Skip to content

Commit 9404372

Browse files
Merge pull request #6833 from douzzer/20231003-options-h-flag-order-etc
20231003-options-h-flag-order-etc
2 parents 88d2503 + 45b613e commit 9404372

2 files changed

Lines changed: 41 additions & 27 deletions

File tree

configure.ac

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9197,7 +9197,7 @@ else
91979197
AC_MSG_ERROR([Could not find colrm or cut to make options file])
91989198
fi
91999199

9200-
for option in $CPPFLAGS $AM_CPPFLAGS $CFLAGS $AM_CFLAGS; do
9200+
for option in $AM_CPPFLAGS $CPPFLAGS $AM_CFLAGS $CFLAGS; do
92019201
opt_type=$(echo $option | $TRIM )
92029202
case "$opt_type" in
92039203
-D)

wolfcrypt/test/test.c

Lines changed: 40 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -24280,23 +24280,29 @@ static wc_test_ret_t hpke_test_single(Hpke* hpke)
2428024280
rngRet = ret = wc_InitRng(rng);
2428124281

2428224282
if (ret != 0)
24283-
return ret;
24283+
return WC_TEST_RET_ENC_EC(ret);
2428424284

2428524285
#ifdef WOLFSSL_SMALL_STACK
2428624286
if (ret == 0) {
2428724287
pubKey = (byte *)XMALLOC(pubKeySz, HEAP_HINT,
2428824288
DYNAMIC_TYPE_TMP_BUFFER);
2428924289
if (pubKey == NULL)
24290-
ret = MEMORY_E;
24290+
ret = WC_TEST_RET_ENC_EC(MEMORY_E);
2429124291
}
2429224292
#endif
2429324293

2429424294
/* generate the keys */
24295-
if (ret == 0)
24295+
if (ret == 0) {
2429624296
ret = wc_HpkeGenerateKeyPair(hpke, &ephemeralKey, rng);
24297+
if (ret != 0)
24298+
ret = WC_TEST_RET_ENC_EC(ret);
24299+
}
2429724300

24298-
if (ret == 0)
24301+
if (ret == 0) {
2429924302
ret = wc_HpkeGenerateKeyPair(hpke, &receiverKey, rng);
24303+
if (ret != 0)
24304+
ret = WC_TEST_RET_ENC_EC(ret);
24305+
}
2430024306

2430124307
/* seal */
2430224308
if (ret == 0) {
@@ -24305,11 +24311,16 @@ static wc_test_ret_t hpke_test_single(Hpke* hpke)
2430524311
(byte*)aad_text, (word32)XSTRLEN(aad_text),
2430624312
(byte*)start_text, (word32)XSTRLEN(start_text),
2430724313
ciphertext);
24314+
if (ret != 0)
24315+
ret = WC_TEST_RET_ENC_EC(ret);
2430824316
}
2430924317

2431024318
/* export ephemeral key */
24311-
if (ret == 0)
24319+
if (ret == 0) {
2431224320
ret = wc_HpkeSerializePublicKey(hpke, ephemeralKey, pubKey, &pubKeySz);
24321+
if (ret != 0)
24322+
ret = WC_TEST_RET_ENC_EC(ret);
24323+
}
2431324324

2431424325
/* open with exported ephemeral key */
2431524326
if (ret == 0) {
@@ -24318,10 +24329,15 @@ static wc_test_ret_t hpke_test_single(Hpke* hpke)
2431824329
(byte*)aad_text, (word32)XSTRLEN(aad_text),
2431924330
ciphertext, (word32)XSTRLEN(start_text),
2432024331
plaintext);
24332+
if (ret != 0)
24333+
ret = WC_TEST_RET_ENC_EC(ret);
2432124334
}
2432224335

24323-
if (ret == 0)
24336+
if (ret == 0) {
2432424337
ret = XMEMCMP(plaintext, start_text, XSTRLEN(start_text));
24338+
if (ret != 0)
24339+
ret = WC_TEST_RET_ENC_NC;
24340+
}
2432524341

2432624342
if (ephemeralKey != NULL)
2432724343
wc_HpkeFreeKey(hpke, hpke->kem, ephemeralKey, hpke->heap);
@@ -24352,7 +24368,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t hpke_test(void)
2435224368
HPKE_AES_128_GCM, NULL);
2435324369

2435424370
if (ret != 0)
24355-
return ret;
24371+
return WC_TEST_RET_ENC_EC(ret);
2435624372

2435724373
ret = hpke_test_single(hpke);
2435824374

@@ -24367,7 +24383,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t hpke_test(void)
2436724383
HPKE_AES_128_GCM, NULL);
2436824384

2436924385
if (ret != 0)
24370-
return ret;
24386+
return WC_TEST_RET_ENC_EC(ret);
2437124387

2437224388
ret = hpke_test_single(hpke);
2437324389

@@ -24382,7 +24398,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t hpke_test(void)
2438224398
HPKE_AES_128_GCM, NULL);
2438324399

2438424400
if (ret != 0)
24385-
return ret;
24401+
return WC_TEST_RET_ENC_EC(ret);
2438624402

2438724403
ret = hpke_test_single(hpke);
2438824404

@@ -24397,7 +24413,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t hpke_test(void)
2439724413
HPKE_AES_256_GCM, NULL);
2439824414

