--- libaitio/src/crypt.c 2012/05/14 12:49:21 1.6 +++ libaitio/src/crypt.c 2012/07/03 08:51:05 1.7 @@ -3,7 +3,7 @@ * by Michael Pounov * * $Author: misho $ -* $Id: crypt.c,v 1.6 2012/05/14 12:49:21 misho Exp $ +* $Id: crypt.c,v 1.7 2012/07/03 08:51:05 misho Exp $ * ************************************************************************** The ELWIX and AITNET software is distributed under the following @@ -51,7 +51,7 @@ SUCH DAMAGE. * * @pInput = input buffer * @inLen = input buffer len - * @ppOutput = output allocated buffe, must be free after use + * @ppOutput = output allocated buffe, must be io_free after use * @Cipher = cipher engine, like EVP_bf_cbc() or etc... * @pKey = key * @pIV = IV, salt (8 bytes) @@ -68,7 +68,7 @@ ioCipher(u_char *pInput, int inLen, u_char **ppOutput, if (!pInput || !inLen || !ppOutput || nMode & 0xFFFFFFFE) return 0; - buf = malloc(inLen + EVP_MAX_BLOCK_LENGTH); + buf = io_malloc(inLen + EVP_MAX_BLOCK_LENGTH); if (!buf) { LOGERR; goto end; @@ -84,7 +84,7 @@ ioCipher(u_char *pInput, int inLen, u_char **ppOutput, if (!EVP_CipherUpdate(&ctx, buf + outlen, &buflen, pos, chunk)) { EVP_CIPHER_CTX_cleanup(&ctx); outlen = 0; - free(buf); + io_free(buf); buf = NULL; goto end; } else { @@ -97,7 +97,7 @@ ioCipher(u_char *pInput, int inLen, u_char **ppOutput, } if (!EVP_CipherFinal_ex(&ctx, buf + outlen, &buflen)) { outlen = 0; - free(buf); + io_free(buf); buf = NULL; } else outlen += buflen; @@ -113,7 +113,7 @@ end: * * @pInput = input buffer * @inLen = input buffer len - * @ppOutput = output allocated buffe, must be free after use + * @ppOutput = output allocated buffe, must be io_free after use * @pKey = key * @pIV = IV, salt (8 bytes) * @nMode = Mode 0 - decrypting or 1 - encrypting @@ -135,7 +135,7 @@ io_Blowfish(u_char *pInput, int inLen, u_char **ppOutp str = strdup((char*) pInput); } else { len = strlen((char*) pInput) / 2; - str = malloc(len + 1); + str = io_malloc(len + 1); if (!str) { LOGERR; return 0; @@ -149,11 +149,11 @@ io_Blowfish(u_char *pInput, int inLen, u_char **ppOutp } ret = len = ioCipher((u_char*) str, len, &buf, EVP_bf_cbc(), pKey, pIV, nMode); - free(str); + io_free(str); if (nMode) { ret *= 2; - *ppOutput = malloc(ret + 1); + *ppOutput = io_malloc(ret + 1); if (!*ppOutput) { LOGERR; return 0; @@ -177,7 +177,7 @@ io_Blowfish(u_char *pInput, int inLen, u_char **ppOutp * * @pInput = Input buffer with ASCII * @inLen = Input buffer data length - * @ppOutput = Output buffer with cipher data, must be free after use + * @ppOutput = Output buffer with cipher data, must be io_free after use * @pKey = Key * @IV = IVector/Nonce/Counter, Warning: IV must be variable, because we write there!!! * return: -1 error or >-1 how many cipher blocks proceeded @@ -193,7 +193,7 @@ io_ctr_AES(u_char *pInput, int inLen, u_char **ppOutpu if (!pInput || !inLen || !ppOutput) return -1; - *ppOutput = malloc(inLen); + *ppOutput = io_malloc(inLen); if (!*ppOutput) { LOGERR; return -1; @@ -209,7 +209,7 @@ io_ctr_AES(u_char *pInput, int inLen, u_char **ppOutpu (inLen / (AES_BLOCK_SIZE - 1)) ? (AES_BLOCK_SIZE - 1) : inLen, &key, IV, ecount_buf, &num); if (num < 1) { - free(*ppOutput); + io_free(*ppOutput); *ppOutput = NULL; total = -1; break;