forked from wolfSSL/wolfssl
Merge pull request #6456 from SparkiDev/tests_api_expect_2
Test api.c: change more tests to use Expect instead of Assert
This commit is contained in:
@ -597,6 +597,10 @@ int BufferLoadCRL(WOLFSSL_CRL* crl, const byte* buff, long sz, int type,
|
||||
DYNAMIC_TYPE_CRL_ENTRY);
|
||||
if (crl->currentEntry == NULL) {
|
||||
WOLFSSL_MSG("alloc CRL Entry failed");
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
XFREE(dcrl, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
#endif
|
||||
FreeDer(&der);
|
||||
return MEMORY_E;
|
||||
}
|
||||
XMEMSET(crl->currentEntry, 0, sizeof(CRL_Entry));
|
||||
|
20
src/ssl.c
20
src/ssl.c
@ -20610,8 +20610,8 @@ size_t wolfSSL_get_client_random(const WOLFSSL* ssl, unsigned char* out,
|
||||
if (x509->dynamicMemory != TRUE)
|
||||
InitX509(x509, 0, NULL);
|
||||
ret = CopyDecodedToX509(x509, cert);
|
||||
FreeDecodedCert(cert);
|
||||
}
|
||||
FreeDecodedCert(cert);
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
|
||||
#endif
|
||||
@ -26128,7 +26128,7 @@ const WOLFSSL_ObjectInfo wolfssl_object_info[] = {
|
||||
{ NID_postalCode, NID_postalCode, oidCertNameType, "postalCode", "postalCode"},
|
||||
{ NID_userId, NID_userId, oidCertNameType, "UID", "userId"},
|
||||
|
||||
#ifdef WOLFSSL_CERT_REQ
|
||||
#if defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_NAME_ALL)
|
||||
{ NID_pkcs9_challengePassword, CHALLENGE_PASSWORD_OID,
|
||||
oidCsrAttrType, "challengePassword", "challengePassword"},
|
||||
{ NID_pkcs9_contentType, PKCS9_CONTENT_TYPE_OID,
|
||||
@ -27862,28 +27862,31 @@ WOLFSSL_EVP_PKEY *wolfSSL_PEM_read_PUBKEY(XFILE fp, WOLFSSL_EVP_PKEY **key,
|
||||
DerBuffer* der = NULL;
|
||||
int keyFormat = 0;
|
||||
|
||||
WOLFSSL_ENTER("wolfSSL_PEM_read_bio_PUBKEY");
|
||||
WOLFSSL_ENTER("wolfSSL_PEM_read_PUBKEY");
|
||||
|
||||
if (pem_read_file_key(fp, cb, pass, PUBLICKEY_TYPE, &keyFormat, &der)
|
||||
>= 0) {
|
||||
const unsigned char* ptr = der->buffer;
|
||||
|
||||
/* handle case where reuse is attempted */
|
||||
if (key != NULL && *key != NULL)
|
||||
if ((key != NULL) && (*key != NULL)) {
|
||||
pkey = *key;
|
||||
}
|
||||
|
||||
wolfSSL_d2i_PUBKEY(&pkey, &ptr, der->length);
|
||||
if (pkey == NULL) {
|
||||
if ((wolfSSL_d2i_PUBKEY(&pkey, &ptr, der->length) == NULL) ||
|
||||
(pkey == NULL)) {
|
||||
WOLFSSL_MSG("Error loading DER buffer into WOLFSSL_EVP_PKEY");
|
||||
pkey = NULL;
|
||||
}
|
||||
}
|
||||
|
||||
FreeDer(&der);
|
||||
|
||||
if (key != NULL && pkey != NULL)
|
||||
if ((key != NULL) && (pkey != NULL)) {
|
||||
*key = pkey;
|
||||
}
|
||||
|
||||
WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_PUBKEY", 0);
|
||||
WOLFSSL_LEAVE("wolfSSL_PEM_read_PUBKEY", 0);
|
||||
|
||||
return pkey;
|
||||
}
|
||||
@ -37446,6 +37449,7 @@ int wolfSSL_PKCS7_encode_certs(PKCS7* pkcs7, WOLFSSL_STACK* certs,
