diff options
author | beck <> | 2014-04-17 13:37:50 +0000 |
---|---|---|
committer | beck <> | 2014-04-17 13:37:50 +0000 |
commit | bddb7c686e3d1aeb156722adc64b6c35ae720f87 (patch) | |
tree | 7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libcrypto/objects | |
parent | ecec66222d758996a4ff2671ca5026d9ede5ef76 (diff) | |
download | openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.gz openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.bz2 openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.zip |
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes:
OPENSSL_malloc->malloc
OPENSSL_free->free
OPENSSL_relloc->realloc
OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libcrypto/objects')
-rw-r--r-- | src/lib/libcrypto/objects/o_names.c | 14 | ||||
-rw-r--r-- | src/lib/libcrypto/objects/obj_dat.c | 26 | ||||
-rw-r--r-- | src/lib/libcrypto/objects/obj_lib.c | 14 | ||||
-rw-r--r-- | src/lib/libcrypto/objects/obj_xref.c | 6 |
4 files changed, 30 insertions, 30 deletions
diff --git a/src/lib/libcrypto/objects/o_names.c b/src/lib/libcrypto/objects/o_names.c index 4a548c2ed4..4c959db2da 100644 --- a/src/lib/libcrypto/objects/o_names.c +++ b/src/lib/libcrypto/objects/o_names.c | |||
@@ -83,7 +83,7 @@ int OBJ_NAME_new_index(unsigned long (*hash_func)(const char *), | |||
83 | for (i=sk_NAME_FUNCS_num(name_funcs_stack); i<names_type_num; i++) | 83 | for (i=sk_NAME_FUNCS_num(name_funcs_stack); i<names_type_num; i++) |
84 | { | 84 | { |
85 | MemCheck_off(); | 85 | MemCheck_off(); |
86 | name_funcs = OPENSSL_malloc(sizeof(NAME_FUNCS)); | 86 | name_funcs = malloc(sizeof(NAME_FUNCS)); |
87 | MemCheck_on(); | 87 | MemCheck_on(); |
88 | if (!name_funcs) | 88 | if (!name_funcs) |
89 | { | 89 | { |
@@ -192,7 +192,7 @@ int OBJ_NAME_add(const char *name, int type, const char *data) | |||
192 | alias=type&OBJ_NAME_ALIAS; | 192 | alias=type&OBJ_NAME_ALIAS; |
193 | type&= ~OBJ_NAME_ALIAS; | 193 | type&= ~OBJ_NAME_ALIAS; |
194 | 194 | ||
195 | onp=(OBJ_NAME *)OPENSSL_malloc(sizeof(OBJ_NAME)); | 195 | onp=(OBJ_NAME *)malloc(sizeof(OBJ_NAME)); |
196 | if (onp == NULL) | 196 | if (onp == NULL) |
197 | { | 197 | { |
198 | /* ERROR */ | 198 | /* ERROR */ |
@@ -217,7 +217,7 @@ int OBJ_NAME_add(const char *name, int type, const char *data) | |||
217 | sk_NAME_FUNCS_value(name_funcs_stack, | 217 | sk_NAME_FUNCS_value(name_funcs_stack, |
218 | ret->type)->free_func(ret->name,ret->type,ret->data); | 218 | ret->type)->free_func(ret->name,ret->type,ret->data); |
219 | } | 219 | } |
220 | OPENSSL_free(ret); | 220 | free(ret); |
221 | } | 221 | } |
