mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-31 19:24:42 +02:00
Merge pull request #5267 from douzzer/20220620-multi-test-fixes
20220620-multi-test-fixes
This commit is contained in:
@@ -315,7 +315,7 @@ static int test_tls(func_args* server_args)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Show cipher suites available. */
|
/* Show cipher suites available. */
|
||||||
static void show_ciphers()
|
static void show_ciphers(void)
|
||||||
{
|
{
|
||||||
char ciphers[WOLFSSL_CIPHER_LIST_MAX_SIZE];
|
char ciphers[WOLFSSL_CIPHER_LIST_MAX_SIZE];
|
||||||
XMEMSET(ciphers, 0, sizeof(ciphers));
|
XMEMSET(ciphers, 0, sizeof(ciphers));
|
||||||
@@ -324,7 +324,7 @@ static void show_ciphers()
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Cleanup temporary output file. */
|
/* Cleanup temporary output file. */
|
||||||
static void cleanup_output()
|
static void cleanup_output(void)
|
||||||
{
|
{
|
||||||
remove(outputName);
|
remove(outputName);
|
||||||
}
|
}
|
||||||
@@ -334,7 +334,7 @@ static void cleanup_output()
|
|||||||
* @return 0 on success.
|
* @return 0 on success.
|
||||||
* @return 1 on failure.
|
* @return 1 on failure.
|
||||||
*/
|
*/
|
||||||
static int validate_cleanup_output()
|
static int validate_cleanup_output(void)
|
||||||
{
|
{
|
||||||
#ifndef NO_SHA256
|
#ifndef NO_SHA256
|
||||||
byte input[WC_SHA256_DIGEST_SIZE];
|
byte input[WC_SHA256_DIGEST_SIZE];
|
||||||
|
@@ -1268,7 +1268,7 @@ int wc_CryptoCb_Cmac(Cmac* cmac, const byte* key, word32 keySz,
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
/* returns the default dev id for the current build */
|
/* returns the default dev id for the current build */
|
||||||
int wc_CryptoCb_DefaultDevID()
|
int wc_CryptoCb_DefaultDevID(void)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
|
@@ -13825,7 +13825,7 @@ static WC_INLINE void IncrementX963KdfCounter(byte* inOutCtr)
|
|||||||
int wc_X963_KDF(enum wc_HashType type, const byte* secret, word32 secretSz,
|
int wc_X963_KDF(enum wc_HashType type, const byte* secret, word32 secretSz,
|
||||||
const byte* sinfo, word32 sinfoSz, byte* out, word32 outSz)
|
const byte* sinfo, word32 sinfoSz, byte* out, word32 outSz)
|
||||||
{
|
{
|
||||||
int ret, i;
|
int ret;
|
||||||
int digestSz, copySz;
|
int digestSz, copySz;
|
||||||
int remaining = outSz;
|
int remaining = outSz;
|
||||||
byte* outIdx;
|
byte* outIdx;
|
||||||
@@ -13869,7 +13869,7 @@ int wc_X963_KDF(enum wc_HashType type, const byte* secret, word32 secretSz,
|
|||||||
outIdx = out;
|
outIdx = out;
|
||||||
XMEMSET(counter, 0, sizeof(counter));
|
XMEMSET(counter, 0, sizeof(counter));
|
||||||
|
|
||||||
for (i = 1; remaining > 0; i++) {
|
while (remaining > 0) {
|
||||||
|
|
||||||
IncrementX963KdfCounter(counter);
|
IncrementX963KdfCounter(counter);
|
||||||
|
|
||||||
|
@@ -4497,7 +4497,7 @@ int wolfSSL_EVP_MD_type(const WOLFSSL_EVP_MD* type)
|
|||||||
* @param none
|
* @param none
|
||||||
* @return "blake2b512"
|
* @return "blake2b512"
|
||||||
*/
|
*/
|
||||||
const WOLFSSL_EVP_MD* wolfSSL_EVP_blake2b512()
|
const WOLFSSL_EVP_MD* wolfSSL_EVP_blake2b512(void)
|
||||||
{
|
{
|
||||||
WOLFSSL_ENTER("EVP_blake2b512");
|
WOLFSSL_ENTER("EVP_blake2b512");
|
||||||
return EVP_get_digestbyname("BLAKE2b512");
|
return EVP_get_digestbyname("BLAKE2b512");
|
||||||
@@ -4510,7 +4510,7 @@ int wolfSSL_EVP_MD_type(const WOLFSSL_EVP_MD* type)
|
|||||||
* @param none
|
* @param none
|
||||||
* @return "blake2s256"
|
* @return "blake2s256"
|
||||||
*/
|
*/
|
||||||
const WOLFSSL_EVP_MD* wolfSSL_EVP_blake2s256()
|
const WOLFSSL_EVP_MD* wolfSSL_EVP_blake2s256(void)
|
||||||
{
|
{
|
||||||
WOLFSSL_ENTER("EVP_blake2s256");
|
WOLFSSL_ENTER("EVP_blake2s256");
|
||||||
return EVP_get_digestbyname("BLAKE2s256");
|
return EVP_get_digestbyname("BLAKE2s256");
|
||||||
|
Reference in New Issue
Block a user