|
||||
|
||||
/* take ownership of certs */
|
||||
p7->certs = certs;
|
||||
/* TODO: takes ownership even on failure below but not on above failure. */
|
||||
|
||||
if (pkcs7->certList) {
|
||||
WOLFSSL_MSG("wolfSSL_PKCS7_encode_certs called multiple times on same "
|
||||
|
12
src/x509.c
12
src/x509.c
@ -1124,8 +1124,9 @@ WOLFSSL_X509_EXTENSION* wolfSSL_X509_set_ext(WOLFSSL_X509* x509, int loc)
|
||||
*/
|
||||
if (x509->ext_sk == NULL)
|
||||
x509->ext_sk = wolfSSL_sk_new_x509_ext();
|
||||
if (x509->ext_sk != NULL)
|
||||
wolfSSL_sk_X509_EXTENSION_push(x509->ext_sk, ext);
|
||||
if (wolfSSL_sk_X509_EXTENSION_push(x509->ext_sk, ext) == WOLFSSL_FAILURE) {
|
||||
wolfSSL_X509_EXTENSION_free(ext);
|
||||
}
|
||||
|
||||
FreeDecodedCert(cert);
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
@ -2926,9 +2927,6 @@ err_cleanup:
|
||||
if (ext) {
|
||||
wolfSSL_X509_EXTENSION_free(ext);
|
||||
}
|
||||
if (asn1str) {
|
||||
wolfSSL_ASN1_STRING_free(asn1str);
|
||||
}
|
||||
return NULL;
|
||||
}
|
||||
|
||||
@ -10354,6 +10352,10 @@ int wolfSSL_i2d_X509_NAME_canon(WOLFSSL_X509_NAME* name, unsigned char** out)
|
||||
return WOLFSSL_FATAL_ERROR;
|
||||
}
|
||||
if (wolfSSL_ASN1_STRING_canon(cano_data, data) != WOLFSSL_SUCCESS) {
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
||||
#endif
|
||||
wolfSSL_ASN1_STRING_free(cano_data);
|
||||
return WOLFSSL_FAILURE;
|
||||
}
|
||||
nameStr = (const char*)wolfSSL_ASN1_STRING_data(cano_data);
|
||||
|
5285
tests/api.c
5285
tests/api.c
File diff suppressed because it is too large
Load Diff
@ -1085,6 +1085,12 @@ int wc_PKCS7_InitWithCert(PKCS7* pkcs7, byte* derCert, word32 derCertSz)
|
||||
/* create new Pkcs7Cert for recipient, freed during cleanup */
|
||||
cert = (Pkcs7Cert*)XMALLOC(sizeof(Pkcs7Cert), pkcs7->heap,
|
||||
DYNAMIC_TYPE_PKCS7);
|
||||
if (cert == NULL) {
|
||||
#ifdef WOLFSSL_SMALL_STACK
|
||||
XFREE(dCert, pkcs7->heap, DYNAMIC_TYPE_DCERT);
|
||||
#endif
|
||||
return MEMORY_E;
|
||||
}
|
||||
XMEMSET(cert, 0, sizeof(Pkcs7Cert));
|
||||
cert->der = derCert;
|
||||
cert->derSz = derCertSz;
|
||||
|
@ -77,8 +77,8 @@
|
||||
#include <wolfssl/openssl/evp.h>
|
||||
#endif
|
||||
|
||||
#if defined(USE_WOLFSSL_MEMORY) && defined(WOLFSSL_TRACK_MEMORY)
|
||||
#include <wolfssl/wolfcrypt/memory.h>
|
||||
#if defined(USE_WOLFSSL_MEMORY) && defined(WOLFSSL_TRACK_MEMORY)
|
||||
#include <wolfssl/wolfcrypt/mem_track.h>
|
||||
#endif
|
||||
|
||||
|
@ -1289,7 +1289,7 @@ enum KeyIdType {
|
||||
};
|
||||
#endif
|
||||
|
||||
#ifdef WOLFSSL_CERT_REQ
|
||||
#if defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_NAME_ALL)
|
||||
enum CsrAttrType {
|
||||
UNSTRUCTURED_NAME_OID = 654,
|
||||
PKCS9_CONTENT_TYPE_OID = 655,
|
||||
|
Reference in New Issue
Block a user