222 | else | 222 | else |
223 | { | 223 | { |
@@ -252,7 +252,7 @@ int OBJ_NAME_remove(const char *name, int type) | |||
252 | sk_NAME_FUNCS_value(name_funcs_stack, | 252 | sk_NAME_FUNCS_value(name_funcs_stack, |
253 | ret->type)->free_func(ret->name,ret->type,ret->data); | 253 | ret->type)->free_func(ret->name,ret->type,ret->data); |
254 | } | 254 | } |
255 | OPENSSL_free(ret); | 255 | free(ret); |
256 | return(1); | 256 | return(1); |
257 | } | 257 | } |
258 | else | 258 | else |
@@ -318,7 +318,7 @@ void OBJ_NAME_do_all_sorted(int type,void (*fn)(const OBJ_NAME *,void *arg), | |||
318 | int n; | 318 | int n; |
319 | 319 | ||
320 | d.type=type; | 320 | d.type=type; |
321 | d.names=OPENSSL_malloc(lh_OBJ_NAME_num_items(names_lh)*sizeof *d.names); | 321 | d.names=malloc(lh_OBJ_NAME_num_items(names_lh)*sizeof *d.names); |
322 | d.n=0; | 322 | d.n=0; |
323 | OBJ_NAME_do_all(type,do_all_sorted_fn,&d); | 323 | OBJ_NAME_do_all(type,do_all_sorted_fn,&d); |
324 | 324 | ||
@@ -327,7 +327,7 @@ void OBJ_NAME_do_all_sorted(int type,void (*fn)(const OBJ_NAME *,void *arg), | |||
327 | for(n=0 ; n < d.n ; ++n) | 327 | for(n=0 ; n < d.n ; ++n) |
328 | fn(d.names[n],arg); | 328 | fn(d.names[n],arg); |
329 | 329 | ||
330 | OPENSSL_free((void *)d.names); | 330 | free((void *)d.names); |
331 | } | 331 | } |
332 | 332 | ||
333 | static int free_type; | 333 | static int free_type; |
@@ -345,7 +345,7 @@ static IMPLEMENT_LHASH_DOALL_FN(names_lh_free, OBJ_NAME) | |||
345 | 345 | ||
346 | static void name_funcs_free(NAME_FUNCS *ptr) | 346 | static void name_funcs_free(NAME_FUNCS *ptr) |
347 | { | 347 | { |
348 | OPENSSL_free(ptr); | 348 | free(ptr); |
349 | } | 349 | } |
350 | 350 | ||
351 | void OBJ_NAME_cleanup(int type) | 351 | void OBJ_NAME_cleanup(int type) |
diff --git a/src/lib/libcrypto/objects/obj_dat.c b/src/lib/libcrypto/objects/obj_dat.c index bced796e62..641a97c8aa 100644 --- a/src/lib/libcrypto/objects/obj_dat.c +++ b/src/lib/libcrypto/objects/obj_dat.c | |||
@@ -199,7 +199,7 @@ static void cleanup3_doall(ADDED_OBJ *a) | |||
199 | { | 199 | { |
200 | if (--a->obj->nid == 0) | 200 | if (--a->obj->nid == 0) |
201 | ASN1_OBJECT_free(a->obj); | 201 | ASN1_OBJECT_free(a->obj); |
202 | OPENSSL_free(a); | 202 | free(a); |
203 | } | 203 | } |
204 | 204 | ||
205 | static IMPLEMENT_LHASH_DOALL_FN(cleanup1, ADDED_OBJ) | 205 | static IMPLEMENT_LHASH_DOALL_FN(cleanup1, ADDED_OBJ) |
@@ -253,13 +253,13 @@ int OBJ_add_object(const ASN1_OBJECT *obj) | |||
253 | if (added == NULL) | 253 | if (added == NULL) |
254 | if (!init_added()) return(0); | 254 | if (!init_added()) return(0); |
