diff options
| author | beck <> | 2014-04-17 13:37:50 +0000 |
|---|---|---|
| committer | beck <> | 2014-04-17 13:37:50 +0000 |
| commit | 6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd (patch) | |
| tree | 7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libssl/ssl_sess.c | |
| parent | 4d13fb9c7b5ac7311d7031173c21ab0121388413 (diff) | |
| download | openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.tar.gz openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.tar.bz2 openbsd-6aa5f85bab6ba5f9189fbc3d53a12e0f6dae48dd.zip | |
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes:
OPENSSL_malloc->malloc
OPENSSL_free->free
OPENSSL_relloc->realloc
OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libssl/ssl_sess.c')
| -rw-r--r-- | src/lib/libssl/ssl_sess.c | 32 |
1 files changed, 16 insertions, 16 deletions
diff --git a/src/lib/libssl/ssl_sess.c b/src/lib/libssl/ssl_sess.c index 0b1c655820..f9f6ee5ecb 100644 --- a/src/lib/libssl/ssl_sess.c +++ b/src/lib/libssl/ssl_sess.c | |||
| @@ -195,7 +195,7 @@ SSL_SESSION | |||
| 195 | { | 195 | { |
| 196 | SSL_SESSION *ss; | 196 | SSL_SESSION *ss; |
| 197 | 197 | ||
| 198 | ss = (SSL_SESSION *)OPENSSL_malloc(sizeof(SSL_SESSION)); | 198 | ss = (SSL_SESSION *)malloc(sizeof(SSL_SESSION)); |
| 199 | if (ss == NULL) { | 199 | if (ss == NULL) { |
| 200 | SSLerr(SSL_F_SSL_SESSION_NEW, ERR_R_MALLOC_FAILURE); | 200 | SSLerr(SSL_F_SSL_SESSION_NEW, ERR_R_MALLOC_FAILURE); |
| 201 | return (0); | 201 | return (0); |
| @@ -371,8 +371,8 @@ ssl_get_new_session(SSL *s, int session) | |||
| 371 | #ifndef OPENSSL_NO_EC | 371 | #ifndef OPENSSL_NO_EC |
| 372 | if (s->tlsext_ecpointformatlist) { | 372 | if (s->tlsext_ecpointformatlist) { |
| 373 | if (ss->tlsext_ecpointformatlist != NULL) | 373 | if (ss->tlsext_ecpointformatlist != NULL) |
| 374 | OPENSSL_free(ss->tlsext_ecpointformatlist); | 374 | free(ss->tlsext_ecpointformatlist); |
| 375 | if ((ss->tlsext_ecpointformatlist = OPENSSL_malloc(s->tlsext_ecpointformatlist_length)) == NULL) { | 375 | if ((ss->tlsext_ecpointformatlist = malloc(s->tlsext_ecpointformatlist_length)) == NULL) { |
| 376 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); | 376 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); |
| 377 | SSL_SESSION_free(ss); | 377 | SSL_SESSION_free(ss); |
| 378 | return 0; | 378 | return 0; |
| @@ -382,8 +382,8 @@ ssl_get_new_session(SSL *s, int session) | |||
| 382 | } | 382 | } |
| 383 | if (s->tlsext_ellipticcurvelist) { | 383 | if (s->tlsext_ellipticcurvelist) { |
| 384 | if (ss->tlsext_ellipticcurvelist != NULL) | 384 | if (ss->tlsext_ellipticcurvelist != NULL) |
| 385 | OPENSSL_free(ss->tlsext_ellipticcurvelist); | 385 | free(ss->tlsext_ellipticcurvelist); |
| 386 | if ((ss->tlsext_ellipticcurvelist = OPENSSL_malloc(s->tlsext_ellipticcurvelist_length)) == NULL) { | 386 | if ((ss->tlsext_ellipticcurvelist = malloc(s->tlsext_ellipticcurvelist_length)) == NULL) { |
| 387 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); | 387 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_MALLOC_FAILURE); |
| 388 | SSL_SESSION_free(ss); | 388 | SSL_SESSION_free(ss); |
| 389 | return 0; | 389 | return 0; |
| @@ -719,30 +719,30 @@ SSL_SESSION_free(SSL_SESSION *ss) | |||
| 719 | sk_SSL_CIPHER_free(ss->ciphers); | 719 | sk_SSL_CIPHER_free(ss->ciphers); |
| 720 | #ifndef OPENSSL_NO_TLSEXT | 720 | #ifndef OPENSSL_NO_TLSEXT |
| 721 | if (ss->tlsext_hostname != NULL) | 721 | if (ss->tlsext_hostname != NULL) |
| 722 | OPENSSL_free(ss->tlsext_hostname); | 722 | free(ss->tlsext_hostname); |
