forked from wolfSSL/wolfssl
warnings
This commit is contained in:
@@ -797,15 +797,15 @@ int RsaPublicKeyDecode(const byte* input, word32* inOutIdx, RsaKey* key,
|
|||||||
word32 inSz)
|
word32 inSz)
|
||||||
{
|
{
|
||||||
int length;
|
int length;
|
||||||
byte b;
|
|
||||||
|
|
||||||
if (GetSequence(input, inOutIdx, &length, inSz) < 0)
|
if (GetSequence(input, inOutIdx, &length, inSz) < 0)
|
||||||
return ASN_PARSE_E;
|
return ASN_PARSE_E;
|
||||||
|
|
||||||
key->type = RSA_PUBLIC;
|
key->type = RSA_PUBLIC;
|
||||||
b = input[*inOutIdx];
|
|
||||||
|
|
||||||
#ifdef OPENSSL_EXTRA
|
#ifdef OPENSSL_EXTRA
|
||||||
|
{
|
||||||
|
byte b = input[*inOutIdx];
|
||||||
if (b != ASN_INTEGER) {
|
if (b != ASN_INTEGER) {
|
||||||
/* not from decoded cert, will have algo id, skip past */
|
/* not from decoded cert, will have algo id, skip past */
|
||||||
if (GetSequence(input, inOutIdx, &length, inSz) < 0)
|
if (GetSequence(input, inOutIdx, &length, inSz) < 0)
|
||||||
@@ -847,7 +847,8 @@ int RsaPublicKeyDecode(const byte* input, word32* inOutIdx, RsaKey* key,
|
|||||||
|
|
||||||
if (GetSequence(input, inOutIdx, &length, inSz) < 0)
|
if (GetSequence(input, inOutIdx, &length, inSz) < 0)
|
||||||
return ASN_PARSE_E;
|
return ASN_PARSE_E;
|
||||||
}
|
} /* end if */
|
||||||
|
} /* openssl var block */
|
||||||
#endif /* OPENSSL_EXTRA */
|
#endif /* OPENSSL_EXTRA */
|
||||||
|
|
||||||
if (GetInt(&key->n, input, inOutIdx, inSz) < 0 ||
|
if (GetInt(&key->n, input, inOutIdx, inSz) < 0 ||
|
||||||
|
@@ -491,6 +491,7 @@ int AddCA(SSL_CTX* ctx, buffer der)
|
|||||||
|
|
||||||
(void)heap;
|
(void)heap;
|
||||||
(void)dynamicType;
|
(void)dynamicType;
|
||||||
|
(void)pkcs8Enc;
|
||||||
|
|
||||||
if (type == CERT_TYPE || type == CA_TYPE) {
|
if (type == CERT_TYPE || type == CA_TYPE) {
|
||||||
XSTRNCPY(header, "-----BEGIN CERTIFICATE-----", sizeof(header));
|
XSTRNCPY(header, "-----BEGIN CERTIFICATE-----", sizeof(header));
|
||||||
|
Reference in New Issue
Block a user