Merge pull request #5175 from douzzer/20220524-shellcheck-warnings

20220524-shellcheck-warnings
This commit is contained in:
David Garske
2022-05-24 14:21:49 -07:00
committed by GitHub
10 changed files with 33 additions and 33 deletions

View File

@@ -189,11 +189,11 @@ create_cert() {
mv ./certs/intermediate/tmp.pem ./certs/intermediate/$4.pem
}
if [ "$1" == "clean" ]; then
if [ "$1" = "clean" ]; then
echo "Cleaning temp files"
cleanup_files
fi
if [ "$1" == "cleanall" ]; then
if [ "$1" = "cleanall" ]; then
echo "Cleaning all files"
rm -f ./certs/intermediate/*.pem
rm -f ./certs/intermediate/*.der

View File

@@ -37,7 +37,7 @@ if [ "$OUTPUT" = "SNI is: ON" ]; then
if [ $RESULT -eq 0 ]; then
# client test against the server
echo "./examples/client/client -X -C -h $server -p 443 -A "$ca" -g -o -N -v d -S $server"
echo "./examples/client/client -X -C -h $server -p 443 -A \"$ca\" -g -o -N -v d -S $server"
./examples/client/client -X -C -h $server -p 443 -A "$ca" -g -o -N -v d -S $server
GL_RESULT=$?
[ $GL_RESULT -ne 0 ] && printf '\n\n%s\n' "Client connection failed"
@@ -62,7 +62,7 @@ fi
if [ $RESULT -eq 0 ]; then
# client test against the server
echo "./examples/client/client -X -C -h $server -p 443 -A "$ca" -g -o -N"
echo "./examples/client/client -X -C -h $server -p 443 -A \"$ca\" -g -o -N"
./examples/client/client -X -C -h $server -p 443 -A "$ca" -g -o -N
GR_RESULT=$?
[ $GR_RESULT -ne 0 ] && printf '\n\n%s\n' "Client connection failed"

View File

@@ -321,11 +321,11 @@ do_wolfssl_client() {
if [ "$version" != "5" -a "$version" != "" ]
then
echo "#"
echo "# $WOLFSSL_CLIENT -p $port -g $wolfssl_resume -l $wolfSuite -v $version $psk $adh "$wolfssl_cert" "$wolfssl_key" "$wolfssl_caCert" $crl"
echo "# $WOLFSSL_CLIENT -p $port -g $wolfssl_resume -l $wolfSuite -v $version $psk $adh \"$wolfssl_cert\" \"$wolfssl_key\" \"$wolfssl_caCert\" $crl"
$WOLFSSL_CLIENT -p $port -g $wolfssl_resume -l $wolfSuite -v $version $psk $adh "$wolfssl_cert" "$wolfssl_key" "$wolfssl_caCert" $crl
else
echo "#"
echo "# $WOLFSSL_CLIENT -p $port -g $wolfssl_resume -l $wolfSuite $psk $adh "$wolfssl_cert" "$wolfssl_key" "$wolfssl_caCert" $crl"
echo "# $WOLFSSL_CLIENT -p $port -g $wolfssl_resume -l $wolfSuite $psk $adh \"$wolfssl_cert\" \"$wolfssl_key\" \"$wolfssl_caCert\" $crl"
# do all versions
$WOLFSSL_CLIENT -p $port -g $wolfssl_resume -l $wolfSuite $psk $adh "$wolfssl_cert" "$wolfssl_key" "$wolfssl_caCert" $crl
fi
@@ -451,10 +451,10 @@ esac
wolf_ciphers=`$WOLFSSL_CLIENT -e`
# get wolfssl supported versions
wolf_versions=`$WOLFSSL_CLIENT -V`
wolf_versions="$wolf_versions:5" #5 will test without -v flag
wolf_versions="${wolf_versions}:5" #5 will test without -v flag
OIFS=$IFS # store old separator to reset
IFS=$'\:' # set delimiter
OIFS="$IFS" # store old separator to reset
IFS=: # set delimiter
for version in $wolf_versions
do
case $version in
@@ -466,7 +466,7 @@ do
;;
esac
done
IFS=$OIFS #restore separator
IFS="$OIFS" #restore separator
#
# Start OpenSSL servers
@@ -552,8 +552,8 @@ case $openssl_nodhe in
esac
# Check suites to determine support in wolfSSL
OIFS=$IFS # store old separator to reset
IFS=$'\:' # set delimiter
OIFS="$IFS" # store old separator to reset
IFS=: # set delimiter
for wolfSuite in $wolf_ciphers; do
case $wolfSuite in
*ECDHE-RSA-*)
@@ -589,7 +589,7 @@ for wolfSuite in $wolf_ciphers; do
wolf_rsa=yes
esac
done
IFS=$OIFS #restore separator
IFS="$OIFS" #restore separator
openssl_ciphers=`$OPENSSL ciphers ALL 2>&1`
case $openssl_ciphers in
@@ -744,8 +744,8 @@ do
check_server_ready
done
OIFS=$IFS # store old separator to reset
IFS=$'\:' # set delimiter
OIFS="$IFS" # store old separator to reset
IFS=: # set delimiter
set -f # no globbing
wolf_temp_cases_total=0
@@ -1173,7 +1173,7 @@ do
open_temp_cases_tested=0
wolfdowngrade="$version"
done
IFS=$OIFS #restore separator
IFS="$OIFS" #restore separator
do_cleanup

View File

@@ -1,4 +1,4 @@
#!/bin/sh
#!/bin/bash
# Test WolfSSL/OpenSSL srtp interoperability
#
# TODO: add OpenSSL client with WolfSSL server
@@ -59,7 +59,7 @@ start_openssl_server() {
server_output_file=/tmp/openssl_srtp_out
# hackish but OpenSSL doesn't work if input is feeded before handshaking and
# hackish but OpenSSL doesn't work if input is fed before handshaking and
# the wolfSSL client needs a reply to stop
(sleep 1;echo -n "I hear you fa shizzle...") | \
${OPENSSL} s_server \

View File

@@ -74,7 +74,7 @@ do_test() {
esac
remove_ready_file
echo "./examples/server/server -r -R "$ready_file" -p $resume_port"
echo "./examples/server/server -r -R \"$ready_file\" -p $resume_port"
./examples/server/server -r -R "$ready_file" -p $resume_port &
server_pid=$!

