diff options
author | beck <> | 2014-04-17 13:37:50 +0000 |
---|---|---|
committer | beck <> | 2014-04-17 13:37:50 +0000 |
commit | bddb7c686e3d1aeb156722adc64b6c35ae720f87 (patch) | |
tree | 7595a93a27385c367802aa17ecf20f96551cf14d /src/lib/libssl/t1_enc.c | |
parent | ecec66222d758996a4ff2671ca5026d9ede5ef76 (diff) | |
download | openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.gz openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.tar.bz2 openbsd-bddb7c686e3d1aeb156722adc64b6c35ae720f87.zip |
Change library to use intrinsic memory allocation functions instead of
OPENSSL_foo wrappers. This changes:
OPENSSL_malloc->malloc
OPENSSL_free->free
OPENSSL_relloc->realloc
OPENSSL_freeFunc->free
Diffstat (limited to 'src/lib/libssl/t1_enc.c')
-rw-r--r-- | src/lib/libssl/t1_enc.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libssl/t1_enc.c b/src/lib/libssl/t1_enc.c index 71d9f164b4..fb471b2f14 100644 --- a/src/lib/libssl/t1_enc.c +++ b/src/lib/libssl/t1_enc.c | |||
@@ -367,7 +367,7 @@ tls1_change_cipher_state(SSL *s, int which) | |||
367 | 367 | ||
368 | if (s->enc_read_ctx != NULL) | 368 | if (s->enc_read_ctx != NULL) |
369 | reuse_dd = 1; | 369 | reuse_dd = 1; |
370 | else if ((s->enc_read_ctx = OPENSSL_malloc(sizeof(EVP_CIPHER_CTX))) == NULL) | 370 | else if ((s->enc_read_ctx = malloc(sizeof(EVP_CIPHER_CTX))) == NULL) |
371 | goto err; | 371 | goto err; |
372 | else | 372 | else |
373 | /* make sure it's intialized in case we exit later with an error */ | 373 | /* make sure it's intialized in case we exit later with an error */ |
@@ -387,7 +387,7 @@ tls1_change_cipher_state(SSL *s, int which) | |||
387 | } | 387 | } |
388 | if (s->s3->rrec.comp == NULL) | 388 | if (s->s3->rrec.comp == NULL) |
389 | s->s3->rrec.comp = (unsigned char *) | 389 | s->s3->rrec.comp = (unsigned char *) |
390 | OPENSSL_malloc(SSL3_RT_MAX_ENCRYPTED_LENGTH); | 390 | malloc(SSL3_RT_MAX_ENCRYPTED_LENGTH); |
391 | if (s->s3->rrec.comp == NULL) | 391 | if (s->s3->rrec.comp == NULL) |
392 | goto err; | 392 | goto err; |
393 | } | 393 | } |
@@ -592,7 +592,7 @@ tls1_setup_key_block(SSL *s) | |||
592 | 592 | ||
593 | ssl3_cleanup_key_block(s); | 593 | ssl3_cleanup_key_block(s); |
594 | 594 | ||
595 | if ((p1 = (unsigned char *)OPENSSL_malloc(num)) == NULL) { | 595 | if ((p1 = (unsigned char *)malloc(num)) == NULL) { |
596 | SSLerr(SSL_F_TLS1_SETUP_KEY_BLOCK, ERR_R_MALLOC_FAILURE); | 596 | SSLerr(SSL_F_TLS1_SETUP_KEY_BLOCK, ERR_R_MALLOC_FAILURE); |
597 | goto err; | 597 | goto err; |
598 | } | 598 | } |
@@ -600,7 +600,7 @@ tls1_setup_key_block(SSL *s) | |||
600 | s->s3->tmp.key_block_length = num; | 600 | s->s3->tmp.key_block_length = num; |
601 | s->s3->tmp.key_block = p1; | 601 | s->s3->tmp.key_block = p1; |
602 | 602 | ||
603 | if ((p2 = (unsigned char *)OPENSSL_malloc(num)) == NULL) { | 603 | if ((p2 = (unsigned char *)malloc(num)) == NULL) { |
604 | SSLerr(SSL_F_TLS1_SETUP_KEY_BLOCK, ERR_R_MALLOC_FAILURE); | 604 | SSLerr(SSL_F_TLS1_SETUP_KEY_BLOCK, ERR_R_MALLOC_FAILURE); |
605 | goto err; | 605 | goto err; |
606 | } | 606 | } |
@@ -642,7 +642,7 @@ tls1_setup_key_block(SSL *s) | |||
642 | err: | 642 | err: |
643 | if (p2) { | 643 | if (p2) { |
644 | OPENSSL_cleanse(p2, num); | 644 | OPENSSL_cleanse(p2, num); |
645 | OPENSSL_free(p2); | 645 | free(p2); |
646 | } | 646 | } |
647 | return (ret); | 647 | return (ret); |
648 | } | 648 | } |
@@ -1074,7 +1074,7 @@ tls1_export_keying_material(SSL *s, unsigned char *out, size_t olen, | |||
1074 | printf ("tls1_export_keying_material(%p,%p,%d,%s,%d,%p,%d)\n", s, out, olen, label, llen, p, plen); | 1074 | printf ("tls1_export_keying_material(%p,%p,%d,%s,%d,%p,%d)\n", s, out, olen, label, llen, p, plen); |
1075 | #endif /* KSSL_DEBUG */ | 1075 | #endif /* KSSL_DEBUG */ |
1076 | 1076 | ||
1077 | buff = OPENSSL_malloc(olen); | 1077 | buff = malloc(olen); |
1078 | if (buff == NULL) | 1078 | if (buff == NULL) |
1079 | goto err2; | 1079 | goto err2; |
1080 | 1080 | ||
@@ -1088,7 +1088,7 @@ tls1_export_keying_material(SSL *s, unsigned char *out, size_t olen, | |||
1088 | vallen += 2 + contextlen; | 1088 | vallen += 2 + contextlen; |
1089 | } | 1089 | } |
1090 | 1090 | ||
1091 | val = OPENSSL_malloc(vallen); | 1091 | val = malloc(vallen); |
1092 | if (val == NULL) | 1092 | if (val == NULL) |
1093 | goto err2; | 1093 | goto err2; |
1094 | currentvalpos = 0; | 1094 | currentvalpos = 0; |
@@ -1145,9 +1145,9 @@ err2: | |||
1145 | rv = 0; | 1145 | rv = 0; |
1146 | ret: | 1146 | ret: |
1147 | if (buff != NULL) | 1147 | if (buff != NULL) |
1148 | OPENSSL_free(buff); | 1148 | free(buff); |
1149 | if (val != NULL) | 1149 | if (val != NULL) |
1150 | OPENSSL_free(val); | 1150 | free(val); |
1151 | return (rv); | 1151 | return (rv); |
1152 | } | 1152 | } |
1153 | 1153 | ||