | ret->length=(int)len; |
325 | if (a != NULL) (*a)=ret; | 325 | if (a != NULL) (*a)=ret; |
@@ -343,8 +343,8 @@ int ASN1_INTEGER_set(ASN1_INTEGER *a, long v) | |||
343 | if (a->length < (int)(sizeof(long)+1)) | 343 | if (a->length < (int)(sizeof(long)+1)) |
344 | { | 344 | { |
345 | if (a->data != NULL) | 345 | if (a->data != NULL) |
346 | OPENSSL_free(a->data); | 346 | free(a->data); |
347 | if ((a->data=(unsigned char *)OPENSSL_malloc(sizeof(long)+1)) != NULL) | 347 | if ((a->data=(unsigned char *)malloc(sizeof(long)+1)) != NULL) |
348 | memset((char *)a->data,0,sizeof(long)+1); | 348 | memset((char *)a->data,0,sizeof(long)+1); |
349 | } | 349 | } |
350 | if (a->data == NULL) | 350 | if (a->data == NULL) |
@@ -422,7 +422,7 @@ ASN1_INTEGER *BN_to_ASN1_INTEGER(const BIGNUM *bn, ASN1_INTEGER *ai) | |||
422 | len=((j == 0)?0:((j/8)+1)); | 422 | len=((j == 0)?0:((j/8)+1)); |
423 | if (ret->length < len+4) | 423 | if (ret->length < len+4) |
424 | { | 424 | { |
425 | unsigned char *new_data=OPENSSL_realloc(ret->data, len+4); | 425 | unsigned char *new_data=realloc(ret->data, len+4); |
426 | if (!new_data) | 426 | if (!new_data) |
427 | { | 427 | { |
428 | ASN1err(ASN1_F_BN_TO_ASN1_INTEGER,ERR_R_MALLOC_FAILURE); | 428 | ASN1err(ASN1_F_BN_TO_ASN1_INTEGER,ERR_R_MALLOC_FAILURE); |
diff --git a/src/lib/libcrypto/asn1/a_mbstr.c b/src/lib/libcrypto/asn1/a_mbstr.c index dc953c8325..f6d8da8b3c 100644 --- a/src/lib/libcrypto/asn1/a_mbstr.c +++ b/src/lib/libcrypto/asn1/a_mbstr.c | |||
@@ -185,7 +185,7 @@ int ASN1_mbstring_ncopy(ASN1_STRING **out, const unsigned char *in, int len, | |||
185 | dest = *out; | 185 | dest = *out; |
186 | if(dest->data) { | 186 | if(dest->data) { |
187 | dest->length = 0; | 187 | dest->length = 0; |
188 | OPENSSL_free(dest->data); | 188 | free(dest->data); |
189 | dest->data = NULL; | 189 | dest->data = NULL; |
190 | } | 190 | } |
191 | dest->type = str_type; | 191 | dest->type = str_type; |
@@ -231,7 +231,7 @@ int ASN1_mbstring_ncopy(ASN1_STRING **out, const unsigned char *in, int len, | |||
231 | cpyfunc = cpy_utf8; | 231 | cpyfunc = cpy_utf8; |
232 | break; | 232 | break; |
233 | } | 233 | } |
234 | if(!(p = OPENSSL_malloc(outlen + 1))) { | 234 | if(!(p = malloc(outlen + 1))) { |
235 | if(free_out) ASN1_STRING_free(dest); | 235 | if(free_out) ASN1_STRING_free(dest); |
236 | ASN1err(ASN1_F_ASN1_MBSTRING_NCOPY,ERR_R_MALLOC_FAILURE); | 236 | ASN1err(ASN1_F_ASN1_MBSTRING_NCOPY,ERR_R_MALLOC_FAILURE); |
237 | return -1; | 237 | return -1; |
diff --git a/src/lib/libcrypto/asn1/a_object.c b/src/lib/libcrypto/asn1/a_object.c index 3978c9150d..c30f32442d 100644 --- a/src/lib/libcrypto/asn1/a_object.c +++ b/src/lib/libcrypto/asn1/a_object.c | |||
@@ -180,9 +180,9 @@ int a2d_ASN1_OBJECT(unsigned char *out, int olen, const char *buf, int num) | |||
180 | if (blsize > tmpsize) | 180 | if (blsize > tmpsize) |
181 | { | 181 | { |
182 | if (tmp != ftmp) | 182 | if (tmp != ftmp) |
183 | OPENSSL_free(tmp); | 183 | free(tmp); |
184 | tmpsize = blsize + 32; | 184 | tmpsize = blsize + 32; |
185 | tmp = OPENSSL_malloc(tmpsize); | 185 | tmp = malloc(tmpsize); |
186 | if (!tmp) | 186 | if (!tmp) |
187 | goto err; | 187 | goto err; |
188 | } | 188 | } |
@@ -215,13 +215,13 @@ int a2d_ASN1_OBJECT(unsigned char *out, int olen, const char *buf, int num) | |||
215 | len+=i; | 215 | len+=i; |
216 | } | 216 | } |
217 | if (tmp != ftmp) | 217 | if (tmp != ftmp) |
218 | OPENSSL_free(tmp); | 218 | free(tmp); |
219 | if (bl) | 219 | if (bl) |
220 | BN_free(bl); | 220 | BN_free(bl); |
221 | return(len); | 221 | return(len); |
222 | err: | 222 | err: |
223 | if (tmp != ftmp) | 223 | if (tmp != ftmp) |
224 | OPENSSL_free(tmp); | 224 | free(tmp); |
225 | if (bl) | 225 | if (bl) |
226 | BN_free(bl); | 226 | BN_free(bl); |
227 | return(0); | 227 | return(0); |
@@ -242,7 +242,7 @@ int i2a_ASN1_OBJECT(BIO *bp, ASN1_OBJECT *a) | |||
242 | i=i2t_ASN1_OBJECT(buf,sizeof buf,a); | 242 | i=i2t_ASN1_OBJECT(buf,sizeof buf,a); |
243 | if (i > (int)(sizeof(buf) - 1)) | 243 | if (i > (int)(sizeof(buf) - 1)) |
244 | { | 244 | { |
245 | p = OPENSSL_malloc(i + 1); | 245 | p = malloc(i + 1); |
246 | if (!p) | 246 | if (!p) |
247 | return -1; | 247 | return -1; |
248 | i2t_ASN1_OBJECT(p,i + 1,a); | 248 | i2t_ASN1_OBJECT(p,i + 1,a); |
@@ -251,7 +251,7 @@ int i2a_ASN1_OBJECT(BIO *bp, ASN1_OBJECT *a) | |||
251 | return BIO_write(bp, "<INVALID>", 9); | 251 | return BIO_write(bp, "<INVALID>", 9); |
252 | BIO_write(bp,p,i); | 252 | BIO_write(bp,p,i); |
253 | if (p != buf) | 253 | if (p != buf) |
254 | OPENSSL_free(p); | 254 | free(p); |
255 | return(i); | 255 | return(i); |
256 | } | 256 | } |
257 | 257 | ||
@@ -319,8 +319,8 @@ ASN1_OBJECT *c2i_ASN1_OBJECT(ASN1_OBJECT **a, const unsigned char **pp, | |||
319 | if ((data == NULL) || (ret->length < len)) | 319 | if ((data == NULL) || (ret->length < len)) |
320 | { | 320 | { |
321 | ret->length=0; | 321 | ret->length=0; |
322 | if (data != NULL) OPENSSL_free(data); | 322 | if (data != NULL) free(data); |
323 | data=(unsigned char *)OPENSSL_malloc(len ? (int)len : 1); | 323 | data=(unsigned char *)malloc(len ? (int)len : 1); |
324 | if (data == NULL) | 324 | if (data == NULL) |
325 | { i=ERR_R_MALLOC_FAILURE; goto err; } | 325 | { i=ERR_R_MALLOC_FAILURE; goto err; } |
326 | ret->flags|=ASN1_OBJECT_FLAG_DYNAMIC_DATA; | 326 | ret->flags|=ASN1_OBJECT_FLAG_DYNAMIC_DATA; |
@@ -348,7 +348,7 @@ ASN1_OBJECT *ASN1_OBJECT_new(void) | |||
348 | { | 348 | { |
349 | ASN1_OBJECT *ret; | 349 | ASN1_OBJECT *ret; |
350 | 350 | ||
351 | ret=(ASN1_OBJECT *)OPENSSL_malloc(sizeof(ASN1_OBJECT)); | 351 | ret=(ASN1_OBJECT *)malloc(sizeof(ASN1_OBJECT)); |
352 | if (ret == NULL) | 352 | if (ret == NULL) |
353 | { | 353 | { |
354 | ASN1err(ASN1_F_ASN1_OBJECT_NEW,ERR_R_MALLOC_FAILURE); | 354 | ASN1err(ASN1_F_ASN1_OBJECT_NEW,ERR_R_MALLOC_FAILURE); |
@@ -369,19 +369,19 @@ void ASN1_OBJECT_free(ASN1_OBJECT *a) | |||
369 | if (a->flags & ASN1_OBJECT_FLAG_DYNAMIC_STRINGS) | 369 | if (a->flags & ASN1_OBJECT_FLAG_DYNAMIC_STRINGS) |
370 | { | 370 | { |
371 | #ifndef CONST_STRICT /* disable purely for compile-time strict const checking. Doing this on a "real" compile will cause memory leaks */ | 371 | #ifndef CONST_STRICT /* disable purely for compile-time strict const checking. Doing this on a "real" compile will cause memory leaks */ |
372 | if (a->sn != NULL) OPENSSL_free((void *)a->sn); | 372 | if (a->sn != NULL) free((void *)a->sn); |
373 | if (a->ln != NULL) OPENSSL_free((void *)a->ln); | 373 | if (a->ln != NULL) free((void *)a->ln); |
