diff options
author | Jack Lloyd <[email protected]> | 2016-10-17 03:39:24 -0400 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2016-10-17 03:39:24 -0400 |
commit | 8f1ecd838eb05ad71bcfeb8cc59873c6f4f903ba (patch) | |
tree | 93a6185d5b97fa6533b338031191ab3f1a2d6efa /src/lib | |
parent | 1fbb61c3f212f180066b5bffb28e68808df1ad2e (diff) |
Maintainer mode fixes
Diffstat (limited to 'src/lib')
-rw-r--r-- | src/lib/cert/x509/x509path.cpp | 8 | ||||
-rw-r--r-- | src/lib/tls/msg_server_hello.cpp | 8 | ||||
-rw-r--r-- | src/lib/tls/tls_cbc/tls_cbc.cpp | 10 |
3 files changed, 12 insertions, 14 deletions
diff --git a/src/lib/cert/x509/x509path.cpp b/src/lib/cert/x509/x509path.cpp index 29853bb4a..a0cae2c93 100644 --- a/src/lib/cert/x509/x509path.cpp +++ b/src/lib/cert/x509/x509path.cpp @@ -29,9 +29,11 @@ find_issuing_cert(const X509_Certificate& cert, const X509_DN issuer_dn = cert.issuer_dn(); const std::vector<byte> auth_key_id = cert.authority_key_id(); - std::shared_ptr<const X509_Certificate> c = end_certs.find_cert(issuer_dn, auth_key_id); - if(c && *c != cert) - return c; + if(std::shared_ptr<const X509_Certificate> c = end_certs.find_cert(issuer_dn, auth_key_id)) + { + if(*c != cert) + return c; + } for(size_t i = 0; i != certstores.size(); ++i) { diff --git a/src/lib/tls/msg_server_hello.cpp b/src/lib/tls/msg_server_hello.cpp index 4f95a5c9d..d13bc7551 100644 --- a/src/lib/tls/msg_server_hello.cpp +++ b/src/lib/tls/msg_server_hello.cpp @@ -66,11 +66,11 @@ Server_Hello::Server_Hello(Handshake_IO& io, { u16bit shared = 0; // always using server preferences for now - for(auto s : server_srtp) - for(auto c : client_srtp) + for(auto s_srtp : server_srtp) + for(auto c_srtp : client_srtp) { - if(shared == 0 && s == c) - shared = s; + if(shared == 0 && s_srtp == c_srtp) + shared = s_srtp; } if(shared) diff --git a/src/lib/tls/tls_cbc/tls_cbc.cpp b/src/lib/tls/tls_cbc/tls_cbc.cpp index c7203003b..0318eb1b1 100644 --- a/src/lib/tls/tls_cbc/tls_cbc.cpp +++ b/src/lib/tls/tls_cbc/tls_cbc.cpp @@ -130,12 +130,11 @@ void TLS_CBC_HMAC_AEAD_Encryption::set_associated_data(const byte ad[], size_t a if(use_encrypt_then_mac()) { - std::vector<byte>& ad = assoc_data(); // AAD hack for EtM - size_t pt_size = make_u16bit(ad[11], ad[12]); + size_t pt_size = make_u16bit(assoc_data()[11], assoc_data()[12]); size_t enc_size = round_up(iv_size() + pt_size + 1, block_size()); - ad[11] = get_byte<uint16_t>(0, enc_size); - ad[12] = get_byte<uint16_t>(1, enc_size); + assoc_data()[11] = get_byte<uint16_t>(0, enc_size); + assoc_data()[12] = get_byte<uint16_t>(1, enc_size); } } @@ -341,9 +340,6 @@ void TLS_CBC_HMAC_AEAD_Decryption::finish(secure_vector<byte>& buffer, size_t of } else { - uint8_t* record_contents = msg().data(); - const size_t record_len = msg().size(); - CT::poison(record_contents, record_len); cbc_decrypt_record(record_contents, record_len); |