summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/rsa
diff options
context:
space:
mode:
authorbeck <>2014-04-17 13:37:50 +0000
committerbeck <>2014-04-17 13:37:50 +0000
commitbddb7c686e3d1aeb156722adc64b6c35ae720f87 (patch)
tree7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libcrypto/rsa
parentecec66222d758996a4ff2671ca5026d9ede5ef76 (diff)
downloadopenbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.gz
openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.bz2
openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.zip
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libcrypto/rsa')
-rw-r--r--src/lib/libcrypto/rsa/rsa_ameth.c6
-rw-r--r--src/lib/libcrypto/rsa/rsa_eay.c16
-rw-r--r--src/lib/libcrypto/rsa/rsa_lib.c12
-rw-r--r--src/lib/libcrypto/rsa/rsa_oaep.c10
-rw-r--r--src/lib/libcrypto/rsa/rsa_pmeth.c8
-rw-r--r--src/lib/libcrypto/rsa/rsa_pss.c8
-rw-r--r--src/lib/libcrypto/rsa/rsa_saos.c8
-rw-r--r--src/lib/libcrypto/rsa/rsa_sign.c8
8 files changed, 38 insertions, 38 deletions
diff --git a/src/lib/libcrypto/rsa/rsa_ameth.c b/src/lib/libcrypto/rsa/rsa_ameth.c
index 5a2062f903..fdd11835ad 100644
--- a/src/lib/libcrypto/rsa/rsa_ameth.c
+++ b/src/lib/libcrypto/rsa/rsa_ameth.c
@@ -78,7 +78,7 @@ static int rsa_pub_encode(X509_PUBKEY *pk, const EVP_PKEY *pkey)
78 V_ASN1_NULL, NULL, penc, penclen)) 78 V_ASN1_NULL, NULL, penc, penclen))
79 return 1; 79 return 1;
80 80
81 OPENSSL_free(penc); 81 free(penc);
82 return 0; 82 return 0;
83 } 83 }
84 84
@@ -201,7 +201,7 @@ static int do_rsa_print(BIO *bp, const RSA *x, int off, int priv)
201 update_buflen(x->iqmp, &buf_len); 201 update_buflen(x->iqmp, &buf_len);
202 } 202 }
203 203
204 m=(unsigned char *)OPENSSL_malloc(buf_len+10); 204 m=(unsigned char *)malloc(buf_len+10);
205 if (m == NULL) 205 if (m == NULL)
206 { 206 {
207 RSAerr(RSA_F_DO_RSA_PRINT,ERR_R_MALLOC_FAILURE); 207 RSAerr(RSA_F_DO_RSA_PRINT,ERR_R_MALLOC_FAILURE);
@@ -248,7 +248,7 @@ static int do_rsa_print(BIO *bp, const RSA *x, int off, int priv)
248 } 248 }
249 ret=1; 249 ret=1;
250err: 250err:
251 if (m != NULL) OPENSSL_free(m); 251 if (m != NULL) free(m);
252 return(ret); 252 return(ret);
253 } 253 }
254 254
diff --git a/src/lib/libcrypto/rsa/rsa_eay.c b/src/lib/libcrypto/rsa/rsa_eay.c
index 88ee2cb557..dcf0c16a8f 100644
--- a/src/lib/libcrypto/rsa/rsa_eay.c
+++ b/src/lib/libcrypto/rsa/rsa_eay.c
@@ -185,7 +185,7 @@ static int RSA_eay_public_encrypt(int flen, const unsigned char *from,
185 f = BN_CTX_get(ctx); 185 f = BN_CTX_get(ctx);
186 ret = BN_CTX_get(ctx); 186 ret = BN_CTX_get(ctx);
187 num=BN_num_bytes(rsa->n); 187 num=BN_num_bytes(rsa->n);
188 buf = OPENSSL_malloc(num); 188 buf = malloc(num);
189 if (!f || !ret || !buf) 189 if (!f || !ret || !buf)
