mirror of
https://github.com/cuberite/polarssl.git
synced 2025-09-09 23:26:29 -04:00
Stop IAR warning about goto skipping variable definition
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
This commit is contained in:
parent
01902779a3
commit
2af05c857a
@ -256,21 +256,22 @@ int mbedtls_pkcs12_pbe_ext(mbedtls_asn1_buf *pbe_params, int mode,
|
|||||||
}
|
}
|
||||||
|
|
||||||
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
|
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
|
||||||
/* PKCS12 uses CBC with PKCS7 padding */
|
{
|
||||||
|
/* PKCS12 uses CBC with PKCS7 padding */
|
||||||
mbedtls_cipher_padding_t padding = MBEDTLS_PADDING_PKCS7;
|
mbedtls_cipher_padding_t padding = MBEDTLS_PADDING_PKCS7;
|
||||||
#if !defined(MBEDTLS_CIPHER_PADDING_PKCS7)
|
#if !defined(MBEDTLS_CIPHER_PADDING_PKCS7)
|
||||||
/* For historical reasons, when decrypting, this function works when
|
/* For historical reasons, when decrypting, this function works when
|
||||||
* decrypting even when support for PKCS7 padding is disabled. In this
|
* decrypting even when support for PKCS7 padding is disabled. In this
|
||||||
* case, it ignores the padding, and so will never report a
|
* case, it ignores the padding, and so will never report a
|
||||||
* password mismatch.
|
* password mismatch.
|
||||||
*/
|
*/
|
||||||
if (mode == MBEDTLS_PKCS12_PBE_DECRYPT) {
|
if (mode == MBEDTLS_PKCS12_PBE_DECRYPT) {
|
||||||
padding = MBEDTLS_PADDING_NONE;
|
padding = MBEDTLS_PADDING_NONE;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
if ((ret = mbedtls_cipher_set_padding_mode(&cipher_ctx, padding)) != 0) {
|
if ((ret = mbedtls_cipher_set_padding_mode(&cipher_ctx, padding)) != 0) {
|
||||||
goto exit;
|
goto exit;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
|
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
|
||||||
|
|
||||||
|
@ -251,23 +251,25 @@ int mbedtls_pkcs5_pbes2_ext(const mbedtls_asn1_buf *pbe_params, int mode,
|
|||||||
}
|
}
|
||||||
|
|
||||||
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
|
#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING)
|
||||||
/* PKCS5 uses CBC with PKCS7 padding (which is the same as
|
{
|
||||||
* "PKCS5 padding" except that it's typically only called PKCS5
|
/* PKCS5 uses CBC with PKCS7 padding (which is the same as
|
||||||
* with 64-bit-block ciphers).
|
* "PKCS5 padding" except that it's typically only called PKCS5
|
||||||
*/
|
* with 64-bit-block ciphers).
|
||||||
mbedtls_cipher_padding_t padding = MBEDTLS_PADDING_PKCS7;
|
*/
|
||||||
|
mbedtls_cipher_padding_t padding = MBEDTLS_PADDING_PKCS7;
|
||||||
#if !defined(MBEDTLS_CIPHER_PADDING_PKCS7)
|
#if !defined(MBEDTLS_CIPHER_PADDING_PKCS7)
|
||||||
/* For historical reasons, when decrypting, this function works when
|
/* For historical reasons, when decrypting, this function works when
|
||||||
* decrypting even when support for PKCS7 padding is disabled. In this
|
* decrypting even when support for PKCS7 padding is disabled. In this
|
||||||
* case, it ignores the padding, and so will never report a
|
* case, it ignores the padding, and so will never report a
|
||||||
* password mismatch.
|
* password mismatch.
|
||||||
*/
|
*/
|
||||||
if (mode == MBEDTLS_DECRYPT) {
|
if (mode == MBEDTLS_DECRYPT) {
|
||||||
padding = MBEDTLS_PADDING_NONE;
|
padding = MBEDTLS_PADDING_NONE;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
if ((ret = mbedtls_cipher_set_padding_mode(&cipher_ctx, padding)) != 0) {
|
if ((ret = mbedtls_cipher_set_padding_mode(&cipher_ctx, padding)) != 0) {
|
||||||
goto exit;
|
goto exit;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
|
#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */
|
||||||
if ((ret = mbedtls_cipher_crypt(&cipher_ctx, iv, enc_scheme_params.len,
|
if ((ret = mbedtls_cipher_crypt(&cipher_ctx, iv, enc_scheme_params.len,
|
||||||
|
Loading…
x
Reference in New Issue
Block a user