Use krb5_enomem() more consistently in lib/krb5.
This commit is contained in:
@@ -70,10 +70,8 @@ _krb5_des_checksum(krb5_context context,
|
||||
krb5_generate_random_block(p, 8);
|
||||
|
||||
m = EVP_MD_CTX_create();
|
||||
if (m == NULL) {
|
||||
krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
|
||||
return ENOMEM;
|
||||
}
|
||||
if (m == NULL)
|
||||
return krb5_enomem(context);
|
||||
|
||||
EVP_DigestInit_ex(m, evp_md, NULL);
|
||||
EVP_DigestUpdate(m, p, 8);
|
||||
@@ -103,10 +101,8 @@ _krb5_des_verify(krb5_context context,
|
||||
krb5_error_code ret = 0;
|
||||
|
||||
m = EVP_MD_CTX_create();
|
||||
if (m == NULL) {
|
||||
krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", ""));
|
||||
return ENOMEM;
|
||||
}
|
||||
if (m == NULL)
|
||||
return krb5_enomem(context);
|
||||
|
||||
memset(&ivec, 0, sizeof(ivec));
|
||||
EVP_CipherInit_ex(&ctx->dctx, NULL, NULL, NULL, (void *)&ivec, -1);
|
||||
|
Reference in New Issue
Block a user