diff options
author | Sascha Hauer <s.hauer@pengutronix.de> | 2019-10-01 23:36:26 +0200 |
---|---|---|
committer | Sascha Hauer <s.hauer@pengutronix.de> | 2019-10-15 14:55:11 +0200 |
commit | d091a81f3ece732826dd4dec0b241624159ae1d6 (patch) | |
tree | d5b1cbb075851dc21c5009f9f7aeb1bf98790001 /crypto/Kconfig | |
parent | 128ad3cbe043d5153007a50f09208c25703257dd (diff) | |
download | barebox-d091a81f3ece732826dd4dec0b241624159ae1d6.tar.gz barebox-d091a81f3ece732826dd4dec0b241624159ae1d6.tar.xz |
rsa: let rsa_of_read_key() return a fully allocated key
Until now rsa_of_read_key() took a pointer to a key and filled the
struct rsa_public_key members with allocated values. So far we have
never freed these values. Change rsa_of_read_key() to always return
a fully allocated key and provide rsa_key_free() to free it. Let the
FIT image code free the key after usage.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
Diffstat (limited to 'crypto/Kconfig')
0 files changed, 0 insertions, 0 deletions