mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-31 19:24:42 +02:00
Fix minor clang-tidy warnings for async.
This commit is contained in:
@@ -15511,6 +15511,10 @@ static WC_INLINE int EncryptDo(WOLFSSL* ssl, byte* out, const byte* input,
|
|||||||
(void)input;
|
(void)input;
|
||||||
(void)sz;
|
(void)sz;
|
||||||
|
|
||||||
|
if (input == NULL) {
|
||||||
|
return BAD_FUNC_ARG;
|
||||||
|
}
|
||||||
|
|
||||||
switch (ssl->specs.bulk_cipher_algorithm) {
|
switch (ssl->specs.bulk_cipher_algorithm) {
|
||||||
#ifdef BUILD_ARC4
|
#ifdef BUILD_ARC4
|
||||||
case wolfssl_rc4:
|
case wolfssl_rc4:
|
||||||
@@ -18386,6 +18390,10 @@ int BuildMessage(WOLFSSL* ssl, byte* output, int outSz, const byte* input,
|
|||||||
FALL_THROUGH;
|
FALL_THROUGH;
|
||||||
case BUILD_MSG_HASH:
|
case BUILD_MSG_HASH:
|
||||||
{
|
{
|
||||||
|
/* done with size calculations */
|
||||||
|
if (sizeOnly)
|
||||||
|
goto exit_buildmsg;
|
||||||
|
|
||||||
if (type == handshake && hashOutput) {
|
if (type == handshake && hashOutput) {
|
||||||
ret = HashOutput(ssl, output, args->headerSz + inSz, args->ivSz);
|
ret = HashOutput(ssl, output, args->headerSz + inSz, args->ivSz);
|
||||||
if (ret != 0)
|
if (ret != 0)
|
||||||
@@ -18413,6 +18421,10 @@ int BuildMessage(WOLFSSL* ssl, byte* output, int outSz, const byte* input,
|
|||||||
FALL_THROUGH;
|
FALL_THROUGH;
|
||||||
case BUILD_MSG_VERIFY_MAC:
|
case BUILD_MSG_VERIFY_MAC:
|
||||||
{
|
{
|
||||||
|
/* done with size calculations */
|
||||||
|
if (sizeOnly)
|
||||||
|
goto exit_buildmsg;
|
||||||
|
|
||||||
/* User Record Layer Callback handling */
|
/* User Record Layer Callback handling */
|
||||||
#ifdef ATOMIC_USER
|
#ifdef ATOMIC_USER
|
||||||
#if defined(HAVE_ENCRYPT_THEN_MAC) && !defined(WOLFSSL_AEAD_ONLY)
|
#if defined(HAVE_ENCRYPT_THEN_MAC) && !defined(WOLFSSL_AEAD_ONLY)
|
||||||
@@ -18488,6 +18500,10 @@ int BuildMessage(WOLFSSL* ssl, byte* output, int outSz, const byte* input,
|
|||||||
FALL_THROUGH;
|
FALL_THROUGH;
|
||||||
case BUILD_MSG_ENCRYPT:
|
case BUILD_MSG_ENCRYPT:
|
||||||
{
|
{
|
||||||
|
/* done with size calculations */
|
||||||
|
if (sizeOnly)
|
||||||
|
goto exit_buildmsg;
|
||||||
|
|
||||||
#if defined(HAVE_SECURE_RENEGOTIATION) && defined(WOLFSSL_DTLS)
|
#if defined(HAVE_SECURE_RENEGOTIATION) && defined(WOLFSSL_DTLS)
|
||||||
/* If we want the PREV_ORDER then modify CUR_ORDER sequence number
|
/* If we want the PREV_ORDER then modify CUR_ORDER sequence number
|
||||||
* for all encryption algos that use it for encryption parameters */
|
* for all encryption algos that use it for encryption parameters */
|
||||||
@@ -18535,6 +18551,10 @@ int BuildMessage(WOLFSSL* ssl, byte* output, int outSz, const byte* input,
|
|||||||
FALL_THROUGH;
|
FALL_THROUGH;
|
||||||
case BUILD_MSG_ENCRYPTED_VERIFY_MAC:
|
case BUILD_MSG_ENCRYPTED_VERIFY_MAC:
|
||||||
{
|
{
|
||||||
|
/* done with size calculations */
|
||||||
|
if (sizeOnly)
|
||||||
|
goto exit_buildmsg;
|
||||||
|
|
||||||
#if defined(HAVE_ENCRYPT_THEN_MAC) && !defined(WOLFSSL_AEAD_ONLY)
|
#if defined(HAVE_ENCRYPT_THEN_MAC) && !defined(WOLFSSL_AEAD_ONLY)
|
||||||
if (ssl->options.startedETMWrite) {
|
if (ssl->options.startedETMWrite) {
|
||||||
WOLFSSL_MSG("Calculate MAC of Encrypted Data");
|
WOLFSSL_MSG("Calculate MAC of Encrypted Data");
|
||||||
|
Reference in New Issue
Block a user