size_t suitable_key_size;
int bits;
- assert_se(pkey);
- assert_se(ret_suitable_key_size);
+ assert(pkey);
+ assert(ret_suitable_key_size);
/* Analyzes the specified public key and that it is RSA. If so, will return a suitable size for a
* disk encryption key to encrypt with RSA for use in PKCS#11 security token schemes. */
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Failed to run %s context.", EVP_MD_name(md));
msz = EVP_MD_size(md);
- assert_se(msz > 0);
+ assert(msz > 0);
h = malloc(msz);
if (!h)
if (EVP_DigestFinal_ex(m, h, &umsz) != 1)
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Failed to finalize hash context.");
- assert_se(umsz == (unsigned) msz);
+ assert(umsz == (unsigned) msz);
*ret = TAKE_PTR(h);
*ret_size = msz;