diff options
| author | beck <> | 2014-04-17 13:37:50 +0000 |
|---|---|---|
| committer | beck <> | 2014-04-17 13:37:50 +0000 |
| commit | 6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd (patch) | |
| tree | 7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libcrypto/ts | |
| parent | 4d13fb9c7b5ac7311d7031173c21ab0121388413 (diff) | |
| download | openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.tar.gz openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.tar.bz2 openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.zip | |
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes:
OPENSSL_malloc->malloc
OPENSSL_free->free
OPENSSL_relloc->realloc
OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libcrypto/ts')
| -rw-r--r-- | src/lib/libcrypto/ts/ts_lib.c | 2 | ||||
| -rw-r--r-- | src/lib/libcrypto/ts/ts_rsp_sign.c | 10 | ||||
| -rw-r--r-- | src/lib/libcrypto/ts/ts_rsp_verify.c | 10 | ||||
| -rw-r--r-- | src/lib/libcrypto/ts/ts_verify_ctx.c | 8 |
4 files changed, 15 insertions, 15 deletions
diff --git a/src/lib/libcrypto/ts/ts_lib.c b/src/lib/libcrypto/ts/ts_lib.c index e8608dbf71..a8de801e28 100644 --- a/src/lib/libcrypto/ts/ts_lib.c +++ b/src/lib/libcrypto/ts/ts_lib.c | |||
| @@ -79,7 +79,7 @@ int TS_ASN1_INTEGER_print_bio(BIO *bio, const ASN1_INTEGER *num) | |||
| 79 | { | 79 | { |
| 80 | result = BIO_write(bio, "0x", 2) > 0; | 80 | result = BIO_write(bio, "0x", 2) > 0; |
| 81 | result = result && BIO_write(bio, hex, strlen(hex)) > 0; | 81 | result = result && BIO_write(bio, hex, strlen(hex)) > 0; |
| 82 | OPENSSL_free(hex); | 82 | free(hex); |
| 83 | } | 83 | } |
| 84 | BN_free(&num_bn); | 84 | BN_free(&num_bn); |
| 85 | 85 | ||
diff --git a/src/lib/libcrypto/ts/ts_rsp_sign.c b/src/lib/libcrypto/ts/ts_rsp_sign.c index e7186a8ce0..e52c9ff03b 100644 --- a/src/lib/libcrypto/ts/ts_rsp_sign.c +++ b/src/lib/libcrypto/ts/ts_rsp_sign.c | |||
| @@ -167,7 +167,7 @@ TS_RESP_CTX *TS_RESP_CTX_new() | |||
| 167 | { | 167 | { |
| 168 | TS_RESP_CTX *ctx; | 168 | TS_RESP_CTX *ctx; |
| 169 | 169 | ||
| 170 | if (!(ctx = (TS_RESP_CTX *) OPENSSL_malloc(sizeof(TS_RESP_CTX)))) | 170 | if (!(ctx = (TS_RESP_CTX *) malloc(sizeof(TS_RESP_CTX)))) |
| 171 | { | 171 | { |
| 172 | TSerr(TS_F_TS_RESP_CTX_NEW, ERR_R_MALLOC_FAILURE); | 172 | TSerr(TS_F_TS_RESP_CTX_NEW, ERR_R_MALLOC_FAILURE); |
| 173 | return NULL; | 173 | return NULL; |
| @@ -195,7 +195,7 @@ void TS_RESP_CTX_free(TS_RESP_CTX *ctx) | |||
| 195 | ASN1_INTEGER_free(ctx->seconds); | 195 | ASN1_INTEGER_free(ctx->seconds); |
| 196 | ASN1_INTEGER_free(ctx->millis); | 196 | ASN1_INTEGER_free(ctx->millis); |
| 197 | ASN1_INTEGER_free(ctx->micros); | 197 | ASN1_INTEGER_free(ctx->micros); |
| 198 | OPENSSL_free(ctx); | 198 | free(ctx); |
| 199 | } | 199 | } |
| 200 | 200 | ||
| 201 | int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) | 201 | int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) |
| @@ -922,7 +922,7 @@ static int ESS_add_signing_cert(PKCS7_SIGNER_INFO *si, ESS_SIGNING_CERT *sc) | |||
| 922 | int len; | 922 | int len; |
| 923 | 923 | ||
