diff options
Diffstat (limited to 'src/lib/libcrypto/pem')
-rw-r--r-- | src/lib/libcrypto/pem/pem_info.c | 12 | ||||
-rw-r--r-- | src/lib/libcrypto/pem/pem_lib.c | 28 | ||||
-rw-r--r-- | src/lib/libcrypto/pem/pem_oth.c | 2 | ||||
-rw-r--r-- | src/lib/libcrypto/pem/pem_pkey.c | 8 | ||||
-rw-r--r-- | src/lib/libcrypto/pem/pem_seal.c | 8 | ||||
-rw-r--r-- | src/lib/libcrypto/pem/pem_sign.c | 4 | ||||
-rw-r--r-- | src/lib/libcrypto/pem/pvkfmt.c | 24 |
7 files changed, 43 insertions, 43 deletions
diff --git a/src/lib/libcrypto/pem/pem_info.c b/src/lib/libcrypto/pem/pem_info.c index cc7f24a9c1..4351260dfb 100644 --- a/src/lib/libcrypto/pem/pem_info.c +++ b/src/lib/libcrypto/pem/pem_info.c | |||
@@ -272,9 +272,9 @@ start: | |||
272 | else { | 272 | else { |
273 | /* unknown */ | 273 | /* unknown */ |
274 | } | 274 | } |
275 | if (name != NULL) OPENSSL_free(name); | 275 | if (name != NULL) free(name); |
276 | if (header != NULL) OPENSSL_free(header); | 276 | if (header != NULL) free(header); |
277 | if (data != NULL) OPENSSL_free(data); | 277 | if (data != NULL) free(data); |
278 | name=NULL; | 278 | name=NULL; |
279 | header=NULL; | 279 | header=NULL; |
280 | data=NULL; | 280 | data=NULL; |
@@ -303,9 +303,9 @@ err: | |||
303 | ret=NULL; | 303 | ret=NULL; |
304 | } | 304 | } |
305 | 305 | ||
306 | if (name != NULL) OPENSSL_free(name); | 306 | if (name != NULL) free(name); |
307 | if (header != NULL) OPENSSL_free(header); | 307 | if (header != NULL) free(header); |
308 | if (data != NULL) OPENSSL_free(data); | 308 | if (data != NULL) free(data); |
309 | return(ret); | 309 | return(ret); |
310 | } | 310 | } |
311 | 311 | ||
diff --git a/src/lib/libcrypto/pem/pem_lib.c b/src/lib/libcrypto/pem/pem_lib.c index 0dfa7c7376..aa6a4c9387 100644 --- a/src/lib/libcrypto/pem/pem_lib.c +++ b/src/lib/libcrypto/pem/pem_lib.c | |||
@@ -288,9 +288,9 @@ int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, const char | |||
288 | return 0; | 288 | return 0; |
289 | } | 289 | } |
290 | if(check_pem(nm, name)) break; | 290 | if(check_pem(nm, name)) break; |
291 | OPENSSL_free(nm); | 291 | free(nm); |
292 | OPENSSL_free(header); | 292 | free(header); |
293 | OPENSSL_free(data); | 293 | free(data); |
294 | } | 294 | } |
295 | if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; | 295 | if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; |
296 | if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; | 296 | if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; |
@@ -304,9 +304,9 @@ int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, const char | |||
304 | ret = 1; | 304 | ret = 1; |
305 | 305 | ||
306 | err: | 306 | err: |
