Browse Source

Remove remnants of multiprime RSA parsing.

Change-Id: Id6d0dc2a9766458bb08863111f509719ca8e5214
Reviewed-on: https://boringssl-review.googlesource.com/15369
Commit-Queue: David Benjamin <davidben@google.com>
Commit-Queue: Steven Valdez <svaldez@google.com>
Reviewed-by: Steven Valdez <svaldez@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
kris/onging/CECPQ3_patch15
David Benjamin 7 years ago
committed by CQ bot account: commit-bot@chromium.org
parent
commit
34a8aacb51
1 changed files with 0 additions and 6 deletions
  1. +0
    -6
      crypto/rsa/rsa_asn1.c

+ 0
- 6
crypto/rsa/rsa_asn1.c View File

@@ -174,8 +174,6 @@ int RSA_public_key_to_bytes(uint8_t **out_bytes, size_t *out_len,
static const uint64_t kVersionTwoPrime = 0;

RSA *RSA_parse_private_key(CBS *cbs) {
BN_CTX *ctx = NULL;
BIGNUM *product_of_primes_so_far = NULL;
RSA *ret = RSA_new();
if (ret == NULL) {
return NULL;
@@ -215,13 +213,9 @@ RSA *RSA_parse_private_key(CBS *cbs) {
goto err;
}

BN_CTX_free(ctx);
BN_free(product_of_primes_so_far);
return ret;

err:
BN_CTX_free(ctx);
BN_free(product_of_primes_so_far);
RSA_free(ret);
return NULL;
}


Loading…
Cancel
Save