diff options
| author | beck <> | 2014-04-17 13:37:50 +0000 |
|---|---|---|
| committer | beck <> | 2014-04-17 13:37:50 +0000 |
| commit | 6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd (patch) | |
| tree | 7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libcrypto/pkcs7 | |
| parent | 4d13fb9c7b5ac7311d7031173c21ab0121388413 (diff) | |
| download | openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.tar.gz openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.tar.bz2 openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.zip | |
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes:
OPENSSL_malloc->malloc
OPENSSL_free->free
OPENSSL_relloc->realloc
OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libcrypto/pkcs7')
| -rw-r--r-- | src/lib/libcrypto/pkcs7/bio_ber.c | 4 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs7/pk7_doit.c | 32 |
2 files changed, 18 insertions, 18 deletions
diff --git a/src/lib/libcrypto/pkcs7/bio_ber.c b/src/lib/libcrypto/pkcs7/bio_ber.c index 31973fcd1f..04dc5c9b96 100644 --- a/src/lib/libcrypto/pkcs7/bio_ber.c +++ b/src/lib/libcrypto/pkcs7/bio_ber.c | |||
| @@ -128,7 +128,7 @@ static int ber_new(BIO *bi) | |||
| 128 | { | 128 | { |
| 129 | BIO_BER_CTX *ctx; | 129 | BIO_BER_CTX *ctx; |
| 130 | 130 | ||
| 131 | ctx=(BIO_BER_CTX *)OPENSSL_malloc(sizeof(BIO_BER_CTX)); | 131 | ctx=(BIO_BER_CTX *)malloc(sizeof(BIO_BER_CTX)); |
| 132 | if (ctx == NULL) return(0); | 132 | if (ctx == NULL) return(0); |
| 133 | 133 | ||
| 134 | memset((char *)ctx,0,sizeof(BIO_BER_CTX)); | 134 | memset((char *)ctx,0,sizeof(BIO_BER_CTX)); |
| @@ -146,7 +146,7 @@ static int ber_free(BIO *a) | |||
| 146 | if (a == NULL) return(0); | 146 | if (a == NULL) return(0); |
| 147 | b=(BIO_BER_CTX *)a->ptr; | 147 | b=(BIO_BER_CTX *)a->ptr; |
| 148 | OPENSSL_cleanse(a->ptr,sizeof(BIO_BER_CTX)); | 148 | OPENSSL_cleanse(a->ptr,sizeof(BIO_BER_CTX)); |
| 149 | OPENSSL_free(a->ptr); | 149 | free(a->ptr); |
| 150 | a->ptr=NULL; | 150 | a->ptr=NULL; |
| 151 | a->init=0; | 151 | a->init=0; |
| 152 | a->flags=0; | 152 | a->flags=0; |
diff --git a/src/lib/libcrypto/pkcs7/pk7_doit.c b/src/lib/libcrypto/pkcs7/pk7_doit.c index 77fda3b82a..396a863f3b 100644 --- a/src/lib/libcrypto/pkcs7/pk7_doit.c +++ b/src/lib/libcrypto/pkcs7/pk7_doit.c | |||
| @@ -169,7 +169,7 @@ static int pkcs7_encode_rinfo(PKCS7_RECIP_INFO *ri, | |||
| 169 | if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0) | 169 | if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0) |
| 170 | goto err; | 170 | goto err; |
| 171 | 171 | ||
| 172 | ek = OPENSSL_malloc(eklen); | 172 | ek = malloc(eklen); |
| 173 | 173 | ||
| 174 | if (ek == NULL) | 174 | if (ek == NULL) |
| 175 | { | 175 | { |
| @@ -191,7 +191,7 @@ static int pkcs7_encode_rinfo(PKCS7_RECIP_INFO *ri, | |||
| 191 | if (pctx) | 191 | if (pctx) |