| 924 | len = i2d_ESS_SIGNING_CERT(sc, NULL); | 924 | len = i2d_ESS_SIGNING_CERT(sc, NULL); |
| 925 | if (!(pp = (unsigned char *) OPENSSL_malloc(len))) | 925 | if (!(pp = (unsigned char *) malloc(len))) |
| 926 | { | 926 | { |
| 927 | TSerr(TS_F_ESS_ADD_SIGNING_CERT, ERR_R_MALLOC_FAILURE); | 927 | TSerr(TS_F_ESS_ADD_SIGNING_CERT, ERR_R_MALLOC_FAILURE); |
| 928 | goto err; | 928 | goto err; |
| @@ -934,13 +934,13 @@ static int ESS_add_signing_cert(PKCS7_SIGNER_INFO *si, ESS_SIGNING_CERT *sc) | |||
| 934 | TSerr(TS_F_ESS_ADD_SIGNING_CERT, ERR_R_MALLOC_FAILURE); | 934 | TSerr(TS_F_ESS_ADD_SIGNING_CERT, ERR_R_MALLOC_FAILURE); |
| 935 | goto err; | 935 | goto err; |
| 936 | } | 936 | } |
| 937 | OPENSSL_free(pp); pp = NULL; | 937 | free(pp); pp = NULL; |
| 938 | return PKCS7_add_signed_attribute(si, | 938 | return PKCS7_add_signed_attribute(si, |
| 939 | NID_id_smime_aa_signingCertificate, | 939 | NID_id_smime_aa_signingCertificate, |
| 940 | V_ASN1_SEQUENCE, seq); | 940 | V_ASN1_SEQUENCE, seq); |
| 941 | err: | 941 | err: |
| 942 | ASN1_STRING_free(seq); | 942 | ASN1_STRING_free(seq); |
| 943 | OPENSSL_free(pp); | 943 | free(pp); |
| 944 | 944 | ||
| 945 | return 0; | 945 | return 0; |
| 946 | } | 946 | } |
diff --git a/src/lib/libcrypto/ts/ts_rsp_verify.c b/src/lib/libcrypto/ts/ts_rsp_verify.c index f241230ef4..d51500b5d4 100644 --- a/src/lib/libcrypto/ts/ts_rsp_verify.c +++ b/src/lib/libcrypto/ts/ts_rsp_verify.c | |||
| @@ -472,7 +472,7 @@ static int int_TS_RESP_verify_token(TS_VERIFY_CTX *ctx, | |||
| 472 | err: | 472 | err: |
| 473 | X509_free(signer); | 473 | X509_free(signer); |
| 474 | X509_ALGOR_free(md_alg); | 474 | X509_ALGOR_free(md_alg); |
| 475 | OPENSSL_free(imprint); | 475 | free(imprint); |
| 476 | return ret; | 476 | return ret; |
| 477 | } | 477 | } |
| 478 | 478 | ||
| @@ -528,7 +528,7 @@ static int TS_check_status_info(TS_RESP *response) | |||
| 528 | ", status text: ", embedded_status_text ? | 528 | ", status text: ", embedded_status_text ? |
| 529 | embedded_status_text : "unspecified", | 529 | embedded_status_text : "unspecified", |
| 530 | ", failure codes: ", failure_text); | 530 | ", failure codes: ", failure_text); |
| 531 | OPENSSL_free(embedded_status_text); | 531 | free(embedded_status_text); |
| 532 | 532 | ||
| 533 | return 0; | 533 | return 0; |
| 534 | } | 534 | } |
| @@ -547,7 +547,7 @@ static char *TS_get_status_text(STACK_OF(ASN1_UTF8STRING) *text) | |||
| 547 | length += 1; /* separator character */ | 547 | length += 1; /* separator character */ |
| 548 | } | 548 | } |
| 549 | /* Allocate memory (closing '\0' included). */ | 549 | /* Allocate memory (closing '\0' included). */ |
| 550 | if (!(result = OPENSSL_malloc(length))) | 550 | if (!(result = malloc(length))) |
| 551 | { | 551 | { |
| 552 | TSerr(TS_F_TS_GET_STATUS_TEXT, ERR_R_MALLOC_FAILURE); | 552 | TSerr(TS_F_TS_GET_STATUS_TEXT, ERR_R_MALLOC_FAILURE); |
| 553 | return NULL; | 553 | return NULL; |
| @@ -606,7 +606,7 @@ static int TS_compute_imprint(BIO *data, TS_TST_INFO *tst_info, | |||
| 606 | if (length < 0) | 606 | if (length < 0) |
