mirror of https://github.com/openssl/openssl.git
				
				
				
			
		
			
				
	
	
		
			95 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			95 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			C
		
	
	
	
/*
 | 
						|
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
 | 
						|
 *
 | 
						|
 * Licensed under the Apache License 2.0 (the "License").  You may not use
 | 
						|
 * this file except in compliance with the License.  You can obtain a copy
 | 
						|
 * in the file LICENSE in the source distribution or at
 | 
						|
 * https://www.openssl.org/source/license.html
 | 
						|
 */
 | 
						|
 | 
						|
/*
 | 
						|
 * This file provides implementation of various array allocation routines that
 | 
						|
 * perform integer overflow checking for size calculation.
 | 
						|
 */
 | 
						|
 | 
						|
#include "internal/mem_alloc_utils.h"
 | 
						|
#include <openssl/crypto.h>
 | 
						|
 | 
						|
void *CRYPTO_malloc_array(size_t num, size_t size, const char *file, int line)
 | 
						|
{
 | 
						|
    size_t bytes;
 | 
						|
 | 
						|
    if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line)))
 | 
						|
        return NULL;
 | 
						|
 | 
						|
    return CRYPTO_malloc(bytes, file, line);
 | 
						|
}
 | 
						|
 | 
						|
void *CRYPTO_calloc(size_t num, size_t size, const char *file, int line)
 | 
						|
{
 | 
						|
    size_t bytes;
 | 
						|
 | 
						|
    if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line)))
 | 
						|
        return NULL;
 | 
						|
 | 
						|
    return CRYPTO_zalloc(bytes, file, line);
 | 
						|
}
 | 
						|
 | 
						|
void *CRYPTO_aligned_alloc_array(size_t num, size_t size, size_t align,
 | 
						|
                                 void **freeptr, const char *file, int line)
 | 
						|
{
 | 
						|
    size_t bytes;
 | 
						|
 | 
						|
    if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line))) {
 | 
						|
        *freeptr = NULL;
 | 
						|
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
 | 
						|
    return CRYPTO_aligned_alloc(bytes, align, freeptr, file, line);
 | 
						|
}
 | 
						|
 | 
						|
void *CRYPTO_realloc_array(void *addr, size_t num, size_t size,
 | 
						|
                           const char *file, int line)
 | 
						|
{
 | 
						|
    size_t bytes;
 | 
						|
 | 
						|
    if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line)))
 | 
						|
        return NULL;
 | 
						|
 | 
						|
    return CRYPTO_realloc(addr, bytes, file, line);
 | 
						|
}
 | 
						|
 | 
						|
void *CRYPTO_clear_realloc_array(void *addr, size_t old_num, size_t num,
 | 
						|
                                 size_t size, const char *file, int line)
 | 
						|
{
 | 
						|
    size_t old_bytes, bytes = 0;
 | 
						|
 | 
						|
    if (ossl_unlikely(!ossl_size_mul(old_num, size, &old_bytes, file, line)
 | 
						|
                      || !ossl_size_mul(num, size, &bytes, file, line)))
 | 
						|
        return NULL;
 | 
						|
 | 
						|
    return CRYPTO_clear_realloc(addr, old_bytes, bytes, file, line);
 | 
						|
}
 | 
						|
 | 
						|
void *CRYPTO_secure_malloc_array(size_t num, size_t size,
 | 
						|
                                 const char *file, int line)
 | 
						|
{
 | 
						|
    size_t bytes;
 | 
						|
 | 
						|
    if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line)))
 | 
						|
        return NULL;
 | 
						|
 | 
						|
    return CRYPTO_secure_malloc(bytes, file, line);
 | 
						|
}
 | 
						|
 | 
						|
void *CRYPTO_secure_calloc(size_t num, size_t size, const char *file, int line)
 | 
						|
{
 | 
						|
    size_t bytes;
 | 
						|
 | 
						|
    if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line)))
 | 
						|
        return NULL;
 | 
						|
 | 
						|
    return CRYPTO_secure_zalloc(bytes, file, line);
 | 
						|
}
 |