summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/pem
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/pem')
-rw-r--r--src/lib/libcrypto/pem/pem_info.c12
-rw-r--r--src/lib/libcrypto/pem/pem_lib.c28
-rw-r--r--src/lib/libcrypto/pem/pem_oth.c2
-rw-r--r--src/lib/libcrypto/pem/pem_pkey.c8
-rw-r--r--src/lib/libcrypto/pem/pem_seal.c8
-rw-r--r--src/lib/libcrypto/pem/pem_sign.c4
-rw-r--r--src/lib/libcrypto/pem/pvkfmt.c24
7 files changed, 43 insertions, 43 deletions
diff --git a/src/lib/libcrypto/pem/pem_info.c b/src/lib/libcrypto/pem/pem_info.c
index cc7f24a9c1..4351260dfb 100644
--- a/src/lib/libcrypto/pem/pem_info.c
+++ b/src/lib/libcrypto/pem/pem_info.c
@@ -272,9 +272,9 @@ start:
272 else { 272 else {
273 /* unknown */ 273 /* unknown */
274 } 274 }
275 if (name != NULL) OPENSSL_free(name); 275 if (name != NULL) free(name);
276 if (header != NULL) OPENSSL_free(header); 276 if (header != NULL) free(header);
277 if (data != NULL) OPENSSL_free(data); 277 if (data != NULL) free(data);
278 name=NULL; 278 name=NULL;
279 header=NULL; 279 header=NULL;
280 data=NULL; 280 data=NULL;
@@ -303,9 +303,9 @@ err:
303 ret=NULL; 303 ret=NULL;
304 } 304 }
305 305
306 if (name != NULL) OPENSSL_free(name); 306 if (name != NULL) free(name);
307 if (header != NULL) OPENSSL_free(header); 307 if (header != NULL) free(header);
308 if (data != NULL) OPENSSL_free(data); 308 if (data != NULL) free(data);
309 return(ret); 309 return(ret);
310 } 310 }
311 311
diff --git a/src/lib/libcrypto/pem/pem_lib.c b/src/lib/libcrypto/pem/pem_lib.c
index 0dfa7c7376..aa6a4c9387 100644
--- a/src/lib/libcrypto/pem/pem_lib.c
+++ b/src/lib/libcrypto/pem/pem_lib.c
@@ -288,9 +288,9 @@ int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, const char
288 return 0; 288 return 0;
289 } 289 }
290 if(check_pem(nm, name)) break; 290 if(check_pem(nm, name)) break;
291 OPENSSL_free(nm); 291 free(nm);
292 OPENSSL_free(header); 292 free(header);
293 OPENSSL_free(data); 293 free(data);
294 } 294 }
295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; 295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err;
296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; 296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err;
@@ -304,9 +304,9 @@ int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, const char
304 ret = 1; 304 ret = 1;
305 305
306err: 306err:
307 if (!ret || !pnm) OPENSSL_free(nm); 307 if (!ret || !pnm) free(nm);
308 OPENSSL_free(header); 308 free(header);
309 if (!ret) OPENSSL_free(data); 309 if (!ret) free(data);
310 return ret; 310 return ret;
311 } 311 }
312 312
@@ -360,7 +360,7 @@ int PEM_ASN1_write_bio(i2d_of_void *i2d, const char *name, BIO *bp,
360 } 360 }
361 /* dzise + 8 bytes are needed */ 361 /* dzise + 8 bytes are needed */
362 /* actually it needs the cipher block size extra... */ 362 /* actually it needs the cipher block size extra... */
