diff options
| author | beck <> | 2014-04-17 13:37:50 +0000 |
|---|---|---|
| committer | beck <> | 2014-04-17 13:37:50 +0000 |
| commit | 6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd (patch) | |
| tree | 7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libcrypto/x509v3 | |
| parent | 4d13fb9c7b5ac7311d7031173c21ab0121388413 (diff) | |
| download | openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.tar.gz openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.tar.bz2 openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.zip | |
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes:
OPENSSL_malloc->malloc
OPENSSL_free->free
OPENSSL_relloc->realloc
OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libcrypto/x509v3')
| -rw-r--r-- | src/lib/libcrypto/x509v3/pcy_cache.c | 4 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/pcy_data.c | 6 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/pcy_node.c | 4 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/pcy_tree.c | 18 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_addr.c | 6 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_akey.c | 4 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_alt.c | 4 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_asid.c | 10 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_conf.c | 4 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_cpols.c | 2 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_ia5.c | 2 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_info.c | 10 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_lib.c | 4 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_pci.c | 10 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_prn.c | 2 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_purp.c | 14 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_sxnet.c | 2 | ||||
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_utl.c | 40 |
18 files changed, 73 insertions, 73 deletions
diff --git a/src/lib/libcrypto/x509v3/pcy_cache.c b/src/lib/libcrypto/x509v3/pcy_cache.c index 172b7e7ee4..24c79b4a80 100644 --- a/src/lib/libcrypto/x509v3/pcy_cache.c +++ b/src/lib/libcrypto/x509v3/pcy_cache.c | |||
| @@ -134,7 +134,7 @@ static int policy_cache_new(X509 *x) | |||
| 134 | CERTIFICATEPOLICIES *ext_cpols = NULL; | 134 | CERTIFICATEPOLICIES *ext_cpols = NULL; |
| 135 | POLICY_MAPPINGS *ext_pmaps = NULL; | 135 | POLICY_MAPPINGS *ext_pmaps = NULL; |
| 136 | int i; | 136 | int i; |
| 137 | cache = OPENSSL_malloc(sizeof(X509_POLICY_CACHE)); | 137 | cache = malloc(sizeof(X509_POLICY_CACHE)); |
| 138 | if (!cache) | 138 | if (!cache) |
| 139 | return 0; | 139 | return 0; |
| 140 | cache->anyPolicy = NULL; | 140 | cache->anyPolicy = NULL; |
| @@ -240,7 +240,7 @@ void policy_cache_free(X509_POLICY_CACHE *cache) | |||
| 240 | policy_data_free(cache->anyPolicy); | 240 | policy_data_free(cache->anyPolicy); |
| 241 | if (cache->data) | 241 | if (cache->data) |
| 242 | sk_X509_POLICY_DATA_pop_free(cache->data, policy_data_free); | 242 | sk_X509_POLICY_DATA_pop_free(cache->data, policy_data_free); |
| 243 | OPENSSL_free(cache); | 243 | free(cache); |
| 244 | } | 244 | } |
| 245 | 245 | ||
| 246 | const X509_POLICY_CACHE *policy_cache_set(X509 *x) | 246 | const X509_POLICY_CACHE *policy_cache_set(X509 *x) |
diff --git a/src/lib/libcrypto/x509v3/pcy_data.c b/src/lib/libcrypto/x509v3/pcy_data.c index 3444b03195..7c80915f5b 100644 --- a/src/lib/libcrypto/x509v3/pcy_data.c +++ b/src/lib/libcrypto/x509v3/pcy_data.c | |||
| @@ -72,7 +72,7 @@ void policy_data_free(X509_POLICY_DATA *data) | |||
| 72 | sk_POLICYQUALINFO_pop_free(data->qualifier_set, | 72 | sk_POLICYQUALINFO_pop_free(data->qualifier_set, |
| 73 | POLICYQUALINFO_free); | 73 | POLICYQUALINFO_free); |
| 74 | sk_ASN1_OBJECT_pop_free(data->expected_policy_set, ASN1_OBJECT_free); | 74 | sk_ASN1_OBJECT_pop_free(data->expected_policy_set, ASN1_OBJECT_free); |
| 75 | OPENSSL_free(data); | 75 | free(data); |
| 76 | } | 76 | } |
| 77 | 77 | ||
| 78 | /* Create a data based on an existing policy. If 'id' is NULL use the | 78 | /* Create a data based on an existing policy. If 'id' is NULL use the |
| @@ -97,13 +97,13 @@ X509_POLICY_DATA *policy_data_new(POLICYINFO *policy, | |||
| 97 | } | 97 | } |
| 98 | else | 98 | else |
| 99 | id = NULL; | 99 | id = NULL; |
| 100 | ret = OPENSSL_malloc(sizeof(X509_POLICY_DATA)); | 100 | ret = malloc(sizeof(X509_POLICY_DATA)); |
| 101 | if (!ret) | 101 | if (!ret) |
| 102 | return NULL; | 102 | return NULL; |
| 103 | ret->expected_policy_set = sk_ASN1_OBJECT_new_null(); | 103 | ret->expected_policy_set = sk_ASN1_OBJECT_new_null(); |
