summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/ts
diff options
context:
space:
mode:
authorbeck <>2014-04-17 13:37:50 +0000
committerbeck <>2014-04-17 13:37:50 +0000
commitbddb7c686e3d1aeb156722adc64b6c35ae720f87 (patch)
tree7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libcrypto/ts
parentecec66222d758996a4ff2671ca5026d9ede5ef76 (diff)
downloadopenbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.gz
openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.bz2
openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.zip
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libcrypto/ts')
-rw-r--r--src/lib/libcrypto/ts/ts_lib.c2
-rw-r--r--src/lib/libcrypto/ts/ts_rsp_sign.c10
-rw-r--r--src/lib/libcrypto/ts/ts_rsp_verify.c10
-rw-r--r--src/lib/libcrypto/ts/ts_verify_ctx.c8
4 files changed, 15 insertions, 15 deletions
diff --git a/src/lib/libcrypto/ts/ts_lib.c b/src/lib/libcrypto/ts/ts_lib.c
index e8608dbf71..a8de801e28 100644
--- a/src/lib/libcrypto/ts/ts_lib.c
+++ b/src/lib/libcrypto/ts/ts_lib.c
@@ -79,7 +79,7 @@ int TS_ASN1_INTEGER_print_bio(BIO *bio, const ASN1_INTEGER *num)
79 { 79 {
80 result = BIO_write(bio, "0x", 2) > 0; 80 result = BIO_write(bio, "0x", 2) > 0;
81 result = result && BIO_write(bio, hex, strlen(hex)) > 0; 81 result = result && BIO_write(bio, hex, strlen(hex)) > 0;
82 OPENSSL_free(hex); 82 free(hex);
83 } 83 }
84 BN_free(&num_bn); 84 BN_free(&num_bn);
85 85
diff --git a/src/lib/libcrypto/ts/ts_rsp_sign.c b/src/lib/libcrypto/ts/ts_rsp_sign.c
index e7186a8ce0..e52c9ff03b 100644
--- a/src/lib/libcrypto/ts/ts_rsp_sign.c
+++ b/src/lib/libcrypto/ts/ts_rsp_sign.c
@@ -167,7 +167,7 @@ TS_RESP_CTX *TS_RESP_CTX_new()
167 { 167 {
168 TS_RESP_CTX *ctx; 168 TS_RESP_CTX *ctx;
169 169
170 if (!(ctx = (TS_RESP_CTX *) OPENSSL_malloc(sizeof(TS_RESP_CTX)))) 170 if (!(ctx = (TS_RESP_CTX *) malloc(sizeof(TS_RESP_CTX))))
171 { 171 {
172 TSerr(TS_F_TS_RESP_CTX_NEW, ERR_R_MALLOC_FAILURE); 172 TSerr(TS_F_TS_RESP_CTX_NEW, ERR_R_MALLOC_FAILURE);
173 return NULL; 173 return NULL;
@@ -195,7 +195,7 @@ void TS_RESP_CTX_free(TS_RESP_CTX *ctx)
195 ASN1_INTEGER_free(ctx->seconds); 195 ASN1_INTEGER_free(ctx->seconds);
196 ASN1_INTEGER_free(ctx->millis); 196 ASN1_INTEGER_free(ctx->millis);
197 ASN1_INTEGER_free(ctx->micros); 197 ASN1_INTEGER_free(ctx->micros);
198 OPENSSL_free(ctx); 198 free(ctx);
199 } 199 }
200 200
201int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer) 201int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX *ctx, X509 *signer)
@@ -922,7 +922,7 @@ static int ESS_add_signing_cert(PKCS7_SIGNER_INFO *si, ESS_SIGNING_CERT *sc)
922 int len; 922 int len;
923 923
