mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-30 10:47:28 +02:00
src/tls13.c: remove unreachable break in DoTls13CertificateVerify().
tests/api.c: fix various use-after-frees of file in do_dual_alg_root_certgen() and do_dual_alg_server_certgen().
This commit is contained in:
committed by
Anthony Hu
parent
e4b7857e43
commit
2f3495f286
@ -9942,7 +9942,6 @@ static int DoTls13CertificateVerify(WOLFSSL* ssl, byte* input,
|
|||||||
break;
|
break;
|
||||||
default:
|
default:
|
||||||
ERROR_OUT(PEER_KEY_ERROR, exit_dcv);
|
ERROR_OUT(PEER_KEY_ERROR, exit_dcv);
|
||||||
break;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (ret != 0)
|
if (ret != 0)
|
||||||
|
35
tests/api.c
35
tests/api.c
@ -878,7 +878,10 @@ static int do_dual_alg_root_certgen(byte **out, char *caKeyFile,
|
|||||||
XMEMSET(caKeyBuf, 0, caKeySz);
|
XMEMSET(caKeyBuf, 0, caKeySz);
|
||||||
ExpectNotNull(file = fopen(caKeyFile, "rb"));
|
ExpectNotNull(file = fopen(caKeyFile, "rb"));
|
||||||
ExpectIntGT(caKeySz = (word32)fread(caKeyBuf, 1, caKeySz, file), 0);
|
ExpectIntGT(caKeySz = (word32)fread(caKeyBuf, 1, caKeySz, file), 0);
|
||||||
fclose(file);
|
if (file) {
|
||||||
|
fclose(file);
|
||||||
|
file = NULL;
|
||||||
|
}
|
||||||
ExpectIntEQ(wc_InitRsaKey_ex(&caKey, NULL, INVALID_DEVID), 0);
|
ExpectIntEQ(wc_InitRsaKey_ex(&caKey, NULL, INVALID_DEVID), 0);
|
||||||
idx = 0;
|
idx = 0;
|
||||||
ExpectIntEQ(wc_RsaPrivateKeyDecode(caKeyBuf, &idx, &caKey, caKeySz),
|
ExpectIntEQ(wc_RsaPrivateKeyDecode(caKeyBuf, &idx, &caKey, caKeySz),
|
||||||
@ -886,11 +889,17 @@ static int do_dual_alg_root_certgen(byte **out, char *caKeyFile,
|
|||||||
XMEMSET(sapkiBuf, 0, sapkiSz);
|
XMEMSET(sapkiBuf, 0, sapkiSz);
|
||||||
ExpectNotNull(file = fopen(sapkiFile, "rb"));
|
ExpectNotNull(file = fopen(sapkiFile, "rb"));
|
||||||
ExpectIntGT(sapkiSz = (word32)fread(sapkiBuf, 1, sapkiSz, file), 0);
|
ExpectIntGT(sapkiSz = (word32)fread(sapkiBuf, 1, sapkiSz, file), 0);
|
||||||
fclose(file);
|
if (file) {
|
||||||
|
fclose(file);
|
||||||
|
file = NULL;
|
||||||
|
}
|
||||||
XMEMSET(altPrivBuf, 0, altPrivSz);
|
XMEMSET(altPrivBuf, 0, altPrivSz);
|
||||||
ExpectNotNull(file = fopen(altPrivFile, "rb"));
|
ExpectNotNull(file = fopen(altPrivFile, "rb"));
|
||||||
ExpectIntGT(altPrivSz = (word32)fread(altPrivBuf, 1, altPrivSz, file), 0);
|
ExpectIntGT(altPrivSz = (word32)fread(altPrivBuf, 1, altPrivSz, file), 0);
|
||||||
fclose(file);
|
if (file) {
|
||||||
|
fclose(file);
|
||||||
|
file = NULL;
|
||||||
|
}
|
||||||
wc_ecc_init(&altCaKey);
|
wc_ecc_init(&altCaKey);
|
||||||
idx = 0;
|
idx = 0;
|
||||||
ExpectIntEQ(wc_EccPrivateKeyDecode(altPrivBuf, &idx, &altCaKey,
|
ExpectIntEQ(wc_EccPrivateKeyDecode(altPrivBuf, &idx, &altCaKey,
|
||||||
@ -981,7 +990,10 @@ static int do_dual_alg_server_certgen(byte **out, char *caKeyFile,
