forked from wolfSSL/wolfssl
Merge pull request #5736 from douzzer/20221025-fixes-wolfsentry-and-armv7a
20221025-fixes-wolfsentry-and-armv7a
This commit is contained in:
@ -2191,7 +2191,7 @@ then
|
|||||||
# Include options.h
|
# Include options.h
|
||||||
AM_CCASFLAGS="$AM_CCASFLAGS -DEXTERNAL_OPTS_OPENVPN"
|
AM_CCASFLAGS="$AM_CCASFLAGS -DEXTERNAL_OPTS_OPENVPN"
|
||||||
ENABLED_ARMASM_CRYPTO=no
|
ENABLED_ARMASM_CRYPTO=no
|
||||||
ENABLED_AESGCM_STREAM=no # not yet implemented
|
ENABLED_AESGCM_STREAM=no # not yet implemented
|
||||||
AC_MSG_NOTICE([32bit ARMv7-a found, setting mfpu to neon])
|
AC_MSG_NOTICE([32bit ARMv7-a found, setting mfpu to neon])
|
||||||
;;
|
;;
|
||||||
*)
|
*)
|
||||||
|
@ -48490,15 +48490,12 @@ static int test_wolfSSL_d2i_OCSP_CERTID(void)
|
|||||||
|
|
||||||
/* The below tests should fail when passed bad parameters. NULL should
|
/* The below tests should fail when passed bad parameters. NULL should
|
||||||
* always be returned. */
|
* always be returned. */
|
||||||
certIdBad = (WOLFSSL_OCSP_CERTID*) 1;
|
|
||||||
certIdBad = wolfSSL_d2i_OCSP_CERTID(NULL, &rawCertIdPtr, sizeof(rawCertId));
|
certIdBad = wolfSSL_d2i_OCSP_CERTID(NULL, &rawCertIdPtr, sizeof(rawCertId));
|
||||||
AssertNull(certIdBad);
|
AssertNull(certIdBad);
|
||||||
|
|
||||||
certIdBad = (WOLFSSL_OCSP_CERTID*) 1;
|
|
||||||
certIdBad = wolfSSL_d2i_OCSP_CERTID(&certId, NULL, sizeof(rawCertId));
|
certIdBad = wolfSSL_d2i_OCSP_CERTID(&certId, NULL, sizeof(rawCertId));
|
||||||
AssertNull(certIdBad);
|
AssertNull(certIdBad);
|
||||||
|
|
||||||
certIdBad = (WOLFSSL_OCSP_CERTID*) 1;
|
|
||||||
certIdBad = wolfSSL_d2i_OCSP_CERTID(&certId, &rawCertIdPtr, 0);
|
certIdBad = wolfSSL_d2i_OCSP_CERTID(&certId, &rawCertIdPtr, 0);
|
||||||
AssertNull(certIdBad);
|
AssertNull(certIdBad);
|
||||||
|
|
||||||
|
@ -33,12 +33,13 @@
|
|||||||
#include <wolfssl/wolfcrypt/settings.h>
|
#include <wolfssl/wolfcrypt/settings.h>
|
||||||
|
|
||||||
#if !defined(NO_AES) && defined(WOLFSSL_ARMASM)
|
#if !defined(NO_AES) && defined(WOLFSSL_ARMASM)
|
||||||
#ifndef WOLFSSL_ARMASM_NO_HW_CRYPTO
|
|
||||||
|
|
||||||
#ifdef HAVE_FIPS
|
#if defined(HAVE_FIPS) && !defined(FIPS_NO_WRAPPERS)
|
||||||
#undef HAVE_FIPS
|
#define FIPS_NO_WRAPPERS
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifndef WOLFSSL_ARMASM_NO_HW_CRYPTO
|
||||||
|
|
||||||
#include <wolfssl/wolfcrypt/aes.h>
|
#include <wolfssl/wolfcrypt/aes.h>
|
||||||
#include <wolfssl/wolfcrypt/error-crypt.h>
|
#include <wolfssl/wolfcrypt/error-crypt.h>
|
||||||
#include <wolfssl/wolfcrypt/logging.h>
|
#include <wolfssl/wolfcrypt/logging.h>
|
||||||
|
@ -1585,7 +1585,8 @@ static int wolfsentry_setup(
|
|||||||
|
|
||||||
#if !defined(NO_FILESYSTEM) && !defined(WOLFSENTRY_NO_JSON)
|
#if !defined(NO_FILESYSTEM) && !defined(WOLFSENTRY_NO_JSON)
|
||||||
if (_wolfsentry_config_path != NULL) {
|
if (_wolfsentry_config_path != NULL) {
|
||||||
char buf[512], err_buf[512];
|
unsigned char buf[512];
|
||||||
|
char err_buf[512];
|
||||||
struct wolfsentry_json_process_state *jps;
|
struct wolfsentry_json_process_state *jps;
|
||||||
|
|
||||||
FILE *f = fopen(_wolfsentry_config_path, "r");
|
FILE *f = fopen(_wolfsentry_config_path, "r");
|
||||||
|
Reference in New Issue
Block a user