374 | #endif | 374 | #endif |
375 | a->sn=a->ln=NULL; | 375 | a->sn=a->ln=NULL; |
376 | } | 376 | } |
377 | if (a->flags & ASN1_OBJECT_FLAG_DYNAMIC_DATA) | 377 | if (a->flags & ASN1_OBJECT_FLAG_DYNAMIC_DATA) |
378 | { | 378 | { |
379 | if (a->data != NULL) OPENSSL_free((void *)a->data); | 379 | if (a->data != NULL) free((void *)a->data); |
380 | a->data=NULL; | 380 | a->data=NULL; |
381 | a->length=0; | 381 | a->length=0; |
382 | } | 382 | } |
383 | if (a->flags & ASN1_OBJECT_FLAG_DYNAMIC) | 383 | if (a->flags & ASN1_OBJECT_FLAG_DYNAMIC) |
384 | OPENSSL_free(a); | 384 | free(a); |
385 | } | 385 | } |
386 | 386 | ||
387 | ASN1_OBJECT *ASN1_OBJECT_create(int nid, unsigned char *data, int len, | 387 | ASN1_OBJECT *ASN1_OBJECT_create(int nid, unsigned char *data, int len, |
diff --git a/src/lib/libcrypto/asn1/a_sign.c b/src/lib/libcrypto/asn1/a_sign.c index 01b6292b65..0433b49a64 100644 --- a/src/lib/libcrypto/asn1/a_sign.c +++ b/src/lib/libcrypto/asn1/a_sign.c | |||
@@ -211,7 +211,7 @@ int ASN1_item_sign_ctx(const ASN1_ITEM *it, | |||
211 | 211 | ||
212 | inl=ASN1_item_i2d(asn,&buf_in, it); | 212 | inl=ASN1_item_i2d(asn,&buf_in, it); |
213 | outll=outl=EVP_PKEY_size(pkey); | 213 | outll=outl=EVP_PKEY_size(pkey); |
214 | buf_out=OPENSSL_malloc((unsigned int)outl); | 214 | buf_out=malloc((unsigned int)outl); |
215 | if ((buf_in == NULL) || (buf_out == NULL)) | 215 | if ((buf_in == NULL) || (buf_out == NULL)) |
216 | { | 216 | { |
217 | outl=0; | 217 | outl=0; |
@@ -226,7 +226,7 @@ int ASN1_item_sign_ctx(const ASN1_ITEM *it, | |||
226 | ASN1err(ASN1_F_ASN1_ITEM_SIGN_CTX,ERR_R_EVP_LIB); | 226 | ASN1err(ASN1_F_ASN1_ITEM_SIGN_CTX,ERR_R_EVP_LIB); |
227 | goto err; | 227 | goto err; |
228 | } | 228 | } |
229 | if (signature->data != NULL) OPENSSL_free(signature->data); | 229 | if (signature->data != NULL) free(signature->data); |
230 | signature->data=buf_out; | 230 | signature->data=buf_out; |
231 | buf_out=NULL; | 231 | buf_out=NULL; |
232 | signature->length=outl; | 232 | signature->length=outl; |
@@ -238,8 +238,8 @@ int ASN1_item_sign_ctx(const ASN1_ITEM *it, | |||
238 | err: | 238 | err: |
239 | EVP_MD_CTX_cleanup(ctx); | 239 | EVP_MD_CTX_cleanup(ctx); |
240 | if (buf_in != NULL) | 240 | if (buf_in != NULL) |
241 | { OPENSSL_cleanse((char *)buf_in,(unsigned int)inl); OPENSSL_free(buf_in); } | 241 | { OPENSSL_cleanse((char *)buf_in,(unsigned int)inl); free(buf_in); } |
242 | if (buf_out != NULL) | 242 | if (buf_out != NULL) |
243 | { OPENSSL_cleanse((char *)buf_out,outll); OPENSSL_free(buf_out); } | 243 | { OPENSSL_cleanse((char *)buf_out,outll); free(buf_out); } |
244 | return(outl); | 244 | return(outl); |
245 | } | 245 | } |
diff --git a/src/lib/libcrypto/asn1/a_strex.c b/src/lib/libcrypto/asn1/a_strex.c index d1a587ccc1..713b3cb028 100644 --- a/src/lib/libcrypto/asn1/a_strex.c +++ b/src/lib/libcrypto/asn1/a_strex.c | |||
@@ -278,12 +278,12 @@ static int do_dump(unsigned long lflags, char_io *io_ch, void *arg, ASN1_STRING | |||
278 | t.type = str->type; | 278 | t.type = str->type; |
279 | t.value.ptr = (char *)str; | 279 | t.value.ptr = (char *)str; |
280 | der_len = i2d_ASN1_TYPE(&t, NULL); | 280 | der_len = i2d_ASN1_TYPE(&t, NULL); |
281 | der_buf = OPENSSL_malloc(der_len); | 281 | der_buf = malloc(der_len); |
282 | if(!der_buf) return -1; | 282 | if(!der_buf) return -1; |
283 | p = der_buf; | 283 | p = der_buf; |
284 | i2d_ASN1_TYPE(&t, &p); | 284 | i2d_ASN1_TYPE(&t, &p); |
285 | outlen = do_hex_dump(io_ch, arg, der_buf, der_len); | 285 | outlen = do_hex_dump(io_ch, arg, der_buf, der_len); |
286 | OPENSSL_free(der_buf); | 286 | free(der_buf); |
287 | if(outlen < 0) return -1; | 287 | if(outlen < 0) return -1; |
288 | return outlen + 1; | 288 | return outlen + 1; |
289 | } | 289 | } |
diff --git a/src/lib/libcrypto/asn1/a_strnid.c b/src/lib/libcrypto/asn1/a_strnid.c index 2fc48c1551..74bc7b316c 100644 --- a/src/lib/libcrypto/asn1/a_strnid.c +++ b/src/lib/libcrypto/asn1/a_strnid.c | |||
@@ -222,7 +222,7 @@ int ASN1_STRING_TABLE_add(int nid, | |||
222 | return 0; | 222 | return 0; |
223 | } | 223 | } |
224 | if(!(tmp = ASN1_STRING_TABLE_get(nid))) { | 224 | if(!(tmp = ASN1_STRING_TABLE_get(nid))) { |
225 | tmp = OPENSSL_malloc(sizeof(ASN1_STRING_TABLE)); | 225 | tmp = malloc(sizeof(ASN1_STRING_TABLE)); |
226 | if(!tmp) { | 226 | if(!tmp) { |
227 | ASN1err(ASN1_F_ASN1_STRING_TABLE_ADD, | 227 | ASN1err(ASN1_F_ASN1_STRING_TABLE_ADD, |
228 | ERR_R_MALLOC_FAILURE); | 228 | ERR_R_MALLOC_FAILURE); |
@@ -250,7 +250,7 @@ void ASN1_STRING_TABLE_cleanup(void) | |||
250 | 250 | ||
251 | static void st_free(ASN1_STRING_TABLE *tbl) | 251 | static void st_free(ASN1_STRING_TABLE *tbl) |
252 | { | 252 | { |
253 | if(tbl->flags & STABLE_FLAGS_MALLOC) OPENSSL_free(tbl); | 253 | if(tbl->flags & STABLE_FLAGS_MALLOC) free(tbl); |
254 | } | 254 | } |
255 | 255 | ||
256 | 256 | ||
diff --git a/src/lib/libcrypto/asn1/a_utctm.c b/src/lib/libcrypto/asn1/a_utctm.c index f2e7de16af..0e7aca90a7 100644 --- a/src/lib/libcrypto/asn1/a_utctm.c +++ b/src/lib/libcrypto/asn1/a_utctm.c | |||
@@ -203,14 +203,14 @@ ASN1_UTCTIME *ASN1_UTCTIME_adj(ASN1_UTCTIME *s, time_t t, | |||
203 | p=(char *)s->data; | 203 | p=(char *)s->data; |
204 | if ((p == NULL) || ((size_t)s->length < len)) | 204 | if ((p == NULL) || ((size_t)s->length < len)) |
205 | { | 205 | { |
206 | p=OPENSSL_malloc(len); | 206 | p=malloc(len); |
207 | if (p == NULL) | 207 | if (p == NULL) |
208 | { | 208 | { |
209 | ASN1err(ASN1_F_ASN1_UTCTIME_ADJ,ERR_R_MALLOC_FAILURE); | 209 | ASN1err(ASN1_F_ASN1_UTCTIME_ADJ,ERR_R_MALLOC_FAILURE); |
210 | return(NULL); | 210 | return(NULL); |
211 | } | 211 | } |
212 | if (s->data != NULL) | 212 | if (s->data != NULL) |
213 | OPENSSL_free(s->data); | 213 | free(s->data); |
214 | s->data=(unsigned char *)p; | 214 | s->data=(unsigned char *)p; |
215 | } | 215 | } |
216 | 216 | ||
diff --git a/src/lib/libcrypto/asn1/a_verify.c b/src/lib/libcrypto/asn1/a_verify.c index 5eb47d768c..8eca970be3 100644 --- a/src/lib/libcrypto/asn1/a_verify.c +++ b/src/lib/libcrypto/asn1/a_verify.c | |||
@@ -154,7 +154,7 @@ int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, | |||
154 | } | 154 | } |
155 | 155 | ||
156 | OPENSSL_cleanse(buf_in,(unsigned int)inl); | 156 | OPENSSL_cleanse(buf_in,(unsigned int)inl); |
157 | OPENSSL_free(buf_in); | 157 | free(buf_in); |
158 | 158 | ||
159 | if (EVP_DigestVerifyFinal(&ctx,signature->data, | 159 | if (EVP_DigestVerifyFinal(&ctx,signature->data, |
160 | (size_t)signature->length) <= 0) | 160 | (size_t)signature->length) <= 0) |
diff --git a/src/lib/libcrypto/asn1/ameth_lib.c b/src/lib/libcrypto/asn1/ameth_lib.c index a19e058fca..228392f1e6 100644 --- a/src/lib/libcrypto/asn1/ameth_lib.c +++ b/src/lib/libcrypto/asn1/ameth_lib.c | |||
@@ -289,7 +289,7 @@ EVP_PKEY_ASN1_METHOD* EVP_PKEY_asn1_new(int id, int flags, | |||
289 | const char *pem_str, const char *info) | 289 | const char *pem_str, const char *info) |
290 | { | 290 | { |
291 | EVP_PKEY_ASN1_METHOD *ameth; | 291 | EVP_PKEY_ASN1_METHOD *ameth; |
292 | ameth = OPENSSL_malloc(sizeof(EVP_PKEY_ASN1_METHOD)); | 292 | ameth = malloc(sizeof(EVP_PKEY_ASN1_METHOD)); |
293 | if (!ameth) | 293 | if (!ameth) |
294 | return NULL; | 294 | return NULL; |
295 | 295 | ||
@@ -393,10 +393,10 @@ void EVP_PKEY_asn1_free(EVP_PKEY_ASN1_METHOD *ameth) | |||
393 | if (ameth && (ameth->pkey_flags & ASN1_PKEY_DYNAMIC)) | 393 | if (ameth && (ameth->pkey_flags & ASN1_PKEY_DYNAMIC)) |
394 | { | 394 | { |
395 | if (ameth->pem_str) | 395 | if (ameth->pem_str) |
396 | OPENSSL_free(ameth->pem_str); | 396 | free(ameth->pem_str); |
397 | if (ameth->info) | 397 | if (ameth->info) |
398 | OPENSSL_free(ameth->info); | 398 | free(ameth->info); |
399 | OPENSSL_free(ameth); | 399 | free(ameth); |
400 | } | 400 | } |
401 | } | 401 | } |
402 | 402 | ||
diff --git a/src/lib/libcrypto/asn1/asn1_gen.c b/src/lib/libcrypto/asn1/asn1_gen.c index 81a7a38895..8194beeb30 100644 --- a/src/lib/libcrypto/asn1/asn1_gen.c +++ b/src/lib/libcrypto/asn1/asn1_gen.c | |||
@@ -226,7 +226,7 @@ ASN1_TYPE *ASN1_generate_v3(char *str, X509V3_CTX *cnf) | |||
226 | 226 | ||
227 | /* Allocate buffer for new encoding */ | 227 | /* Allocate buffer for new encoding */ |
228 | 228 | ||
229 | new_der = OPENSSL_malloc(len); | 229 | new_der = malloc(len); |
230 | if (!new_der) | 230 | if (!new_der) |
231 | goto err; | 231 | goto err; |
232 | 232 | ||
@@ -266,9 +266,9 @@ ASN1_TYPE *ASN1_generate_v3(char *str, X509V3_CTX *cnf) | |||
266 | 266 | ||
267 | err: | 267 | err: |
268 | if (orig_der) | 268 | if (orig_der) |
269 | OPENSSL_free(orig_der); | 269 | free(orig_der); |
270 | if (new_der) | 270 | if (new_der) |
271 | OPENSSL_free(new_der); | 271 | free(new_der); |
272 | 272 | ||
273 | return ret; | 273 | return ret; |
274 | 274 | ||
@@ -499,7 +499,7 @@ static ASN1_TYPE *asn1_multi(int utype, const char *section, X509V3_CTX *cnf) | |||
499 | bad: | 499 | bad: |
500 | 500 | ||
501 | if (der) | 501 | if (der) |
502 | OPENSSL_free(der); | 502 | free(der); |
503 | 503 | ||
504 | if (sk) | 504 | if (sk) |
505 | sk_ASN1_TYPE_pop_free(sk, ASN1_TYPE_free); | 505 | sk_ASN1_TYPE_pop_free(sk, ASN1_TYPE_free); |
diff --git a/src/lib/libcrypto/asn1/asn1_lib.c b/src/lib/libcrypto/asn1/asn1_lib.c index 4d1d6af18d..7b06b6fdc8 100644 --- a/src/lib/libcrypto/asn1/asn1_lib.c +++ b/src/lib/libcrypto/asn1/asn1_lib.c | |||
@@ -383,9 +383,9 @@ int ASN1_STRING_set(ASN1_STRING *str, const void *_data, int len) | |||
383 | { | 383 | { |
384 | c=str->data; | 384 | c=str->data; |
385 | if (c == NULL) | 385 | if (c == NULL) |
386 | str->data=OPENSSL_malloc(len+1); | 386 | str->data=malloc(len+1); |
387 | else | 387 | else |
388 | str->data=OPENSSL_realloc(c,len+1); | 388 | str->data=realloc(c,len+1); |
389 | 389 | ||
390 | if (str->data == NULL) | 390 | if (str->data == NULL) |
391 | { | 391 | { |
@@ -407,7 +407,7 @@ int ASN1_STRING_set(ASN1_STRING *str, const void *_data, int len) | |||
407 | void ASN1_STRING_set0(ASN1_STRING *str, void *data, int len) | 407 | void ASN1_STRING_set0(ASN1_STRING *str, void *data, int len) |
408 | { | 408 | { |
409 | if (str->data) | 409 | if (str->data) |
410 | OPENSSL_free(str->data); | 410 | free(str->data); |
411 | str->data = data; | 411 | str->data = data; |
412 | str->length = len; | 412 | str->length = len; |
413 | } | 413 | } |
@@ -422,7 +422,7 @@ ASN1_STRING *ASN1_STRING_type_new(int type) | |||
422 | { | 422 | { |
423 | ASN1_STRING *ret; | 423 | ASN1_STRING *ret; |
424 | 424 | ||
425 | ret=(ASN1_STRING *)OPENSSL_malloc(sizeof(ASN1_STRING)); | 425 | ret=(ASN1_STRING *)malloc(sizeof(ASN1_STRING)); |
426 | if (ret == NULL) | 426 | if (ret == NULL) |
427 | { | 427 | { |
428 | ASN1err(ASN1_F_ASN1_STRING_TYPE_NEW,ERR_R_MALLOC_FAILURE); | 428 | ASN1err(ASN1_F_ASN1_STRING_TYPE_NEW,ERR_R_MALLOC_FAILURE); |
@@ -439,8 +439,8 @@ void ASN1_STRING_free(ASN1_STRING *a) | |||
439 | { | 439 | { |
440 | if (a == NULL) return; | 440 | if (a == NULL) return; |
441 | if (a->data && !(a->flags & ASN1_STRING_FLAG_NDEF)) | 441 | if (a->data && !(a->flags & ASN1_STRING_FLAG_NDEF)) |
442 | OPENSSL_free(a->data); | 442 | free(a->data); |
443 | OPENSSL_free(a); | 443 | free(a); |
444 | } | 444 | } |
445 | 445 | ||
446 | int ASN1_STRING_cmp(const ASN1_STRING *a, const ASN1_STRING *b) | 446 | int ASN1_STRING_cmp(const ASN1_STRING *a, const ASN1_STRING *b) |
diff --git a/src/lib/libcrypto/asn1/asn1_mac.h b/src/lib/libcrypto/asn1/asn1_mac.h index c60b197552..ecc2c77228 100644 --- a/src/lib/libcrypto/asn1/asn1_mac.h +++ b/src/lib/libcrypto/asn1/asn1_mac.h | |||
@@ -289,7 +289,7 @@ err:\ | |||
289 | 289 | ||
290 | /* New macros */ | 290 | /* New macros */ |
291 | #define M_ASN1_New_Malloc(ret,type) \ | 291 | #define M_ASN1_New_Malloc(ret,type) \ |
292 | if ((ret=(type *)OPENSSL_malloc(sizeof(type))) == NULL) \ | 292 | if ((ret=(type *)malloc(sizeof(type))) == NULL) \ |
293 | { c.line=__LINE__; goto err2; } | 293 | { c.line=__LINE__; goto err2; } |
294 | 294 | ||
295 | #define M_ASN1_New(arg,func) \ | 295 | #define M_ASN1_New(arg,func) \ |
diff --git a/src/lib/libcrypto/asn1/asn_mime.c b/src/lib/libcrypto/asn1/asn_mime.c index 54a704a969..d94b3cd6f8 100644 --- a/src/lib/libcrypto/asn1/asn_mime.c +++ b/src/lib/libcrypto/asn1/asn_mime.c | |||
@@ -220,7 +220,7 @@ static int asn1_write_micalg(BIO *out, STACK_OF(X509_ALGOR) *mdalgs) | |||
220 | if (rv > 0) | 220 | if (rv > 0) |
221 | { | 221 | { |
222 | BIO_puts(out, micstr); | 222 | BIO_puts(out, micstr); |
223 | OPENSSL_free(micstr); | 223 | free(micstr); |
224 | continue; | 224 | continue; |
225 | } | 225 | } |
226 | if (rv != -2) | 226 | if (rv != -2) |
@@ -822,7 +822,7 @@ static MIME_HEADER *mime_hdr_new(char *name, char *value) | |||
822 | } | 822 | } |
823 | } | 823 | } |
824 | } else tmpval = NULL; | 824 | } else tmpval = NULL; |
825 | mhdr = (MIME_HEADER *) OPENSSL_malloc(sizeof(MIME_HEADER)); | 825 | mhdr = (MIME_HEADER *) malloc(sizeof(MIME_HEADER)); |
826 | if(!mhdr) return NULL; | 826 | if(!mhdr) return NULL; |