924 len = i2d_ESS_SIGNING_CERT(sc, NULL); 924 len = i2d_ESS_SIGNING_CERT(sc, NULL);
925 if (!(pp = (unsigned char *) OPENSSL_malloc(len))) 925 if (!(pp = (unsigned char *) malloc(len)))
926 { 926 {
927 TSerr(TS_F_ESS_ADD_SIGNING_CERT, ERR_R_MALLOC_FAILURE); 927 TSerr(TS_F_ESS_ADD_SIGNING_CERT, ERR_R_MALLOC_FAILURE);
928 goto err; 928 goto err;
@@ -934,13 +934,13 @@ static int ESS_add_signing_cert(PKCS7_SIGNER_INFO *si, ESS_SIGNING_CERT *sc)
934 TSerr(TS_F_ESS_ADD_SIGNING_CERT, ERR_R_MALLOC_FAILURE); 934 TSerr(TS_F_ESS_ADD_SIGNING_CERT, ERR_R_MALLOC_FAILURE);
935 goto err; 935 goto err;
936 } 936 }
937 OPENSSL_free(pp); pp = NULL; 937 free(pp); pp = NULL;
938 return PKCS7_add_signed_attribute(si, 938 return PKCS7_add_signed_attribute(si,
939 NID_id_smime_aa_signingCertificate, 939 NID_id_smime_aa_signingCertificate,
940 V_ASN1_SEQUENCE, seq); 940 V_ASN1_SEQUENCE, seq);
941 err: 941 err:
942 ASN1_STRING_free(seq); 942 ASN1_STRING_free(seq);
943 OPENSSL_free(pp); 943 free(pp);
944 944
945 return 0; 945 return 0;
946 } 946 }
diff --git a/src/lib/libcrypto/ts/ts_rsp_verify.c b/src/lib/libcrypto/ts/ts_rsp_verify.c
index f241230ef4..d51500b5d4 100644
--- a/src/lib/libcrypto/ts/ts_rsp_verify.c
+++ b/src/lib/libcrypto/ts/ts_rsp_verify.c
@@ -472,7 +472,7 @@ static int int_TS_RESP_verify_token(TS_VERIFY_CTX *ctx,
472 err: 472 err:
473 X509_free(signer); 473 X509_free(signer);
474 X509_ALGOR_free(md_alg); 474 X509_ALGOR_free(md_alg);
475 OPENSSL_free(imprint); 475 free(imprint);
476 return ret; 476 return ret;
477 } 477 }
478 478
@@ -528,7 +528,7 @@ static int TS_check_status_info(TS_RESP *response)
528 ", status text: ", embedded_status_text ? 528 ", status text: ", embedded_status_text ?
529 embedded_status_text : "unspecified", 529 embedded_status_text : "unspecified",
530 ", failure codes: ", failure_text); 530 ", failure codes: ", failure_text);
531 OPENSSL_free(embedded_status_text); 531 free(embedded_status_text);
532 532
533 return 0; 533 return 0;
534 } 534 }
@@ -547,7 +547,7 @@ static char *TS_get_status_text(STACK_OF(ASN1_UTF8STRING) *text)
547 length += 1; /* separator character */ 547 length += 1; /* separator character */
548 } 548 }
549 /* Allocate memory (closing '\0' included). */ 549 /* Allocate memory (closing '\0' included). */
550 if (!(result = OPENSSL_malloc(length))) 550 if (!(result = malloc(length)))
551 { 551 {
552 TSerr(TS_F_TS_GET_STATUS_TEXT, ERR_R_MALLOC_FAILURE); 552 TSerr(TS_F_TS_GET_STATUS_TEXT, ERR_R_MALLOC_FAILURE);
553 return NULL; 553 return NULL;
@@ -606,7 +606,7 @@ static int TS_compute_imprint(BIO *data, TS_TST_INFO *tst_info,
606 if (length < 0) 606 if (length < 0)