| 192 | EVP_PKEY_CTX_free(pctx); | 192 | EVP_PKEY_CTX_free(pctx); |
| 193 | if (ek) | 193 | if (ek) |
| 194 | OPENSSL_free(ek); | 194 | free(ek); |
| 195 | return ret; | 195 | return ret; |
| 196 | 196 | ||
| 197 | } | 197 | } |
| @@ -224,7 +224,7 @@ static int pkcs7_decrypt_rinfo(unsigned char **pek, int *peklen, | |||
| 224 | ri->enc_key->data, ri->enc_key->length) <= 0) | 224 | ri->enc_key->data, ri->enc_key->length) <= 0) |
| 225 | goto err; | 225 | goto err; |
| 226 | 226 | ||
| 227 | ek = OPENSSL_malloc(eklen); | 227 | ek = malloc(eklen); |
| 228 | 228 | ||
| 229 | if (ek == NULL) | 229 | if (ek == NULL) |
| 230 | { | 230 | { |
| @@ -245,7 +245,7 @@ static int pkcs7_decrypt_rinfo(unsigned char **pek, int *peklen, | |||
| 245 | if (*pek) | 245 | if (*pek) |
| 246 | { | 246 | { |
| 247 | OPENSSL_cleanse(*pek, *peklen); | 247 | OPENSSL_cleanse(*pek, *peklen); |
| 248 | OPENSSL_free(*pek); | 248 | free(*pek); |
| 249 | } | 249 | } |
| 250 | 250 | ||
| 251 | *pek = ek; | 251 | *pek = ek; |
| @@ -255,7 +255,7 @@ static int pkcs7_decrypt_rinfo(unsigned char **pek, int *peklen, | |||
| 255 | if (pctx) | 255 | if (pctx) |
| 256 | EVP_PKEY_CTX_free(pctx); | 256 | EVP_PKEY_CTX_free(pctx); |
| 257 | if (!ret && ek) | 257 | if (!ret && ek) |
| 258 | OPENSSL_free(ek); | 258 | free(ek); |
| 259 | 259 | ||
| 260 | return ret; | 260 | return ret; |
| 261 | } | 261 | } |
| @@ -573,7 +573,7 @@ BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) | |||
| 573 | goto err; | 573 | goto err; |
| 574 | /* Generate random key as MMA defence */ | 574 | /* Generate random key as MMA defence */ |
| 575 | tkeylen = EVP_CIPHER_CTX_key_length(evp_ctx); | 575 | tkeylen = EVP_CIPHER_CTX_key_length(evp_ctx); |
| 576 | tkey = OPENSSL_malloc(tkeylen); | 576 | tkey = malloc(tkeylen); |
| 577 | if (!tkey) | 577 | if (!tkey) |
| 578 | goto err; | 578 | goto err; |
| 579 | if (EVP_CIPHER_CTX_rand_key(evp_ctx, tkey) <= 0) | 579 | if (EVP_CIPHER_CTX_rand_key(evp_ctx, tkey) <= 0) |
| @@ -594,7 +594,7 @@ BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) | |||
| 594 | { | 594 | { |
| 595 | /* Use random key as MMA defence */ | 595 | /* Use random key as MMA defence */ |
| 596 | OPENSSL_cleanse(ek, eklen); | 596 | OPENSSL_cleanse(ek, eklen); |
| 597 | OPENSSL_free(ek); | 597 | free(ek); |
| 598 | ek = tkey; | 598 | ek = tkey; |
| 599 | eklen = tkeylen; | 599 | eklen = tkeylen; |
| 600 | tkey = NULL; | 600 | tkey = NULL; |
| @@ -608,13 +608,13 @@ BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) | |||
| 608 | if (ek) | 608 | if (ek) |
| 609 | { | 609 | { |
| 610 | OPENSSL_cleanse(ek,eklen); | 610 | OPENSSL_cleanse(ek,eklen); |
| 611 | OPENSSL_free(ek); | 611 | free(ek); |
| 612 | ek = NULL; | 612 | ek = NULL; |
| 613 | } | 613 | } |
| 614 | if (tkey) | 614 | if (tkey) |
| 615 | { | 615 | { |