827 | mhdr->name = tmpname; | 827 | mhdr->name = tmpname; |
828 | mhdr->value = tmpval; | 828 | mhdr->value = tmpval; |
@@ -851,7 +851,7 @@ static int mime_hdr_addparam(MIME_HEADER *mhdr, char *name, char *value) | |||
851 | if(!tmpval) return 0; | 851 | if(!tmpval) return 0; |
852 | } else tmpval = NULL; | 852 | } else tmpval = NULL; |
853 | /* Parameter values are case sensitive so leave as is */ | 853 | /* Parameter values are case sensitive so leave as is */ |
854 | mparam = (MIME_PARAM *) OPENSSL_malloc(sizeof(MIME_PARAM)); | 854 | mparam = (MIME_PARAM *) malloc(sizeof(MIME_PARAM)); |
855 | if(!mparam) return 0; | 855 | if(!mparam) return 0; |
856 | mparam->param_name = tmpname; | 856 | mparam->param_name = tmpname; |
857 | mparam->param_value = tmpval; | 857 | mparam->param_value = tmpval; |
@@ -900,17 +900,17 @@ static MIME_PARAM *mime_param_find(MIME_HEADER *hdr, char *name) | |||
900 | 900 | ||
901 | static void mime_hdr_free(MIME_HEADER *hdr) | 901 | static void mime_hdr_free(MIME_HEADER *hdr) |
902 | { | 902 | { |
903 | if(hdr->name) OPENSSL_free(hdr->name); | 903 | if(hdr->name) free(hdr->name); |
904 | if(hdr->value) OPENSSL_free(hdr->value); | 904 | if(hdr->value) free(hdr->value); |
905 | if(hdr->params) sk_MIME_PARAM_pop_free(hdr->params, mime_param_free); | 905 | if(hdr->params) sk_MIME_PARAM_pop_free(hdr->params, mime_param_free); |
906 | OPENSSL_free(hdr); | 906 | free(hdr); |
907 | } | 907 | } |
908 | 908 | ||
909 | static void mime_param_free(MIME_PARAM *param) | 909 | static void mime_param_free(MIME_PARAM *param) |
910 | { | 910 | { |
911 | if(param->param_name) OPENSSL_free(param->param_name); | 911 | if(param->param_name) free(param->param_name); |
912 | if(param->param_value) OPENSSL_free(param->param_value); | 912 | if(param->param_value) free(param->param_value); |
913 | OPENSSL_free(param); | 913 | free(param); |
914 | } | 914 | } |
915 | 915 | ||
916 | /* Check for a multipart boundary. Returns: | 916 | /* Check for a multipart boundary. Returns: |
diff --git a/src/lib/libcrypto/asn1/asn_moid.c b/src/lib/libcrypto/asn1/asn_moid.c index 1ea6a59248..fd04d11459 100644 --- a/src/lib/libcrypto/asn1/asn_moid.c +++ b/src/lib/libcrypto/asn1/asn_moid.c | |||
@@ -145,7 +145,7 @@ static int do_create(char *value, char *name) | |||
145 | p--; | 145 | p--; |
146 | } | 146 | } |
147 | p++; | 147 | p++; |
148 | lntmp = OPENSSL_malloc((p - ln) + 1); | 148 | lntmp = malloc((p - ln) + 1); |
149 | if (lntmp == NULL) | 149 | if (lntmp == NULL) |
150 | return 0; | 150 | return 0; |
151 | memcpy(lntmp, ln, p - ln); | 151 | memcpy(lntmp, ln, p - ln); |
diff --git a/src/lib/libcrypto/asn1/asn_pack.c b/src/lib/libcrypto/asn1/asn_pack.c index 1886508654..13dc5d4665 100644 --- a/src/lib/libcrypto/asn1/asn_pack.c +++ b/src/lib/libcrypto/asn1/asn_pack.c | |||
@@ -75,7 +75,7 @@ ASN1_STRING *ASN1_item_pack(void *obj, const ASN1_ITEM *it, ASN1_STRING **oct) | |||
75 | } else octmp = *oct; | 75 | } else octmp = *oct; |
76 | 76 | ||
77 | if(octmp->data) { | 77 | if(octmp->data) { |
78 | OPENSSL_free(octmp->data); | 78 | free(octmp->data); |
79 | octmp->data = NULL; | 79 | octmp->data = NULL; |
80 | } | 80 | } |
81 | 81 | ||
diff --git a/src/lib/libcrypto/asn1/bio_asn1.c b/src/lib/libcrypto/asn1/bio_asn1.c index dc7efd551c..fa98dba728 100644 --- a/src/lib/libcrypto/asn1/bio_asn1.c +++ b/src/lib/libcrypto/asn1/bio_asn1.c | |||
@@ -150,7 +150,7 @@ BIO_METHOD *BIO_f_asn1(void) | |||
150 | static int asn1_bio_new(BIO *b) | 150 | static int asn1_bio_new(BIO *b) |
151 | { | 151 | { |
152 | BIO_ASN1_BUF_CTX *ctx; | 152 | BIO_ASN1_BUF_CTX *ctx; |
153 | ctx = OPENSSL_malloc(sizeof(BIO_ASN1_BUF_CTX)); | 153 | ctx = malloc(sizeof(BIO_ASN1_BUF_CTX)); |
154 | if (!ctx) | 154 | if (!ctx) |
155 | return 0; | 155 | return 0; |
156 | if (!asn1_bio_init(ctx, DEFAULT_ASN1_BUF_SIZE)) | 156 | if (!asn1_bio_init(ctx, DEFAULT_ASN1_BUF_SIZE)) |
@@ -163,7 +163,7 @@ static int asn1_bio_new(BIO *b) | |||
163 | 163 | ||
164 | static int asn1_bio_init(BIO_ASN1_BUF_CTX *ctx, int size) | 164 | static int asn1_bio_init(BIO_ASN1_BUF_CTX *ctx, int size) |
165 | { | 165 | { |
166 | ctx->buf = OPENSSL_malloc(size); | 166 | ctx->buf = malloc(size); |
167 | if (!ctx->buf) | 167 | if (!ctx->buf) |
168 | return 0; | 168 | return 0; |
169 | ctx->bufsize = size; | 169 | ctx->bufsize = size; |
@@ -186,8 +186,8 @@ static int asn1_bio_free(BIO *b) | |||
186 | if (ctx == NULL) | 186 | if (ctx == NULL) |
187 | return 0; | 187 | return 0; |
188 | if (ctx->buf) | 188 | if (ctx->buf) |
189 | OPENSSL_free(ctx->buf); | 189 | free(ctx->buf); |
190 | OPENSSL_free(ctx); | 190 | free(ctx); |
191 | b->init = 0; | 191 | b->init = 0; |
192 | b->ptr = NULL; | 192 | b->ptr = NULL; |
193 | b->flags = 0; | 193 | b->flags = 0; |
diff --git a/src/lib/libcrypto/asn1/bio_ndef.c b/src/lib/libcrypto/asn1/bio_ndef.c index b91f97a1b1..60f324bdae 100644 --- a/src/lib/libcrypto/asn1/bio_ndef.c +++ b/src/lib/libcrypto/asn1/bio_ndef.c | |||
@@ -110,7 +110,7 @@ BIO *BIO_new_NDEF(BIO *out, ASN1_VALUE *val, const ASN1_ITEM *it) | |||
110 | ASN1err(ASN1_F_BIO_NEW_NDEF, ASN1_R_STREAMING_NOT_SUPPORTED); | 110 | ASN1err(ASN1_F_BIO_NEW_NDEF, ASN1_R_STREAMING_NOT_SUPPORTED); |
111 | return NULL; | 111 | return NULL; |
112 | } | 112 | } |
113 | ndef_aux = OPENSSL_malloc(sizeof(NDEF_SUPPORT)); | 113 | ndef_aux = malloc(sizeof(NDEF_SUPPORT)); |
114 | asn_bio = BIO_new(BIO_f_asn1()); | 114 | asn_bio = BIO_new(BIO_f_asn1()); |
115 | 115 | ||
116 | /* ASN1 bio needs to be next to output BIO */ | 116 | /* ASN1 bio needs to be next to output BIO */ |
@@ -148,7 +148,7 @@ BIO *BIO_new_NDEF(BIO *out, ASN1_VALUE *val, const ASN1_ITEM *it) | |||
148 | if (asn_bio) | 148 | if (asn_bio) |
149 | BIO_free(asn_bio); | 149 | BIO_free(asn_bio); |
150 | if (ndef_aux) | 150 | if (ndef_aux) |
151 | OPENSSL_free(ndef_aux); | 151 | free(ndef_aux); |
152 | return NULL; | 152 | return NULL; |
153 | } | 153 | } |
154 | 154 | ||
@@ -164,7 +164,7 @@ static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg) | |||
164 | ndef_aux = *(NDEF_SUPPORT **)parg; | 164 | ndef_aux = *(NDEF_SUPPORT **)parg; |
165 | 165 | ||
166 | derlen = ASN1_item_ndef_i2d(ndef_aux->val, NULL, ndef_aux->it); | 166 | derlen = ASN1_item_ndef_i2d(ndef_aux->val, NULL, ndef_aux->it); |
167 | p = OPENSSL_malloc(derlen); | 167 | p = malloc(derlen); |
168 | ndef_aux->derbuf = p; | 168 | ndef_aux->derbuf = p; |
169 | *pbuf = p; | 169 | *pbuf = p; |
170 | derlen = ASN1_item_ndef_i2d(ndef_aux->val, &p, ndef_aux->it); | 170 | derlen = ASN1_item_ndef_i2d(ndef_aux->val, &p, ndef_aux->it); |
