summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_srvr.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/s3_srvr.c')
-rw-r--r--src/lib/libssl/s3_srvr.c24
1 files changed, 12 insertions, 12 deletions
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c
index cc46e241d4..927b0d7db1 100644
--- a/src/lib/libssl/s3_srvr.c
+++ b/src/lib/libssl/s3_srvr.c
@@ -1760,7 +1760,7 @@ ssl3_send_server_key_exchange(SSL *s)
1760 NULL, 0, NULL); 1760 NULL, 0, NULL);
1761 1761
1762 encodedPoint = (unsigned char *) 1762 encodedPoint = (unsigned char *)
1763 OPENSSL_malloc(encodedlen*sizeof(unsigned char)); 1763 malloc(encodedlen*sizeof(unsigned char));
1764 1764
1765 bn_ctx = BN_CTX_new(); 1765 bn_ctx = BN_CTX_new();
1766 if ((encodedPoint == NULL) || (bn_ctx == NULL)) { 1766 if ((encodedPoint == NULL) || (bn_ctx == NULL)) {
@@ -1891,7 +1891,7 @@ ssl3_send_server_key_exchange(SSL *s)
1891 p += 1; 1891 p += 1;
1892 memcpy((unsigned char*)p, 1892 memcpy((unsigned char*)p,
1893 (unsigned char *)encodedPoint, encodedlen); 1893 (unsigned char *)encodedPoint, encodedlen);
1894 OPENSSL_free(encodedPoint); 1894 free(encodedPoint);
1895 encodedPoint = NULL; 1895 encodedPoint = NULL;
1896 p += encodedlen; 1896 p += encodedlen;
1897 } 1897 }
@@ -2012,7 +2012,7 @@ f_err:
2012err: 2012err:
2013#ifndef OPENSSL_NO_ECDH 2013#ifndef OPENSSL_NO_ECDH
2014 if (encodedPoint != NULL) 2014 if (encodedPoint != NULL)
2015 OPENSSL_free(encodedPoint); 2015 free(encodedPoint);
2016 BN_CTX_free(bn_ctx); 2016 BN_CTX_free(bn_ctx);
2017#endif 2017#endif
2018 EVP_MD_CTX_cleanup(&md_ctx); 2018 EVP_MD_CTX_cleanup(&md_ctx);
@@ -2706,7 +2706,7 @@ ssl3_get_client_key_exchange(SSL *s)
2706 s2n(psk_len, t); 2706 s2n(psk_len, t);
2707 2707
2708 if (s->session->psk_identity != NULL) 2708 if (s->session->psk_identity != NULL)
2709 OPENSSL_free(s->session->psk_identity); 2709 free(s->session->psk_identity);
2710 s->session->psk_identity = BUF_strdup((char *)p); 2710 s->session->psk_identity = BUF_strdup((char *)p);
2711 if (s->session->psk_identity == NULL) { 2711 if (s->session->psk_identity == NULL) {
2712 SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, 2712 SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,
@@ -2715,7 +2715,7 @@ ssl3_get_client_key_exchange(SSL *s)
2715 } 2715 }
2716 2716
2717 if (s->session->psk_identity_hint != NULL) 2717 if (s->session->psk_identity_hint != NULL)
2718 OPENSSL_free(s->session->psk_identity_hint); 2718 free(s->session->psk_identity_hint);
2719 s->session->psk_identity_hint = BUF_strdup(s->ctx->psk_identity_hint); 2719 s->session->psk_identity_hint = BUF_strdup(s->ctx->psk_identity_hint);
2720 if (s->ctx->psk_identity_hint != NULL && 2720 if (s->ctx->psk_identity_hint != NULL &&
2721 s->session->psk_identity_hint == NULL) { 2721 s->session->psk_identity_hint == NULL) {
@@ -2752,7 +2752,7 @@ ssl3_get_client_key_exchange(SSL *s)
2752 goto err; 2752 goto err;
