forked from wolfSSL/wolfssl
removes 'end of line' spaces;
This commit is contained in:
@ -11298,7 +11298,7 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
|
|||||||
return BUFFER_ERROR;
|
return BUFFER_ERROR;
|
||||||
}
|
}
|
||||||
|
|
||||||
ssl->buffers.serverDH_Pub.buffer =
|
ssl->buffers.serverDH_Pub.buffer =
|
||||||
(byte*) XMALLOC(length, ssl->heap, DYNAMIC_TYPE_DH);
|
(byte*) XMALLOC(length, ssl->heap, DYNAMIC_TYPE_DH);
|
||||||
|
|
||||||
if (ssl->buffers.serverDH_Pub.buffer) {
|
if (ssl->buffers.serverDH_Pub.buffer) {
|
||||||
@ -11308,7 +11308,7 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
|
|||||||
return MEMORY_ERROR;
|
return MEMORY_ERROR;
|
||||||
}
|
}
|
||||||
|
|
||||||
XMEMCPY(ssl->buffers.serverDH_Pub.buffer, input + *inOutIdx,
|
XMEMCPY(ssl->buffers.serverDH_Pub.buffer, input + *inOutIdx,
|
||||||
length);
|
length);
|
||||||
*inOutIdx += length;
|
*inOutIdx += length;
|
||||||
break;
|
break;
|
||||||
@ -11320,7 +11320,7 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
|
|||||||
{
|
{
|
||||||
byte b;
|
byte b;
|
||||||
|
|
||||||
if ((*inOutIdx - begin) + ENUM_LEN + OPAQUE16_LEN +
|
if ((*inOutIdx - begin) + ENUM_LEN + OPAQUE16_LEN +
|
||||||
OPAQUE8_LEN > size) {
|
OPAQUE8_LEN > size) {
|
||||||
return BUFFER_ERROR;
|
return BUFFER_ERROR;
|
||||||
}
|
}
|
||||||
@ -11359,7 +11359,7 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
|
|||||||
wc_ecc_init(ssl->peerEccKey);
|
wc_ecc_init(ssl->peerEccKey);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (wc_ecc_import_x963(input + *inOutIdx, length,
|
if (wc_ecc_import_x963(input + *inOutIdx, length,
|
||||||
ssl->peerEccKey) != 0) {
|
ssl->peerEccKey) != 0) {
|
||||||
return ECC_PEERKEY_ERROR;
|
return ECC_PEERKEY_ERROR;
|
||||||
}
|
}
|
||||||
@ -11409,7 +11409,7 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
|
|||||||
return DH_KEY_SIZE_E;
|
return DH_KEY_SIZE_E;
|
||||||
}
|
}
|
||||||
|
|
||||||
ssl->buffers.serverDH_P.buffer = (byte*) XMALLOC(length, ssl->heap,
|
ssl->buffers.serverDH_P.buffer = (byte*) XMALLOC(length, ssl->heap,
|
||||||
DYNAMIC_TYPE_DH);
|
DYNAMIC_TYPE_DH);
|
||||||
|
|
||||||
if (ssl->buffers.serverDH_P.buffer) {
|
if (ssl->buffers.serverDH_P.buffer) {
|
||||||
@ -11876,7 +11876,7 @@ static void PickHashSigAlgo(WOLFSSL* ssl,
|
|||||||
#endif
|
#endif
|
||||||
#ifdef HAVE_ECC
|
#ifdef HAVE_ECC
|
||||||
/* ecdsa */
|
/* ecdsa */
|
||||||
case ecc_dsa_sa_algo:
|
case ecc_dsa_sa_algo:
|
||||||
{
|
{
|
||||||
int verify = 0;
|
int verify = 0;
|
||||||
#ifndef NO_OLD_TLS
|
#ifndef NO_OLD_TLS
|
||||||
@ -13411,7 +13411,7 @@ int DoSessionTicket(WOLFSSL* ssl,
|
|||||||
/* then random and session id */
|
/* then random and session id */
|
||||||
if (!ssl->options.resuming) {
|
