Merge pull request #2040 from ejohnstown/fix-checks

Fix Checks
This commit is contained in:
David Garske
2019-01-17 12:54:25 -08:00
committed by GitHub
3 changed files with 17 additions and 3 deletions

View File

@@ -643,7 +643,11 @@ static int bench_tls_client(info_t* info)
}
#ifndef NO_DH
wolfSSL_CTX_SetMinDhKey_Sz(cli_ctx, MIN_DHKEY_BITS);
ret = wolfSSL_CTX_SetMinDhKey_Sz(cli_ctx, MIN_DHKEY_BITS);
if (ret != WOLFSSL_SUCCESS) {
printf("Error setting minimum DH key size\n");
goto exit;
}
#endif
/* Allocate and initialize a packet sized buffer */
@@ -960,7 +964,11 @@ static int bench_tls_server(info_t* info)
}
#ifndef NO_DH
wolfSSL_CTX_SetMinDhKey_Sz(srv_ctx, MIN_DHKEY_BITS);
ret = wolfSSL_CTX_SetMinDhKey_Sz(srv_ctx, MIN_DHKEY_BITS);
if (ret != WOLFSSL_SUCCESS) {
printf("Error setting minimum DH key size\n");
goto exit;
}
#endif
/* Allocate read buffer */

View File

@@ -2122,7 +2122,10 @@ THREAD_RETURN WOLFSSL_THREAD client_test(void* args)
wolfSSL_CTX_set_group_messages(ctx);
#ifndef NO_DH
wolfSSL_CTX_SetMinDhKey_Sz(ctx, (word16)minDhKeyBits);
if (wolfSSL_CTX_SetMinDhKey_Sz(ctx, (word16)minDhKeyBits)
!= WOLFSSL_SUCCESS) {
err_sys("Error setting minimum DH key size");
}
#endif
if (usePsk) {

View File

@@ -6479,6 +6479,9 @@ int HashOutput(WOLFSSL* ssl, const byte* output, int sz, int ivSz)
int ret = 0;
const byte* adj;
if (ssl->hsHashes == NULL)
return BAD_FUNC_ARG;
adj = output + RECORD_HEADER_SZ + ivSz;
sz -= RECORD_HEADER_SZ;