| 104 | if (!ret->expected_policy_set) | 104 | if (!ret->expected_policy_set) |
| 105 | { | 105 | { |
| 106 | OPENSSL_free(ret); | 106 | free(ret); |
| 107 | if (id) | 107 | if (id) |
| 108 | ASN1_OBJECT_free(id); | 108 | ASN1_OBJECT_free(id); |
| 109 | return NULL; | 109 | return NULL; |
diff --git a/src/lib/libcrypto/x509v3/pcy_node.c b/src/lib/libcrypto/x509v3/pcy_node.c index bd1e7f1ae8..8c2124a7f6 100644 --- a/src/lib/libcrypto/x509v3/pcy_node.c +++ b/src/lib/libcrypto/x509v3/pcy_node.c | |||
| @@ -115,7 +115,7 @@ X509_POLICY_NODE *level_add_node(X509_POLICY_LEVEL *level, | |||
| 115 | X509_POLICY_TREE *tree) | 115 | X509_POLICY_TREE *tree) |
| 116 | { | 116 | { |
| 117 | X509_POLICY_NODE *node; | 117 | X509_POLICY_NODE *node; |
| 118 | node = OPENSSL_malloc(sizeof(X509_POLICY_NODE)); | 118 | node = malloc(sizeof(X509_POLICY_NODE)); |
| 119 | if (!node) | 119 | if (!node) |
| 120 | return NULL; | 120 | return NULL; |
| 121 | node->data = data; | 121 | node->data = data; |
| @@ -164,7 +164,7 @@ X509_POLICY_NODE *level_add_node(X509_POLICY_LEVEL *level, | |||
| 164 | 164 | ||
| 165 | void policy_node_free(X509_POLICY_NODE *node) | 165 | void policy_node_free(X509_POLICY_NODE *node) |
| 166 | { | 166 | { |
| 167 | OPENSSL_free(node); | 167 | free(node); |
| 168 | } | 168 | } |
| 169 | 169 | ||
| 170 | /* See if a policy node matches a policy OID. If mapping enabled look through | 170 | /* See if a policy node matches a policy OID. If mapping enabled look through |
diff --git a/src/lib/libcrypto/x509v3/pcy_tree.c b/src/lib/libcrypto/x509v3/pcy_tree.c index bb9777348f..c4239b1fd9 100644 --- a/src/lib/libcrypto/x509v3/pcy_tree.c +++ b/src/lib/libcrypto/x509v3/pcy_tree.c | |||
| @@ -219,13 +219,13 @@ static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, | |||
| 219 | 219 | ||
| 220 | /* If we get this far initialize the tree */ | 220 | /* If we get this far initialize the tree */ |
| 221 | 221 | ||
| 222 | tree = OPENSSL_malloc(sizeof(X509_POLICY_TREE)); | 222 | tree = malloc(sizeof(X509_POLICY_TREE)); |
| 223 | 223 | ||
| 224 | if (!tree) | 224 | if (!tree) |
| 225 | return 0; | 225 | return 0; |
| 226 | 226 | ||
| 227 | tree->flags = 0; | 227 | tree->flags = 0; |
| 228 | tree->levels = OPENSSL_malloc(sizeof(X509_POLICY_LEVEL) * n); | 228 | tree->levels = malloc(sizeof(X509_POLICY_LEVEL) * n); |
| 229 | tree->nlevel = 0; | 229 | tree->nlevel = 0; |
| 230 | tree->extra_data = NULL; | 230 | tree->extra_data = NULL; |
| 231 | tree->auth_policies = NULL; | 231 | tree->auth_policies = NULL; |
| @@ -233,7 +233,7 @@ static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, | |||
| 233 | 233 | ||
| 234 | if (!tree->levels) | 234 | if (!tree->levels) |
| 235 | { | 235 | { |
| 236 | OPENSSL_free(tree); | 236 | free(tree); |
| 237 | return 0; | 237 | return 0; |
| 238 | } | 238 | } |
| 239 | 239 | ||
| @@ -516,7 +516,7 @@ static int tree_prune(X509_POLICY_TREE *tree, X509_POLICY_LEVEL *curr) | |||
| 516 | if (node->data->flags & POLICY_DATA_FLAG_MAP_MASK) | 516 | if (node->data->flags & POLICY_DATA_FLAG_MAP_MASK) |
| 517 | { | 517 | { |
| 518 | node->parent->nchild--; | 518 | node->parent->nchild--; |
| 519 | OPENSSL_free(node); | 519 | free(node); |
| 520 | (void)sk_X509_POLICY_NODE_delete(nodes,i); | 520 | (void)sk_X509_POLICY_NODE_delete(nodes,i); |
| 521 | } | 521 | } |
| 522 | } | 522 | } |
| @@ -531,7 +531,7 @@ static int tree_prune(X509_POLICY_TREE *tree, X509_POLICY_LEVEL *curr) | |||
| 531 | if (node->nchild == 0) | 531 | if (node->nchild == 0) |
| 532 | { | 532 | { |
| 533 | node->parent->nchild--; | 533 | node->parent->nchild--; |
| 534 | OPENSSL_free(node); | 534 | free(node); |
| 535 | (void)sk_X509_POLICY_NODE_delete(nodes, i); | 535 | (void)sk_X509_POLICY_NODE_delete(nodes, i); |
| 536 | } | 536 | } |
| 537 | } | 537 | } |
| @@ -539,7 +539,7 @@ static int tree_prune(X509_POLICY_TREE *tree, X509_POLICY_LEVEL *curr) | |||
| 539 | { | 539 | { |
| 540 | if (curr->anyPolicy->parent) | 540 | if (curr->anyPolicy->parent) |
| 541 | curr->anyPolicy->parent->nchild--; | 541 | curr->anyPolicy->parent->nchild--; |
| 542 | OPENSSL_free(curr->anyPolicy); | 542 | free(curr->anyPolicy); |
| 543 | curr->anyPolicy = NULL; | 543 | curr->anyPolicy = NULL; |
| 544 | } | 544 | } |
| 545 | if (curr == tree->levels) | 545 | if (curr == tree->levels) |
| @@ -721,7 +721,7 @@ static int tree_evaluate(X509_POLICY_TREE *tree) | |||
| 721 | static void exnode_free(X509_POLICY_NODE *node) | 721 | static void exnode_free(X509_POLICY_NODE *node) |
| 722 | { | 722 | { |
| 723 | if (node->data && (node->data->flags & POLICY_DATA_FLAG_EXTRA_NODE)) | 723 | if (node->data && (node->data->flags & POLICY_DATA_FLAG_EXTRA_NODE)) |
