ret = 0;
}
- end:
+ end:
OPENSSL_free(copy);
return ret;
}
BIO_printf(bio_out, "%s%c", sk_OPENSSL_CSTRING_value(groups, i),
(i < num - 1) ? ':' : '\n');
}
- err:
+ err:
SSL_CTX_free(ctx);
sk_OPENSSL_CSTRING_free(groups);
return;
BIO_free(bio);
else if (s >= 0)
BIO_closesocket(s);
- end:
+ end:
return ret;
}
ret = 1;
- err:
+ err:
BN_CTX_end(ctx);
BN_CTX_free(new_ctx);
return ret;
key->prov_flags &= ~flags_clr;
ret = 1;
- end:
+ end:
if (!ret) {
OPENSSL_free(key->priv_encoding);
OPENSSL_free(key->seed);
}
ret = 1;
- end:
+ end:
OPENSSL_cleanse((void *)augmented_seed, ML_KEM_RANDOM_BYTES);
OPENSSL_cleanse((void *)sigma, ML_KEM_RANDOM_BYTES);
return ret;
* duplicated.
*/
if (ossl_ml_kem_decoded_key(key))
- return 0;
+ return NULL;
if (key == NULL
|| (ret = OPENSSL_memdup(key, sizeof(*key))) == NULL)
seed, ML_DSA_SEED_BYTES, priv, v->sk_len))
ret = key;
- end:
+ end:
OPENSSL_free(fmt_slots);
PKCS8_PRIV_KEY_INFO_free(p8inf);
if (ret == NULL)
ret = len;
}
- end:
+ end:
OPENSSL_free(fmt_slots);
if (ret == 0)
OPENSSL_free(buf);
/* Any OQS public key content is ignored */
ret = key;
- end:
+ end:
OPENSSL_free(fmt_slots);
PKCS8_PRIV_KEY_INFO_free(p8inf);
if (ret == NULL)
ret = len;
}
- end:
+ end:
OPENSSL_free(fmt_slots);
if (ret == 0)
OPENSSL_free(buf);
"no %s key material available",
type_label);
- end:
+ end:
OPENSSL_free(pubenc);
OPENSSL_free(prvenc);
return ret;
else
ret = ossl_ml_kem_encap_rand(ctext, encap_clen, shsec, encap_slen, key);
- end:
+ end:
/*
* One shot entropy, each encapsulate call must either provide a new
* "ikmE", or else will use a random value. If a caller sets an explicit
}
ret = 1;
- end:
+ end:
EVP_PKEY_free(xkey);
EVP_PKEY_CTX_free(ctx);
return ret;
}
ret = 1;
- end:
+ end:
EVP_PKEY_CTX_free(ctx);
EVP_PKEY_free(xkey);
return ret;
return key;
}
- err:
+ err:
OPENSSL_free(encoded_dk);
ossl_ml_kem_key_free(key);
return NULL;
key->propq = propq;
return key;
- err:
+ err:
OPENSSL_free(propq);
return NULL;
}
ret = param_cb(params, cbarg);
OSSL_PARAM_free(params);
-err:
+ err:
OSSL_PARAM_BLD_free(tmpl);
OPENSSL_secure_clear_free(sub_arg.prvenc, prvlen);
OPENSSL_free(sub_arg.pubenc);
if (EVP_PKEY_fromdata(ctx, ppkey, selection, parr) > 0)
ret = 1;
- err:
+ err:
EVP_PKEY_CTX_free(ctx);
return ret;
}
key->state = prvlen ? MLX_HAVE_PRVKEY : MLX_HAVE_PUBKEY;
return 1;
- err:
+ err:
EVP_PKEY_free(key->mkey);
EVP_PKEY_free(key->xkey);
key->xkey = key->mkey = NULL;
}
ret = 1;
- end:
+ end:
sk_TLS_GROUP_IX_pop_free(collect, free_wrapper);
return ret;
}
goto done;
ok = 1;
- done:
+ done:
EVP_PKEY_free(pkey);
OSSL_PARAM_free(params);
EVP_PKEY_CTX_free(ctx);
testresult = 1;
- end:
+ end:
SSL_free(ssl);
SSL_CTX_free(ctx);
return testresult;
goto end;
testresult = 1;
- end:
+ end:
/* Free stack and any memory owned by detached element */
IPAddressFamily_free(f1);
sk_IPAddressFamily_pop_free(addr, IPAddressFamily_free);