Remove ECDH_EVP_derive_key wrapper function
authorNicola Tuveri <nic.tuv@gmail.com>
Tue, 4 Oct 2016 12:56:49 +0000 (15:56 +0300)
committerRich Salz <rsalz@openssl.org>
Thu, 17 Nov 2016 05:36:23 +0000 (00:36 -0500)
Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/1658)

apps/speed.c

index 2bd29c92aeaeb10abf2268e4f5c0ef29f505b522..5a1d92b43c75d0525735c5f93fb0bce07bde7193 100644 (file)
@@ -1031,18 +1031,6 @@ static int ECDSA_verify_loop(void *args)
 /* ******************************************************************** */
 static long ecdh_c[EC_NUM][1];
 
-static int ECDH_EVP_derive_key(unsigned char *derived_secret,
-                               size_t *outlen, EVP_PKEY_CTX *ctx)
-{
-    int rt = 1;
-    if ((rt = EVP_PKEY_derive(ctx, derived_secret, outlen)) <= 0) {
-        BIO_printf(bio_err, "ECDH EVP_PKEY_derive failure: returned %d\n", rt);
-        ERR_print_errors(bio_err);
-        return rt;
-    }
-    return rt;
-}
-
 static int ECDH_EVP_derive_key_loop(void *args)
 {
     loopargs_t *tempargs = *(loopargs_t **) args;
@@ -1051,10 +1039,12 @@ static int ECDH_EVP_derive_key_loop(void *args)
     int count;
     size_t *outlen = &(tempargs->outlen[testnum]);
 
-    for (count = 0; COND(ecdh_c[testnum][0]); count++) {
-        if (!ECDH_EVP_derive_key(derived_secret, outlen, ctx))
+    for (count = 0; COND(ecdh_c[testnum][0]); count++)
+        if (EVP_PKEY_derive(ctx, derived_secret, outlen) <= 0) {
+            BIO_printf(bio_err, "ECDH EVP_PKEY_derive failure\n");
+            ERR_print_errors(bio_err);
             break;
-    }
+        }
     return count;
 }