addressed review comments

This commit is contained in:
Hideki Miyazaki
2021-06-18 10:49:24 +09:00
parent 951de64e2c
commit 2bbf7cc0fb
2 changed files with 9 additions and 7 deletions

View File

@@ -1873,10 +1873,10 @@ int InitSSL_Ctx(WOLFSSL_CTX* ctx, WOLFSSL_METHOD* method, void* heap)
ctx->noPskDheKe = 1;
#endif
#if defined(WOLFSSL_QT)
#if defined(WOLFSSL_QT) && !defined(NO_PSK)
/* Qt retrieves supported cipher list at initialization
* from get_cipher_compat().
* Qt doesn't not allow to use a cipher if it is not in the supported list.
* Qt doesn't allow to use a cipher if it is not in the supported list.
* Therefore, we need to enable PSK cipher at the beginning.
*/
ctx->havePSK = 1;

View File

@@ -6898,14 +6898,16 @@ int wolfSSL_CTX_load_verify_locations_ex(WOLFSSL_CTX* ctx, const char* file,
#if defined(WOLFSSL_QT)
if (ret == BAD_PATH_ERROR &&
flags & WOLFSSL_LOAD_FLAG_IGNORE_BAD_PATH_ERR) {
/* QSslSocket always loads certs in system folder
* when it is initialized.
* Compliant with OpenSSL when flag sets.*/
/* QSslSocket always loads certs in system folder
* when it is initialized.
* Compliant with OpenSSL when flag sets.
*/
ret = WOLFSSL_SUCCESS;
}
else
else {
/* qssl socket wants to know errors. */
WOLFSSL_ERROR(ret);
}
#endif
}
/* report failure if no files were loaded or there were failures */
@@ -18834,7 +18836,7 @@ WOLF_STACK_OF(WOLFSSL_X509)* wolfSSL_set_peer_cert_chain(WOLFSSL* ssl)
if (sk == NULL) {
WOLFSSL_MSG("Null session chain");
}
#if defined(WOLFSSL_QT)
#if defined(OPENSSL_ALL)
else if (ssl->options.side == WOLFSSL_SERVER_END) {
/* to be compliant with openssl
first element is kept as peer cert on server side.*/