forked from wolfSSL/wolfssl
Merge pull request #6456 from SparkiDev/tests_api_expect_2
Test api.c: change more tests to use Expect instead of Assert
This commit is contained in:
@@ -597,6 +597,10 @@ int BufferLoadCRL(WOLFSSL_CRL* crl, const byte* buff, long sz, int type,
|
|||||||
DYNAMIC_TYPE_CRL_ENTRY);
|
DYNAMIC_TYPE_CRL_ENTRY);
|
||||||
if (crl->currentEntry == NULL) {
|
if (crl->currentEntry == NULL) {
|
||||||
WOLFSSL_MSG("alloc CRL Entry failed");
|
WOLFSSL_MSG("alloc CRL Entry failed");
|
||||||
|
#ifdef WOLFSSL_SMALL_STACK
|
||||||
|
XFREE(dcrl, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
|
#endif
|
||||||
|
FreeDer(&der);
|
||||||
return MEMORY_E;
|
return MEMORY_E;
|
||||||
}
|
}
|
||||||
XMEMSET(crl->currentEntry, 0, sizeof(CRL_Entry));
|
XMEMSET(crl->currentEntry, 0, sizeof(CRL_Entry));
|
||||||
|
20
src/ssl.c
20
src/ssl.c
@@ -20610,8 +20610,8 @@ size_t wolfSSL_get_client_random(const WOLFSSL* ssl, unsigned char* out,
|
|||||||
if (x509->dynamicMemory != TRUE)
|
if (x509->dynamicMemory != TRUE)
|
||||||
InitX509(x509, 0, NULL);
|
InitX509(x509, 0, NULL);
|
||||||
ret = CopyDecodedToX509(x509, cert);
|
ret = CopyDecodedToX509(x509, cert);
|
||||||
FreeDecodedCert(cert);
|
|
||||||
}
|
}
|
||||||
|
FreeDecodedCert(cert);
|
||||||
#ifdef WOLFSSL_SMALL_STACK
|
#ifdef WOLFSSL_SMALL_STACK
|
||||||
XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
|
XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
|
||||||
#endif
|
#endif
|
||||||
@@ -26128,7 +26128,7 @@ const WOLFSSL_ObjectInfo wolfssl_object_info[] = {
|
|||||||
{ NID_postalCode, NID_postalCode, oidCertNameType, "postalCode", "postalCode"},
|
{ NID_postalCode, NID_postalCode, oidCertNameType, "postalCode", "postalCode"},
|
||||||
{ NID_userId, NID_userId, oidCertNameType, "UID", "userId"},
|
{ NID_userId, NID_userId, oidCertNameType, "UID", "userId"},
|
||||||
|
|
||||||
#ifdef WOLFSSL_CERT_REQ
|
#if defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_NAME_ALL)
|
||||||
{ NID_pkcs9_challengePassword, CHALLENGE_PASSWORD_OID,
|
{ NID_pkcs9_challengePassword, CHALLENGE_PASSWORD_OID,
|
||||||
oidCsrAttrType, "challengePassword", "challengePassword"},
|
oidCsrAttrType, "challengePassword", "challengePassword"},
|
||||||
{ NID_pkcs9_contentType, PKCS9_CONTENT_TYPE_OID,
|
{ NID_pkcs9_contentType, PKCS9_CONTENT_TYPE_OID,
|
||||||
@@ -27862,28 +27862,31 @@ WOLFSSL_EVP_PKEY *wolfSSL_PEM_read_PUBKEY(XFILE fp, WOLFSSL_EVP_PKEY **key,
|
|||||||
DerBuffer* der = NULL;
|
DerBuffer* der = NULL;
|
||||||
int keyFormat = 0;
|
int keyFormat = 0;
|
||||||
|
|
||||||
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_PUBKEY");
|
WOLFSSL_ENTER("wolfSSL_PEM_read_PUBKEY");
