Remove remnants of multiprime RSA parsing.

Change-Id: Id6d0dc2a9766458bb08863111f509719ca8e5214
Reviewed-on: https://boringssl-review.googlesource.com/15369
Commit-Queue: David Benjamin <davidben@google.com>
Commit-Queue: Steven Valdez <svaldez@google.com>
Reviewed-by: Steven Valdez <svaldez@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/crypto/rsa/rsa_asn1.c b/crypto/rsa/rsa_asn1.c
index d6e28ad..6d3598b 100644
--- a/crypto/rsa/rsa_asn1.c
+++ b/crypto/rsa/rsa_asn1.c
@@ -174,8 +174,6 @@
 static const uint64_t kVersionTwoPrime = 0;
 
 RSA *RSA_parse_private_key(CBS *cbs) {
-  BN_CTX *ctx = NULL;
-  BIGNUM *product_of_primes_so_far = NULL;
   RSA *ret = RSA_new();
   if (ret == NULL) {
     return NULL;
@@ -215,13 +213,9 @@
     goto err;
   }
 
-  BN_CTX_free(ctx);
-  BN_free(product_of_primes_so_far);
   return ret;
 
 err:
-  BN_CTX_free(ctx);
-  BN_free(product_of_primes_so_far);
   RSA_free(ret);
   return NULL;
 }