mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-25 19:45:44 +01:00
Merge pull request #3848 from rodrigo-dc/development
Fix build failure on gcc-11
This commit is contained in:
commit
d9d4e807fa
2
ChangeLog.d/bugfix_3782.txt
Normal file
2
ChangeLog.d/bugfix_3782.txt
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
Bugfix
|
||||||
|
* Fix build failures on GCC 11. Fixes #3782.
|
@ -420,7 +420,7 @@ exit:
|
|||||||
*/
|
*/
|
||||||
int mbedtls_aes_cmac_prf_128( const unsigned char *key, size_t key_length,
|
int mbedtls_aes_cmac_prf_128( const unsigned char *key, size_t key_length,
|
||||||
const unsigned char *input, size_t in_len,
|
const unsigned char *input, size_t in_len,
|
||||||
unsigned char *output )
|
unsigned char output[16] )
|
||||||
{
|
{
|
||||||
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
||||||
const mbedtls_cipher_info_t *cipher_info;
|
const mbedtls_cipher_info_t *cipher_info;
|
||||||
|
@ -680,20 +680,20 @@ static void ssl_calc_finished_ssl( mbedtls_ssl_context *, unsigned char *, int )
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1)
|
#if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1)
|
||||||
static void ssl_calc_verify_tls( const mbedtls_ssl_context *, unsigned char *, size_t * );
|
static void ssl_calc_verify_tls( const mbedtls_ssl_context *, unsigned char*, size_t * );
|
||||||
static void ssl_calc_finished_tls( mbedtls_ssl_context *, unsigned char *, int );
|
static void ssl_calc_finished_tls( mbedtls_ssl_context *, unsigned char *, int );
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
||||||
#if defined(MBEDTLS_SHA256_C)
|
#if defined(MBEDTLS_SHA256_C)
|
||||||
static void ssl_update_checksum_sha256( mbedtls_ssl_context *, const unsigned char *, size_t );
|
static void ssl_update_checksum_sha256( mbedtls_ssl_context *, const unsigned char *, size_t );
|
||||||
static void ssl_calc_verify_tls_sha256( const mbedtls_ssl_context *,unsigned char *, size_t * );
|
static void ssl_calc_verify_tls_sha256( const mbedtls_ssl_context *,unsigned char*, size_t * );
|
||||||
static void ssl_calc_finished_tls_sha256( mbedtls_ssl_context *,unsigned char *, int );
|
static void ssl_calc_finished_tls_sha256( mbedtls_ssl_context *,unsigned char *, int );
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(MBEDTLS_SHA512_C)
|
#if defined(MBEDTLS_SHA512_C)
|
||||||
static void ssl_update_checksum_sha384( mbedtls_ssl_context *, const unsigned char *, size_t );
|
static void ssl_update_checksum_sha384( mbedtls_ssl_context *, const unsigned char *, size_t );
|
||||||
static void ssl_calc_verify_tls_sha384( const mbedtls_ssl_context *, unsigned char *, size_t * );
|
static void ssl_calc_verify_tls_sha384( const mbedtls_ssl_context *, unsigned char*, size_t * );
|
||||||
static void ssl_calc_finished_tls_sha384( mbedtls_ssl_context *, unsigned char *, int );
|
static void ssl_calc_finished_tls_sha384( mbedtls_ssl_context *, unsigned char *, int );
|
||||||
#endif
|
#endif
|
||||||
#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
|
#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
|
||||||
@ -1667,7 +1667,7 @@ int mbedtls_ssl_derive_keys( mbedtls_ssl_context *ssl )
|
|||||||
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_SSL3)
|
#if defined(MBEDTLS_SSL_PROTO_SSL3)
|
||||||
void ssl_calc_verify_ssl( const mbedtls_ssl_context *ssl,
|
void ssl_calc_verify_ssl( const mbedtls_ssl_context *ssl,
|
||||||
unsigned char hash[36],
|
unsigned char *hash,
|
||||||
size_t *hlen )
|
size_t *hlen )
|
||||||
{
|
{
|
||||||
mbedtls_md5_context md5;
|
mbedtls_md5_context md5;
|
||||||
@ -1720,7 +1720,7 @@ void ssl_calc_verify_ssl( const mbedtls_ssl_context *ssl,
|
|||||||
|
|
||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1)
|
#if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1)