2439924415
if (ret != 0)
24400-
return ret;
24416+
return WC_TEST_RET_ENC_EC(ret);
2440124417

2440224418
ret = hpke_test_single(hpke);
2440324419

@@ -25106,7 +25122,7 @@ static wc_test_ret_t ecc521_test_deterministic_k(WC_RNG* rng)
2510625122
}
2510725123
ret = wc_ecc_init_ex(key, HEAP_HINT, devId);
2510825124
if (ret != 0) {
25109-
return ret;
25125+
return WC_TEST_RET_ENC_EC(ret);
2511025126
}
2511125127
key_inited = 1;
2511225128

@@ -25750,41 +25766,40 @@ static wc_test_ret_t ecc_test_key_gen(WC_RNG* rng, int keySize)
2575025766

2575125767
#if defined(WOLFSSL_SMALL_STACK) && !defined(WOLFSSL_NO_MALLOC)
2575225768
if ((der == NULL) || (userA == NULL))
25753-
ERROR_OUT(MEMORY_E, done);
25769+
ERROR_OUT(WC_TEST_RET_ENC_EC(MEMORY_E), done);
2575425770
#endif
2575525771

2575625772
ret = wc_ecc_init_ex(userA, HEAP_HINT, devId);
2575725773
if (ret != 0)
25758-
goto done;
25774+
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), done);
2575925775

2576025776
ret = wc_ecc_make_key(rng, keySize, userA);
2576125777
#if defined(WOLFSSL_ASYNC_CRYPT)
2576225778
ret = wc_AsyncWait(ret, &userA->asyncDev, WC_ASYNC_FLAG_NONE);
2576325779
#endif
2576425780
if (ret != 0)
25765-
goto done;
25781+
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), done);
2576625782
TEST_SLEEP();
2576725783

2576825784
ret = wc_ecc_check_key(userA);
2576925785
if (ret != 0)
25770-
goto done;
25786+
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), done);
2577125787
TEST_SLEEP();
2577225788

2577325789
derSz = wc_EccKeyToDer(userA, der, ECC_BUFSIZE);
2577425790
if (derSz < 0) {
25775-
ERROR_OUT(derSz, done);
25791+
ERROR_OUT(WC_TEST_RET_ENC_I(derSz), done);
2577625792
}
2577725793

2577825794
ret = SaveDerAndPem(der, derSz, eccCaKeyTempFile, eccCaKeyPemFile,
2577925795
ECC_PRIVATEKEY_TYPE);
25780-
if (ret != 0) {
25781-
goto done;
25782-
}
25796+
if (ret != 0)
25797+
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), done);
2578325798

2578425799
/* test export of public key */
2578525800
derSz = wc_EccPublicKeyToDer(userA, der, ECC_BUFSIZE, 1);
2578625801
if (derSz < 0) {
25787-
ERROR_OUT(derSz, done);
25802+
ERROR_OUT(WC_TEST_RET_ENC_I(derSz), done);
2578825803
}
2578925804
if (derSz == 0) {
2579025805
ERROR_OUT(WC_TEST_RET_ENC_NC, done);
@@ -25794,24 +25809,23 @@ static wc_test_ret_t ecc_test_key_gen(WC_RNG* rng, int keySize)
2579425809
/* test export of compressed public key */
2579525810
derSz = wc_EccPublicKeyToDer_ex(userA, der, ECC_BUFSIZE, 1, 1);
2579625811
if (derSz < 0) {
25797-
ERROR_OUT(derSz, done);
25812+
ERROR_OUT(WC_TEST_RET_ENC_I(derSz), done);
2579825813
}
2579925814
if (derSz == 0) {
2580025815
ERROR_OUT(WC_TEST_RET_ENC_NC, done);
2580125816
}
2580225817
#endif
2580325818

2580425819
ret = SaveDerAndPem(der, derSz, eccPubKeyDerFile, NULL, 0);
25805-
if (ret != 0) {
25806-
goto done;
25807-
}
25820+
if (ret != 0)
25821+
ERROR_OUT(WC_TEST_RET_ENC_EC(ret), done);
2580825822

2580925823
#ifdef HAVE_PKCS8
2581025824
/* test export of PKCS#8 unencrypted private key */
2581125825
pkcs8Sz = FOURK_BUF;
2581225826
derSz = wc_EccPrivateKeyToPKCS8(userA, der, &pkcs8Sz);
2581325827
if (derSz < 0) {
25814-
ERROR_OUT(derSz, done);
25828+
ERROR_OUT(WC_TEST_RET_ENC_I(derSz), done);
2581525829
}
2581625830

2581725831
if (derSz == 0) {
@@ -28723,7 +28737,7 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t ecc_test(void)
2872328737
#if (defined(HAVE_ECC521) || defined(HAVE_ALL_CURVES)) && ECC_MIN_KEY_SZ <= 521
2872428738
ret = ecc_test_curve(&rng, 66, ECC_CURVE_DEF);
2872528739
if (ret < 0) {
28726-
printf("keySize=68, Default\n");
28740+
printf("keySize=66, Default\n");
2872728741
goto done;
2872828742
}
2872928743
#endif /* HAVE_ECC521 */

0 commit comments

Comments
 (0)