Make EVPs allocate context memory, thus making them extensible. Rationalise
DES's keyschedules. I know these two should be separate, and I'll back out the DES changes if they are deemed to be an error. Note that there is a memory leak lurking in SSL somewhere in this version.
This commit is contained in:
@@ -66,17 +66,17 @@ int _des_crypt(char *buf, int len, struct desparams *desp)
|
||||
des_key_schedule ks;
|
||||
int enc;
|
||||
|
||||
des_set_key_unchecked(&desp->des_key,ks);
|
||||
des_set_key_unchecked(&desp->des_key,&ks);
|
||||
enc=(desp->des_dir == ENCRYPT)?DES_ENCRYPT:DES_DECRYPT;
|
||||
|
||||
if (desp->des_mode == CBC)
|
||||
des_ecb_encrypt((const_des_cblock *)desp->UDES.UDES_buf,
|
||||
(des_cblock *)desp->UDES.UDES_buf,ks,
|
||||
(des_cblock *)desp->UDES.UDES_buf,&ks,
|
||||
enc);
|
||||
else
|
||||
{
|
||||
des_ncbc_encrypt(desp->UDES.UDES_buf,desp->UDES.UDES_buf,
|
||||
len,ks,&desp->des_ivec,enc);
|
||||
len,&ks,&desp->des_ivec,enc);
|
||||
#ifdef undef
|
||||
/* len will always be %8 if called from common_crypt
|
||||
* in secure_rpc.
|
||||
|
||||
Reference in New Issue
Block a user