diff options
Diffstat (limited to 'src/lib/libcrypto/pem')
| -rw-r--r-- | src/lib/libcrypto/pem/pem_info.c | 12 | ||||
| -rw-r--r-- | src/lib/libcrypto/pem/pem_lib.c | 28 | ||||
| -rw-r--r-- | src/lib/libcrypto/pem/pem_oth.c | 2 | ||||
| -rw-r--r-- | src/lib/libcrypto/pem/pem_pkey.c | 8 | ||||
| -rw-r--r-- | src/lib/libcrypto/pem/pem_seal.c | 8 | ||||
| -rw-r--r-- | src/lib/libcrypto/pem/pem_sign.c | 4 | ||||
| -rw-r--r-- | src/lib/libcrypto/pem/pvkfmt.c | 24 |
7 files changed, 43 insertions, 43 deletions
diff --git a/src/lib/libcrypto/pem/pem_info.c b/src/lib/libcrypto/pem/pem_info.c index cc7f24a9c1..4351260dfb 100644 --- a/src/lib/libcrypto/pem/pem_info.c +++ b/src/lib/libcrypto/pem/pem_info.c | |||
| @@ -272,9 +272,9 @@ start: | |||
| 272 | else { | 272 | else { |
| 273 | /* unknown */ | 273 | /* unknown */ |
| 274 | } | 274 | } |
| 275 | if (name != NULL) OPENSSL_free(name); | 275 | if (name != NULL) free(name); |
| 276 | if (header != NULL) OPENSSL_free(header); | 276 | if (header != NULL) free(header); |
| 277 | if (data != NULL) OPENSSL_free(data); | 277 | if (data != NULL) free(data); |
| 278 | name=NULL; | 278 | name=NULL; |
| 279 | header=NULL; | 279 | header=NULL; |
| 280 | data=NULL; | 280 | data=NULL; |
| @@ -303,9 +303,9 @@ err: | |||
| 303 | ret=NULL; | 303 | ret=NULL; |
| 304 | } | 304 | } |
| 305 | 305 | ||
| 306 | if (name != NULL) OPENSSL_free(name); | 306 | if (name != NULL) free(name); |
| 307 | if (header != NULL) OPENSSL_free(header); | 307 | if (header != NULL) free(header); |
| 308 | if (data != NULL) OPENSSL_free(data); | 308 | if (data != NULL) free(data); |
| 309 | return(ret); | 309 | return(ret); |
| 310 | } | 310 | } |
| 311 | 311 | ||
diff --git a/src/lib/libcrypto/pem/pem_lib.c b/src/lib/libcrypto/pem/pem_lib.c index 0dfa7c7376..aa6a4c9387 100644 --- a/src/lib/libcrypto/pem/pem_lib.c +++ b/src/lib/libcrypto/pem/pem_lib.c | |||
| @@ -288,9 +288,9 @@ int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, const char | |||
| 288 | return 0; | 288 | return 0; |
| 289 | } | 289 | } |
| 290 | if(check_pem(nm, name)) break; | 290 | if(check_pem(nm, name)) break; |
| 291 | OPENSSL_free(nm); | 291 | free(nm); |
| 292 | OPENSSL_free(header); | 292 | free(header); |
| 293 | OPENSSL_free(data); | 293 | free(data); |
| 294 | } | 294 | } |
| 295 | if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; | 295 | if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; |
| 296 | if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; | 296 | if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; |
| @@ -304,9 +304,9 @@ int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, const char | |||
| 304 | ret = 1; | 304 | ret = 1; |
| 305 | 305 | ||
| 306 | err: | 306 | err: |
| 307 | if (!ret || !pnm) OPENSSL_free(nm); | 307 | if (!ret || !pnm) free(nm); |
