diff options
Diffstat (limited to 'src/lib/libcrypto/x509/x509_lu.c')
| -rw-r--r-- | src/lib/libcrypto/x509/x509_lu.c | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/src/lib/libcrypto/x509/x509_lu.c b/src/lib/libcrypto/x509/x509_lu.c index 38525a8cdd..644ea83bac 100644 --- a/src/lib/libcrypto/x509/x509_lu.c +++ b/src/lib/libcrypto/x509/x509_lu.c | |||
| @@ -66,7 +66,7 @@ X509_LOOKUP *X509_LOOKUP_new(X509_LOOKUP_METHOD *method) | |||
| 66 | { | 66 | { |
| 67 | X509_LOOKUP *ret; | 67 | X509_LOOKUP *ret; |
| 68 | 68 | ||
| 69 | ret=(X509_LOOKUP *)OPENSSL_malloc(sizeof(X509_LOOKUP)); | 69 | ret=(X509_LOOKUP *)malloc(sizeof(X509_LOOKUP)); |
| 70 | if (ret == NULL) return NULL; | 70 | if (ret == NULL) return NULL; |
| 71 | 71 | ||
| 72 | ret->init=0; | 72 | ret->init=0; |
| @@ -76,7 +76,7 @@ X509_LOOKUP *X509_LOOKUP_new(X509_LOOKUP_METHOD *method) | |||
| 76 | ret->store_ctx=NULL; | 76 | ret->store_ctx=NULL; |
| 77 | if ((method->new_item != NULL) && !method->new_item(ret)) | 77 | if ((method->new_item != NULL) && !method->new_item(ret)) |
| 78 | { | 78 | { |
| 79 | OPENSSL_free(ret); | 79 | free(ret); |
| 80 | return NULL; | 80 | return NULL; |
| 81 | } | 81 | } |
| 82 | return ret; | 82 | return ret; |
| @@ -88,7 +88,7 @@ void X509_LOOKUP_free(X509_LOOKUP *ctx) | |||
| 88 | if ( (ctx->method != NULL) && | 88 | if ( (ctx->method != NULL) && |
| 89 | (ctx->method->free != NULL)) | 89 | (ctx->method->free != NULL)) |
| 90 | (*ctx->method->free)(ctx); | 90 | (*ctx->method->free)(ctx); |
| 91 | OPENSSL_free(ctx); | 91 | free(ctx); |
| 92 | } | 92 | } |
| 93 | 93 | ||
| 94 | int X509_LOOKUP_init(X509_LOOKUP *ctx) | 94 | int X509_LOOKUP_init(X509_LOOKUP *ctx) |
| @@ -179,7 +179,7 @@ X509_STORE *X509_STORE_new(void) | |||
| 179 | { | 179 | { |
| 180 | X509_STORE *ret; | 180 | X509_STORE *ret; |
| 181 | 181 | ||
| 182 | if ((ret=(X509_STORE *)OPENSSL_malloc(sizeof(X509_STORE))) == NULL) | 182 | if ((ret=(X509_STORE *)malloc(sizeof(X509_STORE))) == NULL) |
| 183 | return NULL; | 183 | return NULL; |
| 184 | ret->objs = sk_X509_OBJECT_new(x509_object_cmp); | 184 | ret->objs = sk_X509_OBJECT_new(x509_object_cmp); |
| 185 | ret->cache=1; | 185 | ret->cache=1; |
| @@ -203,7 +203,7 @@ X509_STORE *X509_STORE_new(void) | |||
| 203 | if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_X509_STORE, ret, &ret->ex_data)) | 203 | if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_X509_STORE, ret, &ret->ex_data)) |
| 204 | { | 204 | { |
| 205 | sk_X509_OBJECT_free(ret->objs); | 205 | sk_X509_OBJECT_free(ret->objs); |
| 206 | OPENSSL_free(ret); | 206 | free(ret); |
| 207 | return NULL; | 207 | return NULL; |
| 208 | } | 208 | } |
| 209 | 209 | ||
| @@ -226,7 +226,7 @@ static void cleanup(X509_OBJECT *a) | |||
| 226 | /* abort(); */ | 226 | /* abort(); */ |
| 227 | } | 227 | } |
| 228 | 228 | ||
| 229 | OPENSSL_free(a); | 229 | free(a); |
| 230 | } | 230 | } |
