forked from wolfSSL/wolfssl
Merge pull request #4838 from SparkiDev/g++_fix_4
Rework functions to avoid warning with g++
This commit is contained in:
16
src/ssl.c
16
src/ssl.c
@@ -4057,14 +4057,22 @@ int wolfSSL_GetHmacSize(WOLFSSL* ssl)
|
|||||||
#ifdef WORD64_AVAILABLE
|
#ifdef WORD64_AVAILABLE
|
||||||
int wolfSSL_GetPeerSequenceNumber(WOLFSSL* ssl, word64 *seq)
|
int wolfSSL_GetPeerSequenceNumber(WOLFSSL* ssl, word64 *seq)
|
||||||
{
|
{
|
||||||
return ssl ? !(*seq = (word64)ssl->keys.peer_sequence_number_hi << 32 |
|
if ((ssl == NULL) || (seq == NULL))
|
||||||
ssl->keys.peer_sequence_number_lo) : BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
|
|
||||||
|
*seq = ((word64)ssl->keys.peer_sequence_number_hi << 32) |
|
||||||
|
ssl->keys.peer_sequence_number_lo;
|
||||||
|
return !(*seq);
|
||||||
}
|
}
|
||||||
|
|
||||||
int wolfSSL_GetSequenceNumber(WOLFSSL* ssl, word64 *seq)
|
int wolfSSL_GetSequenceNumber(WOLFSSL* ssl, word64 *seq)
|
||||||
{
|
{
|
||||||
return ssl ? !(*seq = (word64)ssl->keys.sequence_number_hi << 32 |
|
if ((ssl == NULL) || (seq == NULL))
|
||||||
ssl->keys.sequence_number_lo) : BAD_FUNC_ARG;
|
return BAD_FUNC_ARG;
|
||||||
|
|
||||||
|
*seq = ((word64)ssl->keys.sequence_number_hi << 32) |
|
||||||
|
ssl->keys.sequence_number_lo;
|
||||||
|
return !(*seq);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user