From a55cedd357d8958361cc5a77b2f27bcf8731e620 Mon Sep 17 00:00:00 2001 From: Anthony Hu Date: Tue, 28 Sep 2021 18:36:18 -0400 Subject: [PATCH] Fixup in response to dgarske comments --- src/tls.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/src/tls.c b/src/tls.c index f647be84f..71cb1f771 100644 --- a/src/tls.c +++ b/src/tls.c @@ -7309,13 +7309,13 @@ static int TLSX_KeyShare_ProcessOqs(WOLFSSL* ssl, KeyShareEntry* keyShareEntry) * is in keyShareEntry->ke; copy it to the pre-master secret * pre-allocated buffer. */ if (keyShareEntry->keLen > ENCRYPT_LEN) { - WOLFSSL_MSG("shared secret is too long.\n"); + WOLFSSL_MSG("shared secret is too long."); return LENGTH_ERROR; } XMEMCPY(ssl->arrays->preMasterSecret, keyShareEntry->ke, keyShareEntry->keLen); ssl->arrays->preMasterSz = keyShareEntry->keLen; - XFREE(keyShareEntry->ke, sl->heap, DYNAMIC_TYPE_TLSX) + XFREE(keyShareEntry->ke, sl->heap, DYNAMIC_TYPE_SECRET) keyShareEntry->ke = NULL; keyShareEntry->keLen = 0; return 0; @@ -7421,7 +7421,7 @@ static int TLSX_KeyShare_ProcessOqs(WOLFSSL* ssl, KeyShareEntry* keyShareEntry) } if (sharedSecret != NULL) { - XFREE(sharedSecret, ssl->heap, DYNAMIC_TYPE_TLSX); + XFREE(sharedSecret, ssl->heap, DYNAMIC_TYPE_SECRET); } wc_ecc_free(&eccpubkey); @@ -7509,7 +7509,7 @@ static int TLSX_KeyShareEntry_Parse(WOLFSSL* ssl, const byte* input, ssl->options.side == WOLFSSL_SERVER_END) { /* For KEMs, the public key is not stored. Casting away const because * we know for KEMs, it will be read-only.*/ - ke = (byte *) &input[offset]; + ke = (byte *)&input[offset]; } else #endif {