summaryrefslogtreecommitdiff
path: root/src/lib/libssl/t1_enc.c
diff options
context:
space:
mode:
authorbeck <>2014-04-17 13:37:50 +0000
committerbeck <>2014-04-17 13:37:50 +0000
commitbddb7c686e3d1aeb156722adc64b6c35ae720f87 (patch)
tree7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libssl/t1_enc.c
parentecec66222d758996a4ff2671ca5026d9ede5ef76 (diff)
downloadopenbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.gz
openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.bz2
openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.zip
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes: OPENSSL_malloc->malloc OPENSSL_free->free OPENSSL_relloc->realloc OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libssl/t1_enc.c')
-rw-r--r--src/lib/libssl/t1_enc.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libssl/t1_enc.c b/src/lib/libssl/t1_enc.c
index 71d9f164b4..fb471b2f14 100644
--- a/src/lib/libssl/t1_enc.c
+++ b/src/lib/libssl/t1_enc.c
@@ -367,7 +367,7 @@ tls1_change_cipher_state(SSL *s, int which)
367 367
368 if (s->enc_read_ctx != NULL) 368 if (s->enc_read_ctx != NULL)
369 reuse_dd = 1; 369 reuse_dd = 1;
370 else if ((s->enc_read_ctx = OPENSSL_malloc(sizeof(EVP_CIPHER_CTX))) == NULL) 370 else if ((s->enc_read_ctx = malloc(sizeof(EVP_CIPHER_CTX))) == NULL)
371 goto err; 371 goto err;
372 else 372 else
373 /* make sure it's intialized in case we exit later with an error */ 373 /* make sure it's intialized in case we exit later with an error */
@@ -387,7 +387,7 @@ tls1_change_cipher_state(SSL *s, int which)
387 } 387 }
388 if (s->s3->rrec.comp == NULL) 388 if (s->s3->rrec.comp == NULL)
389 s->s3->rrec.comp = (unsigned char *) 389 s->s3->rrec.comp = (unsigned char *)
390 OPENSSL_malloc(SSL3_RT_MAX_ENCRYPTED_LENGTH); 390 malloc(SSL3_RT_MAX_ENCRYPTED_LENGTH);
391 if (s->s3->rrec.comp == NULL) 391 if (s->s3->rrec.comp == NULL)
392 goto err; 392 goto err;
393 } 393 }
@@ -592,7 +592,7 @@ tls1_setup_key_block(SSL *s)
592 592
593 ssl3_cleanup_key_block(s); 593 ssl3_cleanup_key_block(s);
594 594
595 if ((p1 = (unsigned char *)OPENSSL_malloc(num)) == NULL) { 595 if ((p1 = (unsigned char *)malloc(num)) == NULL) {
596 SSLerr(SSL_F_TLS1_SETUP_KEY_BLOCK, ERR_R_MALLOC_FAILURE); 596 SSLerr(SSL_F_TLS1_SETUP_KEY_BLOCK, ERR_R_MALLOC_FAILURE);
597 goto err; 597 goto err;
598 } 598 }
@@ -600,7 +600,7 @@ tls1_setup_key_block(SSL *s)
600 s->s3->tmp.key_block_length = num; 600 s->s3->tmp.key_block_length = num;
601 s->s3->tmp.key_block = p1; 601 s->s3->tmp.key_block = p1;
602 602
603 if ((p2 = (unsigned char *)OPENSSL_malloc(num)) == NULL) { 603 if ((p2 = (unsigned char *)malloc(num)) == NULL) {
604 SSLerr(SSL_F_TLS1_SETUP_KEY_BLOCK, ERR_R_MALLOC_FAILURE); 604 SSLerr(SSL_F_TLS1_SETUP_KEY_BLOCK, ERR_R_MALLOC_FAILURE);
605 goto err; 605 goto err;
606 } 606 }
@@ -642,7 +642,7 @@ tls1_setup_key_block(SSL *s)
642err: 642err:
643 if (p2) { 643 if (p2) {
644 OPENSSL_cleanse(p2, num); 644 OPENSSL_cleanse(p2, num);
645 OPENSSL_free(p2); 645 free(p2);
646 } 646 }
647 return (ret); 647 return (ret);
648} 648}
@@ -1074,7 +1074,7 @@ tls1_export_keying_material(SSL *s, unsigned char *out, size_t olen,
1074 printf ("tls1_export_keying_material(%p,%p,%d,%s,%d,%p,%d)\n", s, out, olen, label, llen, p, plen); 1074 printf ("tls1_export_keying_material(%p,%p,%d,%s,%d,%p,%d)\n", s, out, olen, label, llen, p, plen);
1075#endif /* KSSL_DEBUG */ 1075#endif /* KSSL_DEBUG */
1076 1076
1077 buff = OPENSSL_malloc(olen); 1077 buff = malloc(olen);
1078 if (buff == NULL) 1078 if (buff == NULL)
1079 goto err2; 1079 goto err2;
1080 1080
@@ -1088,7 +1088,7 @@ tls1_export_keying_material(SSL *s, unsigned char *out, size_t olen,
1088 vallen += 2 + contextlen; 1088 vallen += 2 + contextlen;
1089 } 1089 }
1090 1090
1091 val = OPENSSL_malloc(vallen); 1091 val = malloc(vallen);
1092 if (val == NULL) 1092 if (val == NULL)
1093 goto err2; 1093 goto err2;
1094 currentvalpos = 0; 1094 currentvalpos = 0;
@@ -1145,9 +1145,9 @@ err2:
1145 rv = 0; 1145 rv = 0;
1146ret: 1146ret:
1147 if (buff != NULL) 1147 if (buff != NULL)
1148 OPENSSL_free(buff); 1148 free(buff);
1149 if (val != NULL) 1149 if (val != NULL)
1150 OPENSSL_free(val); 1150 free(val);
1151 return (rv); 1151 return (rv);
1152} 1152}
1153 1153