307 | if (!ret || !pnm) OPENSSL_free(nm); | 307 | if (!ret || !pnm) free(nm); |
308 | OPENSSL_free(header); | 308 | free(header); |
309 | if (!ret) OPENSSL_free(data); | 309 | if (!ret) free(data); |
310 | return ret; | 310 | return ret; |
311 | } | 311 | } |
312 | 312 | ||
@@ -360,7 +360,7 @@ int PEM_ASN1_write_bio(i2d_of_void *i2d, const char *name, BIO *bp, | |||
360 | } | 360 | } |
361 | /* dzise + 8 bytes are needed */ | 361 | /* dzise + 8 bytes are needed */ |
362 | /* actually it needs the cipher block size extra... */ | 362 | /* actually it needs the cipher block size extra... */ |
363 | data=(unsigned char *)OPENSSL_malloc((unsigned int)dsize+20); | 363 | data=(unsigned char *)malloc((unsigned int)dsize+20); |
364 | if (data == NULL) | 364 | if (data == NULL) |
365 | { | 365 | { |
366 | PEMerr(PEM_F_PEM_ASN1_WRITE_BIO,ERR_R_MALLOC_FAILURE); | 366 | PEMerr(PEM_F_PEM_ASN1_WRITE_BIO,ERR_R_MALLOC_FAILURE); |
@@ -427,7 +427,7 @@ err: | |||
427 | if (data != NULL) | 427 | if (data != NULL) |
428 | { | 428 | { |
429 | OPENSSL_cleanse(data,(unsigned int)dsize); | 429 | OPENSSL_cleanse(data,(unsigned int)dsize); |
430 | OPENSSL_free(data); | 430 | free(data); |
431 | } | 431 | } |
432 | return(ret); | 432 | return(ret); |
433 | } | 433 | } |
@@ -599,7 +599,7 @@ int PEM_write_bio(BIO *bp, const char *name, char *header, unsigned char *data, | |||
599 | goto err; | 599 | goto err; |
600 | } | 600 | } |
601 | 601 | ||
602 | buf = OPENSSL_malloc(PEM_BUFSIZE*8); | 602 | buf = malloc(PEM_BUFSIZE*8); |
603 | if (buf == NULL) | 603 | if (buf == NULL) |
604 | { | 604 | { |
605 | reason=ERR_R_MALLOC_FAILURE; | 605 | reason=ERR_R_MALLOC_FAILURE; |
@@ -620,7 +620,7 @@ int PEM_write_bio(BIO *bp, const char *name, char *header, unsigned char *data, | |||
620 | EVP_EncodeFinal(&ctx,buf,&outl); | 620 | EVP_EncodeFinal(&ctx,buf,&outl); |
621 | if ((outl > 0) && (BIO_write(bp,(char *)buf,outl) != outl)) goto err; | 621 | if ((outl > 0) && (BIO_write(bp,(char *)buf,outl) != outl)) goto err; |
622 | OPENSSL_cleanse(buf, PEM_BUFSIZE*8); | 622 | OPENSSL_cleanse(buf, PEM_BUFSIZE*8); |
623 | OPENSSL_free(buf); | 623 | free(buf); |
624 | buf = NULL; | 624 | buf = NULL; |
625 | if ( (BIO_write(bp,"-----END ",9) != 9) || | 625 | if ( (BIO_write(bp,"-----END ",9) != 9) || |
626 | (BIO_write(bp,name,nlen) != nlen) || | 626 | (BIO_write(bp,name,nlen) != nlen) || |
@@ -630,7 +630,7 @@ int PEM_write_bio(BIO *bp, const char *name, char *header, unsigned char *data, | |||
630 | err: | 630 | err: |
631 | if (buf) { | 631 | if (buf) { |
632 | OPENSSL_cleanse(buf, PEM_BUFSIZE*8); | 632 | OPENSSL_cleanse(buf, PEM_BUFSIZE*8); |
633 | OPENSSL_free(buf); | 633 | free(buf); |
634 | } | 634 | } |
