@@ -162,7 +162,7 @@ int test_tls13_unexpected_ccs(void)
162162 NULL , wolfTLSv1_3_server_method ), 0 );
163163 ExpectIntEQ (wolfSSL_accept (ssl_s ), WOLFSSL_FATAL_ERROR );
164164 ExpectIntEQ (wolfSSL_get_error (ssl_s , WOLFSSL_FATAL_ERROR ),
165- UNKNOWN_RECORD_TYPE );
165+ WC_NO_ERR_TRACE ( UNKNOWN_RECORD_TYPE ) );
166166 ExpectIntEQ (test_ctx .c_len , sizeof (unexpectedAlert ));
167167 ExpectBufEQ (test_ctx .c_buff , unexpectedAlert , sizeof (unexpectedAlert ));
168168 wolfSSL_free (ssl_s );
@@ -178,7 +178,7 @@ int test_tls13_unexpected_ccs(void)
178178 NULL , wolfTLSv1_3_server_method ), 0 );
179179 ExpectIntEQ (wolfSSL_accept (ssl_s ), WOLFSSL_FATAL_ERROR );
180180 ExpectIntEQ (wolfSSL_get_error (ssl_s , WOLFSSL_FATAL_ERROR ),
181- UNKNOWN_RECORD_TYPE );
181+ WC_NO_ERR_TRACE ( UNKNOWN_RECORD_TYPE ) );
182182 ExpectIntEQ (test_ctx .c_len , sizeof (unexpectedAlert ));
183183 ExpectBufEQ (test_ctx .c_buff , unexpectedAlert , sizeof (unexpectedAlert ));
184184 wolfSSL_free (ssl_s );
@@ -194,17 +194,17 @@ int test_tls12_curve_intersection(void) {
194194 WOLFSSL_CTX * ctx_c = NULL , * ctx_s = NULL ;
195195 WOLFSSL * ssl_c = NULL , * ssl_s = NULL ;
196196 struct test_memio_ctx test_ctx ;
197- (void )ctx_c ;
198- (void )ssl_c ;
199- (void )ctx_s ;
200- (void )ssl_s ;
201- (void )test_ctx ;
202197 int ret ;
203198 const char * curve_name ;
204199 int test1 [] = {WOLFSSL_ECC_SECP256R1 };
205200 int test2 [] = {WOLFSSL_ECC_SECP384R1 };
206201 int test3 [] = {WOLFSSL_ECC_SECP256R1 , WOLFSSL_ECC_SECP384R1 };
207202 int test4 [] = {WOLFSSL_ECC_SECP384R1 , WOLFSSL_ECC_SECP256R1 };
203+ (void )ctx_c ;
204+ (void )ssl_c ;
205+ (void )ctx_s ;
206+ (void )ssl_s ;
207+ (void )test_ctx ;
208208 XMEMSET (& test_ctx , 0 , sizeof (test_ctx ));
209209 ExpectIntEQ (test_memio_setup (& test_ctx , & ctx_c , & ctx_s , & ssl_c , & ssl_s ,
210210 wolfTLSv1_2_client_method , wolfTLSv1_2_server_method ), 0 );
@@ -282,13 +282,13 @@ int test_tls13_curve_intersection(void) {
282282 WOLFSSL_CTX * ctx_c = NULL , * ctx_s = NULL ;
283283 WOLFSSL * ssl_c = NULL , * ssl_s = NULL ;
284284 struct test_memio_ctx test_ctx ;
285+ const char * curve_name ;
286+ int test1 [] = {WOLFSSL_ECC_SECP256R1 };
285287 (void )ctx_c ;
286288 (void )ssl_c ;
287289 (void )ctx_s ;
288290 (void )ssl_s ;
289291 (void )test_ctx ;
290- const char * curve_name ;
291- int test1 [] = {WOLFSSL_ECC_SECP256R1 };
292292
293293 XMEMSET (& test_ctx , 0 , sizeof (test_ctx ));
294294 ExpectIntEQ (test_memio_setup (& test_ctx , & ctx_c , & ctx_s , & ssl_c , & ssl_s ,
@@ -324,16 +324,16 @@ int test_tls_certreq_order(void)
324324 WOLFSSL_CTX * ctx_c = NULL , * ctx_s = NULL ;
325325 WOLFSSL * ssl_c = NULL , * ssl_s = NULL ;
326326 struct test_memio_ctx test_ctx ;
327- (void )ctx_c ;
328- (void )ssl_c ;
329- (void )ctx_s ;
330- (void )ssl_s ;
331- (void )test_ctx ;
332327 int i = 0 ;
333328 const char * msg = NULL ;
334329 int msgSz = 0 ;
335330 int certIdx = 0 ;
336331 int certReqIdx = 0 ;
332+ (void )ctx_c ;
333+ (void )ssl_c ;
334+ (void )ctx_s ;
335+ (void )ssl_s ;
336+ (void )test_ctx ;
337337
338338 XMEMSET (& test_ctx , 0 , sizeof (test_ctx ));
339339
@@ -779,12 +779,12 @@ int test_tls12_etm_failed_resumption(void)
779779 const char * cbcSuite = "ECDHE-RSA-AES128-SHA256" ;
780780 WOLFSSL_CTX * ctx_c = NULL , * ctx_s = NULL ;
781781 WOLFSSL * ssl_c = NULL , * ssl_s = NULL ;
782+ WOLFSSL_SESSION * sess = NULL ;
783+ struct test_memio_ctx test_ctx ;
782784 (void )ctx_c ;
783785 (void )ssl_c ;
784786 (void )ctx_s ;
785787 (void )ssl_s ;
786- WOLFSSL_SESSION * sess = NULL ;
787- struct test_memio_ctx test_ctx ;
788788 (void )test_ctx ;
789789
790790 /* First handshake: establish a session-ID-based session on the client.
