diff options
author | beck <> | 2014-04-17 13:37:50 +0000 |
---|---|---|
committer | beck <> | 2014-04-17 13:37:50 +0000 |
commit | bddb7c686e3d1aeb156722adc64b6c35ae720f87 (patch) | |
tree | 7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libcrypto/ex_data.c | |
parent | ecec66222d758996a4ff2671ca5026d9ede5ef76 (diff) | |
download | openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.gz openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.bz2 openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.zip |
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes:
OPENSSL_malloc->malloc
OPENSSL_free->free
OPENSSL_relloc->realloc
OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libcrypto/ex_data.c')
-rw-r--r-- | src/lib/libcrypto/ex_data.c | 24 |
1 files changed, 12 insertions, 12 deletions
diff --git a/src/lib/libcrypto/ex_data.c b/src/lib/libcrypto/ex_data.c index 44bad59527..4c09f9ee02 100644 --- a/src/lib/libcrypto/ex_data.c +++ b/src/lib/libcrypto/ex_data.c | |||
@@ -290,7 +290,7 @@ ex_data_check(void) | |||
290 | static void | 290 | static void |
291 | def_cleanup_util_cb(CRYPTO_EX_DATA_FUNCS *funcs) | 291 | def_cleanup_util_cb(CRYPTO_EX_DATA_FUNCS *funcs) |
292 | { | 292 | { |
293 | OPENSSL_free(funcs); | 293 | free(funcs); |
294 | } | 294 | } |
295 | 295 | ||
296 | /* This callback is used in lh_doall to destroy all EX_CLASS_ITEM values from | 296 | /* This callback is used in lh_doall to destroy all EX_CLASS_ITEM values from |
@@ -301,7 +301,7 @@ def_cleanup_cb(void *a_void) | |||
301 | { | 301 | { |
302 | EX_CLASS_ITEM *item = (EX_CLASS_ITEM *)a_void; | 302 | EX_CLASS_ITEM *item = (EX_CLASS_ITEM *)a_void; |
303 | sk_CRYPTO_EX_DATA_FUNCS_pop_free(item->meth, def_cleanup_util_cb); | 303 | sk_CRYPTO_EX_DATA_FUNCS_pop_free(item->meth, def_cleanup_util_cb); |
304 | OPENSSL_free(item); | 304 | free(item); |
305 | } | 305 | } |
306 | 306 | ||
307 | /* Return the EX_CLASS_ITEM from the "ex_data" hash table that corresponds to a | 307 | /* Return the EX_CLASS_ITEM from the "ex_data" hash table that corresponds to a |
@@ -315,13 +315,13 @@ static EX_CLASS_ITEM | |||
315 | CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA); | 315 | CRYPTO_w_lock(CRYPTO_LOCK_EX_DATA); |
316 | p = lh_EX_CLASS_ITEM_retrieve(ex_data, &d); | 316 | p = lh_EX_CLASS_ITEM_retrieve(ex_data, &d); |
317 | if (!p) { | 317 | if (!p) { |
318 | gen = OPENSSL_malloc(sizeof(EX_CLASS_ITEM)); | 318 | gen = malloc(sizeof(EX_CLASS_ITEM)); |
319 | if (gen) { | 319 | if (gen) { |
320 | gen->class_index = class_index; | 320 | gen->class_index = class_index; |
321 | gen->meth_num = 0; | 321 | gen->meth_num = 0; |
322 | gen->meth = sk_CRYPTO_EX_DATA_FUNCS_new_null(); | 322 | gen->meth = sk_CRYPTO_EX_DATA_FUNCS_new_null(); |
323 | if (!gen->meth) | 323 | if (!gen->meth) |
324 | OPENSSL_free(gen); | 324 | free(gen); |
325 | else { | 325 | else { |
326 | /* Because we're inside the ex_data lock, the | 326 | /* Because we're inside the ex_data lock, the |
327 | * return value from the insert will be NULL */ | 327 | * return value from the insert will be NULL */ |
@@ -343,7 +343,7 @@ def_add_index(EX_CLASS_ITEM *item, long argl, void *argp, | |||
343 | CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func) | 343 | CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func) |
344 | { | 344 | { |
345 | int toret = -1; | 345 | int toret = -1; |
346 | CRYPTO_EX_DATA_FUNCS *a = (CRYPTO_EX_DATA_FUNCS *)OPENSSL_malloc( | 346 | CRYPTO_EX_DATA_FUNCS *a = (CRYPTO_EX_DATA_FUNCS *)malloc( |
