Skip to content

Commit

Permalink
initialize values for -Og test
Browse files Browse the repository at this point in the history
  • Loading branch information
JacobBarthelmeh committed Sep 25, 2024
1 parent efd4127 commit bea285c
Showing 1 changed file with 20 additions and 19 deletions.
39 changes: 20 additions & 19 deletions tests/api.c
Original file line number Diff line number Diff line change
Expand Up @@ -1577,11 +1577,12 @@ static int test_wolfSSL_CTX_new(void)
{
EXPECT_DECLS;
WOLFSSL_CTX *ctx;
WOLFSSL_METHOD* method;
WOLFSSL_METHOD* method = NULL;

ExpectNull(ctx = wolfSSL_CTX_new(NULL));
ExpectNotNull(method = wolfSSLv23_server_method());
ExpectNotNull(ctx = wolfSSL_CTX_new(method));
if (method != NULL)
ExpectNotNull(ctx = wolfSSL_CTX_new(method));

wolfSSL_CTX_free(ctx);

Expand Down Expand Up @@ -21281,7 +21282,7 @@ static int test_wc_RsaKeyToPublicDer(void)
int bits = 2048;
word32 derLen = 294;
#endif
int ret;
int ret = 0;

XMEMSET(&rng, 0, sizeof(rng));
XMEMSET(&key, 0, sizeof(key));
Expand Down Expand Up @@ -24489,7 +24490,7 @@ static int test_wc_curve25519_make_key(void)
#if defined(HAVE_CURVE25519)
curve25519_key key;
WC_RNG rng;
int keysize;
int keysize = 0;

XMEMSET(&rng, 0, sizeof(WC_RNG));

Expand Down Expand Up @@ -25193,7 +25194,7 @@ static int test_wc_curve448_make_key(void)
#if defined(HAVE_CURVE448)
curve448_key key;
WC_RNG rng;
int keysize;
int keysize = 0;

XMEMSET(&rng, 0, sizeof(WC_RNG));

Expand Down Expand Up @@ -25623,7 +25624,7 @@ static int test_wc_ecc_params(void)
/* FIPS/CAVP self-test modules do not have `wc_ecc_get_curve_params`.
It was added after certifications */
#if defined(HAVE_ECC) && !defined(HAVE_FIPS) && !defined(HAVE_SELFTEST)
const ecc_set_type* ecc_set;
const ecc_set_type* ecc_set = NULL;
#if !defined(NO_ECC256) && !defined(NO_ECC_SECP)
/* Test for SECP256R1 curve */
int curve_id = ECC_SECP256R1;
Expand Down Expand Up @@ -53232,7 +53233,7 @@ static int test_wolfSSL_ASN1_TIME(void)
EXPECT_DECLS;
#if defined(OPENSSL_EXTRA) && !defined(NO_ASN_TIME)
WOLFSSL_ASN1_TIME* asn_time = NULL;
unsigned char *data;
unsigned char *data = NULL;

ExpectNotNull(asn_time = ASN1_TIME_new());

Expand Down Expand Up @@ -54136,7 +54137,7 @@ static int test_wolfSSL_IMPLEMENT_ASN1_FUNCTIONS(void)
ExpectIntEQ(ASN1_INTEGER_set(nested_asn1->asn1_obj->expNum, 22222), 1);
/* nested_asn1->asn1_obj->strList */
for (i = 10; i >= 0; i--) {
ASN1_GENERALSTRING* genStr;
ASN1_GENERALSTRING* genStr = NULL;
char fmtStr[20];

ExpectIntGT(snprintf(fmtStr, sizeof(fmtStr), "Bonjour #%d", i), 0);
Expand Down Expand Up @@ -54177,7 +54178,7 @@ static int test_wolfSSL_IMPLEMENT_ASN1_FUNCTIONS(void)

ExpectNotNull(asn1_item = TEST_ASN1_ITEM_new());
for (i = 0; i < 11; i++) {
ASN1_INTEGER* asn1_num;
ASN1_INTEGER* asn1_num = NULL;

