diff options
Diffstat (limited to 'src/lib/libssl/s3_srvr.c')
-rw-r--r-- | src/lib/libssl/s3_srvr.c | 24 |
1 files changed, 12 insertions, 12 deletions
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c index cc46e241d4..927b0d7db1 100644 --- a/src/lib/libssl/s3_srvr.c +++ b/src/lib/libssl/s3_srvr.c | |||
@@ -1760,7 +1760,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
1760 | NULL, 0, NULL); | 1760 | NULL, 0, NULL); |
1761 | 1761 | ||
1762 | encodedPoint = (unsigned char *) | 1762 | encodedPoint = (unsigned char *) |
1763 | OPENSSL_malloc(encodedlen*sizeof(unsigned char)); | 1763 | malloc(encodedlen*sizeof(unsigned char)); |
1764 | 1764 | ||
1765 | bn_ctx = BN_CTX_new(); | 1765 | bn_ctx = BN_CTX_new(); |
1766 | if ((encodedPoint == NULL) || (bn_ctx == NULL)) { | 1766 | if ((encodedPoint == NULL) || (bn_ctx == NULL)) { |
@@ -1891,7 +1891,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
1891 | p += 1; | 1891 | p += 1; |
1892 | memcpy((unsigned char*)p, | 1892 | memcpy((unsigned char*)p, |
1893 | (unsigned char *)encodedPoint, encodedlen); | 1893 | (unsigned char *)encodedPoint, encodedlen); |
1894 | OPENSSL_free(encodedPoint); | 1894 | free(encodedPoint); |
1895 | encodedPoint = NULL; | 1895 | encodedPoint = NULL; |
1896 | p += encodedlen; | 1896 | p += encodedlen; |
1897 | } | 1897 | } |
@@ -2012,7 +2012,7 @@ f_err: | |||
2012 | err: | 2012 | err: |
2013 | #ifndef OPENSSL_NO_ECDH | 2013 | #ifndef OPENSSL_NO_ECDH |
2014 | if (encodedPoint != NULL) | 2014 | if (encodedPoint != NULL) |
2015 | OPENSSL_free(encodedPoint); | 2015 | free(encodedPoint); |
2016 | BN_CTX_free(bn_ctx); | 2016 | BN_CTX_free(bn_ctx); |
2017 | #endif | 2017 | #endif |
2018 | EVP_MD_CTX_cleanup(&md_ctx); | 2018 | EVP_MD_CTX_cleanup(&md_ctx); |
@@ -2706,7 +2706,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
2706 | s2n(psk_len, t); | 2706 | s2n(psk_len, t); |
2707 | 2707 | ||
2708 | if (s->session->psk_identity != NULL) | 2708 | if (s->session->psk_identity != NULL) |
2709 | OPENSSL_free(s->session->psk_identity); | 2709 | free(s->session->psk_identity); |
2710 | s->session->psk_identity = BUF_strdup((char *)p); | 2710 | s->session->psk_identity = BUF_strdup((char *)p); |
2711 | if (s->session->psk_identity == NULL) { | 2711 | if (s->session->psk_identity == NULL) { |
2712 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, | 2712 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, |
@@ -2715,7 +2715,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
2715 | } | 2715 | } |
2716 | 2716 | ||
2717 | if (s->session->psk_identity_hint != NULL) | 2717 | if (s->session->psk_identity_hint != NULL) |
2718 | OPENSSL_free(s->session->psk_identity_hint); | 2718 | free(s->session->psk_identity_hint); |
2719 | s->session->psk_identity_hint = BUF_strdup(s->ctx->psk_identity_hint); | 2719 | s->session->psk_identity_hint = BUF_strdup(s->ctx->psk_identity_hint); |
2720 | if (s->ctx->psk_identity_hint != NULL && | 2720 | if (s->ctx->psk_identity_hint != NULL && |
2721 | s->session->psk_identity_hint == NULL) { | 2721 | s->session->psk_identity_hint == NULL) { |
@@ -2752,7 +2752,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
2752 | goto err; | 2752 | goto err; |
2753 | } | 2753 | } |