@@ -187,7 +187,7 @@ static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) | |||
187 | ndef_aux = *(NDEF_SUPPORT **)parg; | 187 | ndef_aux = *(NDEF_SUPPORT **)parg; |
188 | 188 | ||
189 | if (ndef_aux->derbuf) | 189 | if (ndef_aux->derbuf) |
190 | OPENSSL_free(ndef_aux->derbuf); | 190 | free(ndef_aux->derbuf); |
191 | 191 | ||
192 | ndef_aux->derbuf = NULL; | 192 | ndef_aux->derbuf = NULL; |
193 | *pbuf = NULL; | 193 | *pbuf = NULL; |
@@ -200,7 +200,7 @@ static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) | |||
200 | NDEF_SUPPORT **pndef_aux = (NDEF_SUPPORT **)parg; | 200 | NDEF_SUPPORT **pndef_aux = (NDEF_SUPPORT **)parg; |
201 | if (!ndef_prefix_free(b, pbuf, plen, parg)) | 201 | if (!ndef_prefix_free(b, pbuf, plen, parg)) |
202 | return 0; | 202 | return 0; |
203 | OPENSSL_free(*pndef_aux); | 203 | free(*pndef_aux); |
204 | *pndef_aux = NULL; | 204 | *pndef_aux = NULL; |
205 | return 1; | 205 | return 1; |
206 | } | 206 | } |
@@ -229,7 +229,7 @@ static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg) | |||
229 | return 0; | 229 | return 0; |
230 | 230 | ||
231 | derlen = ASN1_item_ndef_i2d(ndef_aux->val, NULL, ndef_aux->it); | 231 | derlen = ASN1_item_ndef_i2d(ndef_aux->val, NULL, ndef_aux->it); |
232 | p = OPENSSL_malloc(derlen); | 232 | p = malloc(derlen); |
233 | ndef_aux->derbuf = p; | 233 | ndef_aux->derbuf = p; |
234 | *pbuf = p; | 234 | *pbuf = p; |
235 | derlen = ASN1_item_ndef_i2d(ndef_aux->val, &p, ndef_aux->it); | 235 | derlen = ASN1_item_ndef_i2d(ndef_aux->val, &p, ndef_aux->it); |
diff --git a/src/lib/libcrypto/asn1/f_enum.c b/src/lib/libcrypto/asn1/f_enum.c index 56e3cc8df2..caf34ee97e 100644 --- a/src/lib/libcrypto/asn1/f_enum.c +++ b/src/lib/libcrypto/asn1/f_enum.c | |||
@@ -153,15 +153,15 @@ int a2i_ASN1_ENUMERATED(BIO *bp, ASN1_ENUMERATED *bs, char *buf, int size) | |||
153 | if (num+i > slen) | 153 | if (num+i > slen) |
154 | { | 154 | { |
155 | if (s == NULL) | 155 | if (s == NULL) |
156 | sp=(unsigned char *)OPENSSL_malloc( | 156 | sp=(unsigned char *)malloc( |
157 | (unsigned int)num+i*2); | 157 | (unsigned int)num+i*2); |
158 | else | 158 | else |
159 | sp=(unsigned char *)OPENSSL_realloc(s, | 159 | sp=(unsigned char *)realloc(s, |
160 | (unsigned int)num+i*2); | 160 | (unsigned int)num+i*2); |
161 | if (sp == NULL) | 161 | if (sp == NULL) |
162 | { | 162 | { |
163 | ASN1err(ASN1_F_A2I_ASN1_ENUMERATED,ERR_R_MALLOC_FAILURE); | 163 | ASN1err(ASN1_F_A2I_ASN1_ENUMERATED,ERR_R_MALLOC_FAILURE); |
164 | if (s != NULL) OPENSSL_free(s); | 164 | if (s != NULL) free(s); |
165 | goto err; | 165 | goto err; |
166 | } | 166 | } |
167 | s=sp; | 167 | s=sp; |
diff --git a/src/lib/libcrypto/asn1/f_int.c b/src/lib/libcrypto/asn1/f_int.c index 8b92fad9df..977e3d01b7 100644 --- a/src/lib/libcrypto/asn1/f_int.c +++ b/src/lib/libcrypto/asn1/f_int.c | |||
@@ -157,14 +157,14 @@ int a2i_ASN1_INTEGER(BIO *bp, ASN1_INTEGER *bs, char *buf, int size) | |||
157 | if (num+i > slen) | 157 | if (num+i > slen) |
158 | { | 158 | { |
159 | if (s == NULL) | 159 | if (s == NULL) |
160 | sp=(unsigned char *)OPENSSL_malloc( | 160 | sp=(unsigned char *)malloc( |
161 | (unsigned int)num+i*2); | 161 | (unsigned int)num+i*2); |
162 | else | 162 | else |
163 | sp=OPENSSL_realloc_clean(s,slen,num+i*2); | 163 | sp=OPENSSL_realloc_clean(s,slen,num+i*2); |
164 | if (sp == NULL) | 164 | if (sp == NULL) |
165 | { | 165 | { |
166 | ASN1err(ASN1_F_A2I_ASN1_INTEGER,ERR_R_MALLOC_FAILURE); | 166 | ASN1err(ASN1_F_A2I_ASN1_INTEGER,ERR_R_MALLOC_FAILURE); |
167 | if (s != NULL) OPENSSL_free(s); | 167 | if (s != NULL) free(s); |
168 | goto err; | 168 | goto err; |
169 | } | 169 | } |
170 | s=sp; | 170 | s=sp; |
diff --git a/src/lib/libcrypto/asn1/f_string.c b/src/lib/libcrypto/asn1/f_string.c index f7d36adac7..f4bee15335 100644 --- a/src/lib/libcrypto/asn1/f_string.c +++ b/src/lib/libcrypto/asn1/f_string.c | |||
@@ -149,15 +149,15 @@ int a2i_ASN1_STRING(BIO *bp, ASN1_STRING *bs, char *buf, int size) | |||
149 | if (num+i > slen) | 149 | if (num+i > slen) |
150 | { | 150 | { |
151 | if (s == NULL) | 151 | if (s == NULL) |
152 | sp=(unsigned char *)OPENSSL_malloc( | 152 | sp=(unsigned char *)malloc( |
153 | (unsigned int)num+i*2); | 153 | (unsigned int)num+i*2); |
154 | else | 154 | else |
155 | sp=(unsigned char *)OPENSSL_realloc(s, | 155 | sp=(unsigned char *)realloc(s, |
156 | (unsigned int)num+i*2); | 156 | (unsigned int)num+i*2); |
157 | if (sp == NULL) | 157 | if (sp == NULL) |
158 | { | 158 | { |
159 | ASN1err(ASN1_F_A2I_ASN1_STRING,ERR_R_MALLOC_FAILURE); | 159 | ASN1err(ASN1_F_A2I_ASN1_STRING,ERR_R_MALLOC_FAILURE); |
160 | if (s != NULL) OPENSSL_free(s); | 160 | if (s != NULL) free(s); |
161 | goto err; | 161 | goto err; |
162 | } | 162 | } |
163 | s=sp; | 163 | s=sp; |
diff --git a/src/lib/libcrypto/asn1/n_pkey.c b/src/lib/libcrypto/asn1/n_pkey.c index e251739933..97647d17e1 100644 --- a/src/lib/libcrypto/asn1/n_pkey.c +++ b/src/lib/libcrypto/asn1/n_pkey.c | |||
@@ -169,7 +169,7 @@ int i2d_RSA_NET(const RSA *a, unsigned char **pp, | |||
169 | 169 | ||
170 | 170 | ||
171 | /* Since its RC4 encrypted length is actual length */ | 171 | /* Since its RC4 encrypted length is actual length */ |
172 | if ((zz=(unsigned char *)OPENSSL_malloc(rsalen)) == NULL) | 172 | if ((zz=(unsigned char *)malloc(rsalen)) == NULL) |
173 | { | 173 | { |
174 | ASN1err(ASN1_F_I2D_RSA_NET,ERR_R_MALLOC_FAILURE); | 174 | ASN1err(ASN1_F_I2D_RSA_NET,ERR_R_MALLOC_FAILURE); |
175 | goto err; | 175 | goto err; |
@@ -179,7 +179,7 @@ int i2d_RSA_NET(const RSA *a, unsigned char **pp, | |||
179 | /* Write out private key encoding */ | 179 | /* Write out private key encoding */ |
180 | i2d_RSAPrivateKey(a,&zz); | 180 | i2d_RSAPrivateKey(a,&zz); |
181 | 181 | ||
182 | if ((zz=OPENSSL_malloc(pkeylen)) == NULL) | 182 | if ((zz=malloc(pkeylen)) == NULL) |
183 | { | 183 | { |
184 | ASN1err(ASN1_F_I2D_RSA_NET,ERR_R_MALLOC_FAILURE); | 184 | ASN1err(ASN1_F_I2D_RSA_NET,ERR_R_MALLOC_FAILURE); |
185 | goto err; | 185 | goto err; |
diff --git a/src/lib/libcrypto/asn1/p5_pbev2.c b/src/lib/libcrypto/asn1/p5_pbev2.c index 4ea683036b..2d80334e01 100644 --- a/src/lib/libcrypto/asn1/p5_pbev2.c +++ b/src/lib/libcrypto/asn1/p5_pbev2.c | |||
@@ -214,7 +214,7 @@ X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, | |||
214 | 214 | ||
215 | if (!saltlen) | 215 | if (!saltlen) |
216 | saltlen = PKCS5_SALT_LEN; | 216 | saltlen = PKCS5_SALT_LEN; |
217 | if (!(osalt->data = OPENSSL_malloc (saltlen))) | 217 | if (!(osalt->data = malloc (saltlen))) |