363 data=(unsigned char *)OPENSSL_malloc((unsigned int)dsize+20); 363 data=(unsigned char *)malloc((unsigned int)dsize+20);
364 if (data == NULL) 364 if (data == NULL)
365 { 365 {
366 PEMerr(PEM_F_PEM_ASN1_WRITE_BIO,ERR_R_MALLOC_FAILURE); 366 PEMerr(PEM_F_PEM_ASN1_WRITE_BIO,ERR_R_MALLOC_FAILURE);
@@ -427,7 +427,7 @@ err:
427 if (data != NULL) 427 if (data != NULL)
428 { 428 {
429 OPENSSL_cleanse(data,(unsigned int)dsize); 429 OPENSSL_cleanse(data,(unsigned int)dsize);
430 OPENSSL_free(data); 430 free(data);
431 } 431 }
432 return(ret); 432 return(ret);
433 } 433 }
@@ -599,7 +599,7 @@ int PEM_write_bio(BIO *bp, const char *name, char *header, unsigned char *data,
599 goto err; 599 goto err;
600 } 600 }
601 601
602 buf = OPENSSL_malloc(PEM_BUFSIZE*8); 602 buf = malloc(PEM_BUFSIZE*8);
603 if (buf == NULL) 603 if (buf == NULL)
604 { 604 {
605 reason=ERR_R_MALLOC_FAILURE; 605 reason=ERR_R_MALLOC_FAILURE;
@@ -620,7 +620,7 @@ int PEM_write_bio(BIO *bp, const char *name, char *header, unsigned char *data,
620 EVP_EncodeFinal(&ctx,buf,&outl); 620 EVP_EncodeFinal(&ctx,buf,&outl);
621 if ((outl > 0) && (BIO_write(bp,(char *)buf,outl) != outl)) goto err; 621 if ((outl > 0) && (BIO_write(bp,(char *)buf,outl) != outl)) goto err;
622 OPENSSL_cleanse(buf, PEM_BUFSIZE*8); 622 OPENSSL_cleanse(buf, PEM_BUFSIZE*8);
623 OPENSSL_free(buf); 623 free(buf);
624 buf = NULL; 624 buf = NULL;
625 if ( (BIO_write(bp,"-----END ",9) != 9) || 625 if ( (BIO_write(bp,"-----END ",9) != 9) ||
626 (BIO_write(bp,name,nlen) != nlen) || 626 (BIO_write(bp,name,nlen) != nlen) ||
@@ -630,7 +630,7 @@ int PEM_write_bio(BIO *bp, const char *name, char *header, unsigned char *data,
630err: 630err:
631 if (buf) { 631 if (buf) {
632 OPENSSL_cleanse(buf, PEM_BUFSIZE*8); 632 OPENSSL_cleanse(buf, PEM_BUFSIZE*8);
633 OPENSSL_free(buf); 633 free(buf);
634 } 634 }
635 PEMerr(PEM_F_PEM_WRITE_BIO,reason); 635 PEMerr(PEM_F_PEM_WRITE_BIO,reason);
636 return(0); 636 return(0);
@@ -809,9 +809,9 @@ int PEM_read_bio(BIO *bp, char **name, char **header, unsigned char **data,
809 *header=headerB->data; 809 *header=headerB->data;
810 *data=(unsigned char *)dataB->data; 810 *data=(unsigned char *)dataB->data;
811 *len=bl; 811 *len=bl;
812 OPENSSL_free(nameB); 812 free(nameB);
813 OPENSSL_free(headerB); 813 free(headerB);
814 OPENSSL_free(dataB); 814 free(dataB);
815 return(1); 815 return(1);
816err: 816err:
817 BUF_MEM_free(nameB); 817 BUF_MEM_free(nameB);
diff --git a/src/lib/libcrypto/pem/pem_oth.c b/src/lib/libcrypto/pem/pem_oth.c
index b33868d25a..69d281aa9d 100644
--- a/src/lib/libcrypto/pem/pem_oth.c
+++ b/src/lib/libcrypto/pem/pem_oth.c
@@ -81,6 +81,6 @@ void *PEM_ASN1_read_bio(d2i_of_void *d2i, const char *name, BIO *bp, void **x,
81 ret=d2i(x,&p,len); 81 ret=d2i(x,&p,len);