| 724 | OPENSSL_free(node); | 724 | free(node); |
| 725 | } | 725 | } |
| 726 | 726 | ||
| 727 | 727 | ||
| @@ -751,8 +751,8 @@ void X509_policy_tree_free(X509_POLICY_TREE *tree) | |||
| 751 | sk_X509_POLICY_DATA_pop_free(tree->extra_data, | 751 | sk_X509_POLICY_DATA_pop_free(tree->extra_data, |
| 752 | policy_data_free); | 752 | policy_data_free); |
| 753 | 753 | ||
| 754 | OPENSSL_free(tree->levels); | 754 | free(tree->levels); |
| 755 | OPENSSL_free(tree); | 755 | free(tree); |
| 756 | 756 | ||
| 757 | } | 757 | } |
| 758 | 758 | ||
diff --git a/src/lib/libcrypto/x509v3/v3_addr.c b/src/lib/libcrypto/x509v3/v3_addr.c index df46a4983b..179f08d222 100644 --- a/src/lib/libcrypto/x509v3/v3_addr.c +++ b/src/lib/libcrypto/x509v3/v3_addr.c | |||
| @@ -1013,7 +1013,7 @@ static void *v2i_IPAddrBlocks(const struct v3_ext_method *method, | |||
| 1013 | X509V3_conf_err(val); | 1013 | X509V3_conf_err(val); |
| 1014 | goto err; | 1014 | goto err; |
| 1015 | } | 1015 | } |
| 1016 | OPENSSL_free(s); | 1016 | free(s); |
| 1017 | s = NULL; | 1017 | s = NULL; |
| 1018 | continue; | 1018 | continue; |
| 1019 | } | 1019 | } |
| @@ -1077,7 +1077,7 @@ static void *v2i_IPAddrBlocks(const struct v3_ext_method *method, | |||
| 1077 | goto err; | 1077 | goto err; |
| 1078 | } | 1078 | } |
| 1079 | 1079 | ||
| 1080 | OPENSSL_free(s); | 1080 | free(s); |
| 1081 | s = NULL; | 1081 | s = NULL; |
| 1082 | } | 1082 | } |
| 1083 | 1083 | ||
| @@ -1089,7 +1089,7 @@ static void *v2i_IPAddrBlocks(const struct v3_ext_method *method, | |||
| 1089 | return addr; | 1089 | return addr; |
| 1090 | 1090 | ||
| 1091 | err: | 1091 | err: |
| 1092 | OPENSSL_free(s); | 1092 | free(s); |
| 1093 | sk_IPAddressFamily_pop_free(addr, IPAddressFamily_free); | 1093 | sk_IPAddressFamily_pop_free(addr, IPAddressFamily_free); |
| 1094 | return NULL; | 1094 | return NULL; |
| 1095 | } | 1095 | } |
diff --git a/src/lib/libcrypto/x509v3/v3_akey.c b/src/lib/libcrypto/x509v3/v3_akey.c index c6b68ee221..04e1fb9544 100644 --- a/src/lib/libcrypto/x509v3/v3_akey.c +++ b/src/lib/libcrypto/x509v3/v3_akey.c | |||
| @@ -87,7 +87,7 @@ static STACK_OF(CONF_VALUE) *i2v_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, | |||
| 87 | if(akeyid->keyid) { | 87 | if(akeyid->keyid) { |
| 88 | tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); | 88 | tmp = hex_to_string(akeyid->keyid->data, akeyid->keyid->length); |
| 89 | X509V3_add_value("keyid", tmp, &extlist); | 89 | X509V3_add_value("keyid", tmp, &extlist); |
| 90 | OPENSSL_free(tmp); | 90 | free(tmp); |
| 91 | } | 91 | } |
| 92 | if(akeyid->issuer) | 92 | if(akeyid->issuer) |
| 93 | extlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); | 93 | extlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); |
| @@ -95,7 +95,7 @@ static STACK_OF(CONF_VALUE) *i2v_AUTHORITY_KEYID(X509V3_EXT_METHOD *method, | |||
| 95 | tmp = hex_to_string(akeyid->serial->data, | 95 | tmp = hex_to_string(akeyid->serial->data, |
| 96 | akeyid->serial->length); | 96 | akeyid->serial->length); |
| 97 | X509V3_add_value("serial", tmp, &extlist); | 97 | X509V3_add_value("serial", tmp, &extlist); |
| 98 | OPENSSL_free(tmp); | 98 | free(tmp); |
| 99 | } | 99 | } |
| 100 | return extlist; | 100 | return extlist; |
| 101 | } | 101 | } |
diff --git a/src/lib/libcrypto/x509v3/v3_alt.c b/src/lib/libcrypto/x509v3/v3_alt.c index 8de5dd041b..636677df94 100644 --- a/src/lib/libcrypto/x509v3/v3_alt.c +++ b/src/lib/libcrypto/x509v3/v3_alt.c | |||
| @@ -578,11 +578,11 @@ static int do_othername(GENERAL_NAME *gen, char *value, X509V3_CTX *ctx) | |||
| 578 | if (!(gen->d.otherName->value = ASN1_generate_v3(p + 1, ctx))) | 578 | if (!(gen->d.otherName->value = ASN1_generate_v3(p + 1, ctx))) |
| 579 | return 0; | 579 | return 0; |
| 580 | objlen = p - value; | 580 | objlen = p - value; |
| 581 | objtmp = OPENSSL_malloc(objlen + 1); | 581 | objtmp = malloc(objlen + 1); |
| 582 | if (objtmp) { | 582 | if (objtmp) { |
| 583 | strlcpy(objtmp, value, objlen + 1); | 583 | strlcpy(objtmp, value, objlen + 1); |
| 584 | gen->d.otherName->type_id = OBJ_txt2obj(objtmp, 0); | 584 | gen->d.otherName->type_id = OBJ_txt2obj(objtmp, 0); |
| 585 | OPENSSL_free(objtmp); | 585 | free(objtmp); |
| 586 | } else | 586 | } else |
| 587 | gen->d.otherName->type_id = NULL; | 587 | gen->d.otherName->type_id = NULL; |
| 588 | if (!gen->d.otherName->type_id) | 588 | if (!gen->d.otherName->type_id) |
diff --git a/src/lib/libcrypto/x509v3/v3_asid.c b/src/lib/libcrypto/x509v3/v3_asid.c index 1587e8ed72..325c8e0406 100644 --- a/src/lib/libcrypto/x509v3/v3_asid.c +++ b/src/lib/libcrypto/x509v3/v3_asid.c | |||