218 | goto merr; | 218 | goto merr; |
219 | 219 | ||
220 | osalt->length = saltlen; | 220 | osalt->length = saltlen; |
diff --git a/src/lib/libcrypto/asn1/t_crl.c b/src/lib/libcrypto/asn1/t_crl.c index c61169208a..f6550b2b04 100644 --- a/src/lib/libcrypto/asn1/t_crl.c +++ b/src/lib/libcrypto/asn1/t_crl.c | |||
@@ -97,7 +97,7 @@ int X509_CRL_print(BIO *out, X509_CRL *x) | |||
97 | X509_signature_print(out, x->sig_alg, NULL); | 97 | X509_signature_print(out, x->sig_alg, NULL); |
98 | p=X509_NAME_oneline(X509_CRL_get_issuer(x),NULL,0); | 98 | p=X509_NAME_oneline(X509_CRL_get_issuer(x),NULL,0); |
99 | BIO_printf(out,"%8sIssuer: %s\n","",p); | 99 | BIO_printf(out,"%8sIssuer: %s\n","",p); |
100 | OPENSSL_free(p); | 100 | free(p); |
101 | BIO_printf(out,"%8sLast Update: ",""); | 101 | BIO_printf(out,"%8sLast Update: ",""); |
102 | ASN1_TIME_print(out,X509_CRL_get_lastUpdate(x)); | 102 | ASN1_TIME_print(out,X509_CRL_get_lastUpdate(x)); |
103 | BIO_printf(out,"\n%8sNext Update: ",""); | 103 | BIO_printf(out,"\n%8sNext Update: ",""); |
diff --git a/src/lib/libcrypto/asn1/t_x509.c b/src/lib/libcrypto/asn1/t_x509.c index bbf00c7a29..8dfda07b92 100644 --- a/src/lib/libcrypto/asn1/t_x509.c +++ b/src/lib/libcrypto/asn1/t_x509.c | |||
@@ -239,7 +239,7 @@ int X509_print_ex(BIO *bp, X509 *x, unsigned long nmflags, unsigned long cflag) | |||
239 | } | 239 | } |
240 | ret=1; | 240 | ret=1; |
241 | err: | 241 | err: |
242 | if (m != NULL) OPENSSL_free(m); | 242 | if (m != NULL) free(m); |
243 | return(ret); | 243 | return(ret); |
244 | } | 244 | } |
245 | 245 | ||
@@ -256,7 +256,7 @@ int X509_ocspid_print (BIO *bp, X509 *x) | |||
256 | if (BIO_printf(bp," Subject OCSP hash: ") <= 0) | 256 | if (BIO_printf(bp," Subject OCSP hash: ") <= 0) |
257 | goto err; | 257 | goto err; |
258 | derlen = i2d_X509_NAME(x->cert_info->subject, NULL); | 258 | derlen = i2d_X509_NAME(x->cert_info->subject, NULL); |
259 | if ((der = dertmp = (unsigned char *)OPENSSL_malloc (derlen)) == NULL) | 259 | if ((der = dertmp = (unsigned char *)malloc (derlen)) == NULL) |
260 | goto err; | 260 | goto err; |
261 | i2d_X509_NAME(x->cert_info->subject, &dertmp); | 261 | i2d_X509_NAME(x->cert_info->subject, &dertmp); |
262 | 262 | ||
@@ -266,7 +266,7 @@ int X509_ocspid_print (BIO *bp, X509 *x) | |||
266 | { | 266 | { |
267 | if (BIO_printf(bp,"%02X",SHA1md[i]) <= 0) goto err; | 267 | if (BIO_printf(bp,"%02X",SHA1md[i]) <= 0) goto err; |
268 | } | 268 | } |
269 | OPENSSL_free (der); | 269 | free (der); |
270 | der=NULL; | 270 | der=NULL; |
271 | 271 | ||
272 | /* display the hash of the public key as it would appear | 272 | /* display the hash of the public key as it would appear |
@@ -287,7 +287,7 @@ int X509_ocspid_print (BIO *bp, X509 *x) | |||
287 | 287 | ||
288 | return (1); | 288 | return (1); |
289 | err: | 289 | err: |
290 | if (der != NULL) OPENSSL_free(der); | 290 | if (der != NULL) free(der); |
291 | return(0); | 291 | return(0); |
292 | } | 292 | } |
293 | 293 | ||
@@ -477,7 +477,7 @@ int X509_NAME_print(BIO *bp, X509_NAME *name, int obase) | |||
477 | b=X509_NAME_oneline(name,NULL,0); | 477 | b=X509_NAME_oneline(name,NULL,0); |
478 | if (!*b) | 478 | if (!*b) |
479 | { | 479 | { |
480 | OPENSSL_free(b); | 480 | free(b); |
481 | return 1; | 481 | return 1; |
482 | } | 482 | } |
483 | s=b+1; /* skip the first slash */ | 483 | s=b+1; /* skip the first slash */ |
@@ -513,6 +513,6 @@ int X509_NAME_print(BIO *bp, X509_NAME *name, int obase) | |||
513 | err: | 513 | err: |
514 | X509err(X509_F_X509_NAME_PRINT,ERR_R_BUF_LIB); | 514 | X509err(X509_F_X509_NAME_PRINT,ERR_R_BUF_LIB); |
515 | } | 515 | } |
516 | OPENSSL_free(b); | 516 | free(b); |
517 | return(ret); | 517 | return(ret); |
518 | } | 518 | } |
diff --git a/src/lib/libcrypto/asn1/tasn_dec.c b/src/lib/libcrypto/asn1/tasn_dec.c index 87d7dfdf5c..c594db9140 100644 --- a/src/lib/libcrypto/asn1/tasn_dec.c +++ b/src/lib/libcrypto/asn1/tasn_dec.c | |||
@@ -910,7 +910,7 @@ static int asn1_d2i_ex_primitive(ASN1_VALUE **pval, | |||
910 | *in = p; | 910 | *in = p; |
911 | ret = 1; | 911 | ret = 1; |
912 | err: | 912 | err: |
913 | if (free_cont && buf.data) OPENSSL_free(buf.data); | 913 | if (free_cont && buf.data) free(buf.data); |
914 | return ret; | 914 | return ret; |
915 | } | 915 | } |
916 | 916 | ||
@@ -1046,7 +1046,7 @@ int asn1_ex_c2i(ASN1_VALUE **pval, const unsigned char *cont, int len, | |||
1046 | if (*free_cont) | 1046 | if (*free_cont) |
1047 | { | 1047 | { |
1048 | if (stmp->data) | 1048 | if (stmp->data) |
1049 | OPENSSL_free(stmp->data); | 1049 | free(stmp->data); |
1050 | stmp->data = (unsigned char *)cont; /* UGLY CAST! RL */ | 1050 | stmp->data = (unsigned char *)cont; /* UGLY CAST! RL */ |
1051 | stmp->length = len; | 1051 | stmp->length = len; |
1052 | *free_cont = 0; | 1052 | *free_cont = 0; |
diff --git a/src/lib/libcrypto/asn1/tasn_enc.c b/src/lib/libcrypto/asn1/tasn_enc.c index 936ad1f767..9ab0473d73 100644 --- a/src/lib/libcrypto/asn1/tasn_enc.c +++ b/src/lib/libcrypto/asn1/tasn_enc.c | |||
@@ -110,7 +110,7 @@ static int asn1_item_flags_i2d(ASN1_VALUE *val, unsigned char **out, | |||
110 | len = ASN1_item_ex_i2d(&val, NULL, it, -1, flags); | 110 | len = ASN1_item_ex_i2d(&val, NULL, it, -1, flags); |
111 | if (len <= 0) | 111 | if (len <= 0) |
112 | return len; | 112 | return len; |
113 | buf = OPENSSL_malloc(len); | 113 | buf = malloc(len); |
114 | if (!buf) | 114 | if (!buf) |
115 | return -1; | 115 | return -1; |
116 | p = buf; | 116 | p = buf; |
@@ -451,9 +451,9 @@ static int asn1_set_seq_out(STACK_OF(ASN1_VALUE) *sk, unsigned char **out, | |||
451 | do_sort = 0; | 451 | do_sort = 0; |
452 | else | 452 | else |
453 | { | 453 | { |
454 | derlst = OPENSSL_malloc(sk_ASN1_VALUE_num(sk) | 454 | derlst = malloc(sk_ASN1_VALUE_num(sk) |
455 | * sizeof(*derlst)); | 455 | * sizeof(*derlst)); |
456 | tmpdat = OPENSSL_malloc(skcontlen); | 456 | tmpdat = malloc(skcontlen); |
457 | if (!derlst || !tmpdat) | 457 | if (!derlst || !tmpdat) |
458 | return 0; | 458 | return 0; |
459 | } | 459 | } |
@@ -496,8 +496,8 @@ static int asn1_set_seq_out(STACK_OF(ASN1_VALUE) *sk, unsigned char **out, | |||
496 | i++, tder++) | 496 | i++, tder++) |
497 | (void)sk_ASN1_VALUE_set(sk, i, tder->field); | 497 | (void)sk_ASN1_VALUE_set(sk, i, tder->field); |
498 | } | 498 | } |
499 | OPENSSL_free(derlst); | 499 | free(derlst); |
500 | OPENSSL_free(tmpdat); | 500 | free(tmpdat); |
501 | return 1; | 501 | return 1; |
502 | } | 502 | } |
503 | 503 | ||
