diff options
author | beck <> | 2014-04-17 13:37:50 +0000 |
---|---|---|
committer | beck <> | 2014-04-17 13:37:50 +0000 |
commit | bddb7c686e3d1aeb156722adc64b6c35ae720f87 (patch) | |
tree | 7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libcrypto/ts | |
parent | ecec66222d758996a4ff2671ca5026d9ede5ef76 (diff) | |
download | openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.gz openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.bz2 openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.zip |
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes:
OPENSSL_malloc->malloc
OPENSSL_free->free
OPENSSL_relloc->realloc
OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libcrypto/ts')
-rw-r--r-- | src/lib/libcrypto/ts/ts_lib.c | 2 | ||||
-rw-r--r-- | src/lib/libcrypto/ts/ts_rsp_sign.c | 10 | ||||
-rw-r--r-- | src/lib/libcrypto/ts/ts_rsp_verify.c | 10 | ||||
-rw-r--r-- | src/lib/libcrypto/ts/ts_verify_ctx.c | 8 |
4 files changed, 15 insertions, 15 deletions
diff --git a/src/lib/libcrypto/ts/ts_lib.c b/src/lib/libcrypto/ts/ts_lib.c index e8608dbf71..a8de801e28 100644 --- a/src/lib/libcrypto/ts/ts_lib.c +++ b/src/lib/libcrypto/ts/ts_lib.c | |||
@@ -79,7 +79,7 @@ int TS_ASN1_INTEGER_print_bio(BIO *bio, const ASN1_INTEGER *num) | |||
79 | { | 79 | { |
80 | result = BIO_write(bio, "0x", 2) > 0; | 80 | result = BIO_write(bio, "0x", 2) > 0; |
81 | result = result && BIO_write(bio, hex, strlen(hex)) > 0; | 81 | result = result && BIO_write(bio, hex, strlen(hex)) > 0; |
82 | OPENSSL_free(hex); | 82 | free(hex); |
83 | } | 83 | } |
84 | BN_free(&num_bn); | 84 | BN_free(&num_bn); |
85 | 85 | ||
diff --git a/src/lib/libcrypto/ts/ts_rsp_sign.c b/src/lib/libcrypto/ts/ts_rsp_sign.c index e7186a8ce0..e52c9ff03b 100644 --- a/src/lib/libcrypto/ts/ts_rsp_sign.c +++ b/src/lib/libcrypto/ts/ts_rsp_sign.c | |||
@@ -167,7 +167,7 @@ TS_RESP_CTX *TS_RESP_CTX_new() | |||
167 | { | 167 | { |
168 | TS_RESP_CTX *ctx; | 168 | TS_RESP_CTX *ctx; |
169 | 169 | ||
170 | if (!(ctx = (TS_RESP_CTX *) OPENSSL_malloc(sizeof(TS_RESP_CTX)))) | 170 | if (!(ctx = (TS_RESP_CTX *) malloc(sizeof(TS_RESP_CTX)))) |
171 | { | 171 | { |
172 | TSerr(TS_F_TS_RESP_CTX_NEW, ERR_R_MALLOC_FAILURE); | 172 | TSerr(TS_F_TS_RESP_CTX_NEW, ERR_R_MALLOC_FAILURE); |
173 | return NULL; | 173 | return NULL; |
@@ -195,7 +195,7 @@ void TS_RESP_CTX_free(TS_RESP_CTX *ctx) | |||
195 | ASN1_INTEGER_free(ctx->seconds); | 195 | ASN1_INTEGER_free(ctx->seconds); |
196 | ASN1_INTEGER_free(ctx->millis); | 196 | ASN1_INTEGER_free(ctx->millis); |
197 | ASN1_INTEGER_free(ctx->micros); | 197 | ASN1_INTEGER_free(ctx->micros); |
198 | OPENSSL_free(ctx); | 198 | free(ctx); |
199 | } | 199 | } |
200 | 200 | ||
201 | int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) | 201 | int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) |
@@ -922,7 +922,7 @@ static int ESS_add_signing_cert(PKCS7_SIGNER_INFO *si, ESS_SIGNING_CERT *sc) | |||
922 | int len; | 922 | int len; |
923 | 923 | ||