ExpectNotNull(asn1_num = ASN1_INTEGER_new());
ExpectIntEQ(ASN1_INTEGER_set(asn1_num, i), 1);
Expand Down Expand Up @@ -62069,7 +62070,7 @@ static int test_wolfSSL_PEM_read_bio(void)
!defined(NO_FILESYSTEM) && !defined(NO_RSA)
byte buff[6000];
XFILE f = XBADFILE;
int bytes;
int bytes = 0;
X509* x509 = NULL;
BIO* bio = NULL;
BUF_MEM* buf = NULL;
Expand Down Expand Up @@ -64135,7 +64136,7 @@ static int test_wolfSSL_PKCS8_Compat(void)
PKCS8_PRIV_KEY_INFO* pt = NULL;
BIO* bio = NULL;
XFILE f = XBADFILE;
int bytes;
int bytes = 0;
char pkcs8_buffer[512];
#if defined(OPENSSL_ALL) || defined(WOLFSSL_WPAS_SMALL)
EVP_PKEY *pkey = NULL;
Expand Down Expand Up @@ -65156,7 +65157,7 @@ static int test_wolfSSL_SHA224(void)
"\x50\xb0\xc6\x45\x5c\xb4\xf5\x8b\x19\x52\x52\x25\x25";
size_t inLen;
byte hash[WC_SHA224_DIGEST_SIZE];
unsigned char* p;
unsigned char* p = NULL;

inLen = XSTRLEN((char*)input);

Expand Down Expand Up @@ -70176,7 +70177,7 @@ static int test_wolfSSL_GENERAL_NAME_print(void)
GENERAL_NAME* gn = NULL;
unsigned char buf[4096];
const unsigned char* bufPt = NULL;
int bytes;
int bytes = 0;
XFILE f = XBADFILE;
STACK_OF(GENERAL_NAME)* sk = NULL;
BIO* out = NULL;
Expand Down Expand Up @@ -70532,7 +70533,7 @@ static int test_wolfSSL_verify_depth(void)
#if defined(OPENSSL_EXTRA) && !defined(NO_RSA) && !defined(NO_WOLFSSL_CLIENT)
WOLFSSL* ssl = NULL;
WOLFSSL_CTX* ctx = NULL;
long depth;
long depth = 0;

ExpectNotNull(ctx = wolfSSL_CTX_new(wolfSSLv23_client_method()));
ExpectIntGT((depth = SSL_CTX_get_verify_depth(ctx)), 0);
Expand Down Expand Up @@ -74168,7 +74169,7 @@ static int test_wolfSSL_d2i_and_i2d_PublicKey_ecc(void)
BN_CTX* ctx;
EC_GROUP* curve = NULL;
EC_KEY* ephemeral_key = NULL;
const EC_POINT* h;
const EC_POINT* h = NULL;

/* Generate an x963 key pair and get public part into pub_buf */
ExpectNotNull(ctx = BN_CTX_new());
Expand Down Expand Up @@ -75216,7 +75217,7 @@ static int test_wc_SetIssuerRaw(void)
const char* joiCertFile = "./certs/test/cert-ext-joi.der";
WOLFSSL_X509* x509 = NULL;
int peerCertSz;
const byte* peerCertBuf;
const byte* peerCertBuf = NULL;
Cert forgedCert;

ExpectNotNull(x509 = wolfSSL_X509_load_certificate_file(joiCertFile,
Expand All @@ -75241,7 +75242,7 @@ static int test_wc_SetIssueBuffer(void)
const char* joiCertFile = "./certs/test/cert-ext-joi.der";
WOLFSSL_X509* x509 = NULL;
int peerCertSz;
const byte* peerCertBuf;
const byte* peerCertBuf = NULL;
Cert forgedCert;

ExpectNotNull(x509 = wolfSSL_X509_load_certificate_file(joiCertFile,
Expand Down Expand Up @@ -83258,7 +83259,7 @@ static int test_wolfSSL_DH_check(void)
byte buf[6000];
char file[] = "./certs/dsaparams.pem";
XFILE f = XBADFILE;
int bytes;
int bytes = 0;
BIO* bio = NULL;
DSA* dsa = NULL;
#elif !defined(HAVE_FIPS) || FIPS_VERSION_GT(2,0)
Expand Down Expand Up @@ -85479,7 +85480,7 @@ static int test_openssl_make_self_signed_certificate(EVP_PKEY* pkey,
BIGNUM* serial_number = NULL;
X509_NAME* name = NULL;
time_t epoch_off = 0;
ASN1_INTEGER* asn1_serial_number;
ASN1_INTEGER* asn1_serial_number = NULL;
long not_before, not_after;
int derSz;

Expand Down

0 comments on commit bea285c

Please sign in to comment.