summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/rsa/rsa_pss.c
diff options
context:
space:
mode:
authorbeck <>2014-04-17 13:37:50 +0000
committerbeck <>2014-04-17 13:37:50 +0000
commit6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd (patch)
tree7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libcrypto/rsa/rsa_pss.c
parent4d13fb9c7b5ac7311d7031173c21ab0121388413 (diff)
downloadopenbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.tar.gz
openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.tar.bz2
openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.zip
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libcrypto/rsa/rsa_pss.c')
-rw-r--r--src/lib/libcrypto/rsa/rsa_pss.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/libcrypto/rsa/rsa_pss.c b/src/lib/libcrypto/rsa/rsa_pss.c
index 5f9f533d0c..75e8c18533 100644
--- a/src/lib/libcrypto/rsa/rsa_pss.c
+++ b/src/lib/libcrypto/rsa/rsa_pss.c
@@ -133,7 +133,7 @@ int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash,
133 } 133 }
134 maskedDBLen = emLen - hLen - 1; 134 maskedDBLen = emLen - hLen - 1;
135 H = EM + maskedDBLen; 135 H = EM + maskedDBLen;
136 DB = OPENSSL_malloc(maskedDBLen); 136 DB = malloc(maskedDBLen);
137 if (!DB) 137 if (!DB)
138 { 138 {
139 RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS_MGF1, ERR_R_MALLOC_FAILURE); 139 RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS_MGF1, ERR_R_MALLOC_FAILURE);
@@ -177,7 +177,7 @@ int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash,
177 177
178 err: 178 err:
179 if (DB) 179 if (DB)
180 OPENSSL_free(DB); 180 free(DB);
181 EVP_MD_CTX_cleanup(&ctx); 181 EVP_MD_CTX_cleanup(&ctx);
182 182
183 return ret; 183 return ret;
@@ -239,7 +239,7 @@ int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM,
239 } 239 }
240 if (sLen > 0) 240 if (sLen > 0)
241 { 241 {
242 salt = OPENSSL_malloc(sLen); 242 salt = malloc(sLen);
243 if (!salt) 243 if (!salt)
244 { 244 {
245 RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_PSS_MGF1,ERR_R_MALLOC_FAILURE); 245 RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_PSS_MGF1,ERR_R_MALLOC_FAILURE);
@@ -289,7 +289,7 @@ int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM,
289 289
290 err: 290 err:
291 if (salt) 291 if (salt)
292 OPENSSL_free(salt); 292 free(salt);
293 293
294 return ret; 294 return ret;
295 295