347 | sizeof(CRYPTO_EX_DATA_FUNCS)); | 347 | sizeof(CRYPTO_EX_DATA_FUNCS)); |
348 | if (!a) { | 348 | if (!a) { |
349 | CRYPTOerr(CRYPTO_F_DEF_ADD_INDEX, ERR_R_MALLOC_FAILURE); | 349 | CRYPTOerr(CRYPTO_F_DEF_ADD_INDEX, ERR_R_MALLOC_FAILURE); |
@@ -358,7 +358,7 @@ def_add_index(EX_CLASS_ITEM *item, long argl, void *argp, | |||
358 | while (sk_CRYPTO_EX_DATA_FUNCS_num(item->meth) <= item->meth_num) { | 358 | while (sk_CRYPTO_EX_DATA_FUNCS_num(item->meth) <= item->meth_num) { |
359 | if (!sk_CRYPTO_EX_DATA_FUNCS_push(item->meth, NULL)) { | 359 | if (!sk_CRYPTO_EX_DATA_FUNCS_push(item->meth, NULL)) { |
360 | CRYPTOerr(CRYPTO_F_DEF_ADD_INDEX, ERR_R_MALLOC_FAILURE); | 360 | CRYPTOerr(CRYPTO_F_DEF_ADD_INDEX, ERR_R_MALLOC_FAILURE); |
361 | OPENSSL_free(a); | 361 | free(a); |
362 | goto err; | 362 | goto err; |
363 | } | 363 | } |
364 | } | 364 | } |
@@ -422,7 +422,7 @@ int_new_ex_data(int class_index, void *obj, | |||
422 | CRYPTO_r_lock(CRYPTO_LOCK_EX_DATA); | 422 | CRYPTO_r_lock(CRYPTO_LOCK_EX_DATA); |
423 | mx = sk_CRYPTO_EX_DATA_FUNCS_num(item->meth); | 423 | mx = sk_CRYPTO_EX_DATA_FUNCS_num(item->meth); |
424 | if (mx > 0) { | 424 | if (mx > 0) { |
425 | storage = OPENSSL_malloc(mx * sizeof(CRYPTO_EX_DATA_FUNCS*)); | 425 | storage = malloc(mx * sizeof(CRYPTO_EX_DATA_FUNCS*)); |
426 | if (!storage) | 426 | if (!storage) |
427 | goto skip; | 427 | goto skip; |
428 | for (i = 0; i < mx; i++) | 428 | for (i = 0; i < mx; i++) |
@@ -442,7 +442,7 @@ skip: | |||
442 | } | 442 | } |
443 | } | 443 | } |
444 | if (storage) | 444 | if (storage) |
445 | OPENSSL_free(storage); | 445 | free(storage); |
446 | return 1; | 446 | return 1; |
447 | } | 447 | } |
448 | 448 | ||
@@ -466,7 +466,7 @@ int_dup_ex_data(int class_index, CRYPTO_EX_DATA *to, | |||
466 | if (j < mx) | 466 | if (j < mx) |
467 | mx = j; | 467 | mx = j; |
468 | if (mx > 0) { | 468 | if (mx > 0) { |
469 | storage = OPENSSL_malloc(mx * sizeof(CRYPTO_EX_DATA_FUNCS*)); | 469 | storage = malloc(mx * sizeof(CRYPTO_EX_DATA_FUNCS*)); |
470 | if (!storage) | 470 | if (!storage) |
471 | goto skip; | 471 | goto skip; |
472 | for (i = 0; i < mx; i++) | 472 | for (i = 0; i < mx; i++) |
@@ -486,7 +486,7 @@ skip: | |||
486 | CRYPTO_set_ex_data(to, i, ptr); | 486 | CRYPTO_set_ex_data(to, i, ptr); |
487 | } | 487 | } |
488 | if (storage) | 488 | if (storage) |
489 | OPENSSL_free(storage); | 489 | free(storage); |
490 | return 1; | 490 | return 1; |
491 | } | 491 | } |
492 | 492 | ||
@@ -503,7 +503,7 @@ int_free_ex_data(int class_index, void *obj, CRYPTO_EX_DATA *ad) | |||
503 | CRYPTO_r_lock(CRYPTO_LOCK_EX_DATA); | 503 | CRYPTO_r_lock(CRYPTO_LOCK_EX_DATA); |
504 | mx = sk_CRYPTO_EX_DATA_FUNCS_num(item->meth); | 504 | mx = sk_CRYPTO_EX_DATA_FUNCS_num(item->meth); |
505 | if (mx > 0) { | 505 | if (mx > 0) { |
506 | storage = OPENSSL_malloc(mx * sizeof(CRYPTO_EX_DATA_FUNCS*)); | 506 | storage = malloc(mx * sizeof(CRYPTO_EX_DATA_FUNCS*)); |
507 | if (!storage) | 507 | if (!storage) |
508 | goto skip; | 508 | goto skip; |
509 | for (i = 0; i < mx; i++) | 509 | for (i = 0; i < mx; i++) |
@@ -523,7 +523,7 @@ skip: | |||
523 | } | 523 | } |
524 | } | 524 | } |
525 | if (storage) | 525 | if (storage) |
526 | OPENSSL_free(storage); | 526 | free(storage); |
527 | if (ad->sk) { | 527 | if (ad->sk) { |
528 | sk_void_free(ad->sk); | 528 | sk_void_free(ad->sk); |
529 | ad->sk = NULL; | 529 | ad->sk = NULL; |