/* * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * This file provides implementation of various array allocation routines that * perform integer overflow checking for size calculation. */ #include "internal/mem_alloc_utils.h" #include void *CRYPTO_malloc_array(size_t num, size_t size, const char *file, int line) { size_t bytes; if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line))) return NULL; return CRYPTO_malloc(bytes, file, line); } void *CRYPTO_calloc(size_t num, size_t size, const char *file, int line) { size_t bytes; if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line))) return NULL; return CRYPTO_zalloc(bytes, file, line); } void *CRYPTO_aligned_alloc_array(size_t num, size_t size, size_t align, void **freeptr, const char *file, int line) { size_t bytes; if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line))) { *freeptr = NULL; return NULL; } return CRYPTO_aligned_alloc(bytes, align, freeptr, file, line); } void *CRYPTO_realloc_array(void *addr, size_t num, size_t size, const char *file, int line) { size_t bytes; if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line))) return NULL; return CRYPTO_realloc(addr, bytes, file, line); } void *CRYPTO_clear_realloc_array(void *addr, size_t old_num, size_t num, size_t size, const char *file, int line) { size_t old_bytes, bytes = 0; if (ossl_unlikely(!ossl_size_mul(old_num, size, &old_bytes, file, line) || !ossl_size_mul(num, size, &bytes, file, line))) return NULL; return CRYPTO_clear_realloc(addr, old_bytes, bytes, file, line); } void *CRYPTO_secure_malloc_array(size_t num, size_t size, const char *file, int line) { size_t bytes; if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line))) return NULL; return CRYPTO_secure_malloc(bytes, file, line); } void *CRYPTO_secure_calloc(size_t num, size_t size, const char *file, int line) { size_t bytes; if (ossl_unlikely(!ossl_size_mul(num, size, &bytes, file, line))) return NULL; return CRYPTO_secure_zalloc(bytes, file, line); }