Skip to content

Commit 1b6b3ea

Browse files
committed
Remove UTF-8 chars
1 parent 83c456b commit 1b6b3ea

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

tests/api.c

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34498,7 +34498,7 @@ static int test_zd21414_pkcs7_ori_oid_overflow(void)
3449834498
if (pkcs7 != NULL) {
3449934499
/* ORI decrypt callback must be set or parser skips ORI processing */
3450034500
wc_PKCS7_SetOriDecryptCb(pkcs7, oriDecryptCb_zd21414);
34501-
/* Without fix: overflows oriOID[32] crash.
34501+
/* Without fix: overflows oriOID[32] -> crash.
3450234502
* With fix: returns BUFFER_E before the copy. */
3450334503
ExpectIntLT(wc_PKCS7_DecodeEnvelopedData(pkcs7, (byte*)malformed,
3450434504
(word32)sizeof(malformed), decoded, sizeof(decoded)), 0);
@@ -34556,7 +34556,7 @@ static int test_zd21418_ecc_invalid_curve_point(void)
3455634556
#if !(defined(HAVE_SELFTEST) || (defined(HAVE_FIPS) && FIPS_VERSION3_LT(7,0,0)))
3455734557
#if defined(HAVE_ECC) && !defined(NO_ECC256)
3455834558
ecc_key peerKey;
34559-
/* Invalid point (3, 3) NOT on P-256 curve y^2 = x^3 - 3x + b */
34559+
/* Invalid point (3, 3) - NOT on P-256 curve y^2 = x^3 - 3x + b */
3456034560
byte badPt[65];
3456134561

3456234562
XMEMSET(&peerKey, 0, sizeof(peerKey));
@@ -34586,7 +34586,7 @@ static int test_zd21422_pkcs7_padding_oracle(void)
3458634586
defined(WOLFSSL_AES_256) && !defined(NO_PKCS7_ENCRYPTED_DATA)
3458734587
PKCS7 pkcs7;
3458834588
byte key[32];
34589-
byte plaintext[27]; /* 27 bytes padded to 32 padding = 05 05 05 05 05 */
34589+
byte plaintext[27]; /* 27 bytes -> padded to 32 -> padding = 05 05 05 05 05 */
3459034590
byte encoded[4096];
3459134591
byte output[256];
3459234592
byte modified[4096];
@@ -34643,15 +34643,15 @@ static int test_zd21422_pkcs7_padding_oracle(void)
3464334643
/* Flip byte in penultimate block to corrupt interior padding */
3464434644
modified[ctOff + ctLen - 32 + 11] ^= 0x42;
3464534645

34646-
/* Decrypt modified ciphertext must fail, not succeed */
34646+
/* Decrypt modified ciphertext - must fail, not succeed */
3464734647
XMEMSET(&pkcs7, 0, sizeof(pkcs7));
3464834648
ExpectIntEQ(wc_PKCS7_Init(&pkcs7, NULL, 0), 0);
3464934649
pkcs7.encryptionKey = key;
3465034650
pkcs7.encryptionKeySz = sizeof(key);
3465134651

3465234652
outSz = wc_PKCS7_DecodeEncryptedData(&pkcs7, modified,
3465334653
(word32)encodedSz, output, sizeof(output));
34654-
/* Must return an error if it returns plaintext size, padding
34654+
/* Must return an error - if it returns plaintext size, padding
3465534655
* oracle vulnerability exists */
3465634656
ExpectIntLT(outSz, 0);
3465734657
wc_PKCS7_Free(&pkcs7);

0 commit comments

Comments
 (0)