| 607 | goto err; | 607 | goto err; |
| 608 | *imprint_len = length; | 608 | *imprint_len = length; |
| 609 | if (!(*imprint = OPENSSL_malloc(*imprint_len))) | 609 | if (!(*imprint = malloc(*imprint_len))) |
| 610 | { | 610 | { |
| 611 | TSerr(TS_F_TS_COMPUTE_IMPRINT, ERR_R_MALLOC_FAILURE); | 611 | TSerr(TS_F_TS_COMPUTE_IMPRINT, ERR_R_MALLOC_FAILURE); |
| 612 | goto err; | 612 | goto err; |
| @@ -625,7 +625,7 @@ static int TS_compute_imprint(BIO *data, TS_TST_INFO *tst_info, | |||
| 625 | return 1; | 625 | return 1; |
| 626 | err: | 626 | err: |
| 627 | X509_ALGOR_free(*md_alg); | 627 | X509_ALGOR_free(*md_alg); |
| 628 | OPENSSL_free(*imprint); | 628 | free(*imprint); |
| 629 | *imprint_len = 0; | 629 | *imprint_len = 0; |
| 630 | return 0; | 630 | return 0; |
| 631 | } | 631 | } |
diff --git a/src/lib/libcrypto/ts/ts_verify_ctx.c b/src/lib/libcrypto/ts/ts_verify_ctx.c index 609b7735d4..629107aeec 100644 --- a/src/lib/libcrypto/ts/ts_verify_ctx.c +++ b/src/lib/libcrypto/ts/ts_verify_ctx.c | |||
| @@ -63,7 +63,7 @@ | |||
| 63 | TS_VERIFY_CTX *TS_VERIFY_CTX_new(void) | 63 | TS_VERIFY_CTX *TS_VERIFY_CTX_new(void) |
| 64 | { | 64 | { |
| 65 | TS_VERIFY_CTX *ctx = | 65 | TS_VERIFY_CTX *ctx = |
| 66 | (TS_VERIFY_CTX *) OPENSSL_malloc(sizeof(TS_VERIFY_CTX)); | 66 | (TS_VERIFY_CTX *) malloc(sizeof(TS_VERIFY_CTX)); |
| 67 | if (ctx) | 67 | if (ctx) |
| 68 | memset(ctx, 0, sizeof(TS_VERIFY_CTX)); | 68 | memset(ctx, 0, sizeof(TS_VERIFY_CTX)); |
| 69 | else | 69 | else |
| @@ -82,7 +82,7 @@ void TS_VERIFY_CTX_free(TS_VERIFY_CTX *ctx) | |||
| 82 | if (!ctx) return; | 82 | if (!ctx) return; |
| 83 | 83 | ||
| 84 | TS_VERIFY_CTX_cleanup(ctx); | 84 | TS_VERIFY_CTX_cleanup(ctx); |
| 85 | OPENSSL_free(ctx); | 85 | free(ctx); |
| 86 | } | 86 | } |
| 87 | 87 | ||
| 88 | void TS_VERIFY_CTX_cleanup(TS_VERIFY_CTX *ctx) | 88 | void TS_VERIFY_CTX_cleanup(TS_VERIFY_CTX *ctx) |
| @@ -95,7 +95,7 @@ void TS_VERIFY_CTX_cleanup(TS_VERIFY_CTX *ctx) | |||
| 95 | ASN1_OBJECT_free(ctx->policy); | 95 | ASN1_OBJECT_free(ctx->policy); |
| 96 | 96 | ||
| 97 | X509_ALGOR_free(ctx->md_alg); | 97 | X509_ALGOR_free(ctx->md_alg); |
| 98 | OPENSSL_free(ctx->imprint); | 98 | free(ctx->imprint); |
| 99 | 99 | ||
| 100 | BIO_free_all(ctx->data); | 100 | BIO_free_all(ctx->data); |
| 101 | 101 | ||
| @@ -138,7 +138,7 @@ TS_VERIFY_CTX *TS_REQ_to_TS_VERIFY_CTX(TS_REQ *req, TS_VERIFY_CTX *ctx) | |||
| 138 | if (!(ret->md_alg = X509_ALGOR_dup(md_alg))) goto err; | 138 | if (!(ret->md_alg = X509_ALGOR_dup(md_alg))) goto err; |
| 139 | msg = TS_MSG_IMPRINT_get_msg(imprint); | 139 | msg = TS_MSG_IMPRINT_get_msg(imprint); |
| 140 | ret->imprint_len = ASN1_STRING_length(msg); | 140 | ret->imprint_len = ASN1_STRING_length(msg); |
| 141 | if (!(ret->imprint = OPENSSL_malloc(ret->imprint_len))) goto err; | 141 | if (!(ret->imprint = malloc(ret->imprint_len))) goto err; |
| 142 | memcpy(ret->imprint, ASN1_STRING_data(msg), ret->imprint_len); | 142 | memcpy(ret->imprint, ASN1_STRING_data(msg), ret->imprint_len); |
| 143 | 143 | ||
| 144 | /* Setting nonce. */ | 144 | /* Setting nonce. */ |
