Merge pull request #1749 from JacobBarthelmeh/UnitTests
check max key size with ocsp stapling test
This commit is contained in:
commit
be0523b7cd
@ -718,8 +718,28 @@ static void ClientRead(WOLFSSL* ssl, char* reply, int replyLen, int mustRead)
|
||||
|
||||
static void Usage(void)
|
||||
{
|
||||
printf("client " LIBWOLFSSL_VERSION_STRING
|
||||
printf("wolfSSL client " LIBWOLFSSL_VERSION_STRING
|
||||
" NOTE: All files relative to wolfSSL home dir\n");
|
||||
|
||||
/* print out so that scripts can know what the max supported key size is */
|
||||
printf("Max RSA key size in bits for build is set at : ");
|
||||
#ifdef NO_RSA
|
||||
printf("RSA not supported\n");
|
||||
#elif defined(WOLFSSL_SP_MATH) /* case of SP math only */
|
||||
#ifndef WOLFSSL_SP_NO_3072
|
||||
printf("3072\n");
|
||||
#elif !defined(WOLFSSL_SP_NO_2048)
|
||||
printf("2048\n");
|
||||
#else
|
||||
printf("0\n");
|
||||
#endif
|
||||
#elif defined(USE_FAST_MATH)
|
||||
printf("%d\n", FP_MAX_BITS/2);
|
||||
#else
|
||||
/* normal math has unlimited max size */
|
||||
printf("INFINITE\n");
|
||||
#endif
|
||||
|
||||
printf("-? Help, print this usage\n");
|
||||
printf("-h <host> Host to connect to, default %s\n", wolfSSLIP);
|
||||
printf("-p <num> Port to connect on, not 0, default %d\n", wolfSSLPort);
|
||||
|
@ -157,6 +157,18 @@ if [ $? -eq 0 ]; then
|
||||
exit 0
|
||||
fi
|
||||
|
||||
# check if supported key size is large enough to handle 4096 bit RSA
|
||||
size=`./examples/client/client -? | grep "Max key"`
|
||||
size=`echo ${size//[^0-9]/}`
|
||||
if [ ! -z "$size" ]; then
|
||||
printf 'check on max key size of %d ...' $size
|
||||
if [ $size -lt 4096 ]; then
|
||||
printf '%s\n' "4096 bit RSA keys not supported"
|
||||
exit 0
|
||||
fi
|
||||
printf 'OK\n'
|
||||
fi
|
||||
|
||||
# create a port 0 port to use with openssl ocsp responder
|
||||
./examples/server/server -R $ready_file -p $resume_port &
|
||||
wait_for_readyFile $ready_file
|
||||
|
@ -167,6 +167,18 @@ trap cleanup EXIT INT TERM HUP
|
||||
|
||||
[ ! -x ./examples/client/client ] && echo -e "\n\nClient doesn't exist" && exit 1
|
||||
|
||||
# check if supported key size is large enough to handle 4096 bit RSA
|
||||
size=`./examples/client/client -? | grep "Max key"`
|
||||
size=`echo ${size//[^0-9]/}`
|
||||
if [ ! -z "$size" ]; then
|
||||
printf 'check on max key size of %d ...' $size
|
||||
if [ $size -lt 4096 ]; then
|
||||
printf '%s\n' "4096 bit RSA keys not supported"
|
||||
exit 0
|
||||
fi
|
||||
printf 'OK\n'
|
||||
fi
|
||||
|
||||
#get four unique ports
|
||||
# 1:
|
||||
./examples/server/server -R $ready_file1 -p $resume_port &
|
||||
|
Loading…
x
Reference in New Issue
Block a user