diff options
| author | beck <> | 2014-04-17 13:37:50 +0000 |
|---|---|---|
| committer | beck <> | 2014-04-17 13:37:50 +0000 |
| commit | 6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd (patch) | |
| tree | 7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libcrypto/rsa/rsa_pss.c | |
| parent | 4d13fb9c7b5ac7311d7031173c21ab0121388413 (diff) | |
| download | openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.tar.gz openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.tar.bz2 openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.zip | |
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes:
OPENSSL_malloc->malloc
OPENSSL_free->free
OPENSSL_relloc->realloc
OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libcrypto/rsa/rsa_pss.c')
| -rw-r--r-- | src/lib/libcrypto/rsa/rsa_pss.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/libcrypto/rsa/rsa_pss.c b/src/lib/libcrypto/rsa/rsa_pss.c index 5f9f533d0c..75e8c18533 100644 --- a/src/lib/libcrypto/rsa/rsa_pss.c +++ b/src/lib/libcrypto/rsa/rsa_pss.c | |||
| @@ -133,7 +133,7 @@ int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash, | |||
| 133 | } | 133 | } |
| 134 | maskedDBLen = emLen - hLen - 1; | 134 | maskedDBLen = emLen - hLen - 1; |
| 135 | H = EM + maskedDBLen; | 135 | H = EM + maskedDBLen; |
| 136 | DB = OPENSSL_malloc(maskedDBLen); | 136 | DB = malloc(maskedDBLen); |
| 137 | if (!DB) | 137 | if (!DB) |
| 138 | { | 138 | { |
| 139 | RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS_MGF1, ERR_R_MALLOC_FAILURE); | 139 | RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS_MGF1, ERR_R_MALLOC_FAILURE); |
| @@ -177,7 +177,7 @@ int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash, | |||
| 177 | 177 | ||
| 178 | err: | 178 | err: |
| 179 | if (DB) | 179 | if (DB) |
| 180 | OPENSSL_free(DB); | 180 | free(DB); |
| 181 | EVP_MD_CTX_cleanup(&ctx); | 181 | EVP_MD_CTX_cleanup(&ctx); |
| 182 | 182 | ||
| 183 | return ret; | 183 | return ret; |
| @@ -239,7 +239,7 @@ int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM, | |||
| 239 | } | 239 | } |
| 240 | if (sLen > 0) | 240 | if (sLen > 0) |
| 241 | { | 241 | { |
| 242 | salt = OPENSSL_malloc(sLen); | 242 | salt = malloc(sLen); |
| 243 | if (!salt) | 243 | if (!salt) |
| 244 | { | 244 | { |
| 245 | RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_PSS_MGF1,ERR_R_MALLOC_FAILURE); | 245 | RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_PSS_MGF1,ERR_R_MALLOC_FAILURE); |
| @@ -289,7 +289,7 @@ int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM, | |||
| 289 | 289 | ||
| 290 | err: | 290 | err: |
| 291 | if (salt) | 291 | if (salt) |
| 292 | OPENSSL_free(salt); | 292 | free(salt); |
| 293 | 293 | ||
| 294 | return ret; | 294 | return ret; |
| 295 | 295 | ||