190 { 190 {
191 RSAerr(RSA_F_RSA_EAY_PUBLIC_ENCRYPT,ERR_R_MALLOC_FAILURE); 191 RSAerr(RSA_F_RSA_EAY_PUBLIC_ENCRYPT,ERR_R_MALLOC_FAILURE);
@@ -247,7 +247,7 @@ err:
247 if (buf != NULL) 247 if (buf != NULL)
248 { 248 {
249 OPENSSL_cleanse(buf,num); 249 OPENSSL_cleanse(buf,num);
250 OPENSSL_free(buf); 250 free(buf);
251 } 251 }
252 return(r); 252 return(r);
253 } 253 }
@@ -366,7 +366,7 @@ static int RSA_eay_private_encrypt(int flen, const unsigned char *from,
366 f = BN_CTX_get(ctx); 366 f = BN_CTX_get(ctx);
367 ret = BN_CTX_get(ctx); 367 ret = BN_CTX_get(ctx);
368 num = BN_num_bytes(rsa->n); 368 num = BN_num_bytes(rsa->n);
369 buf = OPENSSL_malloc(num); 369 buf = malloc(num);
370 if(!f || !ret || !buf) 370 if(!f || !ret || !buf)
371 { 371 {
372 RSAerr(RSA_F_RSA_EAY_PRIVATE_ENCRYPT,ERR_R_MALLOC_FAILURE); 372 RSAerr(RSA_F_RSA_EAY_PRIVATE_ENCRYPT,ERR_R_MALLOC_FAILURE);
@@ -484,7 +484,7 @@ err:
484 if (buf != NULL) 484 if (buf != NULL)
485 { 485 {
486 OPENSSL_cleanse(buf,num); 486 OPENSSL_cleanse(buf,num);
487 OPENSSL_free(buf); 487 free(buf);
488 } 488 }
489 return(r); 489 return(r);
490 } 490 }
@@ -509,7 +509,7 @@ static int RSA_eay_private_decrypt(int flen, const unsigned char *from,
509 f = BN_CTX_get(ctx); 509 f = BN_CTX_get(ctx);
510 ret = BN_CTX_get(ctx); 510 ret = BN_CTX_get(ctx);
511 num = BN_num_bytes(rsa->n); 511 num = BN_num_bytes(rsa->n);
512 buf = OPENSSL_malloc(num); 512 buf = malloc(num);
513 if(!f || !ret || !buf) 513 if(!f || !ret || !buf)
514 { 514 {
515 RSAerr(RSA_F_RSA_EAY_PRIVATE_DECRYPT,ERR_R_MALLOC_FAILURE); 515 RSAerr(RSA_F_RSA_EAY_PRIVATE_DECRYPT,ERR_R_MALLOC_FAILURE);
@@ -624,7 +624,7 @@ err:
624 if (buf != NULL) 624 if (buf != NULL)
625 { 625 {
626 OPENSSL_cleanse(buf,num); 626 OPENSSL_cleanse(buf,num);
627 OPENSSL_free(buf); 627 free(buf);
628 } 628 }
629 return(r); 629 return(r);
630 } 630 }
@@ -666,7 +666,7 @@ static int RSA_eay_public_decrypt(int flen, const unsigned char *from,
666 f = BN_CTX_get(ctx); 666 f = BN_CTX_get(ctx);
667 ret = BN_CTX_get(ctx); 667 ret = BN_CTX_get(ctx);
668 num=BN_num_bytes(rsa->n); 668 num=BN_num_bytes(rsa->n);
669 buf = OPENSSL_malloc(num); 669 buf = malloc(num);
670 if(!f || !ret || !buf) 670 if(!f || !ret || !buf)
671 { 671 {
672 RSAerr(RSA_F_RSA_EAY_PUBLIC_DECRYPT,ERR_R_MALLOC_FAILURE); 672 RSAerr(RSA_F_RSA_EAY_PUBLIC_DECRYPT,ERR_R_MALLOC_FAILURE);
@@ -729,7 +729,7 @@ err:
729 if (buf != NULL) 729 if (buf != NULL)
730 { 730 {
731 OPENSSL_cleanse(buf,num); 731 OPENSSL_cleanse(buf,num);
732 OPENSSL_free(buf); 732 free(buf);
733 } 733 }
734 return(r); 734 return(r);
735 } 735 }
diff --git a/src/lib/libcrypto/rsa/rsa_lib.c b/src/lib/libcrypto/rsa/rsa_lib.c
index 9e3f7dafcd..e99a3627dc 100644
--- a/src/lib/libcrypto/rsa/rsa_lib.c