|
||||||
|
|
||||||
if (pem_read_file_key(fp, cb, pass, PUBLICKEY_TYPE, &keyFormat, &der)
|
if (pem_read_file_key(fp, cb, pass, PUBLICKEY_TYPE, &keyFormat, &der)
|
||||||
>= 0) {
|
>= 0) {
|
||||||
const unsigned char* ptr = der->buffer;
|
const unsigned char* ptr = der->buffer;
|
||||||
|
|
||||||
/* handle case where reuse is attempted */
|
/* handle case where reuse is attempted */
|
||||||
if (key != NULL && *key != NULL)
|
if ((key != NULL) && (*key != NULL)) {
|
||||||
pkey = *key;
|
pkey = *key;
|
||||||
|
}
|
||||||
|
|
||||||
wolfSSL_d2i_PUBKEY(&pkey, &ptr, der->length);
|
if ((wolfSSL_d2i_PUBKEY(&pkey, &ptr, der->length) == NULL) ||
|
||||||
if (pkey == NULL) {
|
(pkey == NULL)) {
|
||||||
WOLFSSL_MSG("Error loading DER buffer into WOLFSSL_EVP_PKEY");
|
WOLFSSL_MSG("Error loading DER buffer into WOLFSSL_EVP_PKEY");
|
||||||
|
pkey = NULL;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
FreeDer(&der);
|
FreeDer(&der);
|
||||||
|
|
||||||
if (key != NULL && pkey != NULL)
|
if ((key != NULL) && (pkey != NULL)) {
|
||||||
*key = pkey;
|
*key = pkey;
|
||||||
|
}
|
||||||
|
|
||||||
WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_PUBKEY", 0);
|
WOLFSSL_LEAVE("wolfSSL_PEM_read_PUBKEY", 0);
|
||||||
|
|
||||||
return pkey;
|
return pkey;
|
||||||
}
|
}
|
||||||
@@ -37446,6 +37449,7 @@ int wolfSSL_PKCS7_encode_certs(PKCS7* pkcs7, WOLFSSL_STACK* certs,
|
|||||||
|
|
||||||
/* take ownership of certs */
|
/* take ownership of certs */
|
||||||
p7->certs = certs;
|
p7->certs = certs;
|
||||||
|
/* TODO: takes ownership even on failure below but not on above failure. */
|
||||||
|
|
||||||
if (pkcs7->certList) {
|
if (pkcs7->certList) {
|
||||||
WOLFSSL_MSG("wolfSSL_PKCS7_encode_certs called multiple times on same "
|
WOLFSSL_MSG("wolfSSL_PKCS7_encode_certs called multiple times on same "
|
||||||
|
12
src/x509.c
12
src/x509.c
@@ -1124,8 +1124,9 @@ WOLFSSL_X509_EXTENSION* wolfSSL_X509_set_ext(WOLFSSL_X509* x509, int loc)
|
|||||||
*/
|
*/
|
||||||
if (x509->ext_sk == NULL)
|
if (x509->ext_sk == NULL)
|
||||||
x509->ext_sk = wolfSSL_sk_new_x509_ext();
|
x509->ext_sk = wolfSSL_sk_new_x509_ext();
|
||||||
if (x509->ext_sk != NULL)
|
if (wolfSSL_sk_X509_EXTENSION_push(x509->ext_sk, ext) == WOLFSSL_FAILURE) {
|
||||||
wolfSSL_sk_X509_EXTENSION_push(x509->ext_sk, ext);
|
wolfSSL_X509_EXTENSION_free(ext);
|
||||||
|
}
|
||||||
|
|
||||||
FreeDecodedCert(cert);
|
FreeDecodedCert(cert);
|
||||||
#ifdef WOLFSSL_SMALL_STACK
|
#ifdef WOLFSSL_SMALL_STACK
|
||||||
@@ -2926,9 +2927,6 @@ err_cleanup:
|
|||||||
if (ext) {
|
if (ext) {
|
||||||
wolfSSL_X509_EXTENSION_free(ext);
|
wolfSSL_X509_EXTENSION_free(ext);
|
||||||
}
|
}
|
||||||