82 if (ret == NULL) 82 if (ret == NULL)
83 PEMerr(PEM_F_PEM_ASN1_READ_BIO,ERR_R_ASN1_LIB); 83 PEMerr(PEM_F_PEM_ASN1_READ_BIO,ERR_R_ASN1_LIB);
84 OPENSSL_free(data); 84 free(data);
85 return(ret); 85 return(ret);
86 } 86 }
diff --git a/src/lib/libcrypto/pem/pem_pkey.c b/src/lib/libcrypto/pem/pem_pkey.c
index ef152be264..a3b609b2f3 100644
--- a/src/lib/libcrypto/pem/pem_pkey.c
+++ b/src/lib/libcrypto/pem/pem_pkey.c
@@ -131,9 +131,9 @@ p8err:
131 if (ret == NULL) 131 if (ret == NULL)
132 PEMerr(PEM_F_PEM_READ_BIO_PRIVATEKEY,ERR_R_ASN1_LIB); 132 PEMerr(PEM_F_PEM_READ_BIO_PRIVATEKEY,ERR_R_ASN1_LIB);
133err: 133err:
134 OPENSSL_free(nm); 134 free(nm);
135 OPENSSL_cleanse(data, len); 135 OPENSSL_cleanse(data, len);
136 OPENSSL_free(data); 136 free(data);
137 return(ret); 137 return(ret);
138 } 138 }
139 139
@@ -188,8 +188,8 @@ EVP_PKEY *PEM_read_bio_Parameters(BIO *bp, EVP_PKEY **x)
188err: 188err:
189 if (ret == NULL) 189 if (ret == NULL)
190 PEMerr(PEM_F_PEM_READ_BIO_PARAMETERS,ERR_R_ASN1_LIB); 190 PEMerr(PEM_F_PEM_READ_BIO_PARAMETERS,ERR_R_ASN1_LIB);
191 OPENSSL_free(nm); 191 free(nm);
192 OPENSSL_free(data); 192 free(data);
193 return(ret); 193 return(ret);
194 } 194 }
195 195
diff --git a/src/lib/libcrypto/pem/pem_seal.c b/src/lib/libcrypto/pem/pem_seal.c
index b6b4e13498..bac7b16b44 100644
--- a/src/lib/libcrypto/pem/pem_seal.c
+++ b/src/lib/libcrypto/pem/pem_seal.c
@@ -86,7 +86,7 @@ int PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type,
86 j=RSA_size(pubk[i]->pkey.rsa); 86 j=RSA_size(pubk[i]->pkey.rsa);
87 if (j > max) max=j; 87 if (j > max) max=j;
88 } 88 }
89 s=(char *)OPENSSL_malloc(max*2); 89 s=(char *)malloc(max*2);
90 if (s == NULL) 90 if (s == NULL)
91 { 91 {
92 PEMerr(PEM_F_PEM_SEALINIT,ERR_R_MALLOC_FAILURE); 92 PEMerr(PEM_F_PEM_SEALINIT,ERR_R_MALLOC_FAILURE);
@@ -114,7 +114,7 @@ int PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type,
114 114
115 ret=npubk; 115 ret=npubk;
116err: 116err:
117 if (s != NULL) OPENSSL_free(s); 117 if (s != NULL) free(s);
118 OPENSSL_cleanse(key,EVP_MAX_KEY_LENGTH); 118 OPENSSL_cleanse(key,EVP_MAX_KEY_LENGTH);
119 return(ret); 119 return(ret);
120 } 120 }
@@ -157,7 +157,7 @@ int PEM_SealFinal(PEM_ENCODE_SEAL_CTX *ctx, unsigned char *sig, int *sigl,
157 } 157 }
158 i=RSA_size(priv->pkey.rsa); 158 i=RSA_size(priv->pkey.rsa);
159 if (i < 100) i=100; 159 if (i < 100) i=100;
160 s=(unsigned char *)OPENSSL_malloc(i*2); 160 s=(unsigned char *)malloc(i*2);
161 if (s == NULL) 161 if (s == NULL)
162 { 162 {
163 PEMerr(PEM_F_PEM_SEALFINAL,ERR_R_MALLOC_FAILURE); 163 PEMerr(PEM_F_PEM_SEALFINAL,ERR_R_MALLOC_FAILURE);
@@ -179,7 +179,7 @@ int PEM_SealFinal(PEM_ENCODE_SEAL_CTX *ctx, unsigned char *sig, int *sigl,
179err: 179err:
180 EVP_MD_CTX_cleanup(&ctx->md); 180 EVP_MD_CTX_cleanup(&ctx->md);
181 EVP_CIPHER_CTX_cleanup(&ctx->cipher); 181 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