@@ -2518,10 +2518,10 @@ int test_tls_tlsx_parse_guards_coverage(void)
25182518#if defined(HAVE_MANUAL_MEMIO_TESTS_DEPENDENCIES ) && \
25192519 defined(HAVE_TLS_EXTENSIONS ) && !defined(NO_WOLFSSL_SERVER )
25202520
2521- struct test_memio_ctx test_ctx ;
2522- (void )test_ctx ;
25232521 WOLFSSL_CTX * ctx_s = NULL ;
25242522 WOLFSSL * ssl_s = NULL ;
2523+ struct test_memio_ctx test_ctx ;
2524+ (void )test_ctx ;
25252525
25262526 /* --- Subtest 1: TLS 1.2 CH with extensions_total_len == 0
25272527 * (no extensions at all — not the error-guard path, but exercises the
@@ -2751,10 +2751,10 @@ int test_tls_tlsx_sc_fuzz_coverage(void)
27512751 defined(HAVE_SUPPORTED_CURVES ) && defined(HAVE_ECC ) && \
27522752 !defined(WOLFSSL_NO_TLS12 ) && !defined(NO_WOLFSSL_SERVER )
27532753
2754- struct test_memio_ctx test_ctx ;
2755- (void )test_ctx ;
27562754 WOLFSSL_CTX * ctx_s = NULL ;
27572755 WOLFSSL * ssl_s = NULL ;
2756+ struct test_memio_ctx test_ctx ;
2757+ (void )test_ctx ;
27582758
27592759 /* --- Subtest 1: supported_groups with list_len == 0 (empty list).
27602760 * TLSX_SupportedCurve_Parse: after reading list_len=0, offset==length
@@ -2942,10 +2942,10 @@ int test_tls_tlsx_sni_fuzz_coverage(void)
29422942 defined(HAVE_SNI ) && !defined(WOLFSSL_NO_TLS12 ) && \
29432943 !defined(NO_WOLFSSL_SERVER )
29442944
2945- struct test_memio_ctx test_ctx ;
2946- (void )test_ctx ;
29472945 WOLFSSL_CTX * ctx_s = NULL ;
29482946 WOLFSSL * ssl_s = NULL ;
2947+ struct test_memio_ctx test_ctx ;
2948+ (void )test_ctx ;
29492949
29502950 /* Helper macro: set up server-only ctx+ssl with SNI "example.com",
29512951 * inject a raw CH, call accept, tear down. The server must have SNI
@@ -3135,10 +3135,10 @@ int test_tls_tlsx_psk_fuzz_coverage(void)
31353135 (defined(HAVE_SESSION_TICKET ) || !defined(NO_PSK )) && \
31363136 !defined(NO_WOLFSSL_SERVER )
31373137
3138- struct test_memio_ctx test_ctx ;
3139- (void )test_ctx ;
31403138 WOLFSSL_CTX * ctx_s = NULL ;
31413139 WOLFSSL * ssl_s = NULL ;
3140+ struct test_memio_ctx test_ctx ;
3141+ (void )test_ctx ;
31423142
31433143 /* Common prefix for all subtests (up to extensions_total_len field):
31443144 * rec(5) + hs(4) + ver(2) + rand(32) + sid-len(1) + sid(32) +
@@ -3416,10 +3416,10 @@ int test_tls_tlsx_csr_fuzz_coverage(void)
34163416 !defined(WOLFSSL_NO_TLS12 ) && !defined(NO_WOLFSSL_SERVER ) && \
34173417 !defined(NO_WOLFSSL_CLIENT ) && !defined(NO_RSA )
34183418
3419- struct test_memio_ctx test_ctx ;
3420- (void )test_ctx ;
34213419 WOLFSSL_CTX * ctx_s = NULL ;
34223420 WOLFSSL * ssl_s = NULL ;
3421+ struct test_memio_ctx test_ctx ;
3422+ (void )test_ctx ;
34233423
34243424 /* --- Subtest 1: status_request extension with ext-data-len == 0.
