File: array_alloc.c

package info (click to toggle)
openssl 3.6.0-2
  • links: PTS, VCS
  • area: main
  • in suites: experimental
  • size: 148,104 kB
  • sloc: ansic: 612,658; perl: 248,939; asm: 6,332; sh: 1,755; pascal: 997; python: 648; makefile: 551; lisp: 35; ruby: 16; cpp: 10; sed: 6
file content (94 lines) | stat: -rw-r--r-- 2,633 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
/*
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
 *
 * Licensed under the Apache License 2.0 (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
 */

/*
 * This file provides implementation of various array allocation routines that
 * perform integer overflow checking for size calculation.
 */

#include "internal/mem_alloc_utils.h"
#include <openssl/crypto.h>

void *CRYPTO_malloc_array(size_t num, size_t size, const char *file, int line)
{
    size_t bytes;

    if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line)))
        return NULL;

    return CRYPTO_malloc(bytes, file, line);
}

void *CRYPTO_calloc(size_t num, size_t size, const char *file, int line)
{
    size_t bytes;

    if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line)))
        return NULL;

    return CRYPTO_zalloc(bytes, file, line);
}

void *CRYPTO_aligned_alloc_array(size_t num, size_t size, size_t align,
                                 void **freeptr, const char *file, int line)
{
    size_t bytes;

    if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line))) {
        *freeptr = NULL;

        return NULL;
    }

    return CRYPTO_aligned_alloc(bytes, align, freeptr, file, line);
}

void *CRYPTO_realloc_array(void *addr, size_t num, size_t size,
                           const char *file, int line)
{
    size_t bytes;

    if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line)))
        return NULL;

    return CRYPTO_realloc(addr, bytes, file, line);
}

void *CRYPTO_clear_realloc_array(void *addr, size_t old_num, size_t num,
                                 size_t size, const char *file, int line)
{
    size_t old_bytes, bytes = 0;

    if (ossl_unlikely(!ossl_size_mul(old_num, size, &old_bytes, file, line)
                      || !ossl_size_mul(num, size, &bytes, file, line)))
        return NULL;

    return CRYPTO_clear_realloc(addr, old_bytes, bytes, file, line);
}

void *CRYPTO_secure_malloc_array(size_t num, size_t size,
                                 const char *file, int line)
{
    size_t bytes;

    if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line)))
        return NULL;

    return CRYPTO_secure_malloc(bytes, file, line);
}

void *CRYPTO_secure_calloc(size_t num, size_t size, const char *file, int line)
{
    size_t bytes;

    if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line)))
        return NULL;

    return CRYPTO_secure_zalloc(bytes, file, line);
}