mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-05 13:44:41 +02:00
commit-test and jenkins fixes
This commit is contained in:
44
src/tls13.c
44
src/tls13.c
@@ -542,50 +542,6 @@ static int DeriveEarlyTrafficSecret(WOLFSSL* ssl, byte* key)
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifdef HAVE_KEYING_MATERIAL
|
|
||||||
/* The length of the early exporter label. */
|
|
||||||
#define EARLY_EXPORTER_LABEL_SZ 12
|
|
||||||
/* The early exporter label. */
|
|
||||||
static const byte earlyExporterLabel[EARLY_EXPORTER_LABEL_SZ + 1] =
|
|
||||||
"e exp master";
|
|
||||||
|
|
||||||
/* Derive the early exporter key.
|
|
||||||
*
|
|
||||||
* ssl The SSL/TLS object.
|
|
||||||
* key The derived key.
|
|
||||||
* returns 0 on success, otherwise failure.
|
|
||||||
*/
|
|
||||||
static int DeriveEarlyExporterSecret(WOLFSSL* ssl, byte* key)
|
|
||||||
{
|
|
||||||
int ret;
|
|
||||||
WOLFSSL_MSG("Derive Early Exporter Secret");
|
|
||||||
if (ssl == NULL || ssl->arrays == NULL) {
|
|
||||||
return BAD_FUNC_ARG;
|
|
||||||
}
|
|
||||||
ret = DeriveKey(ssl, key, -1, ssl->arrays->secret,
|
|
||||||
earlyExporterLabel, EARLY_EXPORTER_LABEL_SZ,
|
|
||||||
ssl->specs.mac_algorithm, 1);
|
|
||||||
#ifdef HAVE_SECRET_CALLBACK
|
|
||||||
if (ret == 0 && ssl->tls13SecretCb != NULL) {
|
|
||||||
ret = ssl->tls13SecretCb(ssl, EARLY_EXPORTER_SECRET, key,
|
|
||||||
ssl->specs.hash_size, ssl->tls13SecretCtx);
|
|
||||||
if (ret != 0) {
|
|
||||||
return TLS13_SECRET_CB_E;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
#ifdef OPENSSL_EXTRA
|
|
||||||
if (ret == 0 && ssl->tls13KeyLogCb != NULL) {
|
|
||||||
ret = ssl->tls13KeyLogCb(ssl, EARLY_EXPORTER_SECRET, key,
|
|
||||||
ssl->specs.hash_size, NULL);
|
|
||||||
if (ret != 0) {
|
|
||||||
return TLS13_SECRET_CB_E;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
#endif /* OPENSSL_EXTRA */
|
|
||||||
#endif /* HAVE_SECRET_CALLBACK */
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
/* The length of the client handshake label. */
|
/* The length of the client handshake label. */
|
||||||
|
14
tests/api.c
14
tests/api.c
@@ -310,7 +310,6 @@
|
|||||||
#include <wolfssl/openssl/pem.h>
|
#include <wolfssl/openssl/pem.h>
|
||||||
#include <wolfssl/openssl/ec.h>
|
#include <wolfssl/openssl/ec.h>
|
||||||
#include <wolfssl/openssl/engine.h>
|
#include <wolfssl/openssl/engine.h>
|
||||||
#include <wolfssl/openssl/crypto.h>
|
|
||||||
#include <wolfssl/openssl/hmac.h>
|
#include <wolfssl/openssl/hmac.h>
|
||||||
#include <wolfssl/openssl/objects.h>
|
#include <wolfssl/openssl/objects.h>
|
||||||
#include <wolfssl/openssl/rand.h>
|
#include <wolfssl/openssl/rand.h>
|
||||||
@@ -6572,7 +6571,7 @@ static void test_wolfSSL_UseTrustedCA(void)
|
|||||||
#ifndef NO_WOLFSSL_SERVER
|
#ifndef NO_WOLFSSL_SERVER
|
||||||
AssertNotNull((ctx = wolfSSL_CTX_new(wolfSSLv23_server_method())));
|
AssertNotNull((ctx = wolfSSL_CTX_new(wolfSSLv23_server_method())));
|
||||||
AssertTrue(wolfSSL_CTX_use_certificate_file(ctx, svrCertFile, SSL_FILETYPE_PEM));
|
AssertTrue(wolfSSL_CTX_use_certificate_file(ctx, svrCertFile, SSL_FILETYPE_PEM));
|
||||||
AssertTrue(SSL_CTX_use_PrivateKey_file(ctx, svrKeyFile, SSL_FILETYPE_PEM));
|
AssertTrue(wolfSSL_CTX_use_PrivateKey_file(ctx, svrKeyFile, SSL_FILETYPE_PEM));
|
||||||
#else
|
#else
|
||||||
AssertNotNull((ctx = wolfSSL_CTX_new(wolfSSLv23_client_method())));
|
AssertNotNull((ctx = wolfSSL_CTX_new(wolfSSLv23_client_method())));
|
||||||
#endif
|
#endif
|
||||||
@@ -6616,7 +6615,7 @@ static void test_wolfSSL_UseMaxFragment(void)
|
|||||||
#ifndef NO_WOLFSSL_SERVER
|
#ifndef NO_WOLFSSL_SERVER
|
||||||
WOLFSSL_CTX* ctx = wolfSSL_CTX_new(wolfSSLv23_server_method());
|
WOLFSSL_CTX* ctx = wolfSSL_CTX_new(wolfSSLv23_server_method());
|
||||||
AssertTrue(wolfSSL_CTX_use_certificate_file(ctx, svrCertFile, WOLFSSL_FILETYPE_PEM));
|