255 | if ((o=OBJ_dup(obj)) == NULL) goto err; | 255 | if ((o=OBJ_dup(obj)) == NULL) goto err; |
256 | if (!(ao[ADDED_NID]=(ADDED_OBJ *)OPENSSL_malloc(sizeof(ADDED_OBJ)))) goto err2; | 256 | if (!(ao[ADDED_NID]=(ADDED_OBJ *)malloc(sizeof(ADDED_OBJ)))) goto err2; |
257 | if ((o->length != 0) && (obj->data != NULL)) | 257 | if ((o->length != 0) && (obj->data != NULL)) |
258 | if (!(ao[ADDED_DATA]=(ADDED_OBJ *)OPENSSL_malloc(sizeof(ADDED_OBJ)))) goto err2; | 258 | if (!(ao[ADDED_DATA]=(ADDED_OBJ *)malloc(sizeof(ADDED_OBJ)))) goto err2; |
259 | if (o->sn != NULL) | 259 | if (o->sn != NULL) |
260 | if (!(ao[ADDED_SNAME]=(ADDED_OBJ *)OPENSSL_malloc(sizeof(ADDED_OBJ)))) goto err2; | 260 | if (!(ao[ADDED_SNAME]=(ADDED_OBJ *)malloc(sizeof(ADDED_OBJ)))) goto err2; |
261 | if (o->ln != NULL) | 261 | if (o->ln != NULL) |
262 | if (!(ao[ADDED_LNAME]=(ADDED_OBJ *)OPENSSL_malloc(sizeof(ADDED_OBJ)))) goto err2; | 262 | if (!(ao[ADDED_LNAME]=(ADDED_OBJ *)malloc(sizeof(ADDED_OBJ)))) goto err2; |
263 | 263 | ||
264 | for (i=ADDED_DATA; i<=ADDED_NID; i++) | 264 | for (i=ADDED_DATA; i<=ADDED_NID; i++) |
265 | { | 265 | { |
@@ -270,7 +270,7 @@ int OBJ_add_object(const ASN1_OBJECT *obj) | |||
270 | aop=lh_ADDED_OBJ_insert(added,ao[i]); | 270 | aop=lh_ADDED_OBJ_insert(added,ao[i]); |
271 | /* memory leak, buit should not normally matter */ | 271 | /* memory leak, buit should not normally matter */ |
272 | if (aop != NULL) | 272 | if (aop != NULL) |
273 | OPENSSL_free(aop); | 273 | free(aop); |
274 | } | 274 | } |
275 | } | 275 | } |
276 | o->flags&= ~(ASN1_OBJECT_FLAG_DYNAMIC|ASN1_OBJECT_FLAG_DYNAMIC_STRINGS| | 276 | o->flags&= ~(ASN1_OBJECT_FLAG_DYNAMIC|ASN1_OBJECT_FLAG_DYNAMIC_STRINGS| |
@@ -281,8 +281,8 @@ err2: | |||
281 | OBJerr(OBJ_F_OBJ_ADD_OBJECT,ERR_R_MALLOC_FAILURE); | 281 | OBJerr(OBJ_F_OBJ_ADD_OBJECT,ERR_R_MALLOC_FAILURE); |
282 | err: | 282 | err: |
283 | for (i=ADDED_DATA; i<=ADDED_NID; i++) | 283 | for (i=ADDED_DATA; i<=ADDED_NID; i++) |
284 | if (ao[i] != NULL) OPENSSL_free(ao[i]); | 284 | if (ao[i] != NULL) free(ao[i]); |
285 | if (o != NULL) OPENSSL_free(o); | 285 | if (o != NULL) free(o); |
286 | return(NID_undef); | 286 | return(NID_undef); |
287 | } | 287 | } |
288 | 288 | ||
@@ -449,7 +449,7 @@ ASN1_OBJECT *OBJ_txt2obj(const char *s, int no_name) | |||
449 | /* Work out total size */ | 449 | /* Work out total size */ |
450 | j = ASN1_object_size(0,i,V_ASN1_OBJECT); | 450 | j = ASN1_object_size(0,i,V_ASN1_OBJECT); |
451 | 451 | ||