| 308 | OPENSSL_free(header); | 308 | free(header); |
| 309 | if (!ret) OPENSSL_free(data); | 309 | if (!ret) free(data); |
| 310 | return ret; | 310 | return ret; |
| 311 | } | 311 | } |
| 312 | 312 | ||
| @@ -360,7 +360,7 @@ int PEM_ASN1_write_bio(i2d_of_void *i2d, const char *name, BIO *bp, | |||
| 360 | } | 360 | } |
| 361 | /* dzise + 8 bytes are needed */ | 361 | /* dzise + 8 bytes are needed */ |
| 362 | /* actually it needs the cipher block size extra... */ | 362 | /* actually it needs the cipher block size extra... */ |
| 363 | data=(unsigned char *)OPENSSL_malloc((unsigned int)dsize+20); | 363 | data=(unsigned char *)malloc((unsigned int)dsize+20); |
| 364 | if (data == NULL) | 364 | if (data == NULL) |
| 365 | { | 365 | { |
| 366 | PEMerr(PEM_F_PEM_ASN1_WRITE_BIO,ERR_R_MALLOC_FAILURE); | 366 | PEMerr(PEM_F_PEM_ASN1_WRITE_BIO,ERR_R_MALLOC_FAILURE); |
| @@ -427,7 +427,7 @@ err: | |||
| 427 | if (data != NULL) | 427 | if (data != NULL) |
| 428 | { | 428 | { |
| 429 | OPENSSL_cleanse(data,(unsigned int)dsize); | 429 | OPENSSL_cleanse(data,(unsigned int)dsize); |
| 430 | OPENSSL_free(data); | 430 | free(data); |
| 431 | } | 431 | } |
| 432 | return(ret); | 432 | return(ret); |
| 433 | } | 433 | } |
| @@ -599,7 +599,7 @@ int PEM_write_bio(BIO *bp, const char *name, char *header, unsigned char *data, | |||
| 599 | goto err; | 599 | goto err; |
| 600 | } | 600 | } |
| 601 | 601 | ||
| 602 | buf = OPENSSL_malloc(PEM_BUFSIZE*8); | 602 | buf = malloc(PEM_BUFSIZE*8); |
| 603 | if (buf == NULL) | 603 | if (buf == NULL) |
| 604 | { | 604 | { |
| 605 | reason=ERR_R_MALLOC_FAILURE; | 605 | reason=ERR_R_MALLOC_FAILURE; |
| @@ -620,7 +620,7 @@ int PEM_write_bio(BIO *bp, const char *name, char *header, unsigned char *data, | |||
| 620 | EVP_EncodeFinal(&ctx,buf,&outl); | 620 | EVP_EncodeFinal(&ctx,buf,&outl); |
| 621 | if ((outl > 0) && (BIO_write(bp,(char *)buf,outl) != outl)) goto err; | 621 | if ((outl > 0) && (BIO_write(bp,(char *)buf,outl) != outl)) goto err; |
| 622 | OPENSSL_cleanse(buf, PEM_BUFSIZE*8); | 622 | OPENSSL_cleanse(buf, PEM_BUFSIZE*8); |
| 623 | OPENSSL_free(buf); | 623 | free(buf); |
| 624 | buf = NULL; | 624 | buf = NULL; |
| 625 | if ( (BIO_write(bp,"-----END ",9) != 9) || | 625 | if ( (BIO_write(bp,"-----END ",9) != 9) || |
| 626 | (BIO_write(bp,name,nlen) != nlen) || | 626 | (BIO_write(bp,name,nlen) != nlen) || |
| @@ -630,7 +630,7 @@ int PEM_write_bio(BIO *bp, const char *name, char *header, unsigned char *data, | |||
| 630 | err: | 630 | err: |
| 631 | if (buf) { | 631 | if (buf) { |
| 632 | OPENSSL_cleanse(buf, PEM_BUFSIZE*8); | 632 | OPENSSL_cleanse(buf, PEM_BUFSIZE*8); |
| 633 | OPENSSL_free(buf); | 633 | free(buf); |
| 634 | } | 634 | } |