+++ b/src/lib/libcrypto/rsa/rsa_lib.c
@@ -125,7 +125,7 @@ RSA *RSA_new_method(ENGINE *engine)
125 { 125 {
126 RSA *ret; 126 RSA *ret;
127 127
128 ret=(RSA *)OPENSSL_malloc(sizeof(RSA)); 128 ret=(RSA *)malloc(sizeof(RSA));
129 if (ret == NULL) 129 if (ret == NULL)
130 { 130 {
131 RSAerr(RSA_F_RSA_NEW_METHOD,ERR_R_MALLOC_FAILURE); 131 RSAerr(RSA_F_RSA_NEW_METHOD,ERR_R_MALLOC_FAILURE);
@@ -139,7 +139,7 @@ RSA *RSA_new_method(ENGINE *engine)
139 if (!ENGINE_init(engine)) 139 if (!ENGINE_init(engine))
140 { 140 {
141 RSAerr(RSA_F_RSA_NEW_METHOD, ERR_R_ENGINE_LIB); 141 RSAerr(RSA_F_RSA_NEW_METHOD, ERR_R_ENGINE_LIB);
142 OPENSSL_free(ret); 142 free(ret);
143 return NULL; 143 return NULL;
144 } 144 }
145 ret->engine = engine; 145 ret->engine = engine;
@@ -154,7 +154,7 @@ RSA *RSA_new_method(ENGINE *engine)
154 RSAerr(RSA_F_RSA_NEW_METHOD, 154 RSAerr(RSA_F_RSA_NEW_METHOD,
155 ERR_R_ENGINE_LIB); 155 ERR_R_ENGINE_LIB);
156 ENGINE_finish(ret->engine); 156 ENGINE_finish(ret->engine);
157 OPENSSL_free(ret); 157 free(ret);
158 return NULL; 158 return NULL;
159 } 159 }
160 } 160 }
@@ -184,7 +184,7 @@ RSA *RSA_new_method(ENGINE *engine)
184 if (ret->engine) 184 if (ret->engine)
185 ENGINE_finish(ret->engine); 185 ENGINE_finish(ret->engine);
186#endif 186#endif
187 OPENSSL_free(ret); 187 free(ret);
188 return(NULL); 188 return(NULL);
189 } 189 }
190 190
@@ -195,7 +195,7 @@ RSA *RSA_new_method(ENGINE *engine)
195 ENGINE_finish(ret->engine); 195 ENGINE_finish(ret->engine);
196#endif 196#endif
197 CRYPTO_free_ex_data(CRYPTO_EX_INDEX_RSA, ret, &ret->ex_data); 197 CRYPTO_free_ex_data(CRYPTO_EX_INDEX_RSA, ret, &ret->ex_data);
198 OPENSSL_free(ret); 198 free(ret);
199 ret=NULL; 199 ret=NULL;
200 } 200 }
201 return(ret); 201 return(ret);
@@ -240,7 +240,7 @@ void RSA_free(RSA *r)
240 if (r->blinding != NULL) BN_BLINDING_free(r->blinding); 240 if (r->blinding != NULL) BN_BLINDING_free(r->blinding);
241 if (r->mt_blinding != NULL) BN_BLINDING_free(r->mt_blinding); 241 if (r->mt_blinding != NULL) BN_BLINDING_free(r->mt_blinding);
242 if (r->bignum_data != NULL) OPENSSL_free_locked(r->bignum_data); 242 if (r->bignum_data != NULL) OPENSSL_free_locked(r->bignum_data);
243 OPENSSL_free(r); 243 free(r);
244 } 244 }
245 245
246int RSA_up_ref(RSA *r) 246int RSA_up_ref(RSA *r)
diff --git a/src/lib/libcrypto/rsa/rsa_oaep.c b/src/lib/libcrypto/rsa/rsa_oaep.c
index af4d24a56e..a107e89b81 100644
--- a/src/lib/libcrypto/rsa/rsa_oaep.c
+++ b/src/lib/libcrypto/rsa/rsa_oaep.c
@@ -70,7 +70,7 @@ int RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen,
70 20); 70 20);
71#endif 71#endif
72 72
73 dbmask = OPENSSL_malloc(emlen - SHA_DIGEST_LENGTH); 73 dbmask = malloc(emlen - SHA_DIGEST_LENGTH);
