[Pcsclite-cvs-commit] CVS PKCS11/src
CVS User rousseau
ludovic.rousseau@free.fr
Sat, 22 Jan 2005 09:11:35 -0700
Update of /cvsroot/muscleapps/PKCS11/src
In directory haydn:/tmp/cvs-serv19921
Modified Files:
p11_crypt.c
Log Message:
C_Decrypt(): fails in RSA_NO_PAD mode, when checking pairwise
consistency after generating keys with NSS/Mozilla.
Closes bug #300455
--- /cvsroot/muscleapps/PKCS11/src/p11_crypt.c 2003/10/04 08:30:18 1.10
+++ /cvsroot/muscleapps/PKCS11/src/p11_crypt.c 2005/01/22 16:11:35 1.11
@@ -1,6 +1,6 @@
/******************************************************************************
**
-** $Id: p11_crypt.c,v 1.10 2003/10/04 08:30:18 rousseau Exp $
+** $Id: p11_crypt.c,v 1.11 2005/01/22 16:11:35 rousseau Exp $
**
** Package: PKCS-11
** Author : Chris Osgood <oznet@mac.com>
@@ -361,7 +361,7 @@
P11_Object *key; /* = (P11_Object *)session->sign_key; */
MSCCryptInit cryptInit;
CK_BYTE *t_data1 = 0, *t_data2 = 0;
- CK_ULONG t_data1_len, t_data2_len;
+ CK_ULONG output_len, t_data1_len, t_data2_len;
P11_Slot *slot;
CK_ULONG slotID;
@@ -427,8 +427,10 @@
cryptInit.optParams = 0;
cryptInit.optParamsSize = 0;
- t_data1 = (CK_BYTE *)malloc(key->msc_key->keySize / 8);
- t_data2 = (CK_BYTE *)malloc(key->msc_key->keySize / 8);
+ output_len = key->msc_key->keySize / 8;
+ t_data1 = (CK_BYTE *)malloc(output_len);
+ t_data2_len = output_len;
+ t_data2 = (CK_BYTE *)malloc(t_data2_len);
if (!t_data1 || !t_data2)
rv = CKR_HOST_MEMORY;