aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/des/rpc_enc.c
diff options
context:
space:
mode:
authorBen Laurie <ben@openssl.org>2001-07-30 17:46:22 +0000
committerBen Laurie <ben@openssl.org>2001-07-30 17:46:22 +0000
commit3ba5d1cf2eb6ef28ac5f6d9f3d28020d00c5be50 (patch)
tree73d3b6e7e2ee0ce832943a1e080501b8a96c40d6 /crypto/des/rpc_enc.c
parentbe2e2c32972e421ecc78bb79b502cb9d76d0c391 (diff)
downloadopenssl-3ba5d1cf2eb6ef28ac5f6d9f3d28020d00c5be50.tar.gz
Make EVPs allocate context memory, thus making them extensible. Rationalise
DES's keyschedules. I know these two should be separate, and I'll back out the DES changes if they are deemed to be an error. Note that there is a memory leak lurking in SSL somewhere in this version.
Diffstat (limited to 'crypto/des/rpc_enc.c')
-rw-r--r--crypto/des/rpc_enc.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/crypto/des/rpc_enc.c b/crypto/des/rpc_enc.c
index 32d96d5cae..2a4a06672d 100644
--- a/crypto/des/rpc_enc.c
+++ b/crypto/des/rpc_enc.c
@@ -66,17 +66,17 @@ int _des_crypt(char *buf, int len, struct desparams *desp)
des_key_schedule ks;
int enc;
- des_set_key_unchecked(&desp->des_key,ks);
+ des_set_key_unchecked(&desp->des_key,&ks);
enc=(desp->des_dir == ENCRYPT)?DES_ENCRYPT:DES_DECRYPT;
if (desp->des_mode == CBC)
des_ecb_encrypt((const_des_cblock *)desp->UDES.UDES_buf,
- (des_cblock *)desp->UDES.UDES_buf,ks,
+ (des_cblock *)desp->UDES.UDES_buf,&ks,
enc);
else
{
des_ncbc_encrypt(desp->UDES.UDES_buf,desp->UDES.UDES_buf,
- len,ks,&desp->des_ivec,enc);
+ len,&ks,&desp->des_ivec,enc);
#ifdef undef
/* len will always be %8 if called from common_crypt
* in secure_rpc.