mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-01 03:34:39 +02:00
@@ -643,7 +643,11 @@ static int bench_tls_client(info_t* info)
|
||||
}
|
||||
|
||||
#ifndef NO_DH
|
||||
wolfSSL_CTX_SetMinDhKey_Sz(cli_ctx, MIN_DHKEY_BITS);
|
||||
ret = wolfSSL_CTX_SetMinDhKey_Sz(cli_ctx, MIN_DHKEY_BITS);
|
||||
if (ret != WOLFSSL_SUCCESS) {
|
||||
printf("Error setting minimum DH key size\n");
|
||||
goto exit;
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Allocate and initialize a packet sized buffer */
|
||||
@@ -960,7 +964,11 @@ static int bench_tls_server(info_t* info)
|
||||
}
|
||||
|
||||
#ifndef NO_DH
|
||||
wolfSSL_CTX_SetMinDhKey_Sz(srv_ctx, MIN_DHKEY_BITS);
|
||||
ret = wolfSSL_CTX_SetMinDhKey_Sz(srv_ctx, MIN_DHKEY_BITS);
|
||||
if (ret != WOLFSSL_SUCCESS) {
|
||||
printf("Error setting minimum DH key size\n");
|
||||
goto exit;
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Allocate read buffer */
|
||||
|
@@ -2122,7 +2122,10 @@ THREAD_RETURN WOLFSSL_THREAD client_test(void* args)
|
||||
wolfSSL_CTX_set_group_messages(ctx);
|
||||
|
||||
#ifndef NO_DH
|
||||
wolfSSL_CTX_SetMinDhKey_Sz(ctx, (word16)minDhKeyBits);
|
||||
if (wolfSSL_CTX_SetMinDhKey_Sz(ctx, (word16)minDhKeyBits)
|
||||
!= WOLFSSL_SUCCESS) {
|
||||
err_sys("Error setting minimum DH key size");
|
||||
}
|
||||
#endif
|
||||
|
||||
if (usePsk) {
|
||||
|
@@ -6479,6 +6479,9 @@ int HashOutput(WOLFSSL* ssl, const byte* output, int sz, int ivSz)
|
||||
int ret = 0;
|
||||
const byte* adj;
|
||||
|
||||
if (ssl->hsHashes == NULL)
|
||||
return BAD_FUNC_ARG;
|
||||
|
||||
adj = output + RECORD_HEADER_SZ + ivSz;
|
||||
sz -= RECORD_HEADER_SZ;
|
||||
|
||||
|
Reference in New Issue
Block a user