UserNameKeyHandle *ukhInfoNew = ALLOC(UserNameKeyHandle);
ukhInfoNew->userName = user_name;
+ user_name = NULL;
ukhInfoNew->kh = ALLOC(Buffer);
ukhInfoNew->kh->data = NALLOC(BIG_STRING_SIZE, uint8_t);
response_parsed = true;
}
+ SAFE_DELETE(pri_key);
+ SAFE_DELETE(khA);
+ SAFE_DELETE(user_name);
}
ukhIter = ukhIter->next;
unsigned int kh_str_enc_len = 0;
unsigned char kh_str_enc[BIG_STRING_SIZE] = {0, };
- kh_str_enc_len = AsmCrypto::aesEncrypt((const unsigned char*)kh_str,
+ ret = AsmCrypto::aesEncrypt((const unsigned char*)kh_str,
strlen(kh_str),
key,//(const unsigned char*)symKey.c_str(),
iv,//(const unsigned char*)symKey.c_str(),
kh_str_enc);
+ if (ret < 0)
+ kh_str_enc_len = 0;
+ else
+ kh_str_enc_len = ret;
_INFO("After AESEncrypt, length = [%d]", kh_str_enc_len);
- if (kh_str_enc_len > 0) {
- kh_str_enc[kh_str_enc_len] = '\0';
- } else {
- kh_str_enc_len = 0;
- }
+ kh_str_enc[kh_str_enc_len] = '\0';
unsigned char digest[32];