mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2026-03-06 23:34:03 +01:00
scan-build warning and AES key size builds for ARMv8
This commit is contained in:
76
src/ssl.c
76
src/ssl.c
@@ -4608,6 +4608,7 @@ static int wolfssl_encrypt_buffer_key(byte* der, word32 derSz, byte* password,
|
||||
ret = wc_Des_CbcEncryptWithKey(der, der, derSz, key, info->iv);
|
||||
else if (XSTRNCMP(info->name, EVP_DES_EDE3_CBC, EVP_DES_EDE3_SIZE) == 0)
|
||||
ret = wc_Des3_CbcEncryptWithKey(der, der, derSz, key, info->iv);
|
||||
else
|
||||
#endif /* NO_DES3 */
|
||||
#ifndef NO_AES
|
||||
#ifdef WOLFSSL_AES_128
|
||||
@@ -16190,14 +16191,11 @@ const char* wolfSSL_get_curve_name(WOLFSSL* ssl)
|
||||
#endif
|
||||
|
||||
|
||||
#if defined(OPENSSL_EXTRA_X509_SMALL)
|
||||
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(KEEP_PEER_CERT) || \
|
||||
defined(SESSION_CERTS)
|
||||
/* Smaller subset of X509 compatibility functions. Avoid increasing the size of
|
||||
* this subset and its memory usage */
|
||||
|
||||
#ifdef HAVE_ECC
|
||||
static int SetECKeyExternal(WOLFSSL_EC_KEY* eckey);
|
||||
#endif
|
||||
|
||||
#if !defined(NO_CERTS)
|
||||
/* returns a pointer to a new WOLFSSL_X509 structure on success and NULL on
|
||||
* fail
|
||||
@@ -16215,6 +16213,42 @@ WOLFSSL_X509* wolfSSL_X509_new()
|
||||
return x509;
|
||||
}
|
||||
|
||||
WOLFSSL_X509_NAME* wolfSSL_X509_get_subject_name(WOLFSSL_X509* cert)
|
||||
{
|
||||
WOLFSSL_ENTER("wolfSSL_X509_get_subject_name");
|
||||
if (cert && cert->subject.sz != 0)
|
||||
return &cert->subject;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
|
||||
WOLFSSL_X509_NAME* wolfSSL_X509_get_issuer_name(WOLFSSL_X509* cert)
|
||||
{
|
||||
WOLFSSL_ENTER("X509_get_issuer_name");
|
||||
if (cert && cert->issuer.sz != 0)
|
||||
return &cert->issuer;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
int wolfSSL_X509_get_signature_type(WOLFSSL_X509* x509)
|
||||
{
|
||||
int type = 0;
|
||||
|
||||
WOLFSSL_ENTER("wolfSSL_X509_get_signature_type");
|
||||
|
||||
if (x509 != NULL)
|
||||
type = x509->sigOID;
|
||||
|
||||
return type;
|
||||
}
|
||||
|
||||
#if defined(OPENSSL_EXTRA_X509_SMALL)
|
||||
#ifdef HAVE_ECC
|
||||
static int SetECKeyExternal(WOLFSSL_EC_KEY* eckey);
|
||||
#endif
|
||||
|
||||
/* Used to get a string from the WOLFSSL_X509_NAME structure that
|
||||
* corresponds with the NID value passed in.
|
||||
*
|
||||
@@ -16297,37 +16331,6 @@ int wolfSSL_X509_NAME_get_text_by_NID(WOLFSSL_X509_NAME* name,
|
||||
}
|
||||
|
||||
|
||||
WOLFSSL_X509_NAME* wolfSSL_X509_get_subject_name(WOLFSSL_X509* cert)
|
||||
{
|
||||
WOLFSSL_ENTER("wolfSSL_X509_get_subject_name");
|
||||
if (cert && cert->subject.sz != 0)
|
||||
return &cert->subject;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
|
||||
WOLFSSL_X509_NAME* wolfSSL_X509_get_issuer_name(WOLFSSL_X509* cert)
|
||||
{
|
||||
WOLFSSL_ENTER("X509_get_issuer_name");
|
||||
if (cert && cert->issuer.sz != 0)
|
||||
return &cert->issuer;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
int wolfSSL_X509_get_signature_type(WOLFSSL_X509* x509)
|
||||
{
|
||||
int type = 0;
|
||||
|
||||
WOLFSSL_ENTER("wolfSSL_X509_get_signature_type");
|
||||
|
||||
if (x509 != NULL)
|
||||
type = x509->sigOID;
|
||||
|
||||
return type;
|
||||
}
|
||||
|
||||
/* Creates a new WOLFSSL_EVP_PKEY structure that has the public key from x509
|
||||
*
|
||||
* returns a pointer to the created WOLFSSL_EVP_PKEY on success and NULL on fail
|
||||
@@ -16417,6 +16420,7 @@ WOLFSSL_EVP_PKEY* wolfSSL_X509_get_pubkey(WOLFSSL_X509* x509)
|
||||
}
|
||||
return key;
|
||||
}
|
||||
#endif /* OPENSSL_EXTRA_X509_SMALL */
|
||||
#endif /* !NO_CERTS */
|
||||
|
||||
/* End of smaller subset of X509 compatibility functions. Avoid increasing the
|
||||
|
||||
Reference in New Issue
Block a user