| 635 | PEMerr(PEM_F_PEM_WRITE_BIO,reason); | 635 | PEMerr(PEM_F_PEM_WRITE_BIO,reason); |
| 636 | return(0); | 636 | return(0); |
| @@ -809,9 +809,9 @@ int PEM_read_bio(BIO *bp, char **name, char **header, unsigned char **data, | |||
| 809 | *header=headerB->data; | 809 | *header=headerB->data; |
| 810 | *data=(unsigned char *)dataB->data; | 810 | *data=(unsigned char *)dataB->data; |
| 811 | *len=bl; | 811 | *len=bl; |
| 812 | OPENSSL_free(nameB); | 812 | free(nameB); |
| 813 | OPENSSL_free(headerB); | 813 | free(headerB); |
| 814 | OPENSSL_free(dataB); | 814 | free(dataB); |
| 815 | return(1); | 815 | return(1); |
| 816 | err: | 816 | err: |
| 817 | BUF_MEM_free(nameB); | 817 | BUF_MEM_free(nameB); |
diff --git a/src/lib/libcrypto/pem/pem_oth.c b/src/lib/libcrypto/pem/pem_oth.c index b33868d25a..69d281aa9d 100644 --- a/src/lib/libcrypto/pem/pem_oth.c +++ b/src/lib/libcrypto/pem/pem_oth.c | |||
| @@ -81,6 +81,6 @@ void *PEM_ASN1_read_bio(d2i_of_void *d2i, const char *name, BIO *bp, void **x, | |||
| 81 | ret=d2i(x,&p,len); | 81 | ret=d2i(x,&p,len); |
| 82 | if (ret == NULL) | 82 | if (ret == NULL) |
| 83 | PEMerr(PEM_F_PEM_ASN1_READ_BIO,ERR_R_ASN1_LIB); | 83 | PEMerr(PEM_F_PEM_ASN1_READ_BIO,ERR_R_ASN1_LIB); |
| 84 | OPENSSL_free(data); | 84 | free(data); |
| 85 | return(ret); | 85 | return(ret); |
| 86 | } | 86 | } |
diff --git a/src/lib/libcrypto/pem/pem_pkey.c b/src/lib/libcrypto/pem/pem_pkey.c index ef152be264..a3b609b2f3 100644 --- a/src/lib/libcrypto/pem/pem_pkey.c +++ b/src/lib/libcrypto/pem/pem_pkey.c | |||
| @@ -131,9 +131,9 @@ p8err: | |||
| 131 | if (ret == NULL) | 131 | if (ret == NULL) |
| 132 | PEMerr(PEM_F_PEM_READ_BIO_PRIVATEKEY,ERR_R_ASN1_LIB); | 132 | PEMerr(PEM_F_PEM_READ_BIO_PRIVATEKEY,ERR_R_ASN1_LIB); |
| 133 | err: | 133 | err: |
| 134 | OPENSSL_free(nm); | 134 | free(nm); |
| 135 | OPENSSL_cleanse(data, len); | 135 | OPENSSL_cleanse(data, len); |
| 136 | OPENSSL_free(data); | 136 | free(data); |
| 137 | return(ret); | 137 | return(ret); |
| 138 | } | 138 | } |
| 139 | 139 | ||
| @@ -188,8 +188,8 @@ EVP_PKEY *PEM_read_bio_Parameters(BIO *bp, EVP_PKEY **x) | |||
| 188 | err: | 188 | err: |
| 189 | if (ret == NULL) | 189 | if (ret == NULL) |
| 190 | PEMerr(PEM_F_PEM_READ_BIO_PARAMETERS,ERR_R_ASN1_LIB); | 190 | PEMerr(PEM_F_PEM_READ_BIO_PARAMETERS,ERR_R_ASN1_LIB); |
| 191 | OPENSSL_free(nm); | 191 | free(nm); |
| 192 | OPENSSL_free(data); | 192 | free(data); |
| 193 | return(ret); | 193 | return(ret); |
| 194 | } | 194 | } |
| 195 | 195 | ||
diff --git a/src/lib/libcrypto/pem/pem_seal.c b/src/lib/libcrypto/pem/pem_seal.c index b6b4e13498..bac7b16b44 100644 --- a/src/lib/libcrypto/pem/pem_seal.c +++ b/src/lib/libcrypto/pem/pem_seal.c | |||
| @@ -86,7 +86,7 @@ int PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, | |||
| 86 | j=RSA_size(pubk[i]->pkey.rsa); | 86 | j=RSA_size(pubk[i]->pkey.rsa); |