607 goto err; 607 goto err;
608 *imprint_len = length; 608 *imprint_len = length;
609 if (!(*imprint = OPENSSL_malloc(*imprint_len))) 609 if (!(*imprint = malloc(*imprint_len)))
610 { 610 {
611 TSerr(TS_F_TS_COMPUTE_IMPRINT, ERR_R_MALLOC_FAILURE); 611 TSerr(TS_F_TS_COMPUTE_IMPRINT, ERR_R_MALLOC_FAILURE);
612 goto err; 612 goto err;
@@ -625,7 +625,7 @@ static int TS_compute_imprint(BIO *data, TS_TST_INFO *tst_info,
625 return 1; 625 return 1;
626 err: 626 err:
627 X509_ALGOR_free(*md_alg); 627 X509_ALGOR_free(*md_alg);
628 OPENSSL_free(*imprint); 628 free(*imprint);
629 *imprint_len = 0; 629 *imprint_len = 0;
630 return 0; 630 return 0;
631 } 631 }
diff --git a/src/lib/libcrypto/ts/ts_verify_ctx.c b/src/lib/libcrypto/ts/ts_verify_ctx.c
index 609b7735d4..629107aeec 100644
--- a/src/lib/libcrypto/ts/ts_verify_ctx.c
+++ b/src/lib/libcrypto/ts/ts_verify_ctx.c
@@ -63,7 +63,7 @@
63TS_VERIFY_CTX *TS_VERIFY_CTX_new(void) 63TS_VERIFY_CTX *TS_VERIFY_CTX_new(void)
64 { 64 {
65 TS_VERIFY_CTX *ctx = 65 TS_VERIFY_CTX *ctx =
66 (TS_VERIFY_CTX *) OPENSSL_malloc(sizeof(TS_VERIFY_CTX)); 66 (TS_VERIFY_CTX *) malloc(sizeof(TS_VERIFY_CTX));
67 if (ctx) 67 if (ctx)
68 memset(ctx, 0, sizeof(TS_VERIFY_CTX)); 68 memset(ctx, 0, sizeof(TS_VERIFY_CTX));
69 else 69 else
@@ -82,7 +82,7 @@ void TS_VERIFY_CTX_free(TS_VERIFY_CTX *ctx)
82 if (!ctx) return; 82 if (!ctx) return;
83 83
84 TS_VERIFY_CTX_cleanup(ctx); 84 TS_VERIFY_CTX_cleanup(ctx);
85 OPENSSL_free(ctx); 85 free(ctx);
86 } 86 }
87 87
88void TS_VERIFY_CTX_cleanup(TS_VERIFY_CTX *ctx) 88void TS_VERIFY_CTX_cleanup(TS_VERIFY_CTX *ctx)
@@ -95,7 +95,7 @@ void TS_VERIFY_CTX_cleanup(TS_VERIFY_CTX *ctx)
95 ASN1_OBJECT_free(ctx->policy); 95 ASN1_OBJECT_free(ctx->policy);
96 96
97 X509_ALGOR_free(ctx->md_alg); 97 X509_ALGOR_free(ctx->md_alg);
98 OPENSSL_free(ctx->imprint); 98 free(ctx->imprint);
99 99
100 BIO_free_all(ctx->data); 100 BIO_free_all(ctx->data);
101 101
@@ -138,7 +138,7 @@ TS_VERIFY_CTX *TS_REQ_to_TS_VERIFY_CTX(TS_REQ *req, TS_VERIFY_CTX *ctx)
138 if (!(ret->md_alg = X509_ALGOR_dup(md_alg))) goto err; 138 if (!(ret->md_alg = X509_ALGOR_dup(md_alg))) goto err;
139 msg = TS_MSG_IMPRINT_get_msg(imprint); 139 msg = TS_MSG_IMPRINT_get_msg(imprint);
140 ret->imprint_len = ASN1_STRING_length(msg); 140 ret->imprint_len = ASN1_STRING_length(msg);
141 if (!(ret->imprint = OPENSSL_malloc(ret->imprint_len))) goto err; 141 if (!(ret->imprint = malloc(ret->imprint_len))) goto err;
142 memcpy(ret->imprint, ASN1_STRING_data(msg), ret->imprint_len); 142 memcpy(ret->imprint, ASN1_STRING_data(msg), ret->imprint_len);
143 143
144 /* Setting nonce. */ 144 /* Setting nonce. */