forked from wolfSSL/wolfssl
8
certs/ecc-privOnlyCert.pem
Normal file
8
certs/ecc-privOnlyCert.pem
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIBJDCByaADAgECAgEAMAwGCCqGSM49BAMCBQAwGjELMAkGA1UEChMCV1IxCzAJBgNVBAYTAkRF
|
||||||
|
MB4XDTE3MDIwNjE0NTY0MVoXDTE4MDIwNjE0NTY0MVowGjELMAkGA1UEChMCV1IxCzAJBgNVBAYT
|
||||||
|
AkRFMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEJcD9Frgr8rgKHt2szmJSfFgKYH1Xddq9EcHV
|
||||||
|
KupUa3bmPTb33VGXa6gm/numvZZVhVCdmn5pAdhDRYnZ/korJjAMBggqhkjOPQQDAgUAA0gAMEUC
|
||||||
|
IDnBQOHgHIudh7nFB0wG/WFMoUutVFN0uQPbVJSWwbQHAiEAmw25n+eEMgMK4Gi7qH1lzxm11WX0
|
||||||
|
jM1gxQSGZTaja8s=
|
||||||
|
-----END CERTIFICATE-----
|
4
certs/ecc-privOnlyKey.pem
Normal file
4
certs/ecc-privOnlyKey.pem
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MEECAQAwEwYHKoZIzj0CAQYIKoZIzj0DAQcEJzAlAgEBBCBmlE/nixmHCpmplUopbqNEo+jJE40p
|
||||||
|
wfkxzH01tAWqcQ==
|
||||||
|
-----END PRIVATE KEY-----
|
@ -34,7 +34,9 @@ EXTRA_DIST += \
|
|||||||
certs/server-revoked-key.pem \
|
certs/server-revoked-key.pem \
|
||||||
certs/wolfssl-website-ca.pem \
|
certs/wolfssl-website-ca.pem \
|
||||||
certs/test-servercert.p12 \
|
certs/test-servercert.p12 \
|
||||||
certs/dsaparams.pem
|
certs/dsaparams.pem \
|
||||||
|
certs/ecc-privOnlyKey.pem \
|
||||||
|
certs/ecc-privOnlyCert.pem
|
||||||
EXTRA_DIST += \
|
EXTRA_DIST += \
|
||||||
certs/ca-key.der \
|
certs/ca-key.der \
|
||||||
certs/ca-cert.der \
|
certs/ca-cert.der \
|
||||||
|
@ -2190,3 +2190,12 @@
|
|||||||
-A ./certs/server-ecc.pem
|
-A ./certs/server-ecc.pem
|
||||||
-t
|
-t
|
||||||
|
|
||||||
|
# server TLSv1.2 private-only key
|
||||||
|
-v 3
|
||||||
|
-c ./certs/ecc-privOnlyCert.pem
|
||||||
|
-k ./certs/ecc-privOnlyKey.pem
|
||||||
|
|
||||||
|
# client TLSv1.2 private-only key on server
|
||||||
|
-v 3
|
||||||
|
-d
|
||||||
|
|
||||||
|
@ -9956,29 +9956,24 @@ int wc_EccPrivateKeyDecode(const byte* input, word32* inOutIdx, ecc_key* key,
|
|||||||
XMEMCPY(priv, &input[*inOutIdx], privSz);
|
XMEMCPY(priv, &input[*inOutIdx], privSz);
|
||||||
*inOutIdx += length;
|
*inOutIdx += length;
|
||||||
|
|
||||||
if ((*inOutIdx + 1) > inSz) {
|
if (ret == 0 && (*inOutIdx + 1) < inSz) {
|
||||||
#ifdef WOLFSSL_SMALL_STACK
|
/* prefix 0, may have */
|
||||||
XFREE(priv, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
b = input[*inOutIdx];
|
||||||
XFREE(pub, NULL, DYNAMIC_TYPE_TMP_BUFFER);
|
if (b == ECC_PREFIX_0) {
|
||||||
#endif
|
*inOutIdx += 1;
|
||||||
return BUFFER_E;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* prefix 0, may have */
|
if (GetLength(input, inOutIdx, &length, inSz) <= 0)
|
||||||
b = input[*inOutIdx];
|
ret = ASN_PARSE_E;
|
||||||
if (b == ECC_PREFIX_0) {
|
else {
|
||||||
*inOutIdx += 1;
|
ret = GetObjectId(input, inOutIdx, &oidSum, oidIgnoreType,
|
||||||
|
inSz);
|
||||||
if (GetLength(input, inOutIdx, &length, inSz) <= 0)
|
if (ret == 0) {
|
||||||
ret = ASN_PARSE_E;
|
if ((ret = CheckCurve(oidSum)) < 0)
|
||||||
else {
|
ret = ECC_CURVE_OID_E;
|
||||||
ret = GetObjectId(input, inOutIdx, &oidSum, oidIgnoreType, inSz);
|
else {
|
||||||
if (ret == 0) {
|
curve_id = ret;
|
||||||
if ((ret = CheckCurve(oidSum)) < 0)
|
ret = 0;
|
||||||
ret = ECC_CURVE_OID_E;
|
}
|
||||||
else {
|
|
||||||
curve_id = ret;
|
|
||||||
ret = 0;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user