[Pcsclite-cvs-commit] CVS PKCS11/src

CVS User rousseau ludovic.rousseau@free.fr
Sat, 22 Jan 2005 09:11:35 -0700


Update of /cvsroot/muscleapps/PKCS11/src
In directory haydn:/tmp/cvs-serv19921

Modified Files:
	p11_crypt.c 
Log Message:
C_Decrypt(): fails in RSA_NO_PAD mode, when checking pairwise
consistency after generating keys with NSS/Mozilla.
Closes bug #300455


--- /cvsroot/muscleapps/PKCS11/src/p11_crypt.c	2003/10/04 08:30:18	1.10
+++ /cvsroot/muscleapps/PKCS11/src/p11_crypt.c	2005/01/22 16:11:35	1.11
@@ -1,6 +1,6 @@
 /******************************************************************************
 ** 
-**  $Id: p11_crypt.c,v 1.10 2003/10/04 08:30:18 rousseau Exp $
+**  $Id: p11_crypt.c,v 1.11 2005/01/22 16:11:35 rousseau Exp $
 **
 **  Package: PKCS-11
 **  Author : Chris Osgood <oznet@mac.com>
@@ -361,7 +361,7 @@
     P11_Object *key; /* = (P11_Object *)session->sign_key; */
     MSCCryptInit cryptInit;
     CK_BYTE *t_data1 = 0, *t_data2 = 0;
-    CK_ULONG t_data1_len, t_data2_len;
+    CK_ULONG output_len, t_data1_len, t_data2_len;
 
 	P11_Slot *slot;
 	CK_ULONG slotID;
@@ -427,8 +427,10 @@
         cryptInit.optParams       = 0;
         cryptInit.optParamsSize   = 0;
 
-        t_data1 = (CK_BYTE *)malloc(key->msc_key->keySize / 8);
-        t_data2 = (CK_BYTE *)malloc(key->msc_key->keySize / 8);
+		output_len = key->msc_key->keySize / 8;
+        t_data1 = (CK_BYTE *)malloc(output_len);
+		t_data2_len = output_len;
+        t_data2 = (CK_BYTE *)malloc(t_data2_len);
 
         if (!t_data1 || !t_data2)
             rv = CKR_HOST_MEMORY;