diff options
Diffstat (limited to 'src/lib/libssl/s3_srvr.c')
| -rw-r--r-- | src/lib/libssl/s3_srvr.c | 24 | 
1 files changed, 12 insertions, 12 deletions
| diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c index cc46e241d4..927b0d7db1 100644 --- a/src/lib/libssl/s3_srvr.c +++ b/src/lib/libssl/s3_srvr.c | |||
| @@ -1760,7 +1760,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
| 1760 | NULL, 0, NULL); | 1760 | NULL, 0, NULL); | 
| 1761 | 1761 | ||
| 1762 | encodedPoint = (unsigned char *) | 1762 | encodedPoint = (unsigned char *) | 
| 1763 | OPENSSL_malloc(encodedlen*sizeof(unsigned char)); | 1763 | malloc(encodedlen*sizeof(unsigned char)); | 
| 1764 | 1764 | ||
| 1765 | bn_ctx = BN_CTX_new(); | 1765 | bn_ctx = BN_CTX_new(); | 
| 1766 | if ((encodedPoint == NULL) || (bn_ctx == NULL)) { | 1766 | if ((encodedPoint == NULL) || (bn_ctx == NULL)) { | 
| @@ -1891,7 +1891,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
| 1891 | p += 1; | 1891 | p += 1; | 
| 1892 | memcpy((unsigned char*)p, | 1892 | memcpy((unsigned char*)p, | 
| 1893 | (unsigned char *)encodedPoint, encodedlen); | 1893 | (unsigned char *)encodedPoint, encodedlen); | 
| 1894 | OPENSSL_free(encodedPoint); | 1894 | free(encodedPoint); | 
| 1895 | encodedPoint = NULL; | 1895 | encodedPoint = NULL; | 
| 1896 | p += encodedlen; | 1896 | p += encodedlen; | 
| 1897 | } | 1897 | } | 
| @@ -2012,7 +2012,7 @@ f_err: | |||
| 2012 | err: | 2012 | err: | 
| 2013 | #ifndef OPENSSL_NO_ECDH | 2013 | #ifndef OPENSSL_NO_ECDH | 
| 2014 | if (encodedPoint != NULL) | 2014 | if (encodedPoint != NULL) | 
| 2015 | OPENSSL_free(encodedPoint); | 2015 | free(encodedPoint); | 
| 2016 | BN_CTX_free(bn_ctx); | 2016 | BN_CTX_free(bn_ctx); | 
| 2017 | #endif | 2017 | #endif | 
| 2018 | EVP_MD_CTX_cleanup(&md_ctx); | 2018 | EVP_MD_CTX_cleanup(&md_ctx); | 
| @@ -2706,7 +2706,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
| 2706 | s2n(psk_len, t); | 2706 | s2n(psk_len, t); | 
| 2707 | 2707 | ||
| 2708 | if (s->session->psk_identity != NULL) | 2708 | if (s->session->psk_identity != NULL) | 
| 2709 | OPENSSL_free(s->session->psk_identity); | 2709 | free(s->session->psk_identity); | 
| 2710 | s->session->psk_identity = BUF_strdup((char *)p); | 2710 | s->session->psk_identity = BUF_strdup((char *)p); | 
| 2711 | if (s->session->psk_identity == NULL) { | 2711 | if (s->session->psk_identity == NULL) { | 
| 2712 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, | 2712 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, | 
| @@ -2715,7 +2715,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
| 2715 | } | 2715 | } | 
| 2716 | 2716 | ||
| 2717 | if (s->session->psk_identity_hint != NULL) | 2717 | if (s->session->psk_identity_hint != NULL) | 
| 2718 | OPENSSL_free(s->session->psk_identity_hint); | 2718 | free(s->session->psk_identity_hint); | 
| 2719 | s->session->psk_identity_hint = BUF_strdup(s->ctx->psk_identity_hint); | 2719 | s->session->psk_identity_hint = BUF_strdup(s->ctx->psk_identity_hint); | 
| 2720 | if (s->ctx->psk_identity_hint != NULL && | 2720 | if (s->ctx->psk_identity_hint != NULL && | 
| 2721 | s->session->psk_identity_hint == NULL) { | 2721 | s->session->psk_identity_hint == NULL) { | 
| @@ -2752,7 +2752,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
| 2752 | goto err; | 2752 | goto err; | 
| 2753 | } | 2753 | } | 
| 2754 | if (s->session->srp_username != NULL) | 2754 | if (s->session->srp_username != NULL) | 
