Remove remnants of multiprime RSA parsing.
Change-Id: Id6d0dc2a9766458bb08863111f509719ca8e5214
Reviewed-on: https://boringssl-review.googlesource.com/15369
Commit-Queue: David Benjamin <davidben@google.com>
Commit-Queue: Steven Valdez <svaldez@google.com>
Reviewed-by: Steven Valdez <svaldez@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/crypto/rsa/rsa_asn1.c b/crypto/rsa/rsa_asn1.c
index d6e28ad..6d3598b 100644
--- a/crypto/rsa/rsa_asn1.c
+++ b/crypto/rsa/rsa_asn1.c
@@ -174,8 +174,6 @@
static const uint64_t kVersionTwoPrime = 0;
RSA *RSA_parse_private_key(CBS *cbs) {
- BN_CTX *ctx = NULL;
- BIGNUM *product_of_primes_so_far = NULL;
RSA *ret = RSA_new();
if (ret == NULL) {
return NULL;
@@ -215,13 +213,9 @@
goto err;
}
- BN_CTX_free(ctx);
- BN_free(product_of_primes_so_far);
return ret;
err:
- BN_CTX_free(ctx);
- BN_free(product_of_primes_so_far);
RSA_free(ret);
return NULL;
}