74 if (dbmask == NULL) 74 if (dbmask == NULL)
75 { 75 {
76 RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_OAEP, ERR_R_MALLOC_FAILURE); 76 RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_OAEP, ERR_R_MALLOC_FAILURE);
@@ -87,7 +87,7 @@ int RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen,
87 for (i = 0; i < SHA_DIGEST_LENGTH; i++) 87 for (i = 0; i < SHA_DIGEST_LENGTH; i++)
88 seed[i] ^= seedmask[i]; 88 seed[i] ^= seedmask[i];
89 89
90 OPENSSL_free(dbmask); 90 free(dbmask);
91 return 1; 91 return 1;
92 } 92 }
93 93
@@ -121,7 +121,7 @@ int RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen,
121 } 121 }
122 122
123 dblen = num - SHA_DIGEST_LENGTH; 123 dblen = num - SHA_DIGEST_LENGTH;
124 db = OPENSSL_malloc(dblen + num); 124 db = malloc(dblen + num);
125 if (db == NULL) 125 if (db == NULL)
126 { 126 {
127 RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP, ERR_R_MALLOC_FAILURE); 127 RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP, ERR_R_MALLOC_FAILURE);
@@ -172,14 +172,14 @@ int RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen,
172 memcpy(to, db + i, mlen); 172 memcpy(to, db + i, mlen);
173 } 173 }
174 } 174 }
175 OPENSSL_free(db); 175 free(db);
176 return mlen; 176 return mlen;
177 177
178decoding_err: 178decoding_err:
179 /* to avoid chosen ciphertext attacks, the error message should not reveal 179 /* to avoid chosen ciphertext attacks, the error message should not reveal
180 * which kind of decoding error happened */ 180 * which kind of decoding error happened */
181 RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP, RSA_R_OAEP_DECODING_ERROR); 181 RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP, RSA_R_OAEP_DECODING_ERROR);
182 if (db != NULL) OPENSSL_free(db); 182 if (db != NULL) free(db);
183 return -1; 183 return -1;
184 } 184 }
185 185
diff --git a/src/lib/libcrypto/rsa/rsa_pmeth.c b/src/lib/libcrypto/rsa/rsa_pmeth.c
index d706d35ff6..adec632b3b 100644
--- a/src/lib/libcrypto/rsa/rsa_pmeth.c
+++ b/src/lib/libcrypto/rsa/rsa_pmeth.c
@@ -93,7 +93,7 @@ typedef struct
93static int pkey_rsa_init(EVP_PKEY_CTX *ctx) 93static int pkey_rsa_init(EVP_PKEY_CTX *ctx)
94 { 94 {
95 RSA_PKEY_CTX *rctx; 95 RSA_PKEY_CTX *rctx;
96 rctx = OPENSSL_malloc(sizeof(RSA_PKEY_CTX)); 96 rctx = malloc(sizeof(RSA_PKEY_CTX));
97 if (!rctx) 97 if (!rctx)
98 return 0; 98 return 0;
99 rctx->nbits = 1024; 99 rctx->nbits = 1024;
@@ -135,7 +135,7 @@ static int setup_tbuf(RSA_PKEY_CTX *ctx, EVP_PKEY_CTX *pk)
135 { 135 {
136 if (ctx->tbuf) 136 if (ctx->tbuf)
137 return 1; 137 return 1;
138 ctx->tbuf = OPENSSL_malloc(EVP_PKEY_size(pk->pkey)); 138 ctx->tbuf = malloc(EVP_PKEY_size(pk->pkey));
139 if (!ctx->tbuf) 139 if (!ctx->tbuf)
140 return 0; 140 return 0;