| 616 | OPENSSL_cleanse(tkey,tkeylen); | 616 | OPENSSL_cleanse(tkey,tkeylen); |
| 617 | OPENSSL_free(tkey); | 617 | free(tkey); |
| 618 | tkey = NULL; | 618 | tkey = NULL; |
| 619 | } | 619 | } |
| 620 | 620 | ||
| @@ -661,12 +661,12 @@ err: | |||
| 661 | if (ek) | 661 | if (ek) |
| 662 | { | 662 | { |
| 663 | OPENSSL_cleanse(ek,eklen); | 663 | OPENSSL_cleanse(ek,eklen); |
| 664 | OPENSSL_free(ek); | 664 | free(ek); |
| 665 | } | 665 | } |
| 666 | if (tkey) | 666 | if (tkey) |
| 667 | { | 667 | { |
| 668 | OPENSSL_cleanse(tkey,tkeylen); | 668 | OPENSSL_cleanse(tkey,tkeylen); |
| 669 | OPENSSL_free(tkey); | 669 | free(tkey); |
| 670 | } | 670 | } |
| 671 | if (out != NULL) BIO_free_all(out); | 671 | if (out != NULL) BIO_free_all(out); |
| 672 | if (btmp != NULL) BIO_free_all(btmp); | 672 | if (btmp != NULL) BIO_free_all(btmp); |
| @@ -846,7 +846,7 @@ int PKCS7_dataFinal(PKCS7 *p7, BIO *bio) | |||
| 846 | unsigned char *abuf = NULL; | 846 | unsigned char *abuf = NULL; |
| 847 | unsigned int abuflen; | 847 | unsigned int abuflen; |
| 848 | abuflen = EVP_PKEY_size(si->pkey); | 848 | abuflen = EVP_PKEY_size(si->pkey); |
| 849 | abuf = OPENSSL_malloc(abuflen); | 849 | abuf = malloc(abuflen); |
| 850 | if (!abuf) | 850 | if (!abuf) |
| 851 | goto err; | 851 | goto err; |
| 852 | 852 | ||
| @@ -927,10 +927,10 @@ int PKCS7_SIGNER_INFO_sign(PKCS7_SIGNER_INFO *si) | |||
| 927 | goto err; | 927 | goto err; |
| 928 | if (EVP_DigestSignUpdate(&mctx,abuf,alen) <= 0) | 928 | if (EVP_DigestSignUpdate(&mctx,abuf,alen) <= 0) |
| 929 | goto err; | 929 | goto err; |
| 930 | OPENSSL_free(abuf); | 930 | free(abuf); |
| 931 | if (EVP_DigestSignFinal(&mctx, NULL, &siglen) <= 0) | 931 | if (EVP_DigestSignFinal(&mctx, NULL, &siglen) <= 0) |
| 932 | goto err; | 932 | goto err; |
| 933 | abuf = OPENSSL_malloc(siglen); | 933 | abuf = malloc(siglen); |
| 934 | if(!abuf) | 934 | if(!abuf) |
| 935 | goto err; | 935 | goto err; |
| 936 | if (EVP_DigestSignFinal(&mctx, abuf, &siglen) <= 0) | 936 | if (EVP_DigestSignFinal(&mctx, abuf, &siglen) <= 0) |
| @@ -951,7 +951,7 @@ int PKCS7_SIGNER_INFO_sign(PKCS7_SIGNER_INFO *si) | |||
| 951 | 951 | ||
| 952 | err: | 952 | err: |
| 953 | if (abuf) | 953 | if (abuf) |
| 954 | OPENSSL_free(abuf); | 954 | free(abuf); |
| 955 | EVP_MD_CTX_cleanup(&mctx); | 955 | EVP_MD_CTX_cleanup(&mctx); |
| 956 | return 0; | 956 | return 0; |
| 957 | 957 | ||
| @@ -1113,7 +1113,7 @@ for (ii=0; ii<md_len; ii++) printf("%02X",md_dat[ii]); printf(" calc\n"); | |||
| 1113 | if (!EVP_VerifyUpdate(&mdc_tmp, abuf, alen)) | 1113 | if (!EVP_VerifyUpdate(&mdc_tmp, abuf, alen)) |
| 1114 | goto err; | 1114 | goto err; |
| 1115 | 1115 | ||
| 1116 | OPENSSL_free(abuf); | 1116 | free(abuf); |
| 1117 | } | 1117 | } |
| 1118 | 1118 | ||
| 1119 | os=si->enc_digest; | 1119 | os=si->enc_digest; |