| 87 | if (j > max) max=j; | 87 | if (j > max) max=j; |
| 88 | } | 88 | } |
| 89 | s=(char *)OPENSSL_malloc(max*2); | 89 | s=(char *)malloc(max*2); |
| 90 | if (s == NULL) | 90 | if (s == NULL) |
| 91 | { | 91 | { |
| 92 | PEMerr(PEM_F_PEM_SEALINIT,ERR_R_MALLOC_FAILURE); | 92 | PEMerr(PEM_F_PEM_SEALINIT,ERR_R_MALLOC_FAILURE); |
| @@ -114,7 +114,7 @@ int PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, | |||
| 114 | 114 | ||
| 115 | ret=npubk; | 115 | ret=npubk; |
| 116 | err: | 116 | err: |
| 117 | if (s != NULL) OPENSSL_free(s); | 117 | if (s != NULL) free(s); |
| 118 | OPENSSL_cleanse(key,EVP_MAX_KEY_LENGTH); | 118 | OPENSSL_cleanse(key,EVP_MAX_KEY_LENGTH); |
| 119 | return(ret); | 119 | return(ret); |
| 120 | } | 120 | } |
| @@ -157,7 +157,7 @@ int PEM_SealFinal(PEM_ENCODE_SEAL_CTX *ctx, unsigned char *sig, int *sigl, | |||
| 157 | } | 157 | } |
| 158 | i=RSA_size(priv->pkey.rsa); | 158 | i=RSA_size(priv->pkey.rsa); |
| 159 | if (i < 100) i=100; | 159 | if (i < 100) i=100; |
| 160 | s=(unsigned char *)OPENSSL_malloc(i*2); | 160 | s=(unsigned char *)malloc(i*2); |
| 161 | if (s == NULL) | 161 | if (s == NULL) |
| 162 | { | 162 | { |
| 163 | PEMerr(PEM_F_PEM_SEALFINAL,ERR_R_MALLOC_FAILURE); | 163 | PEMerr(PEM_F_PEM_SEALFINAL,ERR_R_MALLOC_FAILURE); |
| @@ -179,7 +179,7 @@ int PEM_SealFinal(PEM_ENCODE_SEAL_CTX *ctx, unsigned char *sig, int *sigl, | |||
| 179 | err: | 179 | err: |
| 180 | EVP_MD_CTX_cleanup(&ctx->md); | 180 | EVP_MD_CTX_cleanup(&ctx->md); |
| 181 | EVP_CIPHER_CTX_cleanup(&ctx->cipher); | 181 | EVP_CIPHER_CTX_cleanup(&ctx->cipher); |
| 182 | if (s != NULL) OPENSSL_free(s); | 182 | if (s != NULL) free(s); |
| 183 | return(ret); | 183 | return(ret); |
| 184 | } | 184 | } |
| 185 | #else /* !OPENSSL_NO_RSA */ | 185 | #else /* !OPENSSL_NO_RSA */ |
diff --git a/src/lib/libcrypto/pem/pem_sign.c b/src/lib/libcrypto/pem/pem_sign.c index c3b9808cb2..cbd3cd0793 100644 --- a/src/lib/libcrypto/pem/pem_sign.c +++ b/src/lib/libcrypto/pem/pem_sign.c | |||
| @@ -82,7 +82,7 @@ int PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, | |||
| 82 | int i,ret=0; | 82 | int i,ret=0; |
| 83 | unsigned int m_len; | 83 | unsigned int m_len; |
| 84 | 84 | ||
| 85 | m=(unsigned char *)OPENSSL_malloc(EVP_PKEY_size(pkey)+2); | 85 | m=(unsigned char *)malloc(EVP_PKEY_size(pkey)+2); |
| 86 | if (m == NULL) | 86 | if (m == NULL) |
| 87 | { | 87 | { |
| 88 | PEMerr(PEM_F_PEM_SIGNFINAL,ERR_R_MALLOC_FAILURE); | 88 | PEMerr(PEM_F_PEM_SIGNFINAL,ERR_R_MALLOC_FAILURE); |
| @@ -96,7 +96,7 @@ int PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, | |||
| 96 | ret=1; | 96 | ret=1; |
| 97 | err: | 97 | err: |
| 98 | /* ctx has been zeroed by EVP_SignFinal() */ | 98 | /* ctx has been zeroed by EVP_SignFinal() */ |