AssertTrue(wolfSSL_CTX_use_certificate_file(ctx, svrCertFile, WOLFSSL_FILETYPE_PEM));
|
||||||
AssertTrue(SSL_CTX_use_PrivateKey_file(ctx, svrKeyFile, WOLFSSL_FILETYPE_PEM));
|
AssertTrue(wolfSSL_CTX_use_PrivateKey_file(ctx, svrKeyFile, WOLFSSL_FILETYPE_PEM));
|
||||||
#else
|
#else
|
||||||
WOLFSSL_CTX* ctx = wolfSSL_CTX_new(wolfSSLv23_client_method());
|
WOLFSSL_CTX* ctx = wolfSSL_CTX_new(wolfSSLv23_client_method());
|
||||||
#endif
|
#endif
|
||||||
@@ -6689,7 +6688,7 @@ static void test_wolfSSL_UseTruncatedHMAC(void)
|
|||||||
#ifndef NO_WOLFSSL_SERVER
|
#ifndef NO_WOLFSSL_SERVER
|
||||||
WOLFSSL_CTX* ctx = wolfSSL_CTX_new(wolfSSLv23_server_method());
|
WOLFSSL_CTX* ctx = wolfSSL_CTX_new(wolfSSLv23_server_method());
|
||||||
AssertTrue(wolfSSL_CTX_use_certificate_file(ctx, svrCertFile, WOLFSSL_FILETYPE_PEM));
|
AssertTrue(wolfSSL_CTX_use_certificate_file(ctx, svrCertFile, WOLFSSL_FILETYPE_PEM));
|
||||||
AssertTrue(SSL_CTX_use_PrivateKey_file(ctx, svrKeyFile, WOLFSSL_FILETYPE_PEM));
|
AssertTrue(wolfSSL_CTX_use_PrivateKey_file(ctx, svrKeyFile, WOLFSSL_FILETYPE_PEM));
|
||||||
#else
|
#else
|
||||||
WOLFSSL_CTX* ctx = wolfSSL_CTX_new(wolfSSLv23_client_method());
|
WOLFSSL_CTX* ctx = wolfSSL_CTX_new(wolfSSLv23_client_method());
|
||||||
#endif
|
#endif
|
||||||
@@ -48762,9 +48761,9 @@ static void test_export_keying_material(void)
|
|||||||
static int test_wolfSSL_THREADID_hash(void)
|
static int test_wolfSSL_THREADID_hash(void)
|
||||||
{
|
{
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
CRYPTO_THREADID id;
|
|
||||||
unsigned long res;
|
unsigned long res;
|
||||||
#if defined(OPENSSL_EXTRA)
|
#if defined(OPENSSL_EXTRA)
|
||||||
|
CRYPTO_THREADID id;
|
||||||
printf(testingFmt, "wolfSSL_THREADID_hash");
|
printf(testingFmt, "wolfSSL_THREADID_hash");
|
||||||
CRYPTO_THREADID_current(NULL);
|
CRYPTO_THREADID_current(NULL);
|
||||||
AssertTrue(1);
|
AssertTrue(1);
|
||||||
@@ -48775,7 +48774,6 @@ static int test_wolfSSL_THREADID_hash(void)
|
|||||||
AssertTrue( res == 0UL);
|
AssertTrue( res == 0UL);
|
||||||
printf(resultFmt, passed);
|
printf(resultFmt, passed);
|
||||||
#endif /* OPENSSL_EXTRA */
|
#endif /* OPENSSL_EXTRA */
|
||||||
(void)id;
|
|
||||||
(void)res;
|
(void)res;
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
@@ -49650,10 +49648,6 @@ static void test_wolfSSL_ERR_strings(void)
|
|||||||
err = wolfSSL_ERR_func_error_string(UNSUPPORTED_SUITE);
|
err = wolfSSL_ERR_func_error_string(UNSUPPORTED_SUITE);
|
||||||
AssertTrue(err != NULL);
|
AssertTrue(err != NULL);
|
||||||
AssertIntEQ((*err == '\0'), 1);
|
AssertIntEQ((*err == '\0'), 1);
|
||||||
|
|
||||||
err = wolfSSL_ERR_lib_error_string(PEM_R_PROBLEMS_GETTING_PASSWORD);
|
|
||||||
AssertTrue(err != NULL);
|
|
||||||
AssertIntEQ((*err == ('\0')), 1);
|
|
||||||
#endif
|
#endif
|
||||||
printf(resultFmt, passed);
|
printf(resultFmt, passed);
|
||||||
#endif
|
#endif
|
||||||
|
@@ -37,6 +37,9 @@
|
|||||||
#include <wolfssl/wolfcrypt/types.h>
|
#include <wolfssl/wolfcrypt/types.h>
|
||||||
#include <wolfssl/wolfcrypt/memory.h>
|
#include <wolfssl/wolfcrypt/memory.h>
|
||||||
|
|
||||||
|
/* For the types */
|
||||||
|
#include <wolfssl/openssl/compat_types.h>
|
||||||
|
|
||||||
#ifdef HAVE_WOLF_EVENT
|
#ifdef HAVE_WOLF_EVENT
|
||||||
#include <wolfssl/wolfcrypt/wolfevent.h>
|
#include <wolfssl/wolfcrypt/wolfevent.h>
|
||||||
#endif
|
#endif
|
||||||
@@ -87,7 +90,6 @@
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
#elif (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL))
|
#elif (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL))
|
||||||
#include <wolfssl/openssl/compat_types.h>
|
|
||||||
#include <wolfssl/openssl/bn.h>
|
#include <wolfssl/openssl/bn.h>
|
||||||
#include <wolfssl/openssl/hmac.h>
|
#include <wolfssl/openssl/hmac.h>
|
||||||
#include <wolfssl/openssl/rsa.h>
|
#include <wolfssl/openssl/rsa.h>
|
||||||
|
Reference in New Issue
Block a user