X-Git-Url: http://git.tuebingen.mpg.de/?a=blobdiff_plain;f=gcrypt.c;h=763fa6de3252d2f5f188fc3f447f2029d0f5775a;hb=9228213e72bbcdaf42665f51c633af6c4ccc78bf;hp=506f0bb84e6c199d065942553935dc27a8833d93;hpb=e74113b0e1a6ca1c047667218b089362372aa0f0;p=paraslash.git diff --git a/gcrypt.c b/gcrypt.c index 506f0bb8..763fa6de 100644 --- a/gcrypt.c +++ b/gcrypt.c @@ -406,7 +406,7 @@ static int get_private_key(const char *key_file, struct asymmetric_key **result) ret = -E_SEXP_BUILD; goto free_params; } - key = para_malloc(sizeof(*key)); + key = alloc(sizeof(*key)); key->sexp = sexp; *result = key; ret = bits; @@ -456,7 +456,7 @@ int apc_get_pubkey(const char *key_file, struct asymmetric_key **result) goto release_n; } PARA_INFO_LOG("successfully read %u bit ssh public key\n", bits); - key = para_malloc(sizeof(*key)); + key = alloc(sizeof(*key)); key->num_bytes = ret; key->sexp = sexp; *result = key; @@ -624,7 +624,7 @@ struct stream_cipher { struct stream_cipher *sc_new(const unsigned char *data, int len) { gcry_error_t gret; - struct stream_cipher *sc = para_malloc(sizeof(*sc)); + struct stream_cipher *sc = alloc(sizeof(*sc)); assert(len >= 2 * AES_CRT128_BLOCK_SIZE); gret = gcry_cipher_open(&sc->handle, GCRY_CIPHER_AES128,