forked from wolfSSL/wolfssl
addressed review comments
This commit is contained in:
@ -25257,7 +25257,7 @@ int wolfSSL_X509_VERIFY_PARAM_set1_ip(WOLFSSL_X509_VERIFY_PARAM* param,
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
p = buf;
|
p = buf;
|
||||||
for (i = 0;i < 16;i += 2) {
|
for (i = 0; i < 16; i += 2) {
|
||||||
val = (((word32)(ip[i]<<8)) | (ip[i+1])) & 0xFFFF;
|
val = (((word32)(ip[i]<<8)) | (ip[i+1])) & 0xFFFF;
|
||||||
if (val == 0){
|
if (val == 0){
|
||||||
if (!write_zero) {
|
if (!write_zero) {
|
||||||
@ -25274,7 +25274,7 @@ int wolfSSL_X509_VERIFY_PARAM_set1_ip(WOLFSSL_X509_VERIFY_PARAM* param,
|
|||||||
}
|
}
|
||||||
/* sanity check */
|
/* sanity check */
|
||||||
if (XSTRLEN(buf) > max_ipv6_len) {
|
if (XSTRLEN(buf) > max_ipv6_len) {
|
||||||
printf("The target ip adress exceeds buffer length(40)\n");
|
WOLFSSL_MSG("The target ip adress exceeds buffer length(40)\n");
|
||||||
XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
buf = NULL;
|
buf = NULL;
|
||||||
break;
|
break;
|
||||||
@ -25297,7 +25297,7 @@ int wolfSSL_X509_VERIFY_PARAM_set1_ip(WOLFSSL_X509_VERIFY_PARAM* param,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
WOLFSSL_MSG("iplen is zero, do nothig");
|
WOLFSSL_MSG("iplen is zero, do nothing");
|
||||||
return WOLFSSL_SUCCESS;
|
return WOLFSSL_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user