2754 | if (s->session->srp_username != NULL) | 2754 | if (s->session->srp_username != NULL) |
2755 | OPENSSL_free(s->session->srp_username); | 2755 | free(s->session->srp_username); |
2756 | s->session->srp_username = BUF_strdup(s->srp_ctx.login); | 2756 | s->session->srp_username = BUF_strdup(s->srp_ctx.login); |
2757 | if (s->session->srp_username == NULL) { | 2757 | if (s->session->srp_username == NULL) { |
2758 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, | 2758 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, |
@@ -3314,7 +3314,7 @@ ssl3_send_newsession_ticket(SSL *s) | |||
3314 | */ | 3314 | */ |
3315 | if (slen_full > 0xFF00) | 3315 | if (slen_full > 0xFF00) |
3316 | return -1; | 3316 | return -1; |
3317 | senc = OPENSSL_malloc(slen_full); | 3317 | senc = malloc(slen_full); |
3318 | if (!senc) | 3318 | if (!senc) |
3319 | return -1; | 3319 | return -1; |
3320 | p = senc; | 3320 | p = senc; |
@@ -3327,7 +3327,7 @@ ssl3_send_newsession_ticket(SSL *s) | |||
3327 | const_p = senc; | 3327 | const_p = senc; |
3328 | sess = d2i_SSL_SESSION(NULL, &const_p, slen_full); | 3328 | sess = d2i_SSL_SESSION(NULL, &const_p, slen_full); |
3329 | if (sess == NULL) { | 3329 | if (sess == NULL) { |
3330 | OPENSSL_free(senc); | 3330 | free(senc); |
3331 | return -1; | 3331 | return -1; |
3332 | } | 3332 | } |
3333 | 3333 | ||
@@ -3337,7 +3337,7 @@ ssl3_send_newsession_ticket(SSL *s) | |||
3337 | slen = i2d_SSL_SESSION(sess, NULL); | 3337 | slen = i2d_SSL_SESSION(sess, NULL); |
3338 | if (slen > slen_full) { | 3338 | if (slen > slen_full) { |
3339 | /* shouldn't ever happen */ | 3339 | /* shouldn't ever happen */ |
3340 | OPENSSL_free(senc); | 3340 | free(senc); |
3341 | return -1; | 3341 | return -1; |
3342 | } | 3342 | } |
3343 | p = senc; | 3343 | p = senc; |
@@ -3372,7 +3372,7 @@ ssl3_send_newsession_ticket(SSL *s) | |||
3372 | if (tctx->tlsext_ticket_key_cb) { | 3372 | if (tctx->tlsext_ticket_key_cb) { |
3373 | if (tctx->tlsext_ticket_key_cb(s, key_name, iv, &ctx, | 3373 | if (tctx->tlsext_ticket_key_cb(s, key_name, iv, &ctx, |
3374 | &hctx, 1) < 0) { | 3374 | &hctx, 1) < 0) { |
3375 | OPENSSL_free(senc); | 3375 | free(senc); |
3376 | return -1; | 3376 | return -1; |
3377 | } | 3377 | } |
3378 | } else { | 3378 | } else { |
@@ -3426,7 +3426,7 @@ ssl3_send_newsession_ticket(SSL *s) | |||
3426 | s->init_num = len; | 3426 | s->init_num = len; |
3427 | s->state = SSL3_ST_SW_SESSION_TICKET_B; | 3427 | s->state = SSL3_ST_SW_SESSION_TICKET_B; |
3428 | s->init_off = 0; | 3428 | s->init_off = 0; |
3429 | OPENSSL_free(senc); | 3429 | free(senc); |
3430 | } | 3430 | } |
3431 | 3431 | ||
3432 | /* SSL3_ST_SW_SESSION_TICKET_B */ | 3432 | /* SSL3_ST_SW_SESSION_TICKET_B */ |
@@ -3529,7 +3529,7 @@ ssl3_get_next_proto(SSL *s) | |||
3529 | if (proto_len + padding_len + 2 != s->init_num) | 3529 | if (proto_len + padding_len + 2 != s->init_num) |
3530 | return 0; | 3530 | return 0; |
3531 | 3531 | ||
3532 | s->next_proto_negotiated = OPENSSL_malloc(proto_len); | 3532 | s->next_proto_negotiated = malloc(proto_len); |
3533 | if (!s->next_proto_negotiated) { | 3533 | if (!s->next_proto_negotiated) { |
3534 | SSLerr(SSL_F_SSL3_GET_NEXT_PROTO, ERR_R_MALLOC_FAILURE); | 3534 | SSLerr(SSL_F_SSL3_GET_NEXT_PROTO, ERR_R_MALLOC_FAILURE); |
3535 | return 0; | 3535 | return 0; |