if (asn1str) {
|
|
||||||
wolfSSL_ASN1_STRING_free(asn1str);
|
|
||||||
}
|
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -10354,6 +10352,10 @@ int wolfSSL_i2d_X509_NAME_canon(WOLFSSL_X509_NAME* name, unsigned char** out)
|
|||||||
return WOLFSSL_FATAL_ERROR;
|
return WOLFSSL_FATAL_ERROR;
|
||||||
}
|
}
|
||||||
if (wolfSSL_ASN1_STRING_canon(cano_data, data) != WOLFSSL_SUCCESS) {
|
if (wolfSSL_ASN1_STRING_canon(cano_data, data) != WOLFSSL_SUCCESS) {
|
||||||
|
#ifdef WOLFSSL_SMALL_STACK
|
||||||
|
XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
|
#endif
|
||||||
|
wolfSSL_ASN1_STRING_free(cano_data);
|
||||||
return WOLFSSL_FAILURE;
|
return WOLFSSL_FAILURE;
|
||||||
}
|
}
|
||||||
nameStr = (const char*)wolfSSL_ASN1_STRING_data(cano_data);
|
nameStr = (const char*)wolfSSL_ASN1_STRING_data(cano_data);
|
||||||
|
5501
tests/api.c
5501
tests/api.c
File diff suppressed because it is too large
Load Diff
@@ -1085,6 +1085,12 @@ int wc_PKCS7_InitWithCert(PKCS7* pkcs7, byte* derCert, word32 derCertSz)
|
|||||||
/* create new Pkcs7Cert for recipient, freed during cleanup */
|
/* create new Pkcs7Cert for recipient, freed during cleanup */
|
||||||
cert = (Pkcs7Cert*)XMALLOC(sizeof(Pkcs7Cert), pkcs7->heap,
|
cert = (Pkcs7Cert*)XMALLOC(sizeof(Pkcs7Cert), pkcs7->heap,
|
||||||
DYNAMIC_TYPE_PKCS7);
|
DYNAMIC_TYPE_PKCS7);
|
||||||
|
if (cert == NULL) {
|
||||||
|
#ifdef WOLFSSL_SMALL_STACK
|
||||||
|
XFREE(dCert, pkcs7->heap, DYNAMIC_TYPE_DCERT);
|
||||||
|
#endif
|
||||||
|
return MEMORY_E;
|
||||||
|
}
|
||||||
XMEMSET(cert, 0, sizeof(Pkcs7Cert));
|
XMEMSET(cert, 0, sizeof(Pkcs7Cert));
|
||||||
cert->der = derCert;
|
cert->der = derCert;
|
||||||
cert->derSz = derCertSz;
|
cert->derSz = derCertSz;
|
||||||
|
@@ -77,8 +77,8 @@
|
|||||||
#include <wolfssl/openssl/evp.h>
|
#include <wolfssl/openssl/evp.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#include <wolfssl/wolfcrypt/memory.h>
|
||||||
#if defined(USE_WOLFSSL_MEMORY) && defined(WOLFSSL_TRACK_MEMORY)
|
#if defined(USE_WOLFSSL_MEMORY) && defined(WOLFSSL_TRACK_MEMORY)
|
||||||
#include <wolfssl/wolfcrypt/memory.h>
|
|
||||||
#include <wolfssl/wolfcrypt/mem_track.h>
|
#include <wolfssl/wolfcrypt/mem_track.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -1289,7 +1289,7 @@ enum KeyIdType {
|
|||||||
};
|
};
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef WOLFSSL_CERT_REQ
|
#if defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_NAME_ALL)
|
||||||
enum CsrAttrType {
|
enum CsrAttrType {
|
||||||
UNSTRUCTURED_NAME_OID = 654,
|
UNSTRUCTURED_NAME_OID = 654,
|
||||||
PKCS9_CONTENT_TYPE_OID = 655,
|
PKCS9_CONTENT_TYPE_OID = 655,
|
||||||
|
Reference in New Issue
Block a user