924 | len = i2d_ESS_SIGNING_CERT(sc, NULL); | 924 | len = i2d_ESS_SIGNING_CERT(sc, NULL); |
925 | if (!(pp = (unsigned char *) OPENSSL_malloc(len))) | 925 | if (!(pp = (unsigned char *) malloc(len))) |
926 | { | 926 | { |
927 | TSerr(TS_F_ESS_ADD_SIGNING_CERT, ERR_R_MALLOC_FAILURE); | 927 | TSerr(TS_F_ESS_ADD_SIGNING_CERT, ERR_R_MALLOC_FAILURE); |
928 | goto err; | 928 | goto err; |
@@ -934,13 +934,13 @@ static int ESS_add_signing_cert(PKCS7_SIGNER_INFO *si, ESS_SIGNING_CERT *sc) | |||
934 | TSerr(TS_F_ESS_ADD_SIGNING_CERT, ERR_R_MALLOC_FAILURE); | 934 | TSerr(TS_F_ESS_ADD_SIGNING_CERT, ERR_R_MALLOC_FAILURE); |
935 | goto err; | 935 | goto err; |
936 | } | 936 | } |
937 | OPENSSL_free(pp); pp = NULL; | 937 | free(pp); pp = NULL; |
938 | return PKCS7_add_signed_attribute(si, | 938 | return PKCS7_add_signed_attribute(si, |
939 | NID_id_smime_aa_signingCertificate, | 939 | NID_id_smime_aa_signingCertificate, |
940 | V_ASN1_SEQUENCE, seq); | 940 | V_ASN1_SEQUENCE, seq); |
941 | err: | 941 | err: |
942 | ASN1_STRING_free(seq); | 942 | ASN1_STRING_free(seq); |
943 | OPENSSL_free(pp); | 943 | free(pp); |
944 | 944 | ||
945 | return 0; | 945 | return 0; |
946 | } | 946 | } |
diff --git a/src/lib/libcrypto/ts/ts_rsp_verify.c b/src/lib/libcrypto/ts/ts_rsp_verify.c index f241230ef4..d51500b5d4 100644 --- a/src/lib/libcrypto/ts/ts_rsp_verify.c +++ b/src/lib/libcrypto/ts/ts_rsp_verify.c | |||
@@ -472,7 +472,7 @@ static int int_TS_RESP_verify_token(TS_VERIFY_CTX *ctx, | |||
472 | err: | 472 | err: |
473 | X509_free(signer); | 473 | X509_free(signer); |
474 | X509_ALGOR_free(md_alg); | 474 | X509_ALGOR_free(md_alg); |
475 | OPENSSL_free(imprint); | 475 | free(imprint); |
476 | return ret; | 476 | return ret; |
477 | } | 477 | } |
478 | 478 | ||
@@ -528,7 +528,7 @@ static int TS_check_status_info(TS_RESP *response) | |||
528 | ", status text: ", embedded_status_text ? | 528 | ", status text: ", embedded_status_text ? |
529 | embedded_status_text : "unspecified", | 529 | embedded_status_text : "unspecified", |
530 | ", failure codes: ", failure_text); | 530 | ", failure codes: ", failure_text); |
531 | OPENSSL_free(embedded_status_text); | 531 | free(embedded_status_text); |
532 | 532 | ||
533 | return 0; | 533 | return 0; |
534 | } | 534 | } |
@@ -547,7 +547,7 @@ static char *TS_get_status_text(STACK_OF(ASN1_UTF8STRING) *text) | |||
547 | length += 1; /* separator character */ | 547 | length += 1; /* separator character */ |
548 | } | 548 | } |
549 | /* Allocate memory (closing '\0' included). */ | 549 | /* Allocate memory (closing '\0' included). */ |
550 | if (!(result = OPENSSL_malloc(length))) | 550 | if (!(result = malloc(length))) |
551 | { | 551 | { |
552 | TSerr(TS_F_TS_GET_STATUS_TEXT, ERR_R_MALLOC_FAILURE); | 552 | TSerr(TS_F_TS_GET_STATUS_TEXT, ERR_R_MALLOC_FAILURE); |
553 | return NULL; | 553 | return NULL; |
@@ -606,7 +606,7 @@ static int TS_compute_imprint(BIO *data, TS_TST_INFO *tst_info, | |||
606 | if (length < 0) | 606 | if (length < 0) |