2753 } 2753 }
2754 if (s->session->srp_username != NULL) 2754 if (s->session->srp_username != NULL)
2755 OPENSSL_free(s->session->srp_username); 2755 free(s->session->srp_username);
2756 s->session->srp_username = BUF_strdup(s->srp_ctx.login); 2756 s->session->srp_username = BUF_strdup(s->srp_ctx.login);
2757 if (s->session->srp_username == NULL) { 2757 if (s->session->srp_username == NULL) {
2758 SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, 2758 SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,
@@ -3314,7 +3314,7 @@ ssl3_send_newsession_ticket(SSL *s)
3314 */ 3314 */
3315 if (slen_full > 0xFF00) 3315 if (slen_full > 0xFF00)
3316 return -1; 3316 return -1;
3317 senc = OPENSSL_malloc(slen_full); 3317 senc = malloc(slen_full);
3318 if (!senc) 3318 if (!senc)
3319 return -1; 3319 return -1;
3320 p = senc; 3320 p = senc;
@@ -3327,7 +3327,7 @@ ssl3_send_newsession_ticket(SSL *s)
3327 const_p = senc; 3327 const_p = senc;
3328 sess = d2i_SSL_SESSION(NULL, &const_p, slen_full); 3328 sess = d2i_SSL_SESSION(NULL, &const_p, slen_full);
3329 if (sess == NULL) { 3329 if (sess == NULL) {
3330 OPENSSL_free(senc); 3330 free(senc);
3331 return -1; 3331 return -1;
3332 } 3332 }
3333 3333
@@ -3337,7 +3337,7 @@ ssl3_send_newsession_ticket(SSL *s)
3337 slen = i2d_SSL_SESSION(sess, NULL); 3337 slen = i2d_SSL_SESSION(sess, NULL);
3338 if (slen > slen_full) { 3338 if (slen > slen_full) {
3339 /* shouldn't ever happen */ 3339 /* shouldn't ever happen */
3340 OPENSSL_free(senc); 3340 free(senc);
3341 return -1; 3341 return -1;
3342 } 3342 }
3343 p = senc; 3343 p = senc;
@@ -3372,7 +3372,7 @@ ssl3_send_newsession_ticket(SSL *s)
3372 if (tctx->tlsext_ticket_key_cb) { 3372 if (tctx->tlsext_ticket_key_cb) {
3373 if (tctx->tlsext_ticket_key_cb(s, key_name, iv, &ctx, 3373 if (tctx->tlsext_ticket_key_cb(s, key_name, iv, &ctx,
3374 &hctx, 1) < 0) { 3374 &hctx, 1) < 0) {
3375 OPENSSL_free(senc); 3375 free(senc);
3376 return -1; 3376 return -1;
3377 } 3377 }
3378 } else { 3378 } else {
@@ -3426,7 +3426,7 @@ ssl3_send_newsession_ticket(SSL *s)
3426 s->init_num = len; 3426 s->init_num = len;
3427 s->state = SSL3_ST_SW_SESSION_TICKET_B; 3427 s->state = SSL3_ST_SW_SESSION_TICKET_B;
3428 s->init_off = 0; 3428 s->init_off = 0;
3429 OPENSSL_free(senc); 3429 free(senc);
3430 } 3430 }
3431 3431
3432 /* SSL3_ST_SW_SESSION_TICKET_B */ 3432 /* SSL3_ST_SW_SESSION_TICKET_B */
@@ -3529,7 +3529,7 @@ ssl3_get_next_proto(SSL *s)
3529 if (proto_len + padding_len + 2 != s->init_num) 3529 if (proto_len + padding_len + 2 != s->init_num)
3530 return 0; 3530 return 0;
3531 3531
3532 s->next_proto_negotiated = OPENSSL_malloc(proto_len); 3532 s->next_proto_negotiated = malloc(proto_len);
3533 if (!s->next_proto_negotiated) { 3533 if (!s->next_proto_negotiated) {
3534 SSLerr(SSL_F_SSL3_GET_NEXT_PROTO, ERR_R_MALLOC_FAILURE); 3534 SSLerr(SSL_F_SSL3_GET_NEXT_PROTO, ERR_R_MALLOC_FAILURE);
3535 return 0; 3535 return 0;