635 | PEMerr(PEM_F_PEM_WRITE_BIO,reason); | 635 | PEMerr(PEM_F_PEM_WRITE_BIO,reason); |
636 | return(0); | 636 | return(0); |
@@ -809,9 +809,9 @@ int PEM_read_bio(BIO *bp, char **name, char **header, unsigned char **data, | |||
809 | *header=headerB->data; | 809 | *header=headerB->data; |
810 | *data=(unsigned char *)dataB->data; | 810 | *data=(unsigned char *)dataB->data; |
811 | *len=bl; | 811 | *len=bl; |
812 | OPENSSL_free(nameB); | 812 | free(nameB); |
813 | OPENSSL_free(headerB); | 813 | free(headerB); |
814 | OPENSSL_free(dataB); | 814 | free(dataB); |
815 | return(1); | 815 | return(1); |
816 | err: | 816 | err: |
817 | BUF_MEM_free(nameB); | 817 | BUF_MEM_free(nameB); |
diff --git a/src/lib/libcrypto/pem/pem_oth.c b/src/lib/libcrypto/pem/pem_oth.c index b33868d25a..69d281aa9d 100644 --- a/src/lib/libcrypto/pem/pem_oth.c +++ b/src/lib/libcrypto/pem/pem_oth.c | |||
@@ -81,6 +81,6 @@ void *PEM_ASN1_read_bio(d2i_of_void *d2i, const char *name, BIO *bp, void **x, | |||
81 | ret=d2i(x,&p,len); | 81 | ret=d2i(x,&p,len); |
82 | if (ret == NULL) | 82 | if (ret == NULL) |
83 | PEMerr(PEM_F_PEM_ASN1_READ_BIO,ERR_R_ASN1_LIB); | 83 | PEMerr(PEM_F_PEM_ASN1_READ_BIO,ERR_R_ASN1_LIB); |
84 | OPENSSL_free(data); | 84 | free(data); |
85 | return(ret); | 85 | return(ret); |
86 | } | 86 | } |
diff --git a/src/lib/libcrypto/pem/pem_pkey.c b/src/lib/libcrypto/pem/pem_pkey.c index ef152be264..a3b609b2f3 100644 --- a/src/lib/libcrypto/pem/pem_pkey.c +++ b/src/lib/libcrypto/pem/pem_pkey.c | |||
@@ -131,9 +131,9 @@ p8err: | |||
131 | if (ret == NULL) | 131 | if (ret == NULL) |
132 | PEMerr(PEM_F_PEM_READ_BIO_PRIVATEKEY,ERR_R_ASN1_LIB); | 132 | PEMerr(PEM_F_PEM_READ_BIO_PRIVATEKEY,ERR_R_ASN1_LIB); |
133 | err: | 133 | err: |
134 | OPENSSL_free(nm); | 134 | free(nm); |
135 | OPENSSL_cleanse(data, len); | 135 | OPENSSL_cleanse(data, len); |
136 | OPENSSL_free(data); | 136 | free(data); |
137 | return(ret); | 137 | return(ret); |
138 | } | 138 | } |
139 | 139 | ||
@@ -188,8 +188,8 @@ EVP_PKEY *PEM_read_bio_Parameters(BIO *bp, EVP_PKEY **x) | |||
188 | err: | 188 | err: |
189 | if (ret == NULL) | 189 | if (ret == NULL) |
190 | PEMerr(PEM_F_PEM_READ_BIO_PARAMETERS,ERR_R_ASN1_LIB); | 190 | PEMerr(PEM_F_PEM_READ_BIO_PARAMETERS,ERR_R_ASN1_LIB); |
191 | OPENSSL_free(nm); | 191 | free(nm); |
192 | OPENSSL_free(data); | 192 | free(data); |
193 | return(ret); | 193 | return(ret); |
194 | } | 194 | } |
195 | 195 | ||
diff --git a/src/lib/libcrypto/pem/pem_seal.c b/src/lib/libcrypto/pem/pem_seal.c index b6b4e13498..bac7b16b44 100644 --- a/src/lib/libcrypto/pem/pem_seal.c +++ b/src/lib/libcrypto/pem/pem_seal.c | |||
@@ -86,7 +86,7 @@ int PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, | |||