if (!ssl->options.resuming) {
|
||||||
/* generate random part and session id */
|
/* generate random part and session id */
|
||||||
ret = wc_RNG_GenerateBlock(ssl->rng, output + idx,
|
ret = wc_RNG_GenerateBlock(ssl->rng, output + idx,
|
||||||
RAN_LEN + sizeof(sessIdSz) + sessIdSz);
|
RAN_LEN + sizeof(sessIdSz) + sessIdSz);
|
||||||
if (ret != 0)
|
if (ret != 0)
|
||||||
return ret;
|
return ret;
|
||||||
@ -14047,7 +14047,7 @@ int DoSessionTicket(WOLFSSL* ssl,
|
|||||||
|
|
||||||
#ifdef HAVE_FUZZER
|
#ifdef HAVE_FUZZER
|
||||||
if (ssl->fuzzerCb) {
|
if (ssl->fuzzerCb) {
|
||||||
ssl->fuzzerCb(ssl, output + preSigIdx, preSigSz,
|
ssl->fuzzerCb(ssl, output + preSigIdx, preSigSz,
|
||||||
FUZZ_SIGNATURE, ssl->fuzzerCtx);
|
FUZZ_SIGNATURE, ssl->fuzzerCtx);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
@ -14565,7 +14565,7 @@ int DoSessionTicket(WOLFSSL* ssl,
|
|||||||
return NO_PRIVATE_KEY;
|
return NO_PRIVATE_KEY;
|
||||||
}
|
}
|
||||||
|
|
||||||
ret = wc_RsaPrivateKeyDecode(ssl->buffers.key.buffer, &i,
|
ret = wc_RsaPrivateKeyDecode(ssl->buffers.key.buffer, &i,
|
||||||
&rsaKey, ssl->buffers.key.length);
|
&rsaKey, ssl->buffers.key.length);
|
||||||
if (ret == 0) {
|
if (ret == 0) {
|
||||||
sigSz = wc_RsaEncryptSize(&rsaKey);
|
sigSz = wc_RsaEncryptSize(&rsaKey);
|
||||||
@ -14632,7 +14632,7 @@ int DoSessionTicket(WOLFSSL* ssl,
|
|||||||
|
|
||||||
#ifdef HAVE_FUZZER
|
#ifdef HAVE_FUZZER
|
||||||
if (ssl->fuzzerCb) {
|
if (ssl->fuzzerCb) {
|
||||||
ssl->fuzzerCb(ssl, output + preSigIdx, preSigSz,
|
ssl->fuzzerCb(ssl, output + preSigIdx, preSigSz,
|
||||||
FUZZ_SIGNATURE, ssl->fuzzerCtx);
|
FUZZ_SIGNATURE, ssl->fuzzerCtx);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
@ -14917,7 +14917,7 @@ int DoSessionTicket(WOLFSSL* ssl,
|
|||||||
byte* digest = &hash[MD5_DIGEST_SIZE];
|
byte* digest = &hash[MD5_DIGEST_SIZE];
|
||||||
int typeH = SHAh;
|
int typeH = SHAh;
|
||||||
int digestSz = SHA_DIGEST_SIZE;
|
int digestSz = SHA_DIGEST_SIZE;
|
||||||
|
|
||||||
#ifdef WOLFSSL_SMALL_STACK
|
#ifdef WOLFSSL_SMALL_STACK
|
||||||
encodedSig = (byte*)XMALLOC(MAX_ENCODED_SIG_SZ, NULL,
|
encodedSig = (byte*)XMALLOC(MAX_ENCODED_SIG_SZ, NULL,
|
||||||
DYNAMIC_TYPE_TMP_BUFFER);
|
DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
@ -16355,7 +16355,7 @@ int DoSessionTicket(WOLFSSL* ssl,
|
|||||||
if (!ssl->buffers.key.buffer) {
|
if (!ssl->buffers.key.buffer) {
|
||||||
return NO_PRIVATE_KEY;
|
return NO_PRIVATE_KEY;
|
||||||
}
|
}
|
||||||
|
|
||||||
ret = wc_RsaPrivateKeyDecode(ssl->buffers.key.buffer, &idx,
|
ret = wc_RsaPrivateKeyDecode(ssl->buffers.key.buffer, &idx,
|
||||||
&key, ssl->buffers.key.length);
|
&key, ssl->buffers.key.length);
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user