| @@ -125,17 +125,17 @@ static int i2r_ASIdentifierChoice(BIO *out, | |||
| 125 | if ((s = i2s_ASN1_INTEGER(NULL, aor->u.id)) == NULL) | 125 | if ((s = i2s_ASN1_INTEGER(NULL, aor->u.id)) == NULL) |
| 126 | return 0; | 126 | return 0; |
| 127 | BIO_printf(out, "%*s%s\n", indent + 2, "", s); | 127 | BIO_printf(out, "%*s%s\n", indent + 2, "", s); |
| 128 | OPENSSL_free(s); | 128 | free(s); |
| 129 | break; | 129 | break; |
| 130 | case ASIdOrRange_range: | 130 | case ASIdOrRange_range: |
| 131 | if ((s = i2s_ASN1_INTEGER(NULL, aor->u.range->min)) == NULL) | 131 | if ((s = i2s_ASN1_INTEGER(NULL, aor->u.range->min)) == NULL) |
| 132 | return 0; | 132 | return 0; |
| 133 | BIO_printf(out, "%*s%s-", indent + 2, "", s); | 133 | BIO_printf(out, "%*s%s-", indent + 2, "", s); |
| 134 | OPENSSL_free(s); | 134 | free(s); |
| 135 | if ((s = i2s_ASN1_INTEGER(NULL, aor->u.range->max)) == NULL) | 135 | if ((s = i2s_ASN1_INTEGER(NULL, aor->u.range->max)) == NULL) |
| 136 | return 0; | 136 | return 0; |
| 137 | BIO_printf(out, "%s\n", s); | 137 | BIO_printf(out, "%s\n", s); |
| 138 | OPENSSL_free(s); | 138 | free(s); |
| 139 | break; | 139 | break; |
| 140 | default: | 140 | default: |
| 141 | return 0; | 141 | return 0; |
| @@ -471,7 +471,7 @@ static int ASIdentifierChoice_canonize(ASIdentifierChoice *choice) | |||
| 471 | ASRange *r; | 471 | ASRange *r; |
| 472 | switch (a->type) { | 472 | switch (a->type) { |
| 473 | case ASIdOrRange_id: | 473 | case ASIdOrRange_id: |
| 474 | if ((r = OPENSSL_malloc(sizeof(ASRange))) == NULL) { | 474 | if ((r = malloc(sizeof(ASRange))) == NULL) { |
| 475 | X509V3err(X509V3_F_ASIDENTIFIERCHOICE_CANONIZE, | 475 | X509V3err(X509V3_F_ASIDENTIFIERCHOICE_CANONIZE, |
| 476 | ERR_R_MALLOC_FAILURE); | 476 | ERR_R_MALLOC_FAILURE); |
| 477 | goto done; | 477 | goto done; |
| @@ -620,7 +620,7 @@ static void *v2i_ASIdentifiers(const struct v3_ext_method *method, | |||
| 620 | s[i1] = '\0'; | 620 | s[i1] = '\0'; |
| 621 | min = s2i_ASN1_INTEGER(NULL, s); | 621 | min = s2i_ASN1_INTEGER(NULL, s); |
| 622 | max = s2i_ASN1_INTEGER(NULL, s + i2); | 622 | max = s2i_ASN1_INTEGER(NULL, s + i2); |
| 623 | OPENSSL_free(s); | 623 | free(s); |
| 624 | if (min == NULL || max == NULL) { | 624 | if (min == NULL || max == NULL) { |
| 625 | X509V3err(X509V3_F_V2I_ASIDENTIFIERS, ERR_R_MALLOC_FAILURE); | 625 | X509V3err(X509V3_F_V2I_ASIDENTIFIERS, ERR_R_MALLOC_FAILURE); |
| 626 | goto err; | 626 | goto err; |
diff --git a/src/lib/libcrypto/x509v3/v3_conf.c b/src/lib/libcrypto/x509v3/v3_conf.c index 6730f9a6ee..519aefc93c 100644 --- a/src/lib/libcrypto/x509v3/v3_conf.c +++ b/src/lib/libcrypto/x509v3/v3_conf.c | |||
| @@ -190,7 +190,7 @@ static X509_EXTENSION *do_ext_i2d(const X509V3_EXT_METHOD *method, int ext_nid, | |||
| 190 | { | 190 | { |
| 191 | unsigned char *p; | 191 | unsigned char *p; |
| 192 | ext_len = method->i2d(ext_struc, NULL); | 192 | ext_len = method->i2d(ext_struc, NULL); |
| 193 | if(!(ext_der = OPENSSL_malloc(ext_len))) goto merr; | 193 | if(!(ext_der = malloc(ext_len))) goto merr; |
| 194 | p = ext_der; | 194 | p = ext_der; |
| 195 | method->i2d(ext_struc, &p); | 195 | method->i2d(ext_struc, &p); |
| 196 | } | 196 | } |
| @@ -300,7 +300,7 @@ static X509_EXTENSION *v3_generic_extension(const char *ext, char *value, | |||
| 300 | err: | 300 | err: |
| 301 | ASN1_OBJECT_free(obj); | 301 | ASN1_OBJECT_free(obj); |
| 302 | M_ASN1_OCTET_STRING_free(oct); | 302 | M_ASN1_OCTET_STRING_free(oct); |
| 303 | if(ext_der) OPENSSL_free(ext_der); | 303 | if(ext_der) free(ext_der); |
| 304 | return extension; | 304 | return extension; |
| 305 | 305 | ||
| 306 | } | 306 | } |
diff --git a/src/lib/libcrypto/x509v3/v3_cpols.c b/src/lib/libcrypto/x509v3/v3_cpols.c index 1f0798b946..1a337fa07e 100644 --- a/src/lib/libcrypto/x509v3/v3_cpols.c +++ b/src/lib/libcrypto/x509v3/v3_cpols.c | |||
| @@ -426,7 +426,7 @@ static void print_notice(BIO *out, USERNOTICE *notice, int indent) | |||
| 426 | if(i) BIO_puts(out, ", "); | 426 | if(i) BIO_puts(out, ", "); |
| 427 | tmp = i2s_ASN1_INTEGER(NULL, num); | 427 | tmp = i2s_ASN1_INTEGER(NULL, num); |
| 428 | BIO_puts(out, tmp); | 428 | BIO_puts(out, tmp); |
| 429 | OPENSSL_free(tmp); | 429 | free(tmp); |
| 430 | } | 430 | } |
| 431 | BIO_puts(out, "\n"); | 431 | BIO_puts(out, "\n"); |
| 432 | } | 432 | } |
diff --git a/src/lib/libcrypto/x509v3/v3_ia5.c b/src/lib/libcrypto/x509v3/v3_ia5.c index ab1c5188b8..98789b36e9 100644 --- a/src/lib/libcrypto/x509v3/v3_ia5.c +++ b/src/lib/libcrypto/x509v3/v3_ia5.c | |||
| @@ -82,7 +82,7 @@ static char *i2s_ASN1_IA5STRING(X509V3_EXT_METHOD *method, | |||
| 82 | { | 82 | { |
| 83 | char *tmp; | 83 | char *tmp; |