141 return 1; 141 return 1;
@@ -149,8 +149,8 @@ static void pkey_rsa_cleanup(EVP_PKEY_CTX *ctx)
149 if (rctx->pub_exp) 149 if (rctx->pub_exp)
150 BN_free(rctx->pub_exp); 150 BN_free(rctx->pub_exp);
151 if (rctx->tbuf) 151 if (rctx->tbuf)
152 OPENSSL_free(rctx->tbuf); 152 free(rctx->tbuf);
153 OPENSSL_free(rctx); 153 free(rctx);
154 } 154 }
155 } 155 }
156static int pkey_rsa_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 156static int pkey_rsa_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen,
diff --git a/src/lib/libcrypto/rsa/rsa_pss.c b/src/lib/libcrypto/rsa/rsa_pss.c
index 5f9f533d0c..75e8c18533 100644
--- a/src/lib/libcrypto/rsa/rsa_pss.c
+++ b/src/lib/libcrypto/rsa/rsa_pss.c
@@ -133,7 +133,7 @@ int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash,
133 } 133 }
134 maskedDBLen = emLen - hLen - 1; 134 maskedDBLen = emLen - hLen - 1;
135 H = EM + maskedDBLen; 135 H = EM + maskedDBLen;
136 DB = OPENSSL_malloc(maskedDBLen); 136 DB = malloc(maskedDBLen);
137 if (!DB) 137 if (!DB)
138 { 138 {
139 RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS_MGF1, ERR_R_MALLOC_FAILURE); 139 RSAerr(RSA_F_RSA_VERIFY_PKCS1_PSS_MGF1, ERR_R_MALLOC_FAILURE);
@@ -177,7 +177,7 @@ int RSA_verify_PKCS1_PSS_mgf1(RSA *rsa, const unsigned char *mHash,
177 177
178 err: 178 err:
179 if (DB) 179 if (DB)
180 OPENSSL_free(DB); 180 free(DB);
181 EVP_MD_CTX_cleanup(&ctx); 181 EVP_MD_CTX_cleanup(&ctx);
182 182
183 return ret; 183 return ret;
@@ -239,7 +239,7 @@ int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM,
239 } 239 }
240 if (sLen > 0) 240 if (sLen > 0)
241 { 241 {
242 salt = OPENSSL_malloc(sLen); 242 salt = malloc(sLen);
243 if (!salt) 243 if (!salt)
244 { 244 {
245 RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_PSS_MGF1,ERR_R_MALLOC_FAILURE); 245 RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_PSS_MGF1,ERR_R_MALLOC_FAILURE);
@@ -289,7 +289,7 @@ int RSA_padding_add_PKCS1_PSS_mgf1(RSA *rsa, unsigned char *EM,
289 289
290 err: 290 err:
291 if (salt) 291 if (salt)
292 OPENSSL_free(salt); 292 free(salt);
293 293
294 return ret; 294 return ret;
295 295
diff --git a/src/lib/libcrypto/rsa/rsa_saos.c b/src/lib/libcrypto/rsa/rsa_saos.c
index f98e0a80a6..ee5473a184 100644
--- a/src/lib/libcrypto/rsa/rsa_saos.c
+++ b/src/lib/libcrypto/rsa/rsa_saos.c
@@ -82,7 +82,7 @@ int RSA_sign_ASN1_OCTET_STRING(int type,
82 RSAerr(RSA_F_RSA_SIGN_ASN1_OCTET_STRING,RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY); 82 RSAerr(RSA_F_RSA_SIGN_ASN1_OCTET_STRING,RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY);
83 return(0); 83 return(0);
84 } 84 }
85 s=(unsigned char *)OPENSSL_malloc((unsigned int)j+1); 85 s=(unsigned char *)malloc((unsigned int)j+1);
86 if (s == NULL) 86 if (s == NULL)