86 | j=RSA_size(pubk[i]->pkey.rsa); | 86 | j=RSA_size(pubk[i]->pkey.rsa); |
87 | if (j > max) max=j; | 87 | if (j > max) max=j; |
88 | } | 88 | } |
89 | s=(char *)OPENSSL_malloc(max*2); | 89 | s=(char *)malloc(max*2); |
90 | if (s == NULL) | 90 | if (s == NULL) |
91 | { | 91 | { |
92 | PEMerr(PEM_F_PEM_SEALINIT,ERR_R_MALLOC_FAILURE); | 92 | PEMerr(PEM_F_PEM_SEALINIT,ERR_R_MALLOC_FAILURE); |
@@ -114,7 +114,7 @@ int PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, | |||
114 | 114 | ||
115 | ret=npubk; | 115 | ret=npubk; |
116 | err: | 116 | err: |
117 | if (s != NULL) OPENSSL_free(s); | 117 | if (s != NULL) free(s); |
118 | OPENSSL_cleanse(key,EVP_MAX_KEY_LENGTH); | 118 | OPENSSL_cleanse(key,EVP_MAX_KEY_LENGTH); |
119 | return(ret); | 119 | return(ret); |
120 | } | 120 | } |
@@ -157,7 +157,7 @@ int PEM_SealFinal(PEM_ENCODE_SEAL_CTX *ctx, unsigned char *sig, int *sigl, | |||
157 | } | 157 | } |
158 | i=RSA_size(priv->pkey.rsa); | 158 | i=RSA_size(priv->pkey.rsa); |
159 | if (i < 100) i=100; | 159 | if (i < 100) i=100; |
160 | s=(unsigned char *)OPENSSL_malloc(i*2); | 160 | s=(unsigned char *)malloc(i*2); |
161 | if (s == NULL) | 161 | if (s == NULL) |
162 | { | 162 | { |
163 | PEMerr(PEM_F_PEM_SEALFINAL,ERR_R_MALLOC_FAILURE); | 163 | PEMerr(PEM_F_PEM_SEALFINAL,ERR_R_MALLOC_FAILURE); |
@@ -179,7 +179,7 @@ int PEM_SealFinal(PEM_ENCODE_SEAL_CTX *ctx, unsigned char *sig, int *sigl, | |||
179 | err: | 179 | err: |
180 | EVP_MD_CTX_cleanup(&ctx->md); | 180 | EVP_MD_CTX_cleanup(&ctx->md); |
181 | EVP_CIPHER_CTX_cleanup(&ctx->cipher); | 181 | EVP_CIPHER_CTX_cleanup(&ctx->cipher); |
182 | if (s != NULL) OPENSSL_free(s); | 182 | if (s != NULL) free(s); |
183 | return(ret); | 183 | return(ret); |
184 | } | 184 | } |
185 | #else /* !OPENSSL_NO_RSA */ | 185 | #else /* !OPENSSL_NO_RSA */ |
diff --git a/src/lib/libcrypto/pem/pem_sign.c b/src/lib/libcrypto/pem/pem_sign.c index c3b9808cb2..cbd3cd0793 100644 --- a/src/lib/libcrypto/pem/pem_sign.c +++ b/src/lib/libcrypto/pem/pem_sign.c | |||
@@ -82,7 +82,7 @@ int PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, | |||
82 | int i,ret=0; | 82 | int i,ret=0; |
83 | unsigned int m_len; | 83 | unsigned int m_len; |
84 | 84 | ||
85 | m=(unsigned char *)OPENSSL_malloc(EVP_PKEY_size(pkey)+2); | 85 | m=(unsigned char *)malloc(EVP_PKEY_size(pkey)+2); |
86 | if (m == NULL) | 86 | if (m == NULL) |
87 | { | 87 | { |
88 | PEMerr(PEM_F_PEM_SIGNFINAL,ERR_R_MALLOC_FAILURE); | 88 | PEMerr(PEM_F_PEM_SIGNFINAL,ERR_R_MALLOC_FAILURE); |
@@ -96,7 +96,7 @@ int PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, | |||
96 | ret=1; | 96 | ret=1; |
97 | err: | 97 | err: |
98 | /* ctx has been zeroed by EVP_SignFinal() */ | 98 | /* ctx has been zeroed by EVP_SignFinal() */ |