| 84 | if(!ia5 || !ia5->length) return NULL; | 84 | if(!ia5 || !ia5->length) return NULL; |
| 85 | if(!(tmp = OPENSSL_malloc(ia5->length + 1))) { | 85 | if(!(tmp = malloc(ia5->length + 1))) { |
| 86 | X509V3err(X509V3_F_I2S_ASN1_IA5STRING,ERR_R_MALLOC_FAILURE); | 86 | X509V3err(X509V3_F_I2S_ASN1_IA5STRING,ERR_R_MALLOC_FAILURE); |
| 87 | return NULL; | 87 | return NULL; |
| 88 | } | 88 | } |
diff --git a/src/lib/libcrypto/x509v3/v3_info.c b/src/lib/libcrypto/x509v3/v3_info.c index 44bc3e1105..2b290ca00c 100644 --- a/src/lib/libcrypto/x509v3/v3_info.c +++ b/src/lib/libcrypto/x509v3/v3_info.c | |||
| @@ -115,7 +115,7 @@ static STACK_OF(CONF_VALUE) *i2v_AUTHORITY_INFO_ACCESS(X509V3_EXT_METHOD *method | |||
| 115 | vtmp = sk_CONF_VALUE_value(ret, i); | 115 | vtmp = sk_CONF_VALUE_value(ret, i); |
| 116 | i2t_ASN1_OBJECT(objtmp, sizeof objtmp, desc->method); | 116 | i2t_ASN1_OBJECT(objtmp, sizeof objtmp, desc->method); |
| 117 | nlen = strlen(objtmp) + strlen(vtmp->name) + 5; | 117 | nlen = strlen(objtmp) + strlen(vtmp->name) + 5; |
| 118 | ntmp = OPENSSL_malloc(nlen); | 118 | ntmp = malloc(nlen); |
| 119 | if(!ntmp) { | 119 | if(!ntmp) { |
| 120 | X509V3err(X509V3_F_I2V_AUTHORITY_INFO_ACCESS, | 120 | X509V3err(X509V3_F_I2V_AUTHORITY_INFO_ACCESS, |
| 121 | ERR_R_MALLOC_FAILURE); | 121 | ERR_R_MALLOC_FAILURE); |
| @@ -124,7 +124,7 @@ static STACK_OF(CONF_VALUE) *i2v_AUTHORITY_INFO_ACCESS(X509V3_EXT_METHOD *method | |||
| 124 | BUF_strlcpy(ntmp, objtmp, nlen); | 124 | BUF_strlcpy(ntmp, objtmp, nlen); |
| 125 | BUF_strlcat(ntmp, " - ", nlen); | 125 | BUF_strlcat(ntmp, " - ", nlen); |
| 126 | BUF_strlcat(ntmp, vtmp->name, nlen); | 126 | BUF_strlcat(ntmp, vtmp->name, nlen); |
| 127 | OPENSSL_free(vtmp->name); | 127 | free(vtmp->name); |
| 128 | vtmp->name = ntmp; | 128 | vtmp->name = ntmp; |
| 129 | 129 | ||
| 130 | } | 130 | } |
| @@ -161,7 +161,7 @@ static AUTHORITY_INFO_ACCESS *v2i_AUTHORITY_INFO_ACCESS(X509V3_EXT_METHOD *metho | |||
| 161 | ctmp.value = cnf->value; | 161 | ctmp.value = cnf->value; |
| 162 | if(!v2i_GENERAL_NAME_ex(acc->location, method, ctx, &ctmp, 0)) | 162 | if(!v2i_GENERAL_NAME_ex(acc->location, method, ctx, &ctmp, 0)) |
| 163 | goto err; | 163 | goto err; |
| 164 | if(!(objtmp = OPENSSL_malloc(objlen + 1))) { | 164 | if(!(objtmp = malloc(objlen + 1))) { |
| 165 | X509V3err(X509V3_F_V2I_AUTHORITY_INFO_ACCESS,ERR_R_MALLOC_FAILURE); | 165 | X509V3err(X509V3_F_V2I_AUTHORITY_INFO_ACCESS,ERR_R_MALLOC_FAILURE); |
| 166 | goto err; | 166 | goto err; |
| 167 | } | 167 | } |
| @@ -170,10 +170,10 @@ static AUTHORITY_INFO_ACCESS *v2i_AUTHORITY_INFO_ACCESS(X509V3_EXT_METHOD *metho | |||
| 170 | if(!acc->method) { | 170 | if(!acc->method) { |
| 171 | X509V3err(X509V3_F_V2I_AUTHORITY_INFO_ACCESS,X509V3_R_BAD_OBJECT); | 171 | X509V3err(X509V3_F_V2I_AUTHORITY_INFO_ACCESS,X509V3_R_BAD_OBJECT); |
| 172 | ERR_add_error_data(2, "value=", objtmp); | 172 | ERR_add_error_data(2, "value=", objtmp); |
| 173 | OPENSSL_free(objtmp); | 173 | free(objtmp); |
| 174 | goto err; | 174 | goto err; |
| 175 | } | 175 | } |
| 176 | OPENSSL_free(objtmp); | 176 | free(objtmp); |
| 177 | 177 | ||
| 178 | } | 178 | } |
| 179 | return ainfo; | 179 | return ainfo; |
diff --git a/src/lib/libcrypto/x509v3/v3_lib.c b/src/lib/libcrypto/x509v3/v3_lib.c index 0f1e1d4422..0613ea7f22 100644 --- a/src/lib/libcrypto/x509v3/v3_lib.c +++ b/src/lib/libcrypto/x509v3/v3_lib.c | |||
| @@ -133,7 +133,7 @@ int X509V3_EXT_add_alias(int nid_to, int nid_from) | |||
| 133 | X509V3err(X509V3_F_X509V3_EXT_ADD_ALIAS,X509V3_R_EXTENSION_NOT_FOUND); | 133 | X509V3err(X509V3_F_X509V3_EXT_ADD_ALIAS,X509V3_R_EXTENSION_NOT_FOUND); |
| 134 | return 0; | 134 | return 0; |
| 135 | } | 135 | } |
| 136 | if(!(tmpext = (X509V3_EXT_METHOD *)OPENSSL_malloc(sizeof(X509V3_EXT_METHOD)))) { | 136 | if(!(tmpext = (X509V3_EXT_METHOD *)malloc(sizeof(X509V3_EXT_METHOD)))) { |
| 137 | X509V3err(X509V3_F_X509V3_EXT_ADD_ALIAS,ERR_R_MALLOC_FAILURE); | 137 | X509V3err(X509V3_F_X509V3_EXT_ADD_ALIAS,ERR_R_MALLOC_FAILURE); |
| 138 | return 0; | 138 | return 0; |
| 139 | } | 139 | } |
| @@ -151,7 +151,7 @@ void X509V3_EXT_cleanup(void) | |||
| 151 | 151 | ||
| 152 | static void ext_list_free(X509V3_EXT_METHOD *ext) | 152 | static void ext_list_free(X509V3_EXT_METHOD *ext) |
| 153 | { | 153 | { |
| 154 | if(ext->ext_flags & X509V3_EXT_DYNAMIC) OPENSSL_free(ext); | 154 | if(ext->ext_flags & X509V3_EXT_DYNAMIC) free(ext); |
| 155 | } | 155 | } |
| 156 | 156 | ||
| 157 | /* Legacy function: we don't need to add standard extensions | 157 | /* Legacy function: we don't need to add standard extensions |