|
||||||
void ssl_calc_verify_tls( const mbedtls_ssl_context *ssl,
|
void ssl_calc_verify_tls( const mbedtls_ssl_context *ssl,
|
||||||
unsigned char hash[36],
|
unsigned char *hash,
|
||||||
size_t *hlen )
|
size_t *hlen )
|
||||||
{
|
{
|
||||||
mbedtls_md5_context md5;
|
mbedtls_md5_context md5;
|
||||||
@ -1752,7 +1752,7 @@ void ssl_calc_verify_tls( const mbedtls_ssl_context *ssl,
|
|||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
|
||||||
#if defined(MBEDTLS_SHA256_C)
|
#if defined(MBEDTLS_SHA256_C)
|
||||||
void ssl_calc_verify_tls_sha256( const mbedtls_ssl_context *ssl,
|
void ssl_calc_verify_tls_sha256( const mbedtls_ssl_context *ssl,
|
||||||
unsigned char hash[32],
|
unsigned char *hash,
|
||||||
size_t *hlen )
|
size_t *hlen )
|
||||||
{
|
{
|
||||||
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
||||||
@ -1801,7 +1801,7 @@ void ssl_calc_verify_tls_sha256( const mbedtls_ssl_context *ssl,
|
|||||||
|
|
||||||
#if defined(MBEDTLS_SHA512_C)
|
#if defined(MBEDTLS_SHA512_C)
|
||||||
void ssl_calc_verify_tls_sha384( const mbedtls_ssl_context *ssl,
|
void ssl_calc_verify_tls_sha384( const mbedtls_ssl_context *ssl,
|
||||||
unsigned char hash[48],
|
unsigned char *hash,
|
||||||
size_t *hlen )
|
size_t *hlen )
|
||||||
{
|
{
|
||||||
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
||||||
@ -3197,6 +3197,9 @@ static void ssl_calc_finished_tls_sha256(
|
|||||||
#endif /* MBEDTLS_SHA256_C */
|
#endif /* MBEDTLS_SHA256_C */
|
||||||
|
|
||||||
#if defined(MBEDTLS_SHA512_C)
|
#if defined(MBEDTLS_SHA512_C)
|
||||||
|
|
||||||
|
typedef int (*finish_sha384_t)(mbedtls_sha512_context*, unsigned char*);
|
||||||
|
|
||||||
static void ssl_calc_finished_tls_sha384(
|
static void ssl_calc_finished_tls_sha384(
|
||||||
mbedtls_ssl_context *ssl, unsigned char *buf, int from )
|
mbedtls_ssl_context *ssl, unsigned char *buf, int from )
|
||||||
{
|
{
|
||||||
@ -3255,8 +3258,14 @@ static void ssl_calc_finished_tls_sha384(
|
|||||||
MBEDTLS_SSL_DEBUG_BUF( 4, "finished sha512 state", (unsigned char *)
|
MBEDTLS_SSL_DEBUG_BUF( 4, "finished sha512 state", (unsigned char *)
|
||||||
sha512.state, sizeof( sha512.state ) );
|
sha512.state, sizeof( sha512.state ) );
|
||||||
#endif
|
#endif
|
||||||
|
/*
|
||||||
|
* For SHA-384, we can save 16 bytes by keeping padbuf 48 bytes long.
|
||||||
|
* However, to avoid stringop-overflow warning in gcc, we have to cast
|
||||||
|
* mbedtls_sha512_finish_ret().
|
||||||
|
*/
|
||||||
|
finish_sha384_t finish = (finish_sha384_t)mbedtls_sha512_finish_ret;
|
||||||
|
finish( &sha512, padbuf );
|
||||||
|
|
||||||
mbedtls_sha512_finish_ret( &sha512, padbuf );
|
|
||||||
mbedtls_sha512_free( &sha512 );
|
mbedtls_sha512_free( &sha512 );
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@ -158,7 +158,7 @@ static int calloc_self_test( int verbose )
|
|||||||
}
|
}
|
||||||
#endif /* MBEDTLS_SELF_TEST */
|
#endif /* MBEDTLS_SELF_TEST */
|
||||||
|
|
||||||
static int test_snprintf( size_t n, const char ref_buf[10], int ref_ret )
|
static int test_snprintf( size_t n, const char *ref_buf, int ref_ret )
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
char buf[10] = "xxxxxxxxx";
|
char buf[10] = "xxxxxxxxx";
|
||||||
|
@ -335,7 +335,7 @@ static int convert_params( size_t cnt , char ** params , int * int_params_store
|
|||||||
#if defined(__GNUC__)
|
#if defined(__GNUC__)
|
||||||
__attribute__((__noinline__))
|
__attribute__((__noinline__))
|
||||||
#endif
|
#endif
|
||||||
static int test_snprintf( size_t n, const char ref_buf[10], int ref_ret )
|
static int test_snprintf( size_t n, const char *ref_buf, int ref_ret )
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
char buf[10] = "xxxxxxxxx";
|
char buf[10] = "xxxxxxxxx";
|
||||||
|
Loading…
Reference in New Issue
Block a user