diff options
Diffstat (limited to 'src/lib/libcrypto/ec/ec_asn1.c')
| -rw-r--r-- | src/lib/libcrypto/ec/ec_asn1.c | 26 |
1 files changed, 13 insertions, 13 deletions
diff --git a/src/lib/libcrypto/ec/ec_asn1.c b/src/lib/libcrypto/ec/ec_asn1.c index 145807b611..2bde9a6a3c 100644 --- a/src/lib/libcrypto/ec/ec_asn1.c +++ b/src/lib/libcrypto/ec/ec_asn1.c | |||
| @@ -485,7 +485,7 @@ static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) | |||
| 485 | } | 485 | } |
| 486 | else | 486 | else |
| 487 | { | 487 | { |
| 488 | if ((buffer_1 = OPENSSL_malloc(len_1)) == NULL) | 488 | if ((buffer_1 = malloc(len_1)) == NULL) |
| 489 | { | 489 | { |
| 490 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, | 490 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, |
| 491 | ERR_R_MALLOC_FAILURE); | 491 | ERR_R_MALLOC_FAILURE); |
| @@ -507,7 +507,7 @@ static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) | |||
| 507 | } | 507 | } |
| 508 | else | 508 | else |
| 509 | { | 509 | { |
| 510 | if ((buffer_2 = OPENSSL_malloc(len_2)) == NULL) | 510 | if ((buffer_2 = malloc(len_2)) == NULL) |
| 511 | { | 511 | { |
| 512 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, | 512 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, |
| 513 | ERR_R_MALLOC_FAILURE); | 513 | ERR_R_MALLOC_FAILURE); |
| @@ -559,9 +559,9 @@ static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) | |||
| 559 | ok = 1; | 559 | ok = 1; |
| 560 | 560 | ||
| 561 | err: if (buffer_1) | 561 | err: if (buffer_1) |
| 562 | OPENSSL_free(buffer_1); | 562 | free(buffer_1); |
| 563 | if (buffer_2) | 563 | if (buffer_2) |
| 564 | OPENSSL_free(buffer_2); | 564 | free(buffer_2); |
| 565 | if (tmp_1) | 565 | if (tmp_1) |
| 566 | BN_free(tmp_1); | 566 | BN_free(tmp_1); |
| 567 | if (tmp_2) | 567 | if (tmp_2) |
| @@ -630,7 +630,7 @@ static ECPARAMETERS *ec_asn1_group2parameters(const EC_GROUP *group, | |||
| 630 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB); | 630 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB); |
| 631 | goto err; | 631 | goto err; |
| 632 | } | 632 | } |
| 633 | if ((buffer = OPENSSL_malloc(len)) == NULL) | 633 | if ((buffer = malloc(len)) == NULL) |
| 634 | { | 634 | { |
| 635 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_MALLOC_FAILURE); | 635 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_MALLOC_FAILURE); |
| 636 | goto err; | 636 | goto err; |
| @@ -686,7 +686,7 @@ err : if(!ok) | |||
| 686 | if (tmp) | 686 | if (tmp) |
| 687 | BN_free(tmp); | 687 | BN_free(tmp); |
| 688 | if (buffer) | 688 | if (buffer) |
| 689 | OPENSSL_free(buffer); | 689 | free(buffer); |
| 690 | return(ret); | 690 | return(ret); |
| 691 | } | 691 | } |
| 692 | 692 | ||
| @@ -925,8 +925,8 @@ static EC_GROUP *ec_asn1_parameters2group(const ECPARAMETERS *params) | |||
| 925 | if (params->curve->seed != NULL) | 925 | if (params->curve->seed != NULL) |
| 926 | { | 926 | { |
| 927 | if (ret->seed != NULL) | 927 | if (ret->seed != NULL) |
| 928 | OPENSSL_free(ret->seed); | 928 | free(ret->seed); |
| 929 | if (!(ret->seed = OPENSSL_malloc(params->curve->seed->length))) | 929 | if (!(ret->seed = malloc(params->curve->seed->length))) |
| 930 | { | 930 | { |
| 931 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, | 931 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, |
| 932 | ERR_R_MALLOC_FAILURE); | 932 | ERR_R_MALLOC_FAILURE); |
| @@ -1247,7 +1247,7 @@ int i2d_ECPrivateKey(EC_KEY *a, unsigned char **out) | |||
| 1247 | priv_key->version = a->version; | 1247 | priv_key->version = a->version; |
| 1248 | 1248 | ||
| 1249 | buf_len = (size_t)BN_num_bytes(a->priv_key); | 1249 | buf_len = (size_t)BN_num_bytes(a->priv_key); |
| 1250 | buffer = OPENSSL_malloc(buf_len); | 1250 | buffer = malloc(buf_len); |
| 1251 | if (buffer == NULL) | 1251 | if (buffer == NULL) |
| 1252 | { | 1252 | { |
| 1253 | ECerr(EC_F_I2D_ECPRIVATEKEY, | 1253 | ECerr(EC_F_I2D_ECPRIVATEKEY, |
| @@ -1292,7 +1292,7 @@ int i2d_ECPrivateKey(EC_KEY *a, unsigned char **out) | |||
| 1292 | 1292 | ||
| 1293 | if (tmp_len > buf_len) | 1293 | if (tmp_len > buf_len) |
| 1294 | { | 1294 | { |
| 1295 | unsigned char *tmp_buffer = OPENSSL_realloc(buffer, tmp_len); | 1295 | unsigned char *tmp_buffer = realloc(buffer, tmp_len); |
| 1296 | if (!tmp_buffer) | 1296 | if (!tmp_buffer) |
| 1297 | { | 1297 | { |
| 1298 | ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE); | 1298 | ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE); |
| @@ -1327,7 +1327,7 @@ int i2d_ECPrivateKey(EC_KEY *a, unsigned char **out) | |||
| 1327 | ok=1; | 1327 | ok=1; |
| 1328 | err: | 1328 | err: |
| 1329 | if (buffer) | 1329 | if (buffer) |
| 1330 | OPENSSL_free(buffer); | 1330 | free(buffer); |
| 1331 | if (priv_key) | 1331 | if (priv_key) |
| 1332 | EC_PRIVATEKEY_free(priv_key); | 1332 | EC_PRIVATEKEY_free(priv_key); |
| 1333 | return(ok?ret:0); | 1333 | return(ok?ret:0); |
| @@ -1424,7 +1424,7 @@ int i2o_ECPublicKey(EC_KEY *a, unsigned char **out) | |||
| 1424 | 1424 | ||
| 1425 | if (*out == NULL) | 1425 | if (*out == NULL) |
| 1426 | { | 1426 | { |
| 1427 | if ((*out = OPENSSL_malloc(buf_len)) == NULL) | 1427 | if ((*out = malloc(buf_len)) == NULL) |
| 1428 | { | 1428 | { |
| 1429 | ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_MALLOC_FAILURE); | 1429 | ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_MALLOC_FAILURE); |
| 1430 | return 0; | 1430 | return 0; |
| @@ -1435,7 +1435,7 @@ int i2o_ECPublicKey(EC_KEY *a, unsigned char **out) | |||
| 1435 | *out, buf_len, NULL)) | 1435 | *out, buf_len, NULL)) |
| 1436 | { | 1436 | { |
| 1437 | ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_EC_LIB); | 1437 | ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_EC_LIB); |
| 1438 | OPENSSL_free(*out); | 1438 | free(*out); |
| 1439 | *out = NULL; | 1439 | *out = NULL; |
| 1440 | return 0; | 1440 | return 0; |
| 1441 | } | 1441 | } |