452 | if((buf=(unsigned char *)OPENSSL_malloc(j)) == NULL) return NULL; | 452 | if((buf=(unsigned char *)malloc(j)) == NULL) return NULL; |
453 | 453 | ||
454 | p = buf; | 454 | p = buf; |
455 | /* Write out tag+length */ | 455 | /* Write out tag+length */ |
@@ -459,7 +459,7 @@ ASN1_OBJECT *OBJ_txt2obj(const char *s, int no_name) | |||
459 | 459 | ||
460 | cp=buf; | 460 | cp=buf; |
461 | op=d2i_ASN1_OBJECT(NULL,&cp,j); | 461 | op=d2i_ASN1_OBJECT(NULL,&cp,j); |
462 | OPENSSL_free(buf); | 462 | free(buf); |
463 | return op; | 463 | return op; |
464 | } | 464 | } |
465 | 465 | ||
@@ -590,7 +590,7 @@ int OBJ_obj2txt(char *buf, int buf_len, const ASN1_OBJECT *a, int no_name) | |||
590 | } | 590 | } |
591 | n++; | 591 | n++; |
592 | n += i; | 592 | n += i; |
593 | OPENSSL_free(bndec); | 593 | free(bndec); |
594 | } | 594 | } |
595 | else | 595 | else |
596 | { | 596 | { |
@@ -774,7 +774,7 @@ int OBJ_create(const char *oid, const char *sn, const char *ln) | |||
774 | i=a2d_ASN1_OBJECT(NULL,0,oid,-1); | 774 | i=a2d_ASN1_OBJECT(NULL,0,oid,-1); |
775 | if (i <= 0) return(0); | 775 | if (i <= 0) return(0); |
776 | 776 | ||
777 | if ((buf=(unsigned char *)OPENSSL_malloc(i)) == NULL) | 777 | if ((buf=(unsigned char *)malloc(i)) == NULL) |
778 | { | 778 | { |
779 | OBJerr(OBJ_F_OBJ_CREATE,ERR_R_MALLOC_FAILURE); | 779 | OBJerr(OBJ_F_OBJ_CREATE,ERR_R_MALLOC_FAILURE); |
780 | return(0); | 780 | return(0); |
@@ -788,7 +788,7 @@ int OBJ_create(const char *oid, const char *sn, const char *ln) | |||
788 | ok=OBJ_add_object(op); | 788 | ok=OBJ_add_object(op); |
789 | err: | 789 | err: |
790 | ASN1_OBJECT_free(op); | 790 | ASN1_OBJECT_free(op); |
791 | OPENSSL_free(buf); | 791 | free(buf); |
792 | return(ok); | 792 | return(ok); |
793 | } | 793 | } |
794 | 794 | ||
diff --git a/src/lib/libcrypto/objects/obj_lib.c b/src/lib/libcrypto/objects/obj_lib.c index 23e9d48cdf..338fe851fc 100644 --- a/src/lib/libcrypto/objects/obj_lib.c +++ b/src/lib/libcrypto/objects/obj_lib.c | |||
@@ -80,7 +80,7 @@ ASN1_OBJECT *OBJ_dup(const ASN1_OBJECT *o) | |||
80 | OBJerr(OBJ_F_OBJ_DUP,ERR_R_ASN1_LIB); | 80 | OBJerr(OBJ_F_OBJ_DUP,ERR_R_ASN1_LIB); |
81 | return(NULL); | 81 | return(NULL); |
82 | } | 82 | } |
83 | data=OPENSSL_malloc(o->length); | 83 | data=malloc(o->length); |
84 | if (data == NULL) | 84 | if (data == NULL) |
85 | goto err; | 85 | goto err; |
86 | if (o->data != NULL) | 86 | if (o->data != NULL) |
@@ -93,7 +93,7 @@ ASN1_OBJECT *OBJ_dup(const ASN1_OBJECT *o) | |||
93 | if (o->ln != NULL) | 93 | if (o->ln != NULL) |
94 | { | 94 | { |
95 | i=strlen(o->ln)+1; | 95 | i=strlen(o->ln)+1; |
96 | ln=OPENSSL_malloc(i); | 96 | ln=malloc(i); |