diff --git a/src/lib/libcrypto/asn1/tasn_fre.c b/src/lib/libcrypto/asn1/tasn_fre.c index 77d3092d31..b04034ba4c 100644 --- a/src/lib/libcrypto/asn1/tasn_fre.c +++ b/src/lib/libcrypto/asn1/tasn_fre.c | |||
@@ -126,7 +126,7 @@ static void asn1_item_combine_free(ASN1_VALUE **pval, const ASN1_ITEM *it, int c | |||
126 | asn1_cb(ASN1_OP_FREE_POST, pval, it, NULL); | 126 | asn1_cb(ASN1_OP_FREE_POST, pval, it, NULL); |
127 | if (!combine) | 127 | if (!combine) |
128 | { | 128 | { |
129 | OPENSSL_free(*pval); | 129 | free(*pval); |
130 | *pval = NULL; | 130 | *pval = NULL; |
131 | } | 131 | } |
132 | break; | 132 | break; |
@@ -173,7 +173,7 @@ static void asn1_item_combine_free(ASN1_VALUE **pval, const ASN1_ITEM *it, int c | |||
173 | asn1_cb(ASN1_OP_FREE_POST, pval, it, NULL); | 173 | asn1_cb(ASN1_OP_FREE_POST, pval, it, NULL); |
174 | if (!combine) | 174 | if (!combine) |
175 | { | 175 | { |
176 | OPENSSL_free(*pval); | 176 | free(*pval); |
177 | *pval = NULL; | 177 | *pval = NULL; |
178 | } | 178 | } |
179 | break; | 179 | break; |
@@ -254,7 +254,7 @@ void ASN1_primitive_free(ASN1_VALUE **pval, const ASN1_ITEM *it) | |||
254 | 254 | ||
255 | case V_ASN1_ANY: | 255 | case V_ASN1_ANY: |
256 | ASN1_primitive_free(pval, NULL); | 256 | ASN1_primitive_free(pval, NULL); |
257 | OPENSSL_free(*pval); | 257 | free(*pval); |
258 | break; | 258 | break; |
259 | 259 | ||
260 | default: | 260 | default: |
diff --git a/src/lib/libcrypto/asn1/tasn_new.c b/src/lib/libcrypto/asn1/tasn_new.c index 0d9e78cc7c..aab9ef08c4 100644 --- a/src/lib/libcrypto/asn1/tasn_new.c +++ b/src/lib/libcrypto/asn1/tasn_new.c | |||
@@ -160,7 +160,7 @@ static int asn1_item_ex_combine_new(ASN1_VALUE **pval, const ASN1_ITEM *it, | |||
160 | } | 160 | } |
161 | if (!combine) | 161 | if (!combine) |
162 | { | 162 | { |
163 | *pval = OPENSSL_malloc(it->size); | 163 | *pval = malloc(it->size); |
164 | if (!*pval) | 164 | if (!*pval) |
165 | goto memerr; | 165 | goto memerr; |
166 | memset(*pval, 0, it->size); | 166 | memset(*pval, 0, it->size); |
@@ -188,7 +188,7 @@ static int asn1_item_ex_combine_new(ASN1_VALUE **pval, const ASN1_ITEM *it, | |||
188 | } | 188 | } |
189 | if (!combine) | 189 | if (!combine) |
190 | { | 190 | { |
191 | *pval = OPENSSL_malloc(it->size); | 191 | *pval = malloc(it->size); |
192 | if (!*pval) | 192 | if (!*pval) |
193 | goto memerr; | 193 | goto memerr; |
194 | memset(*pval, 0, it->size); | 194 | memset(*pval, 0, it->size); |
@@ -354,7 +354,7 @@ int ASN1_primitive_new(ASN1_VALUE **pval, const ASN1_ITEM *it) | |||
354 | return 1; | 354 | return 1; |
355 | 355 | ||
356 | case V_ASN1_ANY: | 356 | case V_ASN1_ANY: |
357 | typ = OPENSSL_malloc(sizeof(ASN1_TYPE)); | 357 | typ = malloc(sizeof(ASN1_TYPE)); |
358 | if (!typ) | 358 | if (!typ) |
359 | return 0; | 359 | return 0; |
360 | typ->value.ptr = NULL; | 360 | typ->value.ptr = NULL; |
diff --git a/src/lib/libcrypto/asn1/tasn_prn.c b/src/lib/libcrypto/asn1/tasn_prn.c index 542a091a66..ec524edac8 100644 --- a/src/lib/libcrypto/asn1/tasn_prn.c +++ b/src/lib/libcrypto/asn1/tasn_prn.c | |||
@@ -85,7 +85,7 @@ ASN1_PCTX default_pctx = | |||
85 | ASN1_PCTX *ASN1_PCTX_new(void) | 85 | ASN1_PCTX *ASN1_PCTX_new(void) |
86 | { | 86 | { |
87 | ASN1_PCTX *ret; | 87 | ASN1_PCTX *ret; |
88 | ret = OPENSSL_malloc(sizeof(ASN1_PCTX)); | 88 | ret = malloc(sizeof(ASN1_PCTX)); |
89 | if (ret == NULL) | 89 | if (ret == NULL) |
90 | { | 90 | { |
91 | ASN1err(ASN1_F_ASN1_PCTX_NEW, ERR_R_MALLOC_FAILURE); | 91 | ASN1err(ASN1_F_ASN1_PCTX_NEW, ERR_R_MALLOC_FAILURE); |
@@ -101,7 +101,7 @@ ASN1_PCTX *ASN1_PCTX_new(void) | |||
101 | 101 | ||
102 | void ASN1_PCTX_free(ASN1_PCTX *p) | 102 | void ASN1_PCTX_free(ASN1_PCTX *p) |
103 | { | 103 | { |
104 | OPENSSL_free(p); | 104 | free(p); |
105 | } | 105 | } |
106 | 106 | ||
107 | unsigned long ASN1_PCTX_get_flags(ASN1_PCTX *p) | 107 | unsigned long ASN1_PCTX_get_flags(ASN1_PCTX *p) |
@@ -480,7 +480,7 @@ static int asn1_print_integer_ctx(BIO *out, ASN1_INTEGER *str, | |||
480 | s = i2s_ASN1_INTEGER(NULL, str); | 480 | s = i2s_ASN1_INTEGER(NULL, str); |
481 | if (BIO_puts(out, s) <= 0) | 481 | if (BIO_puts(out, s) <= 0) |
482 | ret = 0; | 482 | ret = 0; |
483 | OPENSSL_free(s); | 483 | free(s); |
484 | return ret; | 484 | return ret; |
485 | } | 485 | } |
486 | 486 | ||
diff --git a/src/lib/libcrypto/asn1/tasn_utl.c b/src/lib/libcrypto/asn1/tasn_utl.c index ca9ec7a32f..dfa63fb2bc 100644 --- a/src/lib/libcrypto/asn1/tasn_utl.c +++ b/src/lib/libcrypto/asn1/tasn_utl.c | |||
@@ -155,7 +155,7 @@ void asn1_enc_free(ASN1_VALUE **pval, const ASN1_ITEM *it) | |||
155 | if (enc) | 155 | if (enc) |
156 | { | 156 | { |
157 | if (enc->enc) | 157 | if (enc->enc) |
158 | OPENSSL_free(enc->enc); | 158 | free(enc->enc); |
159 | enc->enc = NULL; | 159 | enc->enc = NULL; |
160 | enc->len = 0; | 160 | enc->len = 0; |
161 | enc->modified = 1; | 161 | enc->modified = 1; |
@@ -171,8 +171,8 @@ int asn1_enc_save(ASN1_VALUE **pval, const unsigned char *in, int inlen, | |||
171 | return 1; | 171 | return 1; |
172 | 172 | ||
173 | if (enc->enc) | 173 | if (enc->enc) |
174 | OPENSSL_free(enc->enc); | 174 | free(enc->enc); |
175 | enc->enc = OPENSSL_malloc(inlen); | 175 | enc->enc = malloc(inlen); |
176 | if (!enc->enc) | 176 | if (!enc->enc) |
177 | return 0; | 177 | return 0; |
178 | memcpy(enc->enc, in, inlen); | 178 | memcpy(enc->enc, in, inlen); |
diff --git a/src/lib/libcrypto/asn1/x_crl.c b/src/lib/libcrypto/asn1/x_crl.c index c51c690ba9..cf7e69aaaf 100644 --- a/src/lib/libcrypto/asn1/x_crl.c +++ b/src/lib/libcrypto/asn1/x_crl.c | |||
@@ -493,7 +493,7 @@ X509_CRL_METHOD *X509_CRL_METHOD_new( | |||
493 | int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk)) | 493 | int (*crl_verify)(X509_CRL *crl, EVP_PKEY *pk)) |
494 | { | 494 | { |
495 | X509_CRL_METHOD *m; | 495 | X509_CRL_METHOD *m; |
496 | m = OPENSSL_malloc(sizeof(X509_CRL_METHOD)); | 496 | m = malloc(sizeof(X509_CRL_METHOD)); |
497 | if (!m) | 497 | if (!m) |
498 | return NULL; | 498 | return NULL; |
499 | m->crl_init = crl_init; | 499 | m->crl_init = crl_init; |
@@ -508,7 +508,7 @@ void X509_CRL_METHOD_free(X509_CRL_METHOD *m) | |||
508 | { | 508 | { |
509 | if (!(m->flags & X509_CRL_METHOD_DYNAMIC)) | 509 | if (!(m->flags & X509_CRL_METHOD_DYNAMIC)) |
510 | return; | 510 | return; |
511 | OPENSSL_free(m); | 511 | free(m); |
512 | } | 512 | } |
513 | 513 | ||
514 | void X509_CRL_set_meth_data(X509_CRL *crl, void *dat) | 514 | void X509_CRL_set_meth_data(X509_CRL *crl, void *dat) |