| 723 | if (ss->tlsext_tick != NULL) | 723 | if (ss->tlsext_tick != NULL) |
| 724 | OPENSSL_free(ss->tlsext_tick); | 724 | free(ss->tlsext_tick); |
| 725 | #ifndef OPENSSL_NO_EC | 725 | #ifndef OPENSSL_NO_EC |
| 726 | ss->tlsext_ecpointformatlist_length = 0; | 726 | ss->tlsext_ecpointformatlist_length = 0; |
| 727 | if (ss->tlsext_ecpointformatlist != NULL) | 727 | if (ss->tlsext_ecpointformatlist != NULL) |
| 728 | OPENSSL_free(ss->tlsext_ecpointformatlist); | 728 | free(ss->tlsext_ecpointformatlist); |
| 729 | ss->tlsext_ellipticcurvelist_length = 0; | 729 | ss->tlsext_ellipticcurvelist_length = 0; |
| 730 | if (ss->tlsext_ellipticcurvelist != NULL) | 730 | if (ss->tlsext_ellipticcurvelist != NULL) |
| 731 | OPENSSL_free(ss->tlsext_ellipticcurvelist); | 731 | free(ss->tlsext_ellipticcurvelist); |
| 732 | #endif /* OPENSSL_NO_EC */ | 732 | #endif /* OPENSSL_NO_EC */ |
| 733 | #endif | 733 | #endif |
| 734 | #ifndef OPENSSL_NO_PSK | 734 | #ifndef OPENSSL_NO_PSK |
| 735 | if (ss->psk_identity_hint != NULL) | 735 | if (ss->psk_identity_hint != NULL) |
| 736 | OPENSSL_free(ss->psk_identity_hint); | 736 | free(ss->psk_identity_hint); |
| 737 | if (ss->psk_identity != NULL) | 737 | if (ss->psk_identity != NULL) |
| 738 | OPENSSL_free(ss->psk_identity); | 738 | free(ss->psk_identity); |
| 739 | #endif | 739 | #endif |
| 740 | #ifndef OPENSSL_NO_SRP | 740 | #ifndef OPENSSL_NO_SRP |
| 741 | if (ss->srp_username != NULL) | 741 | if (ss->srp_username != NULL) |
| 742 | OPENSSL_free(ss->srp_username); | 742 | free(ss->srp_username); |
| 743 | #endif | 743 | #endif |
| 744 | OPENSSL_cleanse(ss, sizeof(*ss)); | 744 | OPENSSL_cleanse(ss, sizeof(*ss)); |
| 745 | OPENSSL_free(ss); | 745 | free(ss); |
| 746 | } | 746 | } |
| 747 | 747 | ||
| 748 | int | 748 | int |
| @@ -768,7 +768,7 @@ SSL_set_session(SSL *s, SSL_SESSION *session) | |||
| 768 | #ifndef OPENSSL_NO_KRB5 | 768 | #ifndef OPENSSL_NO_KRB5 |
| 769 | if (s->kssl_ctx && !s->kssl_ctx->client_princ && | 769 | if (s->kssl_ctx && !s->kssl_ctx->client_princ && |
| 770 | session->krb5_client_princ_len > 0) { | 770 | session->krb5_client_princ_len > 0) { |
| 771 | s->kssl_ctx->client_princ = (char *)OPENSSL_malloc(session->krb5_client_princ_len + 1); | 771 | s->kssl_ctx->client_princ = (char *)malloc(session->krb5_client_princ_len + 1); |
| 772 | memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ, | 772 | memcpy(s->kssl_ctx->client_princ, session->krb5_client_princ, |
| 773 | session->krb5_client_princ_len); | 773 | session->krb5_client_princ_len); |
| 774 | s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0'; | 774 | s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0'; |
| @@ -900,11 +900,11 @@ SSL_set_session_ticket_ext(SSL *s, void *ext_data, int ext_len) | |||
| 900 | { | 900 | { |
| 901 | if (s->version >= TLS1_VERSION) { | 901 | if (s->version >= TLS1_VERSION) { |
| 902 | if (s->tlsext_session_ticket) { | 902 | if (s->tlsext_session_ticket) { |
| 903 | OPENSSL_free(s->tlsext_session_ticket); | 903 | free(s->tlsext_session_ticket); |
| 904 | s->tlsext_session_ticket = NULL; | 904 | s->tlsext_session_ticket = NULL; |
| 905 | } | 905 | } |
| 906 | 906 | ||
| 907 | s->tlsext_session_ticket = OPENSSL_malloc(sizeof(TLS_SESSION_TICKET_EXT) + ext_len); | 907 | s->tlsext_session_ticket = malloc(sizeof(TLS_SESSION_TICKET_EXT) + ext_len); |
| 908 | if (!s->tlsext_session_ticket) { | 908 | if (!s->tlsext_session_ticket) { |
| 909 | SSLerr(SSL_F_SSL_SET_SESSION_TICKET_EXT, ERR_R_MALLOC_FAILURE); | 909 | SSLerr(SSL_F_SSL_SET_SESSION_TICKET_EXT, ERR_R_MALLOC_FAILURE); |
| 910 | return 0; | 910 | return 0; |
