diff --git a/.github/workflows/os-check.yml b/.github/workflows/os-check.yml index 4501387f7..81f071ccf 100644 --- a/.github/workflows/os-check.yml +++ b/.github/workflows/os-check.yml @@ -59,6 +59,7 @@ jobs: '--enable-lms=small,verify-only --enable-xmss=small,verify-only', '--disable-sys-ca-certs', '--enable-all CPPFLAGS=-DWOLFSSL_DEBUG_CERTS ', + '--enable-all CFLAGS="-DWOLFSSL_CHECK_MEM_ZERO"', '--enable-coding=no', ] name: make check diff --git a/.wolfssl_known_macro_extras b/.wolfssl_known_macro_extras index 6a8f6ab7c..a7995c151 100644 --- a/.wolfssl_known_macro_extras +++ b/.wolfssl_known_macro_extras @@ -605,6 +605,7 @@ WC_RSA_NO_FERMAT_CHECK WC_SHA384 WC_SHA384_DIGEST_SIZE WC_SHA512 +WC_SKIP_INCLUDED_C_FILES WC_SSIZE_TYPE WC_STRICT_SIG WC_WANT_FLAG_DONT_USE_AESNI @@ -661,7 +662,6 @@ WOLFSSL_CAAM_BLACK_KEY_SM WOLFSSL_CAAM_NO_BLACK_KEY WOLFSSL_CALLBACKS WOLFSSL_CHECK_DESKEY -WOLFSSL_CHECK_MEM_ZERO WOLFSSL_CHIBIOS WOLFSSL_CLANG_TIDY WOLFSSL_CLIENT_EXAMPLE diff --git a/linuxkm/linuxkm_wc_port.h b/linuxkm/linuxkm_wc_port.h index 197b9176a..ff20e326d 100644 --- a/linuxkm/linuxkm_wc_port.h +++ b/linuxkm/linuxkm_wc_port.h @@ -422,6 +422,17 @@ #define WC_AES_XTS_SUPPORT_SIMULTANEOUS_ENC_AND_DEC_KEYS #endif + /* setup for LINUXKM_LKCAPI_REGISTER_HASH_DRBG_DEFAULT needs to be here + * to assure that calls to get_random_bytes() in random.c are gated out + * (they would recurse, potentially infinitely). + */ + #if (defined(LINUXKM_LKCAPI_REGISTER_ALL) && \ + !defined(LINUXKM_LKCAPI_DONT_REGISTER_HASH_DRBG) && \ + !defined(LINUXKM_LKCAPI_DONT_REGISTER_HASH_DRBG_DEFAULT)) && \ + !defined(LINUXKM_LKCAPI_REGISTER_HASH_DRBG_DEFAULT) + #define LINUXKM_LKCAPI_REGISTER_HASH_DRBG_DEFAULT + #endif + #ifndef __PIE__ #include #include @@ -469,7 +480,7 @@ extern void free_wolfcrypt_linuxkm_fpu_states(void); WOLFSSL_API __must_check int wc_can_save_vector_registers_x86(void); WOLFSSL_API __must_check int wc_save_vector_registers_x86(enum wc_svr_flags flags); - WOLFSSL_API void wc_restore_vector_registers_x86(void); + WOLFSSL_API void wc_restore_vector_registers_x86(enum wc_svr_flags flags); #if LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0) #include @@ -505,14 +516,14 @@ #endif #endif #ifndef RESTORE_VECTOR_REGISTERS - #define RESTORE_VECTOR_REGISTERS() wc_restore_vector_registers_x86() + #define RESTORE_VECTOR_REGISTERS() wc_restore_vector_registers_x86(WC_SVR_FLAG_NONE) #endif #ifndef DISABLE_VECTOR_REGISTERS #define DISABLE_VECTOR_REGISTERS() wc_save_vector_registers_x86(WC_SVR_FLAG_INHIBIT) #endif #ifndef REENABLE_VECTOR_REGISTERS - #define REENABLE_VECTOR_REGISTERS() wc_restore_vector_registers_x86() + #define REENABLE_VECTOR_REGISTERS() wc_restore_vector_registers_x86(WC_SVR_FLAG_INHIBIT) #endif #elif defined(WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS) && (defined(CONFIG_ARM) || defined(CONFIG_ARM64)) @@ -1217,12 +1228,12 @@ #if defined(CONFIG_X86) WOLFSSL_API __must_check int wc_can_save_vector_registers_x86(void); WOLFSSL_API __must_check int wc_save_vector_registers_x86(enum wc_svr_flags flags); - WOLFSSL_API void wc_restore_vector_registers_x86(void); + WOLFSSL_API void wc_restore_vector_registers_x86(enum wc_svr_flags flags); #ifndef DISABLE_VECTOR_REGISTERS #define DISABLE_VECTOR_REGISTERS() wc_save_vector_registers_x86(WC_SVR_FLAG_INHIBIT) #endif #ifndef REENABLE_VECTOR_REGISTERS - #define REENABLE_VECTOR_REGISTERS() wc_restore_vector_registers_x86() + #define REENABLE_VECTOR_REGISTERS() wc_restore_vector_registers_x86(WC_SVR_FLAG_INHIBIT) #endif #else /* !CONFIG_X86 */ #error WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS is set for an unimplemented architecture. diff --git a/linuxkm/lkcapi_aes_glue.c b/linuxkm/lkcapi_aes_glue.c index cb5e0ea52..398f428d0 100644 --- a/linuxkm/lkcapi_aes_glue.c +++ b/linuxkm/lkcapi_aes_glue.c @@ -19,6 +19,9 @@ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA */ +/* included by linuxkm/lkcapi_glue.c */ +#ifndef WC_SKIP_INCLUDED_C_FILES + #ifndef LINUXKM_LKCAPI_REGISTER #error lkcapi_aes_glue.c included in non-LINUXKM_LKCAPI_REGISTER project. #endif @@ -4312,3 +4315,5 @@ static int linuxkm_test_aesecb(void) { #endif /* LINUXKM_LKCAPI_REGISTER_AESECB */ #endif /* LINUXKM_LKCAPI_REGISTER_AES */ + +#endif /* !WC_SKIP_INCLUDED_C_FILES */ diff --git a/linuxkm/lkcapi_dh_glue.c b/linuxkm/lkcapi_dh_glue.c index d8db8db12..69cfffe5a 100644 --- a/linuxkm/lkcapi_dh_glue.c +++ b/linuxkm/lkcapi_dh_glue.c @@ -20,6 +20,9 @@ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA */ +/* included by linuxkm/lkcapi_glue.c */ +#ifndef WC_SKIP_INCLUDED_C_FILES + #ifndef LINUXKM_LKCAPI_REGISTER #error lkcapi_dh_glue.c included in non-LINUXKM_LKCAPI_REGISTER project. #endif @@ -2966,3 +2969,5 @@ test_kpp_end: } #endif /* LINUXKM_LKCAPI_REGISTER_DH */ + +#endif /* !WC_SKIP_INCLUDED_C_FILES */ diff --git a/linuxkm/lkcapi_ecdh_glue.c b/linuxkm/lkcapi_ecdh_glue.c index 96d5ce8db..86231183d 100644 --- a/linuxkm/lkcapi_ecdh_glue.c +++ b/linuxkm/lkcapi_ecdh_glue.c @@ -20,6 +20,9 @@ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA */ +/* included by linuxkm/lkcapi_glue.c */ +#ifndef WC_SKIP_INCLUDED_C_FILES + #ifndef LINUXKM_LKCAPI_REGISTER #error lkcapi_ecdh_glue.c included in non-LINUXKM_LKCAPI_REGISTER project. #endif @@ -991,3 +994,5 @@ test_ecdh_nist_end: } #endif /* LINUXKM_LKCAPI_REGISTER_ECDH */ + +#endif /* !WC_SKIP_INCLUDED_C_FILES */ diff --git a/linuxkm/lkcapi_ecdsa_glue.c b/linuxkm/lkcapi_ecdsa_glue.c index f7e3cf67a..92d38dfd2 100644 --- a/linuxkm/lkcapi_ecdsa_glue.c +++ b/linuxkm/lkcapi_ecdsa_glue.c @@ -20,6 +20,9 @@ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA */ +/* included by linuxkm/lkcapi_glue.c */ +#ifndef WC_SKIP_INCLUDED_C_FILES + #ifndef LINUXKM_LKCAPI_REGISTER #error lkcapi_ecdsa_glue.c included in non-LINUXKM_LKCAPI_REGISTER project. #endif @@ -843,3 +846,5 @@ test_ecdsa_nist_end: } #endif /* LINUXKM_LKCAPI_REGISTER_ECDSA */ + +#endif /* !WC_SKIP_INCLUDED_C_FILES */ diff --git a/linuxkm/lkcapi_glue.c b/linuxkm/lkcapi_glue.c index b62b82a83..db34d95aa 100644 --- a/linuxkm/lkcapi_glue.c +++ b/linuxkm/lkcapi_glue.c @@ -21,6 +21,7 @@ */ /* included by linuxkm/module_hooks.c */ +#ifndef WC_SKIP_INCLUDED_C_FILES #ifndef LINUXKM_LKCAPI_REGISTER #error lkcapi_glue.c included in non-LINUXKM_LKCAPI_REGISTER project. @@ -981,3 +982,5 @@ static int linuxkm_lkcapi_unregister(void) return seen_err; } + +#endif /* !WC_SKIP_INCLUDED_C_FILES */ diff --git a/linuxkm/lkcapi_rsa_glue.c b/linuxkm/lkcapi_rsa_glue.c index 218d9eb37..0902af41f 100644 --- a/linuxkm/lkcapi_rsa_glue.c +++ b/linuxkm/lkcapi_rsa_glue.c @@ -20,6 +20,9 @@ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA */ +/* included by linuxkm/lkcapi_glue.c */ +#ifndef WC_SKIP_INCLUDED_C_FILES + #ifndef LINUXKM_LKCAPI_REGISTER #error lkcapi_rsa_glue.c included in non-LINUXKM_LKCAPI_REGISTER project. #endif @@ -3250,3 +3253,5 @@ static int get_hash_enc_len(int hash_oid) return enc_len; } #endif /* LINUXKM_LKCAPI_REGISTER_RSA */ + +#endif /* !WC_SKIP_INCLUDED_C_FILES */ diff --git a/linuxkm/lkcapi_sha_glue.c b/linuxkm/lkcapi_sha_glue.c index 0e73dd981..196ade40f 100644 --- a/linuxkm/lkcapi_sha_glue.c +++ b/linuxkm/lkcapi_sha_glue.c @@ -19,6 +19,9 @@ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA */ +/* included by linuxkm/lkcapi_glue.c */ +#ifndef WC_SKIP_INCLUDED_C_FILES + #ifndef LINUXKM_LKCAPI_REGISTER #error lkcapi_sha_glue.c included in non-LINUXKM_LKCAPI_REGISTER project. #endif @@ -374,10 +377,7 @@ !defined(LINUXKM_LKCAPI_REGISTER_HASH_DRBG) #define LINUXKM_LKCAPI_REGISTER_HASH_DRBG #endif - #if (defined(LINUXKM_LKCAPI_REGISTER_ALL) && !defined(LINUXKM_LKCAPI_DONT_REGISTER_HASH_DRBG_DEFAULT)) && \ - !defined(LINUXKM_LKCAPI_REGISTER_HASH_DRBG_DEFAULT) - #define LINUXKM_LKCAPI_REGISTER_HASH_DRBG_DEFAULT - #endif + /* setup for LINUXKM_LKCAPI_REGISTER_HASH_DRBG_DEFAULT is in linuxkm_wc_port.h */ #else #undef LINUXKM_LKCAPI_REGISTER_HASH_DRBG #endif @@ -2048,3 +2048,5 @@ static int wc_linuxkm_drbg_cleanup(void) { } #endif /* LINUXKM_LKCAPI_REGISTER_HASH_DRBG */ + +#endif /* !WC_SKIP_INCLUDED_C_FILES */ diff --git a/linuxkm/x86_vector_register_glue.c b/linuxkm/x86_vector_register_glue.c index 159162cd1..f40357d70 100644 --- a/linuxkm/x86_vector_register_glue.c +++ b/linuxkm/x86_vector_register_glue.c @@ -21,6 +21,7 @@ */ /* included by linuxkm/module_hooks.c */ +#ifndef WC_SKIP_INCLUDED_C_FILES #if !defined(WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS) || !defined(CONFIG_X86) #error x86_vector_register_glue.c included in non-vectorized/non-x86 project. @@ -346,26 +347,26 @@ WARN_UNUSED_RESULT int wc_save_vector_registers_x86(enum wc_svr_flags flags) /* allow for nested calls */ if (pstate && (pstate->fpu_state != 0U)) { - if (unlikely(pstate->fpu_state & WC_FPU_INHIBITED_FLAG)) { - if (flags & WC_SVR_FLAG_INHIBIT) { - /* allow recursive inhibit calls as long as the whole stack of - * them is inhibiting. - */ - ++pstate->fpu_state; - return 0; - } - else - return WC_ACCEL_INHIBIT_E; + if (pstate->fpu_state & WC_FPU_INHIBITED_FLAG) { + /* don't allow recursive inhibit calls when already inhibited -- + * it would add no functionality and require keeping a separate + * count of inhibit recursions. + */ + return WC_ACCEL_INHIBIT_E; } - if (unlikely(flags & WC_SVR_FLAG_INHIBIT)) - return BAD_STATE_E; if (unlikely((pstate->fpu_state & WC_FPU_COUNT_MASK) == WC_FPU_COUNT_MASK)) { pr_err("ERROR: wc_save_vector_registers_x86 recursion register overflow for " "pid %d on CPU %d.\n", pstate->pid, raw_smp_processor_id()); return BAD_STATE_E; - } else { + } + if (flags & WC_SVR_FLAG_INHIBIT) { + ++pstate->fpu_state; + pstate->fpu_state |= WC_FPU_INHIBITED_FLAG; + return 0; + } + else { ++pstate->fpu_state; return 0; } @@ -475,7 +476,7 @@ WARN_UNUSED_RESULT int wc_save_vector_registers_x86(enum wc_svr_flags flags) __builtin_unreachable(); } -void wc_restore_vector_registers_x86(void) +void wc_restore_vector_registers_x86(enum wc_svr_flags flags) { struct wc_thread_fpu_count_ent *pstate; @@ -494,6 +495,14 @@ void wc_restore_vector_registers_x86(void) } if ((--pstate->fpu_state & WC_FPU_COUNT_MASK) > 0U) { + if (flags & WC_SVR_FLAG_INHIBIT) { + if (pstate->fpu_state & WC_FPU_INHIBITED_FLAG) + pstate->fpu_state &= ~WC_FPU_INHIBITED_FLAG; + else + VRG_PR_WARN_X("BUG: wc_restore_vector_registers_x86() called by pid %d on CPU %d " + "with _INHIBIT flag but saved state isn't _INHIBITED_.\n", task_pid_nr(current), + raw_smp_processor_id()); + } return; } @@ -505,6 +514,10 @@ void wc_restore_vector_registers_x86(void) #endif local_bh_enable(); } else if (unlikely(pstate->fpu_state & WC_FPU_INHIBITED_FLAG)) { + if (unlikely(! (flags & WC_SVR_FLAG_INHIBIT))) + VRG_PR_WARN_X("BUG: wc_restore_vector_registers_x86() called by pid %d on CPU %d " + "without _INHIBIT flag but saved state is _INHIBITED_.\n", task_pid_nr(current), + raw_smp_processor_id()); pstate->fpu_state = 0U; wc_linuxkm_fpu_state_release(pstate); local_bh_enable(); @@ -519,3 +532,5 @@ void wc_restore_vector_registers_x86(void) return; } + +#endif /* !WC_SKIP_INCLUDED_C_FILES */ diff --git a/src/internal.c b/src/internal.c index ca749e5f7..fe50ca4f8 100644 --- a/src/internal.c +++ b/src/internal.c @@ -11004,7 +11004,7 @@ void ShrinkInputBuffer(WOLFSSL* ssl, int forcedFree) } ForceZero(ssl->buffers.inputBuffer.buffer, - ssl->buffers.inputBuffer.length); + ssl->buffers.inputBuffer.bufferSize); XFREE(ssl->buffers.inputBuffer.buffer - ssl->buffers.inputBuffer.offset, ssl->heap, DYNAMIC_TYPE_IN_BUFFER); ssl->buffers.inputBuffer.buffer = ssl->buffers.inputBuffer.staticBuffer; diff --git a/wolfcrypt/src/logging.c b/wolfcrypt/src/logging.c index a9f18b5e5..68729fe6d 100644 --- a/wolfcrypt/src/logging.c +++ b/wolfcrypt/src/logging.c @@ -253,7 +253,8 @@ void WOLFSSL_START(int funcNum) if (funcNum < WC_FUNC_COUNT) { double now = current_time(0) * 1000.0; #ifdef WOLFSSL_FUNC_TIME_LOG - fprintf(stderr, "%17.3f: START - %s\n", now, wc_func_name[funcNum]); + WOLFSSL_DEBUG_PRINTF("%17.3f: START - %s\n", + now, wc_func_name[funcNum]); #endif wc_func_start[funcNum] = now; } @@ -265,7 +266,8 @@ void WOLFSSL_END(int funcNum) double now = current_time(0) * 1000.0; wc_func_time[funcNum] += now - wc_func_start[funcNum]; #ifdef WOLFSSL_FUNC_TIME_LOG - fprintf(stderr, "%17.3f: END - %s\n", now, wc_func_name[funcNum]); + WOLFSSL_DEBUG_PRINTF("%17.3f: END - %s\n", + now, wc_func_name[funcNum]); #endif } } @@ -278,11 +280,11 @@ void WOLFSSL_TIME(int count) for (i = 0; i < WC_FUNC_COUNT; i++) { if (wc_func_time[i] > 0) { avg = wc_func_time[i] / count; - fprintf(stderr, "%8.3f ms: %s\n", avg, wc_func_name[i]); + WOLFSSL_DEBUG_PRINTF("%8.3f ms: %s\n", avg, wc_func_name[i]); total += avg; } } - fprintf(stderr, "%8.3f ms\n", total); + WOLFSSL_DEBUG_PRINTF("%8.3f ms\n", total); } #endif @@ -1850,36 +1852,21 @@ static int backtrace_callback(void *data, uintptr_t pc, const char *filename, *(int *)data = 1; return 0; } -#ifdef NO_STDIO_FILESYSTEM - printf(" #%d %p in %s %s:%d\n", (*(int *)data)++, (void *)pc, - function, filename, lineno); -#else - fprintf(stderr, " #%d %p in %s %s:%d\n", (*(int *)data)++, (void *)pc, - function, filename, lineno); -#endif + WOLFSSL_DEBUG_PRINTF(" #%d %p in %s %s:%d\n", (*(int *)data)++, + (void *)pc, function, filename, lineno); return 0; } static void backtrace_error(void *data, const char *msg, int errnum) { (void)data; -#ifdef NO_STDIO_FILESYSTEM - printf("ERR TRACE: error %d while backtracing: %s", errnum, msg); -#else - fprintf(stderr, "ERR TRACE: error %d while backtracing: %s", errnum, msg); -#endif + WOLFSSL_DEBUG_PRINTF("ERR TRACE: error %d while backtracing: %s", + errnum, msg); } static void backtrace_creation_error(void *data, const char *msg, int errnum) { (void)data; -#ifdef NO_STDIO_FILESYSTEM - printf("ERR TRACE: internal error %d " + WOLFSSL_DEBUG_PRINTF("ERR TRACE: internal error %d " "while initializing backtrace facility: %s", errnum, msg); - printf("ERR TRACE: internal error " - "while initializing backtrace facility"); -#else - fprintf(stderr, "ERR TRACE: internal error %d " - "while initializing backtrace facility: %s", errnum, msg); -#endif } static int backtrace_init(struct backtrace_state **backtrace_state) { diff --git a/wolfcrypt/src/memory.c b/wolfcrypt/src/memory.c index 3bd5fc185..ae57c5f67 100644 --- a/wolfcrypt/src/memory.c +++ b/wolfcrypt/src/memory.c @@ -212,7 +212,7 @@ static wolfSSL_Mutex zeroMutex WOLFSSL_MUTEX_INITIALIZER_CLAUSE(zeroMutex); /* Initialize the table of addresses and the mutex. */ -void wc_MemZero_Init() +void wc_MemZero_Init(void) { /* Clear the table to more easily see what is valid. */ XMEMSET(memZero, 0, sizeof(memZero)); @@ -226,7 +226,7 @@ void wc_MemZero_Init() /* Free the mutex and check we have not any uncheck addresses. */ -void wc_MemZero_Free() +void wc_MemZero_Free(void) { /* Free mutex. */ #ifndef WOLFSSL_MUTEX_INITIALIZER @@ -302,7 +302,9 @@ void wc_MemZero_Check(void* addr, size_t len) fprintf(stderr, "\n[MEM_ZERO] %s:%p + %ld is not zero\n", memZero[i].name, memZero[i].addr, j); fprintf(stderr, "[MEM_ZERO] Checking %p:%ld\n", addr, len); + #ifndef TEST_ALWAYS_RUN_TO_END abort(); + #endif } } /* Update next index to write to. */ diff --git a/wolfcrypt/src/wc_mlkem_asm.S b/wolfcrypt/src/wc_mlkem_asm.S index bb36fe928..752542aaf 100644 --- a/wolfcrypt/src/wc_mlkem_asm.S +++ b/wolfcrypt/src/wc_mlkem_asm.S @@ -15780,7 +15780,7 @@ _mlkem_decompress_5_avx2: vpmulhrsw %ymm1, %ymm0, %ymm0 vmovdqu %ymm0, 448(%rdi) vmovq 150(%rsi), %xmm0 - movzxw 158(%rsi), %rdx + movzwq 158(%rsi), %rdx vpinsrq $0x01, %rdx, %xmm0, %xmm0 vinserti128 $0x01, %xmm0, %ymm0, %ymm0 vpshufb %ymm2, %ymm0, %ymm0 diff --git a/wolfssl/wolfcrypt/error-crypt.h b/wolfssl/wolfcrypt/error-crypt.h index 74e441c6a..4a5df0561 100644 --- a/wolfssl/wolfcrypt/error-crypt.h +++ b/wolfssl/wolfcrypt/error-crypt.h @@ -349,22 +349,13 @@ WOLFSSL_ABI WOLFSSL_API const char* wc_GetErrorString(int error); #endif #endif #ifndef WC_ERR_TRACE - #ifdef NO_STDIO_FILESYSTEM - #define WC_ERR_TRACE(label) \ - ( printf("ERR TRACE: %s L %d %s (%d)\n", \ - __FILE__, __LINE__, #label, label), \ - WOLFSSL_DEBUG_BACKTRACE_RENDER_CLAUSE, \ - label \ + #define WC_ERR_TRACE(label) \ + ( WOLFSSL_DEBUG_PRINTF_FN(WOLFSSL_DEBUG_PRINTF_FIRST_ARGS \ + "ERR TRACE: %s L %d %s (%d)\n", \ + __FILE__, __LINE__, #label, label), \ + WOLFSSL_DEBUG_BACKTRACE_RENDER_CLAUSE, \ + label \ ) - #else - #define WC_ERR_TRACE(label) \ - ( fprintf(stderr, \ - "ERR TRACE: %s L %d %s (%d)\n", \ - __FILE__, __LINE__, #label, label), \ - WOLFSSL_DEBUG_BACKTRACE_RENDER_CLAUSE, \ - label \ - ) - #endif #endif #include #else diff --git a/wolfssl/wolfcrypt/logging.h b/wolfssl/wolfcrypt/logging.h index f7eec130d..fe5adad66 100644 --- a/wolfssl/wolfcrypt/logging.h +++ b/wolfssl/wolfcrypt/logging.h @@ -550,6 +550,8 @@ WOLFSSL_API void wolfSSL_SetLoggingPrefix(const char* prefix); #define WOLFSSL_DEBUG_PRINTF_FN printk #elif defined(WOLFSSL_RENESAS_RA6M4) #define WOLFSSL_DEBUG_PRINTF_FN myprintf +#elif defined(NO_STDIO_FILESYSTEM) + #define WOLFSSL_DEBUG_PRINTF_FN printf #else #define WOLFSSL_DEBUG_PRINTF_FN fprintf #define WOLFSSL_DEBUG_PRINTF_FIRST_ARGS stderr, @@ -561,14 +563,8 @@ WOLFSSL_API void wolfSSL_SetLoggingPrefix(const char* prefix); #if defined(WOLFSSL_DEBUG_PRINTF_FN) && !defined(WOLFSSL_DEBUG_PRINTF) #if defined(WOLF_NO_VARIADIC_MACROS) - #if defined(WOLFSSL_ESPIDF) - /* ESP-IDF supports variadic. Do not use WOLF_NO_VARIADIC_MACROS. - * This is only for WOLF_NO_VARIADIC_MACROS testing: */ - #define WOLFSSL_DEBUG_PRINTF(a) \ - WOLFSSL_DEBUG_PRINTF_FN(WOLFSSL_DEBUG_PRINTF_FIRST_ARGS a) - #else - /* no variadic not defined for this platform */ - #endif + #define WOLFSSL_DEBUG_PRINTF(a) \ + WOLFSSL_DEBUG_PRINTF_FN(WOLFSSL_DEBUG_PRINTF_FIRST_ARGS a) #else #define WOLFSSL_DEBUG_PRINTF(...) \ WOLFSSL_DEBUG_PRINTF_FN(WOLFSSL_DEBUG_PRINTF_FIRST_ARGS __VA_ARGS__) diff --git a/wrapper/Ada/tls_server.adb b/wrapper/Ada/tls_server.adb index 9cd30b9d3..64e4f988d 100644 --- a/wrapper/Ada/tls_server.adb +++ b/wrapper/Ada/tls_server.adb @@ -346,6 +346,14 @@ package body Tls_Server with SPARK_Mode is WolfSSL.Create_WolfSSL (Context => Ctx, Ssl => Ssl); if not WolfSSL.Is_Valid (Ssl) then Put_Line ("ERROR: failed to create WOLFSSL object."); + declare + Error_Message : constant WolfSSL.Error_Message := + WolfSSL.Error (WolfSSL.Get_Error (Ssl, Result)); + begin + if Result = Success then + Put_Line (Error_Message.Text (1 .. Error_Message.Last)); + end if; + end; SPARK_Sockets.Close_Socket (L); if not DTLS then diff --git a/wrapper/Ada/wolfssl.adb b/wrapper/Ada/wolfssl.adb index 9bdd07afd..2f7caba0b 100644 --- a/wrapper/Ada/wolfssl.adb +++ b/wrapper/Ada/wolfssl.adb @@ -19,6 +19,7 @@ -- Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA -- +with Ada.Unchecked_Conversion; pragma Warnings (Off, "* is an internal GNAT unit"); with GNAT.Sockets.Thin_Common; pragma Warnings (On, "* is an internal GNAT unit"); @@ -798,10 +799,15 @@ package body WolfSSL is S : String (1 .. Error_Message_Index'Last); B : Byte_Array (1 .. size_t (Error_Message_Index'Last)); C : Natural; + -- Use unchecked conversion instead of type conversion to mimic C style + -- conversion from int to unsigned long, avoiding the Ada overflow check. + function To_Unsigned_Long is new Ada.Unchecked_Conversion + (Source => long, + Target => unsigned_long); begin - WolfSSL_Error_String (Error => unsigned_long (Code), + WolfSSL_Error_String (Error => To_Unsigned_Long (long (Code)), Data => B, - Size => unsigned_long (B'Last)); + Size => To_Unsigned_Long (long (B'Last))); Interfaces.C.To_Ada (Item => B, Target => S, Count => C,