mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2026-01-28 23:39:54 +01:00
Fixes from C++ and address access checking
Fix access of table for cache resistance. Don't name variable public or private. Cast from void*
This commit is contained in:
@@ -9756,7 +9756,7 @@ WOLFSSL_X509_EXTENSION *wolfSSL_X509V3_EXT_i2d(int nid, int crit,
|
||||
case NID_info_access:
|
||||
/* typedef STACK_OF(ACCESS_DESCRIPTION) AUTHORITY_INFO_ACCESS */
|
||||
{
|
||||
WOLFSSL_STACK* sk = data;
|
||||
WOLFSSL_STACK* sk = (WOLFSSL_STACK*)data;
|
||||
|
||||
if (ext->ext_sk) {
|
||||
wolfSSL_sk_free(ext->ext_sk);
|
||||
@@ -9771,7 +9771,7 @@ WOLFSSL_X509_EXTENSION *wolfSSL_X509V3_EXT_i2d(int nid, int crit,
|
||||
case NID_basic_constraints:
|
||||
{
|
||||
/* WOLFSSL_BASIC_CONSTRAINTS */
|
||||
WOLFSSL_BASIC_CONSTRAINTS* bc = data;
|
||||
WOLFSSL_BASIC_CONSTRAINTS* bc = (WOLFSSL_BASIC_CONSTRAINTS*)data;
|
||||
|
||||
if (!(ext->obj = wolfSSL_ASN1_OBJECT_new())) {
|
||||
WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
|
||||
@@ -9791,7 +9791,7 @@ WOLFSSL_X509_EXTENSION *wolfSSL_X509V3_EXT_i2d(int nid, int crit,
|
||||
case NID_authority_key_identifier:
|
||||
{
|
||||
/* AUTHORITY_KEYID */
|
||||
WOLFSSL_AUTHORITY_KEYID* akey = data;
|
||||
WOLFSSL_AUTHORITY_KEYID* akey = (WOLFSSL_AUTHORITY_KEYID*)data;
|
||||
|
||||
if (akey->keyid) {
|
||||
if (wolfSSL_ASN1_STRING_set(&ext->value, akey->keyid->data,
|
||||
@@ -31883,7 +31883,7 @@ int wolfSSL_PEM_write_mem_RSAPrivateKey(RSA* rsa, const EVP_CIPHER* cipher,
|
||||
byte *tmpBuf;
|
||||
|
||||
/* Add space for padding */
|
||||
if (!(tmpBuf = XREALLOC(derBuf, derSz + blockSz, NULL,
|
||||
if (!(tmpBuf = (byte*)XREALLOC(derBuf, derSz + blockSz, NULL,
|
||||
DYNAMIC_TYPE_TMP_BUFFER))) {
|
||||
WOLFSSL_MSG("Extending DER buffer failed");
|
||||
XFREE(derBuf, NULL, DYNAMIC_TYPE_DER);
|
||||
|
||||
Reference in New Issue
Block a user