| 99 | if (m != NULL) OPENSSL_free(m); | 99 | if (m != NULL) free(m); |
| 100 | return(ret); | 100 | return(ret); |
| 101 | } | 101 | } |
| 102 | 102 | ||
diff --git a/src/lib/libcrypto/pem/pvkfmt.c b/src/lib/libcrypto/pem/pvkfmt.c index b1bf71a5da..8da8e77973 100644 --- a/src/lib/libcrypto/pem/pvkfmt.c +++ b/src/lib/libcrypto/pem/pvkfmt.c | |||
| @@ -93,14 +93,14 @@ static int read_lebn(const unsigned char **in, unsigned int nbyte, BIGNUM **r) | |||
| 93 | unsigned char *tmpbuf, *q; | 93 | unsigned char *tmpbuf, *q; |
| 94 | unsigned int i; | 94 | unsigned int i; |
| 95 | p = *in + nbyte - 1; | 95 | p = *in + nbyte - 1; |
| 96 | tmpbuf = OPENSSL_malloc(nbyte); | 96 | tmpbuf = malloc(nbyte); |
| 97 | if (!tmpbuf) | 97 | if (!tmpbuf) |
| 98 | return 0; | 98 | return 0; |
| 99 | q = tmpbuf; | 99 | q = tmpbuf; |
| 100 | for (i = 0; i < nbyte; i++) | 100 | for (i = 0; i < nbyte; i++) |
| 101 | *q++ = *p--; | 101 | *q++ = *p--; |
| 102 | *r = BN_bin2bn(tmpbuf, nbyte, NULL); | 102 | *r = BN_bin2bn(tmpbuf, nbyte, NULL); |
| 103 | OPENSSL_free(tmpbuf); | 103 | free(tmpbuf); |
| 104 | if (*r) | 104 | if (*r) |
| 105 | { | 105 | { |
| 106 | *in += nbyte; | 106 | *in += nbyte; |
| @@ -284,7 +284,7 @@ static EVP_PKEY *do_b2i_bio(BIO *in, int ispub) | |||
| 284 | return NULL; | 284 | return NULL; |
| 285 | 285 | ||
| 286 | length = blob_length(bitlen, isdss, ispub); | 286 | length = blob_length(bitlen, isdss, ispub); |
| 287 | buf = OPENSSL_malloc(length); | 287 | buf = malloc(length); |
| 288 | if (!buf) | 288 | if (!buf) |
| 289 | { | 289 | { |
| 290 | PEMerr(PEM_F_DO_B2I_BIO, ERR_R_MALLOC_FAILURE); | 290 | PEMerr(PEM_F_DO_B2I_BIO, ERR_R_MALLOC_FAILURE); |
| @@ -304,7 +304,7 @@ static EVP_PKEY *do_b2i_bio(BIO *in, int ispub) | |||
| 304 | 304 | ||
| 305 | err: | 305 | err: |
| 306 | if (buf) | 306 | if (buf) |
| 307 | OPENSSL_free(buf); | 307 | free(buf); |
| 308 | return ret; | 308 | return ret; |
| 309 | } | 309 | } |
| 310 | 310 | ||
| @@ -508,7 +508,7 @@ static int do_i2b(unsigned char **out, EVP_PKEY *pk, int ispub) | |||
| 508 | p = *out; | 508 | p = *out; |
| 509 | else | 509 | else |
| 510 | { | 510 | { |
| 511 | p = OPENSSL_malloc(outlen); | 511 | p = malloc(outlen); |
| 512 | if (!p) | 512 | if (!p) |
| 513 | return -1; | 513 | return -1; |
| 514 | *out = p; | 514 | *out = p; |
| @@ -541,7 +541,7 @@ static int do_i2b_bio(BIO *out, EVP_PKEY *pk, int ispub) | |||
| 541 | if (outlen < 0) | 541 | if (outlen < 0) |
| 542 | return -1; | 542 | return -1; |
| 543 | wrlen = BIO_write(out, tmp, outlen); | 543 | wrlen = BIO_write(out, tmp, outlen); |
| 544 | OPENSSL_free(tmp); | 544 | free(tmp); |
| 545 | if (wrlen == outlen) | 545 | if (wrlen == outlen) |
| 546 | return outlen; | 546 | return outlen; |
| 547 | return -1; | 547 | return -1; |