diff --git a/src/lib/libcrypto/asn1/x_info.c b/src/lib/libcrypto/asn1/x_info.c index d44f6cdb01..c13fad056f 100644 --- a/src/lib/libcrypto/asn1/x_info.c +++ b/src/lib/libcrypto/asn1/x_info.c | |||
@@ -66,7 +66,7 @@ X509_INFO *X509_INFO_new(void) | |||
66 | { | 66 | { |
67 | X509_INFO *ret=NULL; | 67 | X509_INFO *ret=NULL; |
68 | 68 | ||
69 | ret=(X509_INFO *)OPENSSL_malloc(sizeof(X509_INFO)); | 69 | ret=(X509_INFO *)malloc(sizeof(X509_INFO)); |
70 | if (ret == NULL) | 70 | if (ret == NULL) |
71 | { | 71 | { |
72 | ASN1err(ASN1_F_X509_INFO_NEW,ERR_R_MALLOC_FAILURE); | 72 | ASN1err(ASN1_F_X509_INFO_NEW,ERR_R_MALLOC_FAILURE); |
@@ -106,8 +106,8 @@ void X509_INFO_free(X509_INFO *x) | |||
106 | if (x->x509 != NULL) X509_free(x->x509); | 106 | if (x->x509 != NULL) X509_free(x->x509); |
107 | if (x->crl != NULL) X509_CRL_free(x->crl); | 107 | if (x->crl != NULL) X509_CRL_free(x->crl); |
108 | if (x->x_pkey != NULL) X509_PKEY_free(x->x_pkey); | 108 | if (x->x_pkey != NULL) X509_PKEY_free(x->x_pkey); |
109 | if (x->enc_data != NULL) OPENSSL_free(x->enc_data); | 109 | if (x->enc_data != NULL) free(x->enc_data); |
110 | OPENSSL_free(x); | 110 | free(x); |
111 | } | 111 | } |
112 | 112 | ||
113 | IMPLEMENT_STACK_OF(X509_INFO) | 113 | IMPLEMENT_STACK_OF(X509_INFO) |
diff --git a/src/lib/libcrypto/asn1/x_name.c b/src/lib/libcrypto/asn1/x_name.c index d7c2318693..e14d329639 100644 --- a/src/lib/libcrypto/asn1/x_name.c +++ b/src/lib/libcrypto/asn1/x_name.c | |||
@@ -132,7 +132,7 @@ IMPLEMENT_ASN1_DUP_FUNCTION(X509_NAME) | |||
132 | static int x509_name_ex_new(ASN1_VALUE **val, const ASN1_ITEM *it) | 132 | static int x509_name_ex_new(ASN1_VALUE **val, const ASN1_ITEM *it) |
133 | { | 133 | { |
134 | X509_NAME *ret = NULL; | 134 | X509_NAME *ret = NULL; |
135 | ret = OPENSSL_malloc(sizeof(X509_NAME)); | 135 | ret = malloc(sizeof(X509_NAME)); |
136 | if(!ret) goto memerr; | 136 | if(!ret) goto memerr; |
137 | if ((ret->entries=sk_X509_NAME_ENTRY_new_null()) == NULL) | 137 | if ((ret->entries=sk_X509_NAME_ENTRY_new_null()) == NULL) |
138 | goto memerr; | 138 | goto memerr; |
@@ -149,7 +149,7 @@ static int x509_name_ex_new(ASN1_VALUE **val, const ASN1_ITEM *it) | |||
149 | { | 149 | { |
150 | if (ret->entries) | 150 | if (ret->entries) |
151 | sk_X509_NAME_ENTRY_free(ret->entries); | 151 | sk_X509_NAME_ENTRY_free(ret->entries); |
152 | OPENSSL_free(ret); | 152 | free(ret); |
153 | } | 153 | } |
154 | return 0; | 154 | return 0; |
155 | } | 155 | } |
@@ -164,8 +164,8 @@ static void x509_name_ex_free(ASN1_VALUE **pval, const ASN1_ITEM *it) | |||
164 | BUF_MEM_free(a->bytes); | 164 | BUF_MEM_free(a->bytes); |
165 | sk_X509_NAME_ENTRY_pop_free(a->entries,X509_NAME_ENTRY_free); | 165 | sk_X509_NAME_ENTRY_pop_free(a->entries,X509_NAME_ENTRY_free); |
166 | if (a->canon_enc) | 166 | if (a->canon_enc) |
167 | OPENSSL_free(a->canon_enc); | 167 | free(a->canon_enc); |
168 | OPENSSL_free(a); | 168 | free(a); |
169 | *pval = NULL; | 169 | *pval = NULL; |
170 | } | 170 | } |
171 | 171 | ||
@@ -325,7 +325,7 @@ static int x509_name_canon(X509_NAME *a) | |||
325 | 325 | ||
326 | if (a->canon_enc) | 326 | if (a->canon_enc) |
327 | { | 327 | { |
328 | OPENSSL_free(a->canon_enc); | 328 | free(a->canon_enc); |
329 | a->canon_enc = NULL; | 329 | a->canon_enc = NULL; |
330 | } | 330 | } |
331 | /* Special case: empty X509_NAME => null encoding */ | 331 | /* Special case: empty X509_NAME => null encoding */ |
@@ -362,7 +362,7 @@ static int x509_name_canon(X509_NAME *a) | |||
362 | 362 | ||
363 | a->canon_enclen = i2d_name_canon(intname, NULL); | 363 | a->canon_enclen = i2d_name_canon(intname, NULL); |
364 | 364 | ||
365 | p = OPENSSL_malloc(a->canon_enclen); | 365 | p = malloc(a->canon_enclen); |
366 | 366 | ||
367 | if (!p) | 367 | if (!p) |
368 | goto err; | 368 | goto err; |
diff --git a/src/lib/libcrypto/asn1/x_pkey.c b/src/lib/libcrypto/asn1/x_pkey.c index 8453618426..3bf2f5e915 100644 --- a/src/lib/libcrypto/asn1/x_pkey.c +++ b/src/lib/libcrypto/asn1/x_pkey.c | |||
@@ -146,6 +146,6 @@ void X509_PKEY_free(X509_PKEY *x) | |||
146 | if (x->enc_algor != NULL) X509_ALGOR_free(x->enc_algor); | 146 | if (x->enc_algor != NULL) X509_ALGOR_free(x->enc_algor); |
147 | if (x->enc_pkey != NULL) M_ASN1_OCTET_STRING_free(x->enc_pkey); | 147 | if (x->enc_pkey != NULL) M_ASN1_OCTET_STRING_free(x->enc_pkey); |
148 | if (x->dec_pkey != NULL)EVP_PKEY_free(x->dec_pkey); | 148 | if (x->dec_pkey != NULL)EVP_PKEY_free(x->dec_pkey); |
149 | if ((x->key_data != NULL) && (x->key_free)) OPENSSL_free(x->key_data); | 149 | if ((x->key_data != NULL) && (x->key_free)) free(x->key_data); |
150 | OPENSSL_free(x); | 150 | free(x); |
151 | } | 151 | } |
diff --git a/src/lib/libcrypto/asn1/x_pubkey.c b/src/lib/libcrypto/asn1/x_pubkey.c index b649e1fcf9..684f40899f 100644 --- a/src/lib/libcrypto/asn1/x_pubkey.c +++ b/src/lib/libcrypto/asn1/x_pubkey.c | |||
@@ -357,7 +357,7 @@ int X509_PUBKEY_set0_param(X509_PUBKEY *pub, ASN1_OBJECT *aobj, | |||
357 | if (penc) | 357 | if (penc) |
358 | { | 358 | { |
359 | if (pub->public_key->data) | 359 | if (pub->public_key->data) |
360 | OPENSSL_free(pub->public_key->data); | 360 | free(pub->public_key->data); |
361 | pub->public_key->data = penc; | 361 | pub->public_key->data = penc; |
362 | pub->public_key->length = penclen; | 362 | pub->public_key->length = penclen; |
363 | /* Set number of unused bits to zero */ | 363 | /* Set number of unused bits to zero */ |
diff --git a/src/lib/libcrypto/asn1/x_x509.c b/src/lib/libcrypto/asn1/x_x509.c index de3df9eb51..5734f2b069 100644 --- a/src/lib/libcrypto/asn1/x_x509.c +++ b/src/lib/libcrypto/asn1/x_x509.c | |||
@@ -105,7 +105,7 @@ static int x509_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, | |||
105 | break; | 105 | break; |
106 | 106 | ||
107 | case ASN1_OP_D2I_POST: | 107 | case ASN1_OP_D2I_POST: |
108 | if (ret->name != NULL) OPENSSL_free(ret->name); | 108 | if (ret->name != NULL) free(ret->name); |
109 | ret->name=X509_NAME_oneline(ret->cert_info->subject,NULL,0); | 109 | ret->name=X509_NAME_oneline(ret->cert_info->subject,NULL,0); |
110 | break; | 110 | break; |
111 | 111 | ||
@@ -123,7 +123,7 @@ static int x509_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, | |||
123 | ASIdentifiers_free(ret->rfc3779_asid); | 123 | ASIdentifiers_free(ret->rfc3779_asid); |
124 | #endif | 124 | #endif |
125 | 125 | ||
126 | if (ret->name != NULL) OPENSSL_free(ret->name); | 126 | if (ret->name != NULL) free(ret->name); |
127 | break; | 127 | break; |
128 | 128 | ||
129 | } | 129 | } |