182 if (s != NULL) OPENSSL_free(s); 182 if (s != NULL) free(s);
183 return(ret); 183 return(ret);
184 } 184 }
185#else /* !OPENSSL_NO_RSA */ 185#else /* !OPENSSL_NO_RSA */
diff --git a/src/lib/libcrypto/pem/pem_sign.c b/src/lib/libcrypto/pem/pem_sign.c
index c3b9808cb2..cbd3cd0793 100644
--- a/src/lib/libcrypto/pem/pem_sign.c
+++ b/src/lib/libcrypto/pem/pem_sign.c
@@ -82,7 +82,7 @@ int PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen,
82 int i,ret=0; 82 int i,ret=0;
83 unsigned int m_len; 83 unsigned int m_len;
84 84
85 m=(unsigned char *)OPENSSL_malloc(EVP_PKEY_size(pkey)+2); 85 m=(unsigned char *)malloc(EVP_PKEY_size(pkey)+2);
86 if (m == NULL) 86 if (m == NULL)
87 { 87 {
88 PEMerr(PEM_F_PEM_SIGNFINAL,ERR_R_MALLOC_FAILURE); 88 PEMerr(PEM_F_PEM_SIGNFINAL,ERR_R_MALLOC_FAILURE);
@@ -96,7 +96,7 @@ int PEM_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen,
96 ret=1; 96 ret=1;
97err: 97err:
98 /* ctx has been zeroed by EVP_SignFinal() */ 98 /* ctx has been zeroed by EVP_SignFinal() */
99 if (m != NULL) OPENSSL_free(m); 99 if (m != NULL) free(m);
100 return(ret); 100 return(ret);
101 } 101 }
102 102
diff --git a/src/lib/libcrypto/pem/pvkfmt.c b/src/lib/libcrypto/pem/pvkfmt.c
index b1bf71a5da..8da8e77973 100644
--- a/src/lib/libcrypto/pem/pvkfmt.c
+++ b/src/lib/libcrypto/pem/pvkfmt.c
@@ -93,14 +93,14 @@ static int read_lebn(const unsigned char **in, unsigned int nbyte, BIGNUM **r)
93 unsigned char *tmpbuf, *q; 93 unsigned char *tmpbuf, *q;
94 unsigned int i; 94 unsigned int i;
95 p = *in + nbyte - 1; 95 p = *in + nbyte - 1;
96 tmpbuf = OPENSSL_malloc(nbyte); 96 tmpbuf = malloc(nbyte);
97 if (!tmpbuf) 97 if (!tmpbuf)
98 return 0; 98 return 0;
99 q = tmpbuf; 99 q = tmpbuf;
100 for (i = 0; i < nbyte; i++) 100 for (i = 0; i < nbyte; i++)
101 *q++ = *p--; 101 *q++ = *p--;
102 *r = BN_bin2bn(tmpbuf, nbyte, NULL); 102 *r = BN_bin2bn(tmpbuf, nbyte, NULL);
103 OPENSSL_free(tmpbuf); 103 free(tmpbuf);
104 if (*r) 104 if (*r)
105 { 105 {
106 *in += nbyte; 106 *in += nbyte;
@@ -284,7 +284,7 @@ static EVP_PKEY *do_b2i_bio(BIO *in, int ispub)
284 return NULL; 284 return NULL;
285 285
286 length = blob_length(bitlen, isdss, ispub); 286 length = blob_length(bitlen, isdss, ispub);
287 buf = OPENSSL_malloc(length); 287 buf = malloc(length);
288 if (!buf) 288 if (!buf)
289 { 289 {
290 PEMerr(PEM_F_DO_B2I_BIO, ERR_R_MALLOC_FAILURE); 290 PEMerr(PEM_F_DO_B2I_BIO, ERR_R_MALLOC_FAILURE);
@@ -304,7 +304,7 @@ static EVP_PKEY *do_b2i_bio(BIO *in, int ispub)
304 304
305 err: 305 err:
306 if (buf) 306 if (buf)
307 OPENSSL_free(buf); 307 free(buf);
308 return ret; 308 return ret;
309 } 309 }
310 310
@@ -508,7 +508,7 @@ static int do_i2b(unsigned char **out, EVP_PKEY *pk, int ispub)
508 p = *out; 508 p = *out;
509 else 509 else
510 { 510 {