diff --git a/src/lib/libcrypto/x509v3/v3_pci.c b/src/lib/libcrypto/x509v3/v3_pci.c index 0dcfa004fe..9cef94258c 100644 --- a/src/lib/libcrypto/x509v3/v3_pci.c +++ b/src/lib/libcrypto/x509v3/v3_pci.c | |||
| @@ -135,7 +135,7 @@ static int process_pci_value(CONF_VALUE *val, | |||
| 135 | goto err; | 135 | goto err; |
| 136 | } | 136 | } |
| 137 | 137 | ||
| 138 | tmp_data = OPENSSL_realloc((*policy)->data, | 138 | tmp_data = realloc((*policy)->data, |
| 139 | (*policy)->length + val_len + 1); | 139 | (*policy)->length + val_len + 1); |
| 140 | if (tmp_data) | 140 | if (tmp_data) |
| 141 | { | 141 | { |
| @@ -147,7 +147,7 @@ static int process_pci_value(CONF_VALUE *val, | |||
| 147 | } | 147 | } |
| 148 | else | 148 | else |
| 149 | { | 149 | { |
| 150 | OPENSSL_free(tmp_data2); | 150 | free(tmp_data2); |
| 151 | /* realloc failure implies the original data space is b0rked too! */ | 151 | /* realloc failure implies the original data space is b0rked too! */ |
| 152 | (*policy)->data = NULL; | 152 | (*policy)->data = NULL; |
| 153 | (*policy)->length = 0; | 153 | (*policy)->length = 0; |
| @@ -155,7 +155,7 @@ static int process_pci_value(CONF_VALUE *val, | |||
| 155 | X509V3_conf_err(val); | 155 | X509V3_conf_err(val); |
| 156 | goto err; | 156 | goto err; |
| 157 | } | 157 | } |
| 158 | OPENSSL_free(tmp_data2); | 158 | free(tmp_data2); |
| 159 | } | 159 | } |
| 160 | else if (strncmp(val->value, "file:", 5) == 0) | 160 | else if (strncmp(val->value, "file:", 5) == 0) |
| 161 | { | 161 | { |
| @@ -173,7 +173,7 @@ static int process_pci_value(CONF_VALUE *val, | |||
| 173 | { | 173 | { |
| 174 | if (!n) continue; | 174 | if (!n) continue; |
| 175 | 175 | ||
| 176 | tmp_data = OPENSSL_realloc((*policy)->data, | 176 | tmp_data = realloc((*policy)->data, |
| 177 | (*policy)->length + n + 1); | 177 | (*policy)->length + n + 1); |
| 178 | 178 | ||
| 179 | if (!tmp_data) | 179 | if (!tmp_data) |
| @@ -197,7 +197,7 @@ static int process_pci_value(CONF_VALUE *val, | |||
| 197 | else if (strncmp(val->value, "text:", 5) == 0) | 197 | else if (strncmp(val->value, "text:", 5) == 0) |
| 198 | { | 198 | { |
| 199 | val_len = strlen(val->value + 5); | 199 | val_len = strlen(val->value + 5); |
| 200 | tmp_data = OPENSSL_realloc((*policy)->data, | 200 | tmp_data = realloc((*policy)->data, |
| 201 | (*policy)->length + val_len + 1); | 201 | (*policy)->length + val_len + 1); |
| 202 | if (tmp_data) | 202 | if (tmp_data) |
| 203 | { | 203 | { |
diff --git a/src/lib/libcrypto/x509v3/v3_prn.c b/src/lib/libcrypto/x509v3/v3_prn.c index 2124b447b4..565937af47 100644 --- a/src/lib/libcrypto/x509v3/v3_prn.c +++ b/src/lib/libcrypto/x509v3/v3_prn.c | |||
| @@ -126,7 +126,7 @@ int X509V3_EXT_print(BIO *out, X509_EXTENSION *ext, unsigned long flag, int inde | |||
| 126 | 126 | ||
| 127 | err: | 127 | err: |
| 128 | sk_CONF_VALUE_pop_free(nval, X509V3_conf_free); | 128 | sk_CONF_VALUE_pop_free(nval, X509V3_conf_free); |
| 129 | if(value) OPENSSL_free(value); | 129 | if(value) free(value); |
| 130 | if(method->it) ASN1_item_free(ext_str, ASN1_ITEM_ptr(method->it)); | 130 | if(method->it) ASN1_item_free(ext_str, ASN1_ITEM_ptr(method->it)); |
| 131 | else method->ext_free(ext_str); | 131 | else method->ext_free(ext_str); |
| 132 | return ok; | 132 | return ok; |
diff --git a/src/lib/libcrypto/x509v3/v3_purp.c b/src/lib/libcrypto/x509v3/v3_purp.c index f59bfc1844..45d7251c29 100644 --- a/src/lib/libcrypto/x509v3/v3_purp.c +++ b/src/lib/libcrypto/x509v3/v3_purp.c | |||
| @@ -183,17 +183,17 @@ int X509_PURPOSE_add(int id, int trust, int flags, | |||
| 183 | idx = X509_PURPOSE_get_by_id(id); | 183 | idx = X509_PURPOSE_get_by_id(id); |
| 184 | /* Need a new entry */ | 184 | /* Need a new entry */ |
| 185 | if(idx == -1) { | 185 | if(idx == -1) { |
| 186 | if(!(ptmp = OPENSSL_malloc(sizeof(X509_PURPOSE)))) { | 186 | if(!(ptmp = malloc(sizeof(X509_PURPOSE)))) { |
| 187 | X509V3err(X509V3_F_X509_PURPOSE_ADD,ERR_R_MALLOC_FAILURE); | 187 | X509V3err(X509V3_F_X509_PURPOSE_ADD,ERR_R_MALLOC_FAILURE); |
| 188 | return 0; | 188 | return 0; |
| 189 | } | 189 | } |
| 190 | ptmp->flags = X509_PURPOSE_DYNAMIC; | 190 | ptmp->flags = X509_PURPOSE_DYNAMIC; |
| 191 | } else ptmp = X509_PURPOSE_get0(idx); | 191 | } else ptmp = X509_PURPOSE_get0(idx); |
| 192 | 192 | ||
| 193 | /* OPENSSL_free existing name if dynamic */ | 193 | /* free existing name if dynamic */ |
| 194 | if(ptmp->flags & X509_PURPOSE_DYNAMIC_NAME) { | 194 | if(ptmp->flags & X509_PURPOSE_DYNAMIC_NAME) { |
| 195 | OPENSSL_free(ptmp->name); | 195 | free(ptmp->name); |
| 196 | OPENSSL_free(ptmp->sname); | 196 | free(ptmp->sname); |
| 197 | } | 197 | } |
| 198 | /* dup supplied name */ | 198 | /* dup supplied name */ |
| 199 | ptmp->name = BUF_strdup(name); | 199 | ptmp->name = BUF_strdup(name); |
| @@ -232,10 +232,10 @@ static void xptable_free(X509_PURPOSE *p) | |||
| 232 | if (p->flags & X509_PURPOSE_DYNAMIC) | 232 | if (p->flags & X509_PURPOSE_DYNAMIC) |
| 233 | { | 233 | { |
| 234 | if (p->flags & X509_PURPOSE_DYNAMIC_NAME) { | 234 | if (p->flags & X509_PURPOSE_DYNAMIC_NAME) { |
| 235 | OPENSSL_free(p->name); | 235 | free(p->name); |
| 236 | OPENSSL_free(p->sname); | 236 | free(p->sname); |
| 237 | } | 237 | } |
| 238 | OPENSSL_free(p); | 238 | free(p); |
| 239 | } | 239 | } |
| 240 | } | 240 | } |
| 241 | 241 | ||
diff --git a/src/lib/libcrypto/x509v3/v3_sxnet.c b/src/lib/libcrypto/x509v3/v3_sxnet.c index 2a6bf11b65..a2b0322e44 100644 --- a/src/lib/libcrypto/x509v3/v3_sxnet.c +++ b/src/lib/libcrypto/x509v3/v3_sxnet.c | |||
| @@ -114,7 +114,7 @@ static int sxnet_i2r(X509V3_EXT_METHOD *method, SXNET *sx, BIO *out, | |||
| 114 | id = sk_SXNETID_value(sx->ids, i); | 114 | id = sk_SXNETID_value(sx->ids, i); |
| 115 | tmp = i2s_ASN1_INTEGER(NULL, id->zone); | 115 | tmp = i2s_ASN1_INTEGER(NULL, id->zone); |
| 116 | BIO_printf(out, "\n%*sZone: %s, User: ", indent, "", tmp); | 116 | BIO_printf(out, "\n%*sZone: %s, User: ", indent, "", tmp); |
| 117 | OPENSSL_free(tmp); | 117 | free(tmp); |
| 118 | M_ASN1_OCTET_STRING_print(out, id->user); | 118 | M_ASN1_OCTET_STRING_print(out, id->user); |
| 119 | } | 119 | } |
| 120 | return 1; | 120 | return 1; |
diff --git a/src/lib/libcrypto/x509v3/v3_utl.c b/src/lib/libcrypto/x509v3/v3_utl.c index c4b6143eff..d938a175ed 100644 --- a/src/lib/libcrypto/x509v3/v3_utl.c +++ b/src/lib/libcrypto/x509v3/v3_utl.c | |||
| @@ -85,7 +85,7 @@ int X509V3_add_value(const char *name, const char *value, | |||
| 85 | char *tname = NULL, *tvalue = NULL; | 85 | char *tname = NULL, *tvalue = NULL; |
| 86 | if(name && !(tname = BUF_strdup(name))) goto err; | 86 | if(name && !(tname = BUF_strdup(name))) goto err; |
| 87 | if(value && !(tvalue = BUF_strdup(value))) goto err; | 87 | if(value && !(tvalue = BUF_strdup(value))) goto err; |
| 88 | if(!(vtmp = (CONF_VALUE *)OPENSSL_malloc(sizeof(CONF_VALUE)))) goto err; | 88 | if(!(vtmp = (CONF_VALUE *)malloc(sizeof(CONF_VALUE)))) goto err; |
| 89 | if(!*extlist && !(*extlist = sk_CONF_VALUE_new_null())) goto err; | 89 | if(!*extlist && !(*extlist = sk_CONF_VALUE_new_null())) goto err; |
| 90 | vtmp->section = NULL; | 90 | vtmp->section = NULL; |
| 91 | vtmp->name = tname; | 91 | vtmp->name = tname; |
| @@ -94,9 +94,9 @@ int X509V3_add_value(const char *name, const char *value, | |||
| 94 | return 1; | 94 | return 1; |
| 95 | err: | 95 | err: |
| 96 | X509V3err(X509V3_F_X509V3_ADD_VALUE,ERR_R_MALLOC_FAILURE); | 96 | X509V3err(X509V3_F_X509V3_ADD_VALUE,ERR_R_MALLOC_FAILURE); |
| 97 | if(vtmp) OPENSSL_free(vtmp); | 97 | if(vtmp) free(vtmp); |
| 98 | if(tname) OPENSSL_free(tname); | 98 | if(tname) free(tname); |
| 99 | if(tvalue) OPENSSL_free(tvalue); | 99 | if(tvalue) free(tvalue); |
| 100 | return 0; | 100 | return 0; |
| 101 | } | 101 | } |
| 102 | 102 | ||
| @@ -111,10 +111,10 @@ int X509V3_add_value_uchar(const char *name, const unsigned char *value, | |||
| 111 | void X509V3_conf_free(CONF_VALUE *conf) | 111 | void X509V3_conf_free(CONF_VALUE *conf) |
| 112 | { | 112 | { |
| 113 | if(!conf) return; | 113 | if(!conf) return; |
| 114 | if(conf->name) OPENSSL_free(conf->name); | 114 | if(conf->name) free(conf->name); |
| 115 | if(conf->value) OPENSSL_free(conf->value); | 115 | if(conf->value) free(conf->value); |
| 116 | if(conf->section) OPENSSL_free(conf->section); | 116 | if(conf->section) free(conf->section); |
| 117 | OPENSSL_free(conf); | 117 | free(conf); |
| 118 | } | 118 | } |
| 119 | 119 | ||
| 120 | int X509V3_add_value_bool(const char *name, int asn1_bool, | 120 | int X509V3_add_value_bool(const char *name, int asn1_bool, |
| @@ -206,7 +206,7 @@ int X509V3_add_value_int(const char *name, ASN1_INTEGER *aint, | |||
| 206 | if(!aint) return 1; | 206 | if(!aint) return 1; |
| 207 | if(!(strtmp = i2s_ASN1_INTEGER(NULL, aint))) return 0; | 207 | if(!(strtmp = i2s_ASN1_INTEGER(NULL, aint))) return 0; |
| 208 | ret = X509V3_add_value(name, strtmp, extlist); | 208 | ret = X509V3_add_value(name, strtmp, extlist); |
| 209 | OPENSSL_free(strtmp); | 209 | free(strtmp); |
| 210 | return ret; | 210 | return ret; |
| 211 | } | 211 | } |
| 212 | 212 | ||
| @@ -328,11 +328,11 @@ STACK_OF(CONF_VALUE) *X509V3_parse_list(const char *line) | |||
| 328 | } | 328 | } |
| 329 | X509V3_add_value(ntmp, NULL, &values); | 329 | X509V3_add_value(ntmp, NULL, &values); |
| 330 | } | 330 | } |
| 331 | OPENSSL_free(linebuf); | 331 | free(linebuf); |