View File

@@ -102,7 +102,7 @@ then
fi
# TLS v1.3 sniffer test X25519
if test $RESULT -eq 0 && test $has_tlsv13 == yes && test $has_x22519 == yes
if test $RESULT -eq 0 && test $has_tlsv13 == yes && test $has_x25519 == yes
then
./sslSniffer/sslSnifferTest/snifftest ./scripts/sniffer-tls13-x25519.pcap ./certs/statickeys/x25519.pem 127.0.0.1 11111

View File

@@ -38,7 +38,7 @@ server_out_file="$(pwd)/wolfssl_tls13_server_out$$"
# Client output
client_out_file="$(pwd)/wolfssl_tls13_client_out$$"
echo "ready file "$ready_file""
echo "ready file \"$ready_file\""
create_port() {
while [ ! -s "$ready_file" ]; do
@@ -262,7 +262,7 @@ if [ "$early_data" = "yes" ]; then
tee "$server_out_file") &
server_pid=$!
create_port
./examples/client/client -v 4 -r -0 -p $port 2>&1 >"$client_out_file"
./examples/client/client -v 4 -r -0 -p $port >"$client_out_file" 2>&1
RESULT=$?
cat "$client_out_file"
remove_ready_file

View File

@@ -1,6 +1,6 @@
#!/bin/sh
if [[ -n "$NETWORK_UNSHARE_HELPER" ]]; then
if [ -n "$NETWORK_UNSHARE_HELPER" ]; then
exec "${NETWORK_UNSHARE_HELPER}" "@builddir@/tests/unit.test" "$@" || exit $?
elif [ "${AM_BWRAPPED-}" != "yes" ]; then
bwrap_path="$(command -v bwrap)"

View File

@@ -9306,7 +9306,7 @@ int wolfSSL_ECDSA_do_verify(const unsigned char *d, int dlen,
r = wolfSSL_BN_bn2hex(sig->r);
s = wolfSSL_BN_bn2hex(sig->s);
/* get DER-encoded ECDSA signature */
ret = wc_ecc_rs_to_sig((const char*)r, (const char*)s,
ret = wc_ecc_rs_to_sig((const char*)r, (const char*)s,
signature, &signaturelen);
/* free r and s */
if (r)
@@ -9318,10 +9318,10 @@ int wolfSSL_ECDSA_do_verify(const unsigned char *d, int dlen,
WOLFSSL_MSG("wc_ecc_verify_hash failed");
return WOLFSSL_FATAL_ERROR;
}
/* verify hash. expects to call wc_CryptoCb_EccVerify internally */
/* verify hash. expects to call wc_CryptoCb_EccVerify internally */
ret = wc_ecc_verify_hash(signature, signaturelen, d, dlen, &check_sign,
(ecc_key*)key->internal);
if (ret != MP_OKAY) {
WOLFSSL_MSG("wc_ecc_verify_hash failed");
return WOLFSSL_FATAL_ERROR;

View File

@@ -39428,7 +39428,7 @@ static int ecc_onlycb_test(myCryptoDevCtx *ctx)
byte* out = (byte*)XMALLOC(sizeof(byte),
HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
#ifdef OPENSSL_EXTRA
byte* check = (byte*)XMALLOC(sizeof(byte)*(256), HEAP_HINT,
byte* check = (byte*)XMALLOC(sizeof(byte)*(256), HEAP_HINT,
DYNAMIC_TYPE_TMP_BUFFER);
#endif
@@ -39581,10 +39581,10 @@ static int ecc_onlycb_test(myCryptoDevCtx *ctx)
}
else
ret = 0;
#ifdef OPENSSL_EXTRA
(void)pkey;
cp = ecc_clikey_der_256;
privKey = d2i_PrivateKey(EVP_PKEY_EC, NULL, &cp,
@@ -39594,7 +39594,7 @@ static int ecc_onlycb_test(myCryptoDevCtx *ctx)
}
pkey = (ecc_key*)privKey->ecc->internal;
pkey->devId = devId;
p = ecc_clikeypub_der_256;
pubKey = d2i_PUBKEY(NULL, &p, sizeof_ecc_clikeypub_der_256);
if (pubKey == NULL) {
@@ -39605,7 +39605,7 @@ static int ecc_onlycb_test(myCryptoDevCtx *ctx)
/* sign */
EVP_MD_CTX_init(&mdCtx);
ret = EVP_DigestSignInit(&mdCtx, NULL, EVP_sha256(), NULL, privKey);
if (ret != WOLFSSL_SUCCESS) {
ERROR_OUT(-8021, exit_onlycb);
@@ -39647,7 +39647,7 @@ static int ecc_onlycb_test(myCryptoDevCtx *ctx)
}
/* verify */
EVP_MD_CTX_init(&mdCtx);
if (ret == SSL_SUCCESS) {