@@ -2218,8 +2218,7 @@ int wolfSSL_X509_get_ext_by_NID(const WOLFSSL_X509* x509, int nid, int lastPos)
22182218
22192219#endif /* OPENSSL_ALL || OPENSSL_EXTRA */
22202220
2221- #if defined(OPENSSL_EXTRA ) && !defined(IGNORE_NAME_CONSTRAINTS ) && \
2222- !defined(WOLFSSL_LINUXKM )
2221+ #if defined(OPENSSL_EXTRA ) && !defined(IGNORE_NAME_CONSTRAINTS )
22232222/*
22242223 * Convert a Base_entry linked list to a STACK of GENERAL_SUBTREE.
22252224 *
@@ -2370,7 +2369,7 @@ static int ConvertBaseEntryToSubtreeStack(Base_entry* list, WOLFSSL_STACK* sk,
23702369
23712370 return 0 ;
23722371}
2373- #endif /* OPENSSL_EXTRA && !IGNORE_NAME_CONSTRAINTS && !WOLFSSL_LINUXKM */
2372+ #endif /* OPENSSL_EXTRA && !IGNORE_NAME_CONSTRAINTS */
23742373
23752374#if defined(OPENSSL_EXTRA ) || defined(WOLFSSL_WPAS_SMALL )
23762375/* Looks for the extension matching the passed in nid
@@ -2874,8 +2873,7 @@ void* wolfSSL_X509_get_ext_d2i(const WOLFSSL_X509* x509, int nid, int* c,
28742873 }
28752874 break ;
28762875
2877- #if defined(OPENSSL_EXTRA ) && !defined(IGNORE_NAME_CONSTRAINTS ) && \
2878- !defined(WOLFSSL_LINUXKM )
2876+ #if defined(OPENSSL_EXTRA ) && !defined(IGNORE_NAME_CONSTRAINTS )
28792877 case NAME_CONS_OID :
28802878 {
28812879 WOLFSSL_NAME_CONSTRAINTS * nc = NULL ;
@@ -2937,7 +2935,7 @@ void* wolfSSL_X509_get_ext_d2i(const WOLFSSL_X509* x509, int nid, int* c,
29372935
29382936 return nc ;
29392937 }
2940- #endif /* OPENSSL_EXTRA && !IGNORE_NAME_CONSTRAINTS && !WOLFSSL_LINUXKM */
2938+ #endif /* OPENSSL_EXTRA && !IGNORE_NAME_CONSTRAINTS */
29412939
29422940 case PRIV_KEY_USAGE_PERIOD_OID :
29432941 WOLFSSL_MSG ("Private Key Usage Period extension not supported" );
@@ -5327,7 +5325,7 @@ void wolfSSL_EXTENDED_KEY_USAGE_free(WOLFSSL_STACK * sk)
53275325 wolfSSL_sk_X509_pop_free (sk , NULL );
53285326}
53295327
5330- #if !defined(IGNORE_NAME_CONSTRAINTS ) && !defined( WOLFSSL_LINUXKM )
5328+ #if !defined(IGNORE_NAME_CONSTRAINTS )
53315329/*
53325330 * Allocate and initialize an empty GENERAL_SUBTREE structure.
53335331 * Returns NULL on allocation failure.
@@ -5480,12 +5478,14 @@ static const char* ExtractHostFromUri(const char* uri, int uriLen, int* hostLen)
54805478 const char * hostStart ;
54815479 const char * hostEnd ;
54825480 const char * p ;
5483- const char * uriEnd = uri + uriLen ;
5481+ const char * uriEnd ;
54845482
54855483 if (uri == NULL || uriLen <= 0 || hostLen == NULL ) {
54865484 return NULL ;
54875485 }
54885486
5487+ uriEnd = uri + uriLen ;
5488+
54895489 /* Find "://" to skip scheme */
54905490 hostStart = NULL ;
54915491 for (p = uri ; p < uriEnd - 2 ; p ++ ) {
@@ -5692,7 +5692,7 @@ int wolfSSL_NAME_CONSTRAINTS_check_name(WOLFSSL_NAME_CONSTRAINTS* nc,
56925692
56935693 return 1 ;
56945694}
5695- #endif /* !IGNORE_NAME_CONSTRAINTS && !WOLFSSL_LINUXKM */
5695+ #endif /* !IGNORE_NAME_CONSTRAINTS */
56965696
56975697#if defined(OPENSSL_ALL ) && !defined(NO_BIO )
56985698/* Outputs name string of the given WOLFSSL_GENERAL_NAME_OBJECT to WOLFSSL_BIO.
0 commit comments