87 { 87 {
88 RSAerr(RSA_F_RSA_SIGN_ASN1_OCTET_STRING,ERR_R_MALLOC_FAILURE); 88 RSAerr(RSA_F_RSA_SIGN_ASN1_OCTET_STRING,ERR_R_MALLOC_FAILURE);
@@ -97,7 +97,7 @@ int RSA_sign_ASN1_OCTET_STRING(int type,
97 *siglen=i; 97 *siglen=i;
98 98
99 OPENSSL_cleanse(s,(unsigned int)j+1); 99 OPENSSL_cleanse(s,(unsigned int)j+1);
100 OPENSSL_free(s); 100 free(s);
101 return(ret); 101 return(ret);
102 } 102 }
103 103
@@ -117,7 +117,7 @@ int RSA_verify_ASN1_OCTET_STRING(int dtype,
117 return(0); 117 return(0);
118 } 118 }
119 119
120 s=(unsigned char *)OPENSSL_malloc((unsigned int)siglen); 120 s=(unsigned char *)malloc((unsigned int)siglen);
121 if (s == NULL) 121 if (s == NULL)
122 { 122 {
123 RSAerr(RSA_F_RSA_VERIFY_ASN1_OCTET_STRING,ERR_R_MALLOC_FAILURE); 123 RSAerr(RSA_F_RSA_VERIFY_ASN1_OCTET_STRING,ERR_R_MALLOC_FAILURE);
@@ -143,7 +143,7 @@ err:
143 if (s != NULL) 143 if (s != NULL)
144 { 144 {
145 OPENSSL_cleanse(s,(unsigned int)siglen); 145 OPENSSL_cleanse(s,(unsigned int)siglen);
146 OPENSSL_free(s); 146 free(s);
147 } 147 }
148 return(ret); 148 return(ret);
149 } 149 }
diff --git a/src/lib/libcrypto/rsa/rsa_sign.c b/src/lib/libcrypto/rsa/rsa_sign.c
index fa3239ab30..71d6bb3ce4 100644
--- a/src/lib/libcrypto/rsa/rsa_sign.c
+++ b/src/lib/libcrypto/rsa/rsa_sign.c
@@ -120,7 +120,7 @@ int RSA_sign(int type, const unsigned char *m, unsigned int m_len,
120 return(0); 120 return(0);
121 } 121 }
122 if(type != NID_md5_sha1) { 122 if(type != NID_md5_sha1) {
123 tmps=(unsigned char *)OPENSSL_malloc((unsigned int)j+1); 123 tmps=(unsigned char *)malloc((unsigned int)j+1);
124 if (tmps == NULL) 124 if (tmps == NULL)
125 { 125 {
126 RSAerr(RSA_F_RSA_SIGN,ERR_R_MALLOC_FAILURE); 126 RSAerr(RSA_F_RSA_SIGN,ERR_R_MALLOC_FAILURE);
@@ -138,7 +138,7 @@ int RSA_sign(int type, const unsigned char *m, unsigned int m_len,
138 138
139 if(type != NID_md5_sha1) { 139 if(type != NID_md5_sha1) {
140 OPENSSL_cleanse(tmps,(unsigned int)j+1); 140 OPENSSL_cleanse(tmps,(unsigned int)j+1);
141 OPENSSL_free(tmps); 141 free(tmps);
142 } 142 }
143 return(ret); 143 return(ret);
144 } 144 }
@@ -169,7 +169,7 @@ int int_rsa_verify(int dtype, const unsigned char *m,
169 return 1; 169 return 1;
170 } 170 }
171 171
172 s=(unsigned char *)OPENSSL_malloc((unsigned int)siglen); 172 s=(unsigned char *)malloc((unsigned int)siglen);
173 if (s == NULL) 173 if (s == NULL)
174 { 174 {
175 RSAerr(RSA_F_INT_RSA_VERIFY,ERR_R_MALLOC_FAILURE); 175 RSAerr(RSA_F_INT_RSA_VERIFY,ERR_R_MALLOC_FAILURE);
@@ -281,7 +281,7 @@ err:
281 if (s != NULL) 281 if (s != NULL)
282 { 282 {
283 OPENSSL_cleanse(s,(unsigned int)siglen); 283 OPENSSL_cleanse(s,(unsigned int)siglen);
284 OPENSSL_free(s); 284 free(s);
285 } 285 }
286 return(ret); 286 return(ret);
287 } 287 }