607 | goto err; | 607 | goto err; |
608 | *imprint_len = length; | 608 | *imprint_len = length; |
609 | if (!(*imprint = OPENSSL_malloc(*imprint_len))) | 609 | if (!(*imprint = malloc(*imprint_len))) |
610 | { | 610 | { |
611 | TSerr(TS_F_TS_COMPUTE_IMPRINT, ERR_R_MALLOC_FAILURE); | 611 | TSerr(TS_F_TS_COMPUTE_IMPRINT, ERR_R_MALLOC_FAILURE); |
612 | goto err; | 612 | goto err; |
@@ -625,7 +625,7 @@ static int TS_compute_imprint(BIO *data, TS_TST_INFO *tst_info, | |||
625 | return 1; | 625 | return 1; |
626 | err: | 626 | err: |
627 | X509_ALGOR_free(*md_alg); | 627 | X509_ALGOR_free(*md_alg); |
628 | OPENSSL_free(*imprint); | 628 | free(*imprint); |
629 | *imprint_len = 0; | 629 | *imprint_len = 0; |
630 | return 0; | 630 | return 0; |
631 | } | 631 | } |
diff --git a/src/lib/libcrypto/ts/ts_verify_ctx.c b/src/lib/libcrypto/ts/ts_verify_ctx.c index 609b7735d4..629107aeec 100644 --- a/src/lib/libcrypto/ts/ts_verify_ctx.c +++ b/src/lib/libcrypto/ts/ts_verify_ctx.c | |||
@@ -63,7 +63,7 @@ | |||
63 | TS_VERIFY_CTX *TS_VERIFY_CTX_new(void) | 63 | TS_VERIFY_CTX *TS_VERIFY_CTX_new(void) |
64 | { | 64 | { |
65 | TS_VERIFY_CTX *ctx = | 65 | TS_VERIFY_CTX *ctx = |
66 | (TS_VERIFY_CTX *) OPENSSL_malloc(sizeof(TS_VERIFY_CTX)); | 66 | (TS_VERIFY_CTX *) malloc(sizeof(TS_VERIFY_CTX)); |
67 | if (ctx) | 67 | if (ctx) |
68 | memset(ctx, 0, sizeof(TS_VERIFY_CTX)); | 68 | memset(ctx, 0, sizeof(TS_VERIFY_CTX)); |
69 | else | 69 | else |
@@ -82,7 +82,7 @@ void TS_VERIFY_CTX_free(TS_VERIFY_CTX *ctx) | |||
82 | if (!ctx) return; | 82 | if (!ctx) return; |
83 | 83 | ||
84 | TS_VERIFY_CTX_cleanup(ctx); | 84 | TS_VERIFY_CTX_cleanup(ctx); |
85 | OPENSSL_free(ctx); | 85 | free(ctx); |
86 | } | 86 | } |
87 | 87 | ||
88 | void TS_VERIFY_CTX_cleanup(TS_VERIFY_CTX *ctx) | 88 | void TS_VERIFY_CTX_cleanup(TS_VERIFY_CTX *ctx) |
@@ -95,7 +95,7 @@ void TS_VERIFY_CTX_cleanup(TS_VERIFY_CTX *ctx) | |||
95 | ASN1_OBJECT_free(ctx->policy); | 95 | ASN1_OBJECT_free(ctx->policy); |
96 | 96 | ||
97 | X509_ALGOR_free(ctx->md_alg); | 97 | X509_ALGOR_free(ctx->md_alg); |
98 | OPENSSL_free(ctx->imprint); | 98 | free(ctx->imprint); |
99 | 99 | ||
100 | BIO_free_all(ctx->data); | 100 | BIO_free_all(ctx->data); |
101 | 101 | ||
@@ -138,7 +138,7 @@ TS_VERIFY_CTX *TS_REQ_to_TS_VERIFY_CTX(TS_REQ *req, TS_VERIFY_CTX *ctx) | |||
138 | if (!(ret->md_alg = X509_ALGOR_dup(md_alg))) goto err; | 138 | if (!(ret->md_alg = X509_ALGOR_dup(md_alg))) goto err; |
139 | msg = TS_MSG_IMPRINT_get_msg(imprint); | 139 | msg = TS_MSG_IMPRINT_get_msg(imprint); |
140 | ret->imprint_len = ASN1_STRING_length(msg); | 140 | ret->imprint_len = ASN1_STRING_length(msg); |
141 | if (!(ret->imprint = OPENSSL_malloc(ret->imprint_len))) goto err; | 141 | if (!(ret->imprint = malloc(ret->imprint_len))) goto err; |
142 | memcpy(ret->imprint, ASN1_STRING_data(msg), ret->imprint_len); | 142 | memcpy(ret->imprint, ASN1_STRING_data(msg), ret->imprint_len); |
143 | 143 | ||
144 | /* Setting nonce. */ | 144 | /* Setting nonce. */ |