|
|||||||
ExpectNotNull(file = fopen(serverKeyFile, "rb"));
|
ExpectNotNull(file = fopen(serverKeyFile, "rb"));
|
||||||
ExpectIntGT(serverKeySz = (word32)fread(serverKeyBuf, 1, serverKeySz, file),
|
ExpectIntGT(serverKeySz = (word32)fread(serverKeyBuf, 1, serverKeySz, file),
|
||||||
0);
|
0);
|
||||||
fclose(file);
|
if (file) {
|
||||||
|
fclose(file);
|
||||||
|
file = NULL;
|
||||||
|
}
|
||||||
ExpectIntEQ(wc_InitRsaKey_ex(&serverKey, NULL, INVALID_DEVID), 0);
|
ExpectIntEQ(wc_InitRsaKey_ex(&serverKey, NULL, INVALID_DEVID), 0);
|
||||||
idx = 0;
|
idx = 0;
|
||||||
ExpectIntEQ(wc_RsaPrivateKeyDecode(serverKeyBuf, &idx, &serverKey,
|
ExpectIntEQ(wc_RsaPrivateKeyDecode(serverKeyBuf, &idx, &serverKey,
|
||||||
@ -989,7 +1001,10 @@ static int do_dual_alg_server_certgen(byte **out, char *caKeyFile,
|
|||||||
XMEMSET(caKeyBuf, 0, caKeySz);
|
XMEMSET(caKeyBuf, 0, caKeySz);
|
||||||
ExpectNotNull(file = fopen(caKeyFile, "rb"));
|
ExpectNotNull(file = fopen(caKeyFile, "rb"));
|
||||||
ExpectIntGT(caKeySz = (word32)fread(caKeyBuf, 1, caKeySz, file), 0);
|
ExpectIntGT(caKeySz = (word32)fread(caKeyBuf, 1, caKeySz, file), 0);
|
||||||
fclose(file);
|
if (file) {
|
||||||
|
fclose(file);
|
||||||
|
file = NULL;
|
||||||
|
}
|
||||||
ExpectIntEQ(wc_InitRsaKey_ex(&caKey, NULL, INVALID_DEVID), 0);
|
ExpectIntEQ(wc_InitRsaKey_ex(&caKey, NULL, INVALID_DEVID), 0);
|
||||||
idx = 0;
|
idx = 0;
|
||||||
ExpectIntEQ(wc_RsaPrivateKeyDecode(caKeyBuf, &idx, &caKey,
|
ExpectIntEQ(wc_RsaPrivateKeyDecode(caKeyBuf, &idx, &caKey,
|
||||||
@ -997,11 +1012,17 @@ static int do_dual_alg_server_certgen(byte **out, char *caKeyFile,
|
|||||||
XMEMSET(sapkiBuf, 0, sapkiSz);
|
XMEMSET(sapkiBuf, 0, sapkiSz);
|
||||||
ExpectNotNull(file = fopen(sapkiFile, "rb"));
|
ExpectNotNull(file = fopen(sapkiFile, "rb"));
|
||||||
ExpectIntGT(sapkiSz = (word32)fread(sapkiBuf, 1, sapkiSz, file), 0);
|
ExpectIntGT(sapkiSz = (word32)fread(sapkiBuf, 1, sapkiSz, file), 0);
|
||||||
fclose(file);
|
if (file) {
|
||||||
|
fclose(file);
|
||||||
|
file = NULL;
|
||||||
|
}
|
||||||
XMEMSET(altPrivBuf, 0, altPrivSz);
|
XMEMSET(altPrivBuf, 0, altPrivSz);
|
||||||
ExpectNotNull(file = fopen(altPrivFile, "rb"));
|
ExpectNotNull(file = fopen(altPrivFile, "rb"));
|
||||||
ExpectIntGT(altPrivSz = (word32)fread(altPrivBuf, 1, altPrivSz, file), 0);
|
ExpectIntGT(altPrivSz = (word32)fread(altPrivBuf, 1, altPrivSz, file), 0);
|
||||||
fclose(file);
|
if (file) {
|
||||||
|
fclose(file);
|
||||||
|
file = NULL;
|
||||||
|
}
|
||||||
wc_ecc_init(&altCaKey);
|
wc_ecc_init(&altCaKey);
|
||||||
idx = 0;
|
idx = 0;
|
||||||
ExpectIntEQ(wc_EccPrivateKeyDecode(altPrivBuf, &idx, &altCaKey,
|
ExpectIntEQ(wc_EccPrivateKeyDecode(altPrivBuf, &idx, &altCaKey,
|
||||||
|
Reference in New Issue
Block a user