| @@ -746,7 +746,7 @@ static EVP_PKEY *do_PVK_body(const unsigned char **in, | |||
| 746 | PEMerr(PEM_F_DO_PVK_BODY,PEM_R_BAD_PASSWORD_READ); | 746 | PEMerr(PEM_F_DO_PVK_BODY,PEM_R_BAD_PASSWORD_READ); |
| 747 | return NULL; | 747 | return NULL; |
| 748 | } | 748 | } |
| 749 | enctmp = OPENSSL_malloc(keylen + 8); | 749 | enctmp = malloc(keylen + 8); |
| 750 | if (!enctmp) | 750 | if (!enctmp) |
| 751 | { | 751 | { |
| 752 | PEMerr(PEM_F_DO_PVK_BODY, ERR_R_MALLOC_FAILURE); | 752 | PEMerr(PEM_F_DO_PVK_BODY, ERR_R_MALLOC_FAILURE); |
| @@ -797,7 +797,7 @@ static EVP_PKEY *do_PVK_body(const unsigned char **in, | |||
| 797 | err: | 797 | err: |
| 798 | EVP_CIPHER_CTX_cleanup(&cctx); | 798 | EVP_CIPHER_CTX_cleanup(&cctx); |
| 799 | if (enctmp && saltlen) | 799 | if (enctmp && saltlen) |
| 800 | OPENSSL_free(enctmp); | 800 | free(enctmp); |
| 801 | return ret; | 801 | return ret; |
| 802 | } | 802 | } |
| 803 | 803 | ||
| @@ -819,7 +819,7 @@ EVP_PKEY *b2i_PVK_bio(BIO *in, pem_password_cb *cb, void *u) | |||
| 819 | if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) | 819 | if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) |
| 820 | return 0; | 820 | return 0; |
| 821 | buflen = (int) keylen + saltlen; | 821 | buflen = (int) keylen + saltlen; |
| 822 | buf = OPENSSL_malloc(buflen); | 822 | buf = malloc(buflen); |
| 823 | if (!buf) | 823 | if (!buf) |
| 824 | { | 824 | { |
| 825 | PEMerr(PEM_F_B2I_PVK_BIO, ERR_R_MALLOC_FAILURE); | 825 | PEMerr(PEM_F_B2I_PVK_BIO, ERR_R_MALLOC_FAILURE); |
| @@ -837,7 +837,7 @@ EVP_PKEY *b2i_PVK_bio(BIO *in, pem_password_cb *cb, void *u) | |||
| 837 | if (buf) | 837 | if (buf) |
| 838 | { | 838 | { |
| 839 | OPENSSL_cleanse(buf, buflen); | 839 | OPENSSL_cleanse(buf, buflen); |
| 840 | OPENSSL_free(buf); | 840 | free(buf); |
| 841 | } | 841 | } |
| 842 | return ret; | 842 | return ret; |
| 843 | } | 843 | } |
| @@ -863,7 +863,7 @@ static int i2b_PVK(unsigned char **out, EVP_PKEY*pk, int enclevel, | |||
| 863 | p = *out; | 863 | p = *out; |
| 864 | else | 864 | else |
| 865 | { | 865 | { |
| 866 | p = OPENSSL_malloc(outlen); | 866 | p = malloc(outlen); |
| 867 | if (!p) | 867 | if (!p) |
| 868 | { | 868 | { |
| 869 | PEMerr(PEM_F_I2B_PVK,ERR_R_MALLOC_FAILURE); | 869 | PEMerr(PEM_F_I2B_PVK,ERR_R_MALLOC_FAILURE); |
| @@ -936,7 +936,7 @@ int i2b_PVK_bio(BIO *out, EVP_PKEY *pk, int enclevel, | |||
| 936 | if (outlen < 0) | 936 | if (outlen < 0) |
| 937 | return -1; | 937 | return -1; |
| 938 | wrlen = BIO_write(out, tmp, outlen); | 938 | wrlen = BIO_write(out, tmp, outlen); |
| 939 | OPENSSL_free(tmp); | 939 | free(tmp); |
| 940 | if (wrlen == outlen) | 940 | if (wrlen == outlen) |
| 941 | { | 941 | { |
| 942 | PEMerr(PEM_F_I2B_PVK_BIO, PEM_R_BIO_WRITE_FAILURE); | 942 | PEMerr(PEM_F_I2B_PVK_BIO, PEM_R_BIO_WRITE_FAILURE); |
