forked from wolfSSL/wolfssl
updates for vxworks compatibility
This commit is contained in:
@ -314,7 +314,9 @@ THREAD_RETURN CYASSL_THREAD server_test(void* args)
|
|||||||
fdOpenSession(Task_self());
|
fdOpenSession(Task_self());
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef WOLFSSL_VXWORKS
|
#ifdef WOLFSSL_VXWORKS
|
||||||
|
useAnyAddr = 1;
|
||||||
|
#else
|
||||||
while ((ch = mygetopt(argc, argv, "?dbstnNufrRawPIp:v:l:A:c:k:Z:S:oO:D:L:ieB:"))
|
while ((ch = mygetopt(argc, argv, "?dbstnNufrRawPIp:v:l:A:c:k:Z:S:oO:D:L:ieB:"))
|
||||||
!= -1) {
|
!= -1) {
|
||||||
switch (ch) {
|
switch (ch) {
|
||||||
|
@ -503,7 +503,7 @@ static INLINE void build_addr(SOCKADDR_IN_T* addr, const char* peer,
|
|||||||
#elif defined(WOLFSSL_TIRTOS)
|
#elif defined(WOLFSSL_TIRTOS)
|
||||||
struct hostent* entry = DNSGetHostByName(peer);
|
struct hostent* entry = DNSGetHostByName(peer);
|
||||||
#elif defined(WOLFSSL_VXWORKS)
|
#elif defined(WOLFSSL_VXWORKS)
|
||||||
struct hostent* entry = (struct hostent*)hostGetByName(peer);
|
struct hostent* entry = (struct hostent*)hostGetByName((char*)peer);
|
||||||
#else
|
#else
|
||||||
struct hostent* entry = gethostbyname(peer);
|
struct hostent* entry = gethostbyname(peer);
|
||||||
#endif
|
#endif
|
||||||
|
@ -305,6 +305,10 @@
|
|||||||
|
|
||||||
|
|
||||||
#ifdef WOLFSSL_VXWORKS
|
#ifdef WOLFSSL_VXWORKS
|
||||||
|
/* VxWorks simulator incorrectly detects building for i386 */
|
||||||
|
#ifdef VXWORKS_SIM
|
||||||
|
#define TFM_NO_ASM
|
||||||
|
#endif
|
||||||
#define WOLFSSL_HAVE_MIN
|
#define WOLFSSL_HAVE_MIN
|
||||||
#define USE_FAST_MATH
|
#define USE_FAST_MATH
|
||||||
#define TFM_TIMING_RESISTANT
|
#define TFM_TIMING_RESISTANT
|
||||||
|
Reference in New Issue
Block a user