99 | if (m != NULL) OPENSSL_free(m); | 99 | if (m != NULL) free(m); |
100 | return(ret); | 100 | return(ret); |
101 | } | 101 | } |
102 | 102 | ||
diff --git a/src/lib/libcrypto/pem/pvkfmt.c b/src/lib/libcrypto/pem/pvkfmt.c index b1bf71a5da..8da8e77973 100644 --- a/src/lib/libcrypto/pem/pvkfmt.c +++ b/src/lib/libcrypto/pem/pvkfmt.c | |||
@@ -93,14 +93,14 @@ static int read_lebn(const unsigned char **in, unsigned int nbyte, BIGNUM **r) | |||
93 | unsigned char *tmpbuf, *q; | 93 | unsigned char *tmpbuf, *q; |
94 | unsigned int i; | 94 | unsigned int i; |
95 | p = *in + nbyte - 1; | 95 | p = *in + nbyte - 1; |
96 | tmpbuf = OPENSSL_malloc(nbyte); | 96 | tmpbuf = malloc(nbyte); |
97 | if (!tmpbuf) | 97 | if (!tmpbuf) |
98 | return 0; | 98 | return 0; |
99 | q = tmpbuf; | 99 | q = tmpbuf; |
100 | for (i = 0; i < nbyte; i++) | 100 | for (i = 0; i < nbyte; i++) |
101 | *q++ = *p--; | 101 | *q++ = *p--; |
102 | *r = BN_bin2bn(tmpbuf, nbyte, NULL); | 102 | *r = BN_bin2bn(tmpbuf, nbyte, NULL); |
103 | OPENSSL_free(tmpbuf); | 103 | free(tmpbuf); |
104 | if (*r) | 104 | if (*r) |
105 | { | 105 | { |
106 | *in += nbyte; | 106 | *in += nbyte; |
@@ -284,7 +284,7 @@ static EVP_PKEY *do_b2i_bio(BIO *in, int ispub) | |||
284 | return NULL; | 284 | return NULL; |
285 | 285 | ||
286 | length = blob_length(bitlen, isdss, ispub); | 286 | length = blob_length(bitlen, isdss, ispub); |
287 | buf = OPENSSL_malloc(length); | 287 | buf = malloc(length); |
288 | if (!buf) | 288 | if (!buf) |
289 | { | 289 | { |
290 | PEMerr(PEM_F_DO_B2I_BIO, ERR_R_MALLOC_FAILURE); | 290 | PEMerr(PEM_F_DO_B2I_BIO, ERR_R_MALLOC_FAILURE); |
@@ -304,7 +304,7 @@ static EVP_PKEY *do_b2i_bio(BIO *in, int ispub) | |||
304 | 304 | ||
305 | err: | 305 | err: |
306 | if (buf) | 306 | if (buf) |
307 | OPENSSL_free(buf); | 307 | free(buf); |
308 | return ret; | 308 | return ret; |
309 | } | 309 | } |
310 | 310 | ||
@@ -508,7 +508,7 @@ static int do_i2b(unsigned char **out, EVP_PKEY *pk, int ispub) | |||
508 | p = *out; | 508 | p = *out; |
509 | else | 509 | else |
510 | { | 510 | { |
511 | p = OPENSSL_malloc(outlen); | 511 | p = malloc(outlen); |
512 | if (!p) | 512 | if (!p) |
513 | return -1; | 513 | return -1; |
514 | *out = p; | 514 | *out = p; |
@@ -541,7 +541,7 @@ static int do_i2b_bio(BIO *out, EVP_PKEY *pk, int ispub) | |||
541 | if (outlen < 0) | 541 | if (outlen < 0) |
542 | return -1; | 542 | return -1; |
543 | wrlen = BIO_write(out, tmp, outlen); | 543 | wrlen = BIO_write(out, tmp, outlen); |
544 | OPENSSL_free(tmp); | 544 | free(tmp); |
545 | if (wrlen == outlen) | 545 | if (wrlen == outlen) |
546 | return outlen; | 546 | return outlen; |
547 | return -1; | 547 | return -1; |
