aboutsummaryrefslogtreecommitdiffstats
path: root/Source/lib/crypto/rsa/rsa_public_key.c
diff options
context:
space:
mode:
Diffstat (limited to 'Source/lib/crypto/rsa/rsa_public_key.c')
-rw-r--r--Source/lib/crypto/rsa/rsa_public_key.c34
1 files changed, 17 insertions, 17 deletions
diff --git a/Source/lib/crypto/rsa/rsa_public_key.c b/Source/lib/crypto/rsa/rsa_public_key.c
index 57ad10128..5b85f5256 100644
--- a/Source/lib/crypto/rsa/rsa_public_key.c
+++ b/Source/lib/crypto/rsa/rsa_public_key.c
@@ -23,11 +23,11 @@
#include <gmp.h>
#include <sys/stat.h>
#include <unistd.h>
+#include <string.h>
#include "rsa_public_key.h"
#include <daemon.h>
-#include <utils/allocator.h>
#include <crypto/hashers/hasher.h>
#include <asn1/der_decoder.h>
@@ -215,7 +215,7 @@ static status_t verify_emsa_pkcs1_signature(private_rsa_public_key_t *this, chun
if ((*(em.ptr) != 0x00) ||
(*(em.ptr+1) != 0x01))
{
- allocator_free(em.ptr);
+ free(em.ptr);
return FAILED;
}
@@ -232,7 +232,7 @@ static status_t verify_emsa_pkcs1_signature(private_rsa_public_key_t *this, chun
else if (*pos != 0xFF)
{
/* bad padding, decryption failed ?!*/
- allocator_free(em.ptr);
+ free(em.ptr);
return FAILED;
}
pos++;
@@ -241,7 +241,7 @@ static status_t verify_emsa_pkcs1_signature(private_rsa_public_key_t *this, chun
if (pos + 20 > em.ptr + em.len)
{
/* not enought room for oid compare */
- allocator_free(em.ptr);
+ free(em.ptr);
return FAILED;
}
@@ -279,14 +279,14 @@ static status_t verify_emsa_pkcs1_signature(private_rsa_public_key_t *this, chun
if (hasher == NULL)
{
/* not supported hash algorithm */
- allocator_free(em.ptr);
+ free(em.ptr);
return NOT_SUPPORTED;
}
if (pos + hasher->get_block_size(hasher) != em.ptr + em.len)
{
/* bad length */
- allocator_free(em.ptr);
+ free(em.ptr);
hasher->destroy(hasher);
return FAILED;
}
@@ -298,15 +298,15 @@ static status_t verify_emsa_pkcs1_signature(private_rsa_public_key_t *this, chun
if (memcmp(hash.ptr, pos, hash.len) != 0)
{
/* hash does not equal */
- allocator_free(hash.ptr);
- allocator_free(em.ptr);
+ free(hash.ptr);
+ free(em.ptr);
return FAILED;
}
/* seems good */
- allocator_free(hash.ptr);
- allocator_free(em.ptr);
+ free(hash.ptr);
+ free(em.ptr);
return SUCCESS;
}
@@ -323,11 +323,11 @@ static status_t get_key(private_rsa_public_key_t *this, chunk_t *key)
e.ptr = mpz_export(NULL, NULL, 1, e.len, 1, 0, this->e);
key->len = this->k * 2;
- key->ptr = allocator_alloc(key->len);
+ key->ptr = malloc(key->len);
memcpy(key->ptr, n.ptr, n.len);
memcpy(key->ptr + n.len, e.ptr, e.len);
- allocator_free(n.ptr);
- allocator_free(e.ptr);
+ free(n.ptr);
+ free(e.ptr);
return SUCCESS;
}
@@ -369,7 +369,7 @@ static void destroy(private_rsa_public_key_t *this)
{
mpz_clear(this->n);
mpz_clear(this->e);
- allocator_free(this);
+ free(this);
}
/**
@@ -377,7 +377,7 @@ static void destroy(private_rsa_public_key_t *this)
*/
private_rsa_public_key_t *rsa_public_key_create_empty()
{
- private_rsa_public_key_t *this = allocator_alloc_thing(private_rsa_public_key_t);
+ private_rsa_public_key_t *this = malloc_thing(private_rsa_public_key_t);
/* public functions */
this->public.verify_emsa_pkcs1_signature = (status_t (*) (rsa_public_key_t*,chunk_t,chunk_t))verify_emsa_pkcs1_signature;
@@ -458,11 +458,11 @@ rsa_public_key_t *rsa_public_key_create_from_file(char *filename)
dd = der_decoder_create(rsa_public_key_info_rules);
status = dd->decode(dd, chunk, &key_info);
dd->destroy(dd);
- allocator_free_chunk(&key_info.algorithm_oid);
+ chunk_free(&key_info.algorithm_oid);
if (status == SUCCESS)
{
public_key = rsa_public_key_create_from_chunk(chunk);
}
- allocator_free_chunk(&key_info.public_key);
+ chunk_free(&key_info.public_key);
return public_key;
}