mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-01 11:44:38 +02:00
Fix Checks
1. In the tls_bench, check the return code on wolfSSL_CTX_SetMinDhKey_Sz() as it is checked in the examples.
This commit is contained in:
@@ -643,7 +643,11 @@ static int bench_tls_client(info_t* info)
|
||||
}
|
||||
|
||||
#ifndef NO_DH
|
||||
wolfSSL_CTX_SetMinDhKey_Sz(cli_ctx, MIN_DHKEY_BITS);
|
||||
ret = wolfSSL_CTX_SetMinDhKey_Sz(cli_ctx, MIN_DHKEY_BITS);
|
||||
if (ret != WOLFSSL_SUCCESS) {
|
||||
printf("Error setting minimum DH key size\n");
|
||||
goto exit;
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Allocate and initialize a packet sized buffer */
|
||||
@@ -960,7 +964,11 @@ static int bench_tls_server(info_t* info)
|
||||
}
|
||||
|
||||
#ifndef NO_DH
|
||||
wolfSSL_CTX_SetMinDhKey_Sz(srv_ctx, MIN_DHKEY_BITS);
|
||||
ret = wolfSSL_CTX_SetMinDhKey_Sz(srv_ctx, MIN_DHKEY_BITS);
|
||||
if (ret != WOLFSSL_SUCCESS) {
|
||||
printf("Error setting minimum DH key size\n");
|
||||
goto exit;
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Allocate read buffer */
|
||||
|
Reference in New Issue
Block a user