| 231 | 231 | ||
| 232 | void X509_STORE_free(X509_STORE *vfy) | 232 | void X509_STORE_free(X509_STORE *vfy) |
| @@ -251,7 +251,7 @@ void X509_STORE_free(X509_STORE *vfy) | |||
| 251 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_X509_STORE, vfy, &vfy->ex_data); | 251 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_X509_STORE, vfy, &vfy->ex_data); |
| 252 | if (vfy->param) | 252 | if (vfy->param) |
| 253 | X509_VERIFY_PARAM_free(vfy->param); | 253 | X509_VERIFY_PARAM_free(vfy->param); |
| 254 | OPENSSL_free(vfy); | 254 | free(vfy); |
| 255 | } | 255 | } |
| 256 | 256 | ||
| 257 | X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m) | 257 | X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m) |
| @@ -337,7 +337,7 @@ int X509_STORE_add_cert(X509_STORE *ctx, X509 *x) | |||
| 337 | int ret=1; | 337 | int ret=1; |
| 338 | 338 | ||
| 339 | if (x == NULL) return 0; | 339 | if (x == NULL) return 0; |
| 340 | obj=(X509_OBJECT *)OPENSSL_malloc(sizeof(X509_OBJECT)); | 340 | obj=(X509_OBJECT *)malloc(sizeof(X509_OBJECT)); |
| 341 | if (obj == NULL) | 341 | if (obj == NULL) |
| 342 | { | 342 | { |
| 343 | X509err(X509_F_X509_STORE_ADD_CERT,ERR_R_MALLOC_FAILURE); | 343 | X509err(X509_F_X509_STORE_ADD_CERT,ERR_R_MALLOC_FAILURE); |
| @@ -353,7 +353,7 @@ int X509_STORE_add_cert(X509_STORE *ctx, X509 *x) | |||
| 353 | if (X509_OBJECT_retrieve_match(ctx->objs, obj)) | 353 | if (X509_OBJECT_retrieve_match(ctx->objs, obj)) |
| 354 | { | 354 | { |
| 355 | X509_OBJECT_free_contents(obj); | 355 | X509_OBJECT_free_contents(obj); |
| 356 | OPENSSL_free(obj); | 356 | free(obj); |
| 357 | X509err(X509_F_X509_STORE_ADD_CERT,X509_R_CERT_ALREADY_IN_HASH_TABLE); | 357 | X509err(X509_F_X509_STORE_ADD_CERT,X509_R_CERT_ALREADY_IN_HASH_TABLE); |
| 358 | ret=0; | 358 | ret=0; |
| 359 | } | 359 | } |
| @@ -370,7 +370,7 @@ int X509_STORE_add_crl(X509_STORE *ctx, X509_CRL *x) | |||
| 370 | int ret=1; | 370 | int ret=1; |
| 371 | 371 | ||
| 372 | if (x == NULL) return 0; | 372 | if (x == NULL) return 0; |
| 373 | obj=(X509_OBJECT *)OPENSSL_malloc(sizeof(X509_OBJECT)); | 373 | obj=(X509_OBJECT *)malloc(sizeof(X509_OBJECT)); |
| 374 | if (obj == NULL) | 374 | if (obj == NULL) |
| 375 | { | 375 | { |
| 376 | X509err(X509_F_X509_STORE_ADD_CRL,ERR_R_MALLOC_FAILURE); | 376 | X509err(X509_F_X509_STORE_ADD_CRL,ERR_R_MALLOC_FAILURE); |
| @@ -386,7 +386,7 @@ int X509_STORE_add_crl(X509_STORE *ctx, X509_CRL *x) | |||
| 386 | if (X509_OBJECT_retrieve_match(ctx->objs, obj)) | 386 | if (X509_OBJECT_retrieve_match(ctx->objs, obj)) |
| 387 | { | 387 | { |
| 388 | X509_OBJECT_free_contents(obj); | 388 | X509_OBJECT_free_contents(obj); |
| 389 | OPENSSL_free(obj); | 389 | free(obj); |
| 390 | X509err(X509_F_X509_STORE_ADD_CRL,X509_R_CERT_ALREADY_IN_HASH_TABLE); | 390 | X509err(X509_F_X509_STORE_ADD_CRL,X509_R_CERT_ALREADY_IN_HASH_TABLE); |
| 391 | ret=0; | 391 | ret=0; |
| 392 | } | 392 | } |