511 p = OPENSSL_malloc(outlen); 511 p = malloc(outlen);
512 if (!p) 512 if (!p)
513 return -1; 513 return -1;
514 *out = p; 514 *out = p;
@@ -541,7 +541,7 @@ static int do_i2b_bio(BIO *out, EVP_PKEY *pk, int ispub)
541 if (outlen < 0) 541 if (outlen < 0)
542 return -1; 542 return -1;
543 wrlen = BIO_write(out, tmp, outlen); 543 wrlen = BIO_write(out, tmp, outlen);
544 OPENSSL_free(tmp); 544 free(tmp);
545 if (wrlen == outlen) 545 if (wrlen == outlen)
546 return outlen; 546 return outlen;
547 return -1; 547 return -1;
@@ -746,7 +746,7 @@ static EVP_PKEY *do_PVK_body(const unsigned char **in,
746 PEMerr(PEM_F_DO_PVK_BODY,PEM_R_BAD_PASSWORD_READ); 746 PEMerr(PEM_F_DO_PVK_BODY,PEM_R_BAD_PASSWORD_READ);
747 return NULL; 747 return NULL;
748 } 748 }
749 enctmp = OPENSSL_malloc(keylen + 8); 749 enctmp = malloc(keylen + 8);
750 if (!enctmp) 750 if (!enctmp)
751 { 751 {
752 PEMerr(PEM_F_DO_PVK_BODY, ERR_R_MALLOC_FAILURE); 752 PEMerr(PEM_F_DO_PVK_BODY, ERR_R_MALLOC_FAILURE);
@@ -797,7 +797,7 @@ static EVP_PKEY *do_PVK_body(const unsigned char **in,
797 err: 797 err:
798 EVP_CIPHER_CTX_cleanup(&cctx); 798 EVP_CIPHER_CTX_cleanup(&cctx);
799 if (enctmp && saltlen) 799 if (enctmp && saltlen)
800 OPENSSL_free(enctmp); 800 free(enctmp);
801 return ret; 801 return ret;
802 } 802 }
803 803
@@ -819,7 +819,7 @@ EVP_PKEY *b2i_PVK_bio(BIO *in, pem_password_cb *cb, void *u)
819 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen)) 819 if (!do_PVK_header(&p, 24, 0, &saltlen, &keylen))
820 return 0; 820 return 0;
821 buflen = (int) keylen + saltlen; 821 buflen = (int) keylen + saltlen;
822 buf = OPENSSL_malloc(buflen); 822 buf = malloc(buflen);
823 if (!buf) 823 if (!buf)
824 { 824 {
825 PEMerr(PEM_F_B2I_PVK_BIO, ERR_R_MALLOC_FAILURE); 825 PEMerr(PEM_F_B2I_PVK_BIO, ERR_R_MALLOC_FAILURE);
@@ -837,7 +837,7 @@ EVP_PKEY *b2i_PVK_bio(BIO *in, pem_password_cb *cb, void *u)
837 if (buf) 837 if (buf)
838 { 838 {
839 OPENSSL_cleanse(buf, buflen); 839 OPENSSL_cleanse(buf, buflen);
840 OPENSSL_free(buf); 840 free(buf);
841 } 841 }
842 return ret; 842 return ret;
843 } 843 }
@@ -863,7 +863,7 @@ static int i2b_PVK(unsigned char **out, EVP_PKEY*pk, int enclevel,
863 p = *out; 863 p = *out;
864 else 864 else
865 { 865 {
866 p = OPENSSL_malloc(outlen); 866 p = malloc(outlen);
867 if (!p) 867 if (!p)
868 { 868 {
869 PEMerr(PEM_F_I2B_PVK,ERR_R_MALLOC_FAILURE); 869 PEMerr(PEM_F_I2B_PVK,ERR_R_MALLOC_FAILURE);
@@ -936,7 +936,7 @@ int i2b_PVK_bio(BIO *out, EVP_PKEY *pk, int enclevel,
936 if (outlen < 0) 936 if (outlen < 0)
937 return -1; 937 return -1;
938 wrlen = BIO_write(out, tmp, outlen); 938 wrlen = BIO_write(out, tmp, outlen);
939 OPENSSL_free(tmp); 939 free(tmp);
940 if (wrlen == outlen) 940 if (wrlen == outlen)
941 { 941 {
942 PEMerr(PEM_F_I2B_PVK_BIO, PEM_R_BIO_WRITE_FAILURE); 942 PEMerr(PEM_F_I2B_PVK_BIO, PEM_R_BIO_WRITE_FAILURE);