@@ -34498,7 +34498,7 @@ static int test_zd21414_pkcs7_ori_oid_overflow(void)
3449834498 if (pkcs7 != NULL) {
3449934499 /* ORI decrypt callback must be set or parser skips ORI processing */
3450034500 wc_PKCS7_SetOriDecryptCb(pkcs7, oriDecryptCb_zd21414);
34501- /* Without fix: overflows oriOID[32] → crash.
34501+ /* Without fix: overflows oriOID[32] -> crash.
3450234502 * With fix: returns BUFFER_E before the copy. */
3450334503 ExpectIntLT(wc_PKCS7_DecodeEnvelopedData(pkcs7, (byte*)malformed,
3450434504 (word32)sizeof(malformed), decoded, sizeof(decoded)), 0);
@@ -34556,7 +34556,7 @@ static int test_zd21418_ecc_invalid_curve_point(void)
3455634556#if !(defined(HAVE_SELFTEST) || (defined(HAVE_FIPS) && FIPS_VERSION3_LT(7,0,0)))
3455734557#if defined(HAVE_ECC) && !defined(NO_ECC256)
3455834558 ecc_key peerKey;
34559- /* Invalid point (3, 3) — NOT on P-256 curve y^2 = x^3 - 3x + b */
34559+ /* Invalid point (3, 3) - NOT on P-256 curve y^2 = x^3 - 3x + b */
3456034560 byte badPt[65];
3456134561
3456234562 XMEMSET(&peerKey, 0, sizeof(peerKey));
@@ -34586,7 +34586,7 @@ static int test_zd21422_pkcs7_padding_oracle(void)
3458634586 defined(WOLFSSL_AES_256) && !defined(NO_PKCS7_ENCRYPTED_DATA)
3458734587 PKCS7 pkcs7;
3458834588 byte key[32];
34589- byte plaintext[27]; /* 27 bytes → padded to 32 → padding = 05 05 05 05 05 */
34589+ byte plaintext[27]; /* 27 bytes -> padded to 32 -> padding = 05 05 05 05 05 */
3459034590 byte encoded[4096];
3459134591 byte output[256];
3459234592 byte modified[4096];
@@ -34643,15 +34643,15 @@ static int test_zd21422_pkcs7_padding_oracle(void)
3464334643 /* Flip byte in penultimate block to corrupt interior padding */
3464434644 modified[ctOff + ctLen - 32 + 11] ^= 0x42;
3464534645
34646- /* Decrypt modified ciphertext — must fail, not succeed */
34646+ /* Decrypt modified ciphertext - must fail, not succeed */
3464734647 XMEMSET(&pkcs7, 0, sizeof(pkcs7));
3464834648 ExpectIntEQ(wc_PKCS7_Init(&pkcs7, NULL, 0), 0);
3464934649 pkcs7.encryptionKey = key;
3465034650 pkcs7.encryptionKeySz = sizeof(key);
3465134651
3465234652 outSz = wc_PKCS7_DecodeEncryptedData(&pkcs7, modified,
3465334653 (word32)encodedSz, output, sizeof(output));
34654- /* Must return an error — if it returns plaintext size, padding
34654+ /* Must return an error - if it returns plaintext size, padding
3465534655 * oracle vulnerability exists */
3465634656 ExpectIntLT(outSz, 0);
3465734657 wc_PKCS7_Free(&pkcs7);
0 commit comments