@@ -746,7 +746,7 @@ static EVP_PKEY *do_PVK_body(const unsigned char **in, | |||
746 | PEMerr(PEM_F_DO_PVK_BODY,PEM_R_BAD_PASSWORD_READ); | 746 | PEMerr(PEM_F_DO_PVK_BODY,PEM_R_BAD_PASSWORD_READ); |
747 | return NULL; | 747 | return NULL; |
748 | } | 748 | } |
749 | enctmp = OPENSSL_malloc(keylen + 8); | 749 | enctmp = malloc(keylen + 8); |
750 | if (!enctmp) | 750 | if (!enctmp) |
751 | { | 751 | { |
752 | PEMerr(PEM_F_DO_PVK_BODY, ERR_R_MALLOC_FAILURE); | 752 | PEMerr(PEM_F_DO_PVK_BODY, ERR_R_MALLOC_FAILURE); |
@@ -797,7 +797,7 @@ static EVP_PKEY *do_PVK_body(const unsigned char **in, | |||
797 | err: | 797 | err: |
798 | EVP_CIPHER_CTX_cleanup(&cctx); | 798 | EVP_CIPHER_CTX_cleanup(&cctx); |
799 | if (enctmp && saltlen) | 799 | if (enctmp && saltlen) |
800 | OPENSSL_free(enctmp); | 800 | free(enctmp); |
801 | return ret; | 801 | return ret; |
802 | } | 802 | } |
803 | 803 | ||
@@ -819,7 +819,7 @@ EVP_PKEY *b2i_PVK_bio(BIO *in, pem_password_cb *cb, void *u) | |||
819 | if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) | 819 | if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) |
820 | return 0; | 820 | return 0; |
821 | buflen = (int) keylen + saltlen; | 821 | buflen = (int) keylen + saltlen; |
822 | buf = OPENSSL_malloc(buflen); | 822 | buf = malloc(buflen); |
823 | if (!buf) | 823 | if (!buf) |
824 | { | 824 | { |
825 | PEMerr(PEM_F_B2I_PVK_BIO, ERR_R_MALLOC_FAILURE); | 825 | PEMerr(PEM_F_B2I_PVK_BIO, ERR_R_MALLOC_FAILURE); |
@@ -837,7 +837,7 @@ EVP_PKEY *b2i_PVK_bio(BIO *in, pem_password_cb *cb, void *u) | |||
837 | if (buf) | 837 | if (buf) |
838 | { | 838 | { |
839 | OPENSSL_cleanse(buf, buflen); | 839 | OPENSSL_cleanse(buf, buflen); |
840 | OPENSSL_free(buf); | 840 | free(buf); |
841 | } | 841 | } |
842 | return ret; | 842 | return ret; |
843 | } | 843 | } |
@@ -863,7 +863,7 @@ static int i2b_PVK(unsigned char **out, EVP_PKEY*pk, int enclevel, | |||
863 | p = *out; | 863 | p = *out; |
864 | else | 864 | else |
865 | { | 865 | { |
866 | p = OPENSSL_malloc(outlen); | 866 | p = malloc(outlen); |
867 | if (!p) | 867 | if (!p) |
868 | { | 868 | { |
869 | PEMerr(PEM_F_I2B_PVK,ERR_R_MALLOC_FAILURE); | 869 | PEMerr(PEM_F_I2B_PVK,ERR_R_MALLOC_FAILURE); |
@@ -936,7 +936,7 @@ int i2b_PVK_bio(BIO *out, EVP_PKEY *pk, int enclevel, | |||
936 | if (outlen < 0) | 936 | if (outlen < 0) |
937 | return -1; | 937 | return -1; |
938 | wrlen = BIO_write(out, tmp, outlen); | 938 | wrlen = BIO_write(out, tmp, outlen); |
939 | OPENSSL_free(tmp); | 939 | free(tmp); |
940 | if (wrlen == outlen) | 940 | if (wrlen == outlen) |
941 | { | 941 | { |
942 | PEMerr(PEM_F_I2B_PVK_BIO, PEM_R_BIO_WRITE_FAILURE); | 942 | PEMerr(PEM_F_I2B_PVK_BIO, PEM_R_BIO_WRITE_FAILURE); |