| 2755 | OPENSSL_free(s->session->srp_username); | 2755 | free(s->session->srp_username); | 
| 2756 | s->session->srp_username = BUF_strdup(s->srp_ctx.login); | 2756 | s->session->srp_username = BUF_strdup(s->srp_ctx.login); | 
| 2757 | if (s->session->srp_username == NULL) { | 2757 | if (s->session->srp_username == NULL) { | 
| 2758 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, | 2758 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, | 
| @@ -3314,7 +3314,7 @@ ssl3_send_newsession_ticket(SSL *s) | |||
| 3314 | */ | 3314 | */ | 
| 3315 | if (slen_full > 0xFF00) | 3315 | if (slen_full > 0xFF00) | 
| 3316 | return -1; | 3316 | return -1; | 
| 3317 | senc = OPENSSL_malloc(slen_full); | 3317 | senc = malloc(slen_full); | 
| 3318 | if (!senc) | 3318 | if (!senc) | 
| 3319 | return -1; | 3319 | return -1; | 
| 3320 | p = senc; | 3320 | p = senc; | 
| @@ -3327,7 +3327,7 @@ ssl3_send_newsession_ticket(SSL *s) | |||
| 3327 | const_p = senc; | 3327 | const_p = senc; | 
| 3328 | sess = d2i_SSL_SESSION(NULL, &const_p, slen_full); | 3328 | sess = d2i_SSL_SESSION(NULL, &const_p, slen_full); | 
| 3329 | if (sess == NULL) { | 3329 | if (sess == NULL) { | 
| 3330 | OPENSSL_free(senc); | 3330 | free(senc); | 
| 3331 | return -1; | 3331 | return -1; | 
| 3332 | } | 3332 | } | 
| 3333 | 3333 | ||
| @@ -3337,7 +3337,7 @@ ssl3_send_newsession_ticket(SSL *s) | |||
| 3337 | slen = i2d_SSL_SESSION(sess, NULL); | 3337 | slen = i2d_SSL_SESSION(sess, NULL); | 
| 3338 | if (slen > slen_full) { | 3338 | if (slen > slen_full) { | 
| 3339 | /* shouldn't ever happen */ | 3339 | /* shouldn't ever happen */ | 
| 3340 | OPENSSL_free(senc); | 3340 | free(senc); | 
| 3341 | return -1; | 3341 | return -1; | 
| 3342 | } | 3342 | } | 
| 3343 | p = senc; | 3343 | p = senc; | 
| @@ -3372,7 +3372,7 @@ ssl3_send_newsession_ticket(SSL *s) | |||
| 3372 | if (tctx->tlsext_ticket_key_cb) { | 3372 | if (tctx->tlsext_ticket_key_cb) { | 
| 3373 | if (tctx->tlsext_ticket_key_cb(s, key_name, iv, &ctx, | 3373 | if (tctx->tlsext_ticket_key_cb(s, key_name, iv, &ctx, | 
| 3374 | &hctx, 1) < 0) { | 3374 | &hctx, 1) < 0) { | 
| 3375 | OPENSSL_free(senc); | 3375 | free(senc); | 
| 3376 | return -1; | 3376 | return -1; | 
| 3377 | } | 3377 | } | 
| 3378 | } else { | 3378 | } else { | 
| @@ -3426,7 +3426,7 @@ ssl3_send_newsession_ticket(SSL *s) | |||
| 3426 | s->init_num = len; | 3426 | s->init_num = len; | 
| 3427 | s->state = SSL3_ST_SW_SESSION_TICKET_B; | 3427 | s->state = SSL3_ST_SW_SESSION_TICKET_B; | 
| 3428 | s->init_off = 0; | 3428 | s->init_off = 0; | 
| 3429 | OPENSSL_free(senc); | 3429 | free(senc); | 
| 3430 | } | 3430 | } | 
| 3431 | 3431 | ||
| 3432 | /* SSL3_ST_SW_SESSION_TICKET_B */ | 3432 | /* SSL3_ST_SW_SESSION_TICKET_B */ | 
| @@ -3529,7 +3529,7 @@ ssl3_get_next_proto(SSL *s) | |||
| 3529 | if (proto_len + padding_len + 2 != s->init_num) | 3529 | if (proto_len + padding_len + 2 != s->init_num) | 
| 3530 | return 0; | 3530 | return 0; | 
| 3531 | 3531 | ||
| 3532 | s->next_proto_negotiated = OPENSSL_malloc(proto_len); | 3532 | s->next_proto_negotiated = malloc(proto_len); | 
| 3533 | if (!s->next_proto_negotiated) { | 3533 | if (!s->next_proto_negotiated) { | 
| 3534 | SSLerr(SSL_F_SSL3_GET_NEXT_PROTO, ERR_R_MALLOC_FAILURE); | 3534 | SSLerr(SSL_F_SSL3_GET_NEXT_PROTO, ERR_R_MALLOC_FAILURE); | 
| 3535 | return 0; | 3535 | return 0; | 
