diff options
Diffstat (limited to 'src/lib/libcrypto/ec/ec_asn1.c')
-rw-r--r-- | src/lib/libcrypto/ec/ec_asn1.c | 26 |
1 files changed, 13 insertions, 13 deletions
diff --git a/src/lib/libcrypto/ec/ec_asn1.c b/src/lib/libcrypto/ec/ec_asn1.c index 145807b611..2bde9a6a3c 100644 --- a/src/lib/libcrypto/ec/ec_asn1.c +++ b/src/lib/libcrypto/ec/ec_asn1.c | |||
@@ -485,7 +485,7 @@ static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) | |||
485 | } | 485 | } |
486 | else | 486 | else |
487 | { | 487 | { |
488 | if ((buffer_1 = OPENSSL_malloc(len_1)) == NULL) | 488 | if ((buffer_1 = malloc(len_1)) == NULL) |
489 | { | 489 | { |
490 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, | 490 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, |
491 | ERR_R_MALLOC_FAILURE); | 491 | ERR_R_MALLOC_FAILURE); |
@@ -507,7 +507,7 @@ static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) | |||
507 | } | 507 | } |
508 | else | 508 | else |
509 | { | 509 | { |
510 | if ((buffer_2 = OPENSSL_malloc(len_2)) == NULL) | 510 | if ((buffer_2 = malloc(len_2)) == NULL) |
511 | { | 511 | { |
512 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, | 512 | ECerr(EC_F_EC_ASN1_GROUP2CURVE, |
513 | ERR_R_MALLOC_FAILURE); | 513 | ERR_R_MALLOC_FAILURE); |
@@ -559,9 +559,9 @@ static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) | |||
559 | ok = 1; | 559 | ok = 1; |
560 | 560 | ||
561 | err: if (buffer_1) | 561 | err: if (buffer_1) |
562 | OPENSSL_free(buffer_1); | 562 | free(buffer_1); |
563 | if (buffer_2) | 563 | if (buffer_2) |
564 | OPENSSL_free(buffer_2); | 564 | free(buffer_2); |
565 | if (tmp_1) | 565 | if (tmp_1) |
566 | BN_free(tmp_1); | 566 | BN_free(tmp_1); |
567 | if (tmp_2) | 567 | if (tmp_2) |
@@ -630,7 +630,7 @@ static ECPARAMETERS *ec_asn1_group2parameters(const EC_GROUP *group, | |||
630 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB); | 630 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_EC_LIB); |
631 | goto err; | 631 | goto err; |
632 | } | 632 | } |
633 | if ((buffer = OPENSSL_malloc(len)) == NULL) | 633 | if ((buffer = malloc(len)) == NULL) |
634 | { | 634 | { |
635 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_MALLOC_FAILURE); | 635 | ECerr(EC_F_EC_ASN1_GROUP2PARAMETERS, ERR_R_MALLOC_FAILURE); |
636 | goto err; | 636 | goto err; |
@@ -686,7 +686,7 @@ err : if(!ok) | |||
686 | if (tmp) | 686 | if (tmp) |
687 | BN_free(tmp); | 687 | BN_free(tmp); |
688 | if (buffer) | 688 | if (buffer) |
689 | OPENSSL_free(buffer); | 689 | free(buffer); |
690 | return(ret); | 690 | return(ret); |
691 | } | 691 | } |
692 | 692 | ||
@@ -925,8 +925,8 @@ static EC_GROUP *ec_asn1_parameters2group(const ECPARAMETERS *params) | |||
925 | if (params->curve->seed != NULL) | 925 | if (params->curve->seed != NULL) |
926 | { | 926 | { |
927 | if (ret->seed != NULL) | 927 | if (ret->seed != NULL) |
928 | OPENSSL_free(ret->seed); | 928 | free(ret->seed); |
929 | if (!(ret->seed = OPENSSL_malloc(params->curve->seed->length))) | 929 | if (!(ret->seed = malloc(params->curve->seed->length))) |
930 | { | 930 | { |
931 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, | 931 | ECerr(EC_F_EC_ASN1_PARAMETERS2GROUP, |
932 | ERR_R_MALLOC_FAILURE); | 932 | ERR_R_MALLOC_FAILURE); |
@@ -1247,7 +1247,7 @@ int i2d_ECPrivateKey(EC_KEY *a, unsigned char **out) | |||
1247 | priv_key->version = a->version; | 1247 | priv_key->version = a->version; |
1248 | 1248 | ||
1249 | buf_len = (size_t)BN_num_bytes(a->priv_key); | 1249 | buf_len = (size_t)BN_num_bytes(a->priv_key); |
1250 | buffer = OPENSSL_malloc(buf_len); | 1250 | buffer = malloc(buf_len); |
1251 | if (buffer == NULL) | 1251 | if (buffer == NULL) |
1252 | { | 1252 | { |
1253 | ECerr(EC_F_I2D_ECPRIVATEKEY, | 1253 | ECerr(EC_F_I2D_ECPRIVATEKEY, |
@@ -1292,7 +1292,7 @@ int i2d_ECPrivateKey(EC_KEY *a, unsigned char **out) | |||
1292 | 1292 | ||
1293 | if (tmp_len > buf_len) | 1293 | if (tmp_len > buf_len) |
1294 | { | 1294 | { |
1295 | unsigned char *tmp_buffer = OPENSSL_realloc(buffer, tmp_len); | 1295 | unsigned char *tmp_buffer = realloc(buffer, tmp_len); |
1296 | if (!tmp_buffer) | 1296 | if (!tmp_buffer) |
1297 | { | 1297 | { |
1298 | ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE); | 1298 | ECerr(EC_F_I2D_ECPRIVATEKEY, ERR_R_MALLOC_FAILURE); |
@@ -1327,7 +1327,7 @@ int i2d_ECPrivateKey(EC_KEY *a, unsigned char **out) | |||
1327 | ok=1; | 1327 | ok=1; |
1328 | err: | 1328 | err: |
1329 | if (buffer) | 1329 | if (buffer) |
1330 | OPENSSL_free(buffer); | 1330 | free(buffer); |
1331 | if (priv_key) | 1331 | if (priv_key) |
1332 | EC_PRIVATEKEY_free(priv_key); | 1332 | EC_PRIVATEKEY_free(priv_key); |
1333 | return(ok?ret:0); | 1333 | return(ok?ret:0); |
@@ -1424,7 +1424,7 @@ int i2o_ECPublicKey(EC_KEY *a, unsigned char **out) | |||
1424 | 1424 | ||
1425 | if (*out == NULL) | 1425 | if (*out == NULL) |
1426 | { | 1426 | { |
1427 | if ((*out = OPENSSL_malloc(buf_len)) == NULL) | 1427 | if ((*out = malloc(buf_len)) == NULL) |
1428 | { | 1428 | { |
1429 | ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_MALLOC_FAILURE); | 1429 | ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_MALLOC_FAILURE); |
1430 | return 0; | 1430 | return 0; |
@@ -1435,7 +1435,7 @@ int i2o_ECPublicKey(EC_KEY *a, unsigned char **out) | |||
1435 | *out, buf_len, NULL)) | 1435 | *out, buf_len, NULL)) |
1436 | { | 1436 | { |
1437 | ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_EC_LIB); | 1437 | ECerr(EC_F_I2O_ECPUBLICKEY, ERR_R_EC_LIB); |
1438 | OPENSSL_free(*out); | 1438 | free(*out); |
1439 | *out = NULL; | 1439 | *out = NULL; |
1440 | return 0; | 1440 | return 0; |
1441 | } | 1441 | } |