34253425 * L3774: (length == 0) => return 0. The server silently accepts the
@@ -3674,10 +3674,10 @@ int test_tls_tlsx_parse_guards_batch4(void)
36743674 defined(HAVE_TLS_EXTENSIONS ) && !defined(NO_WOLFSSL_SERVER ) && \
36753675 !defined(WOLFSSL_NO_TLS12 )
36763676
3677- struct test_memio_ctx test_ctx ;
3678- (void )test_ctx ;
36793677 WOLFSSL_CTX * ctx_s = NULL ;
36803678 WOLFSSL * ssl_s = NULL ;
3679+ struct test_memio_ctx test_ctx ;
3680+ (void )test_ctx ;
36813681
36823682 /* --- Subtest 1: CH with extensions_total_len == 0 (empty extensions list).
36833683 * L17021: ssl!=NULL, input!=NULL, isRequest=1 suites!=NULL => all false.
@@ -3870,10 +3870,10 @@ int test_tls_tlsx_keyshare_parse_batch4(void)
38703870 defined(WOLFSSL_TLS13 ) && defined(HAVE_SUPPORTED_CURVES ) && \
38713871 !defined(NO_WOLFSSL_SERVER )
38723872
3873- struct test_memio_ctx test_ctx ;
3874- (void )test_ctx ;
38753873 WOLFSSL_CTX * ctx_s = NULL ;
38763874 WOLFSSL * ssl_s = NULL ;
3875+ struct test_memio_ctx test_ctx ;
3876+ (void )test_ctx ;
38773877
38783878 /*
38793879 * Common TLS 1.3 CH prefix (up to extensions_total_len, excluding it):
@@ -4170,10 +4170,10 @@ int test_tls_tlsx_psk_parse_sh_batch4(void)
41704170 !defined(NO_WOLFSSL_CLIENT ) && !defined(NO_WOLFSSL_SERVER ) && \
41714171 !defined(NO_RSA )
41724172
4173- struct test_memio_ctx test_ctx ;
4174- (void )test_ctx ;
41754173 WOLFSSL_CTX * ctx_c = NULL ;
41764174 WOLFSSL * ssl_c = NULL ;
4175+ struct test_memio_ctx test_ctx ;
4176+ (void )test_ctx ;
41774177
41784178 /*
41794179 * Craft a minimal TLS 1.3 ServerHello with supported_versions and a
@@ -4284,7 +4284,8 @@ int test_tls_build_handshake_hash_batch4(void)
42844284 * sha_mac < sha256_mac so the condition evaluates true even for SHA-1 suites
42854285 * when !NO_SHA256 is defined.
42864286 */
4287- #if !defined(NO_AES ) && defined(HAVE_AES_CBC ) && !defined(NO_SHA )
4287+ #if !defined(NO_AES ) && defined(HAVE_AES_CBC ) && !defined(NO_SHA ) && \
4288+ !defined(NO_DH ) && !defined(NO_OLD_TLS )
42884289 {
42894290 XMEMSET (& test_ctx , 0 , sizeof (test_ctx ));
42904291 ExpectIntEQ (test_memio_setup (& test_ctx , & ctx_c , & ctx_s , & ssl_c , & ssl_s ,
@@ -4398,10 +4399,10 @@ int test_tls_tlsx_parse_msgtype_batch4(void)
43984399 defined(WOLFSSL_TLS13 ) && defined(HAVE_TLS_EXTENSIONS ) && \
43994400 !defined(NO_WOLFSSL_CLIENT )
44004401
4401- struct test_memio_ctx test_ctx ;
4402- (void )test_ctx ;
44034402 WOLFSSL_CTX * ctx_c = NULL ;
44044403 WOLFSSL * ssl_c = NULL ;
4404+ struct test_memio_ctx test_ctx ;
4405+ (void )test_ctx ;
44054406
44064407 /* --- Subtest 1: TLS 1.3 ServerHello with TLSX_STATUS_REQUEST_V2
44074408 * (type=0x0011). In TLS 1.3 CSR2 is only allowed in
0 commit comments