forked from wolfSSL/wolfssl
Peer review fixes.
This commit is contained in:
@ -8101,12 +8101,14 @@ static int wolfSSL_EVP_PKEY_get_der(const WOLFSSL_EVP_PKEY* key, unsigned char**
|
||||
{
|
||||
unsigned char* pt;
|
||||
int sz;
|
||||
word16 pkcs8HeaderSz = 0;
|
||||
word16 pkcs8HeaderSz;
|
||||
|
||||
if (!key || !key->pkey_sz)
|
||||
return WOLFSSL_FATAL_ERROR;
|
||||
|
||||
/* return the key without PKCS8 for compatibility */
|
||||
/* if pkcs8HeaderSz is invalid, use 0 and return all of pkey */
|
||||
pkcs8HeaderSz = 0;
|
||||
if (key->pkey_sz < key->pkcs8HeaderSz)
|
||||
pkcs8HeaderSz = key->pkcs8HeaderSz;
|
||||
sz = key->pkey_sz - pkcs8HeaderSz;
|
||||
|
@ -356,7 +356,7 @@ struct WOLFSSL_EVP_PKEY {
|
||||
#ifndef NO_RSA
|
||||
WOLFSSL_RSA* rsa;
|
||||
#endif
|
||||
#ifndef NO_DSA
|
||||
#ifndef NO_DSA
|
||||
WOLFSSL_DSA* dsa;
|
||||
#endif
|
||||
#ifdef HAVE_ECC
|
||||
|
Reference in New Issue
Block a user