Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Moved CertManager APIs into own file #6583

Merged
merged 3 commits into from
Jul 10, 2023

Conversation

SparkiDev
Copy link
Contributor

@SparkiDev SparkiDev commented Jul 6, 2023

Description

Split out certificate manager APIs into ssl_certman.c. ssl.c includes ssl_certman.c
Better test coverage.
Minor fixes.
wolfSSL_X509_chain_up_ref calls XFREE with name->heap but name may be NULL. Check for NULL first.

Testing

Tested different configurations affecting Certificate Manager code.

Checklist

  • added tests
  • updated/added doxygen
  • updated appropriate READMEs
  • Updated manual and documentation

@SparkiDev SparkiDev self-assigned this Jul 6, 2023
@SparkiDev SparkiDev force-pushed the certman_split branch 4 times, most recently from 758718c to a5f461b Compare July 7, 2023 04:21
@SparkiDev SparkiDev assigned dgarske and unassigned SparkiDev Jul 7, 2023
dgarske
dgarske previously approved these changes Jul 7, 2023
@dgarske dgarske assigned JacobBarthelmeh and unassigned dgarske Jul 7, 2023
byte *response, int responseSz, WOLFSSL_BUFFER_INFO *responseBuffer,
CertStatus *status, OcspEntry *entry, OcspRequest *ocspRequest);
WOLFSSL_API int wolfSSL_CertManagerCheckOCSPResponse(
WOLFSSL_CERT_MANAGER* cm, unsigned char *response, int responseSz,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for changing the byte to unsigned char type in ssl.h to match ssl.h pattern! Just making note of it, we should probably follow up with catching any other byte/word32 uses in ssl.h between now and the next release to have them all handled.

JacobBarthelmeh
JacobBarthelmeh previously approved these changes Jul 7, 2023
Copy link
Contributor

@JacobBarthelmeh JacobBarthelmeh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Picked up a merge conflict, but looks good otherwise. Thanks Sean

@dgarske dgarske self-assigned this Jul 7, 2023
@dgarske dgarske dismissed stale reviews from JacobBarthelmeh and themself via 3861066 July 7, 2023 18:46
dgarske
dgarske previously approved these changes Jul 7, 2023
Copy link
Contributor

@dgarske dgarske left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Spent a few hours working on a rebase and force push. There was an upstream change lost on rebase for set_verify in the LoadCA that was lost. Also corrected several spelling errors.

@dgarske dgarske assigned SparkiDev and unassigned SparkiDev Jul 7, 2023
SparkiDev and others added 2 commits July 7, 2023 15:08
Split out certificate manager APIs into ssl_certman.c.
ssl.c includes ssl_certman.c
Better test coverage.
Minor fixes.
wolfSSL_X509_chain_up_ref calls XFREE with name->heap but name may be
NULL. Check for NULL first.
…tests for bad date check. Various spelling fixes.
DecodeCertInternal was not recognizing VERIFY_SKIP_DATE.
@SparkiDev SparkiDev removed their assignment Jul 10, 2023
@JacobBarthelmeh JacobBarthelmeh merged commit 2426cf1 into wolfSSL:master Jul 10, 2023
67 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants