1 (edited by srikbn 2019-04-25 06:17:57)

Topic: WolfCrypt Test and Server certificate decode issue

Hello,
    Am executing WolfCrypto Test  and below is the result .
Am getting same error when device is  decoding Server certificate ( During Client-Server Handshake)

Please let me know what may be the issue , tried

"1. Make sure your stack enough reserved space. For my wolfCrypt test on a PIC32MZ here I set it to 20480 bytes.
2. If you are setting the FP_MAX_BITS make sure and use the max key size times 2 (so 2048-bit RSA will require `#define FP_MAX_BITS 4096`).
3. For the wolfCrypt self test it requires certificates. Typically these come from the file system in ./certs. If NO_FILESYSTEM is defined then you'll need to set either USE_CERT_BUFFERS_2048 or USE_CERT_BUFFERS_1024 depending on your FP_MAX_BITS."

Not able solve this issue  .

"error    test passed!
Bad end of line in Base64 Decode
Bad Base64 Decode data, too small
Bad Base64 Decode data, too big
Bad Base64 Decode data, too small
Bad Base64 Decode data, too big
Bad Base64 Decode data, too small
Bad Base64 Decode data, too big
Bad Base64 Decode data, too small
Bad Base64 Decode data, too big
base64   test passed!
asn      test passed!
SHA      test passed!
SHA-256  test passed!
SHA-384  test passed!
SHA-512  test passed!
Hash     test passed!
HMAC-SHA test passed!
HMAC-SHA256 test passed!
HMAC-SHA384 test passed!
HMAC-SHA512 test passed!
GMAC     test passed!
HC-128   test passed!
DES      test passed!
DES3     test passed!
AES      test passed!
AES192   test passed!
AES256   test passed!
AES-GCM  test passed!
AES-CCM  test passed!
RANDOM   test passed!
GetLength value exceeds buffer length
GetLength value exceeds buffer length
GetLength value exceeds buffer length
wc_SignatureGetSize: Invalid RsaKey key size
RSA Signature Verify difference!
wolfSSL Using RSA OAEP padding
wolfSSL Using RSA OAEP un-padding
wolfSSL Using RSA OAEP padding
wolfSSL Using RSA OAEP un-padding
wolfSSL Using RSA OAEP un-padding
wolfSSL Using RSA OAEP padding
wolfSSL Using RSA OAEP un-padding
wolfSSL Using RSA OAEP padding
wolfSSL Using RSA OAEP un-padding
wolfSSL Using RSA OAEP padding
wolfSSL Using RSA OAEP un-padding
RSA      test passed!
wolfSSL Entering GetObjectId()
wolfSSL Entering wc_ecc_make_pub
wolfSSL Entering wc_ecc_make_pub
Verify called with private key, generating public part
ECC      test passed!
wolfSSL Entering GetObjectId()
wolfSSL Entering GetObjectId()
ECC buffer test passed!
logging  test passed!
mutex    test passed!
memcb    test passed!
Test complete"

Share

Re: WolfCrypt Test and Server certificate decode issue

"GetLength value exceeds buffer length
GetLength value exceeds buffer length
GetLength value exceeds buffer length
wc_SignatureGetSize: Invalid RsaKey key size!"

Is issue

Share

Re: WolfCrypt Test and Server certificate decode issue

Hi srikbn,

The output you mentioned is expected when you have compiled wolfSSL with "--enable-debug" or -DDEBUG_WOLFSSL.  This is being output by the wolfCrypt test app when a failure test case is being tested and is expected.

Best Regards,
Chris