diff --git a/examples/client/client.c b/examples/client/client.c index d225da2ea..bbb9bcb8f 100644 --- a/examples/client/client.c +++ b/examples/client/client.c @@ -753,6 +753,14 @@ THREAD_RETURN WOLFSSL_THREAD client_test(void* args) done = 1; #endif + /* www.globalsign.com only supports static RSA or ECDHE with AES */ + /* We cannot expect users to have on static RSA so test for ECC only + * as some users will most likely be on 32-bit systems where ECC + * is not enabled by default */ + #if defined(HAVE_OCSP) && !defined(HAVE_ECC) + done = 1; + #endif + #ifndef NO_PSK done = 1; #endif diff --git a/src/ssl.c b/src/ssl.c index b00daae7f..f1cd2d4c1 100644 --- a/src/ssl.c +++ b/src/ssl.c @@ -17053,6 +17053,10 @@ int wolfSSL_EC25519_generate_key(unsigned char *priv, unsigned int *privSz, { #ifndef WOLFSSL_KEY_GEN WOLFSSL_MSG("No Key Gen built in"); + (void) priv; + (void) privSz; + (void) pub; + (void) pubSz; return SSL_FAILURE; #else /* WOLFSSL_KEY_GEN */ int ret = SSL_FAILURE; @@ -17127,6 +17131,12 @@ int wolfSSL_EC25519_shared_key(unsigned char *shared, unsigned int *sharedSz, { #ifndef WOLFSSL_KEY_GEN WOLFSSL_MSG("No Key Gen built in"); + (void) shared; + (void) sharedSz; + (void) priv; + (void) privSz; + (void) pub; + (void) pubSz; return SSL_FAILURE; #else /* WOLFSSL_KEY_GEN */ int ret = SSL_FAILURE; diff --git a/wolfcrypt/src/aes_asm.asm b/wolfcrypt/src/aes_asm.asm index 921d89a73..5453d2e45 100644 --- a/wolfcrypt/src/aes_asm.asm +++ b/wolfcrypt/src/aes_asm.asm @@ -794,7 +794,7 @@ AES_192_Key_Expansion PROC movdqa [rsp+0], xmm6 movdqu xmm1,[rdi] - movdqu xmm3,16[rdi] + movq xmm3,qword ptr 16[rdi] movdqa [rsi],xmm1 movdqa xmm5,xmm3 diff --git a/wolfcrypt/src/aes_asm.s b/wolfcrypt/src/aes_asm.s index 92d670416..46f7e29e6 100644 --- a/wolfcrypt/src/aes_asm.s +++ b/wolfcrypt/src/aes_asm.s @@ -657,7 +657,7 @@ AES_192_Key_Expansion: # parameter 2: %rsi movdqu (%rdi), %xmm1 -movdqu 16(%rdi), %xmm3 +movq 16(%rdi), %xmm3 movdqa %xmm1, (%rsi) movdqa %xmm3, %xmm5