diff options
Diffstat (limited to 'src/lib/libssl/ssl_asn1.c')
-rw-r--r-- | src/lib/libssl/ssl_asn1.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/src/lib/libssl/ssl_asn1.c b/src/lib/libssl/ssl_asn1.c index e77cdddfd3..fa6456e4f5 100644 --- a/src/lib/libssl/ssl_asn1.c +++ b/src/lib/libssl/ssl_asn1.c | |||
@@ -92,7 +92,7 @@ int i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
92 | 92 | ||
93 | /* Note that I cheat in the following 2 assignments. I know | 93 | /* Note that I cheat in the following 2 assignments. I know |
94 | * that if the ASN1_INTEGER passed to ASN1_INTEGER_set | 94 | * that if the ASN1_INTEGER passed to ASN1_INTEGER_set |
95 | * is > sizeof(long)+1, the buffer will not be re-Malloc()ed. | 95 | * is > sizeof(long)+1, the buffer will not be re-OPENSSL_malloc()ed. |
96 | * This is a bit evil but makes things simple, no dynamic allocation | 96 | * This is a bit evil but makes things simple, no dynamic allocation |
97 | * to clean up :-) */ | 97 | * to clean up :-) */ |
98 | a.version.length=LSIZE2; | 98 | a.version.length=LSIZE2; |
@@ -223,13 +223,13 @@ SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, unsigned char **pp, | |||
223 | ai.data=NULL; ai.length=0; | 223 | ai.data=NULL; ai.length=0; |
224 | M_ASN1_D2I_get(aip,d2i_ASN1_INTEGER); | 224 | M_ASN1_D2I_get(aip,d2i_ASN1_INTEGER); |
225 | version=(int)ASN1_INTEGER_get(aip); | 225 | version=(int)ASN1_INTEGER_get(aip); |
226 | if (ai.data != NULL) { Free(ai.data); ai.data=NULL; ai.length=0; } | 226 | if (ai.data != NULL) { OPENSSL_free(ai.data); ai.data=NULL; ai.length=0; } |
227 | 227 | ||
228 | /* we don't care about the version right now :-) */ | 228 | /* we don't care about the version right now :-) */ |
229 | M_ASN1_D2I_get(aip,d2i_ASN1_INTEGER); | 229 | M_ASN1_D2I_get(aip,d2i_ASN1_INTEGER); |
230 | ssl_version=(int)ASN1_INTEGER_get(aip); | 230 | ssl_version=(int)ASN1_INTEGER_get(aip); |
231 | ret->ssl_version=ssl_version; | 231 | ret->ssl_version=ssl_version; |
232 | if (ai.data != NULL) { Free(ai.data); ai.data=NULL; ai.length=0; } | 232 | if (ai.data != NULL) { OPENSSL_free(ai.data); ai.data=NULL; ai.length=0; } |
233 | 233 | ||
234 | os.data=NULL; os.length=0; | 234 | os.data=NULL; os.length=0; |
235 | M_ASN1_D2I_get(osp,d2i_ASN1_OCTET_STRING); | 235 | M_ASN1_D2I_get(osp,d2i_ASN1_OCTET_STRING); |
@@ -291,14 +291,14 @@ SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, unsigned char **pp, | |||
291 | else | 291 | else |
292 | ret->key_arg_length=os.length; | 292 | ret->key_arg_length=os.length; |
293 | memcpy(ret->key_arg,os.data,ret->key_arg_length); | 293 | memcpy(ret->key_arg,os.data,ret->key_arg_length); |
294 | if (os.data != NULL) Free(os.data); | 294 | if (os.data != NULL) OPENSSL_free(os.data); |
295 | 295 | ||
296 | ai.length=0; | 296 | ai.length=0; |
297 | M_ASN1_D2I_get_EXP_opt(aip,d2i_ASN1_INTEGER,1); | 297 | M_ASN1_D2I_get_EXP_opt(aip,d2i_ASN1_INTEGER,1); |
298 | if (ai.data != NULL) | 298 | if (ai.data != NULL) |
299 | { | 299 | { |
300 | ret->time=ASN1_INTEGER_get(aip); | 300 | ret->time=ASN1_INTEGER_get(aip); |
301 | Free(ai.data); ai.data=NULL; ai.length=0; | 301 | OPENSSL_free(ai.data); ai.data=NULL; ai.length=0; |
302 | } | 302 | } |
303 | else | 303 | else |
304 | ret->time=time(NULL); | 304 | ret->time=time(NULL); |
@@ -308,7 +308,7 @@ SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, unsigned char **pp, | |||
308 | if (ai.data != NULL) | 308 | if (ai.data != NULL) |
309 | { | 309 | { |
310 | ret->timeout=ASN1_INTEGER_get(aip); | 310 | ret->timeout=ASN1_INTEGER_get(aip); |
311 | Free(ai.data); ai.data=NULL; ai.length=0; | 311 | OPENSSL_free(ai.data); ai.data=NULL; ai.length=0; |
312 | } | 312 | } |
313 | else | 313 | else |
314 | ret->timeout=3; | 314 | ret->timeout=3; |
@@ -330,7 +330,7 @@ SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, unsigned char **pp, | |||
330 | SSLerr(SSL_F_D2I_SSL_SESSION,SSL_R_BAD_LENGTH); | 330 | SSLerr(SSL_F_D2I_SSL_SESSION,SSL_R_BAD_LENGTH); |
331 | ret->sid_ctx_length=os.length; | 331 | ret->sid_ctx_length=os.length; |
332 | memcpy(ret->sid_ctx,os.data,os.length); | 332 | memcpy(ret->sid_ctx,os.data,os.length); |
333 | Free(os.data); os.data=NULL; os.length=0; | 333 | OPENSSL_free(os.data); os.data=NULL; os.length=0; |
334 | } | 334 | } |
335 | else | 335 | else |
336 | ret->sid_ctx_length=0; | 336 | ret->sid_ctx_length=0; |
@@ -340,7 +340,7 @@ SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, unsigned char **pp, | |||
340 | if (ai.data != NULL) | 340 | if (ai.data != NULL) |
341 | { | 341 | { |
342 | ret->verify_result=ASN1_INTEGER_get(aip); | 342 | ret->verify_result=ASN1_INTEGER_get(aip); |
343 | Free(ai.data); ai.data=NULL; ai.length=0; | 343 | OPENSSL_free(ai.data); ai.data=NULL; ai.length=0; |
344 | } | 344 | } |
345 | else | 345 | else |
346 | ret->verify_result=X509_V_OK; | 346 | ret->verify_result=X509_V_OK; |