97 | if (ln == NULL) goto err; | 97 | if (ln == NULL) goto err; |
98 | memcpy(ln,o->ln,i); | 98 | memcpy(ln,o->ln,i); |
99 | r->ln=ln; | 99 | r->ln=ln; |
@@ -102,7 +102,7 @@ ASN1_OBJECT *OBJ_dup(const ASN1_OBJECT *o) | |||
102 | if (o->sn != NULL) | 102 | if (o->sn != NULL) |
103 | { | 103 | { |
104 | i=strlen(o->sn)+1; | 104 | i=strlen(o->sn)+1; |
105 | sn=OPENSSL_malloc(i); | 105 | sn=malloc(i); |
106 | if (sn == NULL) goto err; | 106 | if (sn == NULL) goto err; |
107 | memcpy(sn,o->sn,i); | 107 | memcpy(sn,o->sn,i); |
108 | r->sn=sn; | 108 | r->sn=sn; |
@@ -112,10 +112,10 @@ ASN1_OBJECT *OBJ_dup(const ASN1_OBJECT *o) | |||
112 | return(r); | 112 | return(r); |
113 | err: | 113 | err: |
114 | OBJerr(OBJ_F_OBJ_DUP,ERR_R_MALLOC_FAILURE); | 114 | OBJerr(OBJ_F_OBJ_DUP,ERR_R_MALLOC_FAILURE); |
115 | if (ln != NULL) OPENSSL_free(ln); | 115 | if (ln != NULL) free(ln); |
116 | if (sn != NULL) OPENSSL_free(sn); | 116 | if (sn != NULL) free(sn); |
117 | if (data != NULL) OPENSSL_free(data); | 117 | if (data != NULL) free(data); |
118 | if (r != NULL) OPENSSL_free(r); | 118 | if (r != NULL) free(r); |
119 | return(NULL); | 119 | return(NULL); |
120 | } | 120 | } |
121 | 121 | ||
diff --git a/src/lib/libcrypto/objects/obj_xref.c b/src/lib/libcrypto/objects/obj_xref.c index 9f744bcede..797adc8d10 100644 --- a/src/lib/libcrypto/objects/obj_xref.c +++ b/src/lib/libcrypto/objects/obj_xref.c | |||
@@ -162,7 +162,7 @@ int OBJ_add_sigid(int signid, int dig_id, int pkey_id) | |||
162 | sigx_app = sk_nid_triple_new(sigx_cmp); | 162 | sigx_app = sk_nid_triple_new(sigx_cmp); |
163 | if (!sigx_app) | 163 | if (!sigx_app) |
164 | return 0; | 164 | return 0; |
165 | ntr = OPENSSL_malloc(sizeof(int) * 3); | 165 | ntr = malloc(sizeof(int) * 3); |
166 | if (!ntr) | 166 | if (!ntr) |
167 | return 0; | 167 | return 0; |
168 | ntr->sign_id = signid; | 168 | ntr->sign_id = signid; |
@@ -171,7 +171,7 @@ int OBJ_add_sigid(int signid, int dig_id, int pkey_id) | |||
171 | 171 | ||
172 | if (!sk_nid_triple_push(sig_app, ntr)) | 172 | if (!sk_nid_triple_push(sig_app, ntr)) |
173 | { | 173 | { |
174 | OPENSSL_free(ntr); | 174 | free(ntr); |
175 | return 0; | 175 | return 0; |
176 | } | 176 | } |
177 | 177 | ||
@@ -186,7 +186,7 @@ int OBJ_add_sigid(int signid, int dig_id, int pkey_id) | |||
186 | 186 | ||
187 | static void sid_free(nid_triple *tt) | 187 | static void sid_free(nid_triple *tt) |
188 | { | 188 | { |
189 | OPENSSL_free(tt); | 189 | free(tt); |
190 | } | 190 | } |
191 | 191 | ||
192 | void OBJ_sigid_free(void) | 192 | void OBJ_sigid_free(void) |