| 332 | return values; | 332 | return values; |
| 333 | 333 | ||
| 334 | err: | 334 | err: |
| 335 | OPENSSL_free(linebuf); | 335 | free(linebuf); |
| 336 | sk_CONF_VALUE_pop_free(values, X509V3_conf_free); | 336 | sk_CONF_VALUE_pop_free(values, X509V3_conf_free); |
| 337 | return NULL; | 337 | return NULL; |
| 338 | 338 | ||
| @@ -355,7 +355,7 @@ static char *strip_spaces(char *name) | |||
| 355 | 355 | ||
| 356 | /* hex string utilities */ | 356 | /* hex string utilities */ |
| 357 | 357 | ||
| 358 | /* Given a buffer of length 'len' return a OPENSSL_malloc'ed string with its | 358 | /* Given a buffer of length 'len' return a malloc'ed string with its |
| 359 | * hex representation | 359 | * hex representation |
| 360 | * @@@ (Contents of buffer are always kept in ASCII, also on EBCDIC machines) | 360 | * @@@ (Contents of buffer are always kept in ASCII, also on EBCDIC machines) |
| 361 | */ | 361 | */ |
| @@ -367,7 +367,7 @@ char *hex_to_string(const unsigned char *buffer, long len) | |||
| 367 | int i; | 367 | int i; |
| 368 | const static char hexdig[] = "0123456789ABCDEF"; | 368 | const static char hexdig[] = "0123456789ABCDEF"; |
| 369 | if(!buffer || !len) return NULL; | 369 | if(!buffer || !len) return NULL; |
| 370 | if(!(tmp = OPENSSL_malloc(len * 3 + 1))) { | 370 | if(!(tmp = malloc(len * 3 + 1))) { |
| 371 | X509V3err(X509V3_F_HEX_TO_STRING,ERR_R_MALLOC_FAILURE); | 371 | X509V3err(X509V3_F_HEX_TO_STRING,ERR_R_MALLOC_FAILURE); |
| 372 | return NULL; | 372 | return NULL; |
| 373 | } | 373 | } |
| @@ -393,14 +393,14 @@ unsigned char *string_to_hex(const char *str, long *len) | |||
| 393 | X509V3err(X509V3_F_STRING_TO_HEX,X509V3_R_INVALID_NULL_ARGUMENT); | 393 | X509V3err(X509V3_F_STRING_TO_HEX,X509V3_R_INVALID_NULL_ARGUMENT); |
| 394 | return NULL; | 394 | return NULL; |
| 395 | } | 395 | } |
| 396 | if(!(hexbuf = OPENSSL_malloc(strlen(str) >> 1))) goto err; | 396 | if(!(hexbuf = malloc(strlen(str) >> 1))) goto err; |
| 397 | for(p = (unsigned char *)str, q = hexbuf; *p;) { | 397 | for(p = (unsigned char *)str, q = hexbuf; *p;) { |
| 398 | ch = *p++; | 398 | ch = *p++; |
| 399 | if(ch == ':') continue; | 399 | if(ch == ':') continue; |
| 400 | cl = *p++; | 400 | cl = *p++; |
| 401 | if(!cl) { | 401 | if(!cl) { |
| 402 | X509V3err(X509V3_F_STRING_TO_HEX,X509V3_R_ODD_NUMBER_OF_DIGITS); | 402 | X509V3err(X509V3_F_STRING_TO_HEX,X509V3_R_ODD_NUMBER_OF_DIGITS); |
| 403 | OPENSSL_free(hexbuf); | 403 | free(hexbuf); |
| 404 | return NULL; | 404 | return NULL; |
| 405 | } | 405 | } |
| 406 | if(isupper(ch)) ch = tolower(ch); | 406 | if(isupper(ch)) ch = tolower(ch); |
| @@ -422,12 +422,12 @@ unsigned char *string_to_hex(const char *str, long *len) | |||
| 422 | return hexbuf; | 422 | return hexbuf; |
| 423 | 423 | ||
| 424 | err: | 424 | err: |
| 425 | if(hexbuf) OPENSSL_free(hexbuf); | 425 | if(hexbuf) free(hexbuf); |
| 426 | X509V3err(X509V3_F_STRING_TO_HEX,ERR_R_MALLOC_FAILURE); | 426 | X509V3err(X509V3_F_STRING_TO_HEX,ERR_R_MALLOC_FAILURE); |
| 427 | return NULL; | 427 | return NULL; |
| 428 | 428 | ||
| 429 | badhex: | 429 | badhex: |
| 430 | OPENSSL_free(hexbuf); | 430 | free(hexbuf); |
| 431 | X509V3err(X509V3_F_STRING_TO_HEX,X509V3_R_ILLEGAL_HEX_DIGIT); | 431 | X509V3err(X509V3_F_STRING_TO_HEX,X509V3_R_ILLEGAL_HEX_DIGIT); |
| 432 | return NULL; | 432 | return NULL; |
| 433 | 433 | ||
| @@ -531,7 +531,7 @@ static STACK_OF(OPENSSL_STRING) *get_email(X509_NAME *name, GENERAL_NAMES *gens) | |||
| 531 | 531 | ||
| 532 | static void str_free(OPENSSL_STRING str) | 532 | static void str_free(OPENSSL_STRING str) |
| 533 | { | 533 | { |
| 534 | OPENSSL_free(str); | 534 | free(str); |
| 535 | } | 535 | } |
| 536 | 536 | ||
| 537 | static int append_ia5(STACK_OF(OPENSSL_STRING) **sk, ASN1_IA5STRING *email) | 537 | static int append_ia5(STACK_OF(OPENSSL_STRING) **sk, ASN1_IA5STRING *email) |
| @@ -608,7 +608,7 @@ ASN1_OCTET_STRING *a2i_IPADDRESS_NC(const char *ipasc) | |||
| 608 | 608 | ||
| 609 | iplen2 = a2i_ipadd(ipout + iplen1, p); | 609 | iplen2 = a2i_ipadd(ipout + iplen1, p); |
| 610 | 610 | ||
| 611 | OPENSSL_free(iptmp); | 611 | free(iptmp); |
| 612 | iptmp = NULL; | 612 | iptmp = NULL; |
| 613 | 613 | ||
| 614 | if (!iplen2 || (iplen1 != iplen2)) | 614 | if (!iplen2 || (iplen1 != iplen2)) |
| @@ -624,7 +624,7 @@ ASN1_OCTET_STRING *a2i_IPADDRESS_NC(const char *ipasc) | |||
| 624 | 624 | ||
| 625 | err: | 625 | err: |
| 626 | if (iptmp) | 626 | if (iptmp) |
| 627 | OPENSSL_free(iptmp); | 627 | free(iptmp); |
| 628 | if (ret) | 628 | if (ret) |
| 629 | ASN1_OCTET_STRING_free(ret); | 629 | ASN1_OCTET_STRING_free(ret); |
| 630 | return NULL; | 630 | return NULL; |
