forked from wolfSSL/wolfssl
infer: fix more uninitialized value errors.
This commit is contained in:
@@ -21014,7 +21014,7 @@ static int test_RsaDecryptBoundsCheck(void)
|
|||||||
WC_RNG rng;
|
WC_RNG rng;
|
||||||
RsaKey key;
|
RsaKey key;
|
||||||
byte flatC[256];
|
byte flatC[256];
|
||||||
word32 flatCSz;
|
word32 flatCSz = 0;
|
||||||
byte out[256];
|
byte out[256];
|
||||||
word32 outSz = sizeof(out);
|
word32 outSz = sizeof(out);
|
||||||
|
|
||||||
@@ -23432,7 +23432,7 @@ static int test_wc_DsaSignVerify(void)
|
|||||||
byte hash[WC_SHA_DIGEST_SIZE];
|
byte hash[WC_SHA_DIGEST_SIZE];
|
||||||
word32 idx = 0;
|
word32 idx = 0;
|
||||||
word32 bytes;
|
word32 bytes;
|
||||||
int answer;
|
int answer = 0;
|
||||||
#ifdef USE_CERT_BUFFERS_1024
|
#ifdef USE_CERT_BUFFERS_1024
|
||||||
byte tmp[ONEK_BUF];
|
byte tmp[ONEK_BUF];
|
||||||
|
|
||||||
@@ -25778,7 +25778,7 @@ static int test_wc_ecc_params(void)
|
|||||||
#if !defined(NO_ECC256) && !defined(NO_ECC_SECP)
|
#if !defined(NO_ECC256) && !defined(NO_ECC_SECP)
|
||||||
/* Test for SECP256R1 curve */
|
/* Test for SECP256R1 curve */
|
||||||
int curve_id = ECC_SECP256R1;
|
int curve_id = ECC_SECP256R1;
|
||||||
int curve_idx;
|
int curve_idx = 0;
|
||||||
|
|
||||||
ExpectIntNE(curve_idx = wc_ecc_get_curve_idx(curve_id), ECC_CURVE_INVALID);
|
ExpectIntNE(curve_idx = wc_ecc_get_curve_idx(curve_id), ECC_CURVE_INVALID);
|
||||||
ExpectNotNull(ecc_set = wc_ecc_get_curve_params(curve_idx));
|
ExpectNotNull(ecc_set = wc_ecc_get_curve_params(curve_idx));
|
||||||
|
@@ -25402,9 +25402,9 @@ int PemToDer(const unsigned char* buff, long longSz, int type,
|
|||||||
{
|
{
|
||||||
const char* header = NULL;
|
const char* header = NULL;
|
||||||
const char* footer = NULL;
|
const char* footer = NULL;
|
||||||
const char* headerEnd;
|
const char* headerEnd = NULL;
|
||||||
const char* footerEnd;
|
const char* footerEnd = NULL;
|
||||||
const char* consumedEnd;
|
const char* consumedEnd = NULL;
|
||||||
const char* bufferEnd = (const char*)(buff + longSz);
|
const char* bufferEnd = (const char*)(buff + longSz);
|
||||||
long neededSz;
|
long neededSz;
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
|
@@ -15005,8 +15005,8 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t aesgcm_test(void)
|
|||||||
byte resultC[sizeof(p) + AES_BLOCK_SIZE];
|
byte resultC[sizeof(p) + AES_BLOCK_SIZE];
|
||||||
wc_test_ret_t ret = 0;
|
wc_test_ret_t ret = 0;
|
||||||
|
|
||||||
int alen;
|
int alen = 0;
|
||||||
int plen;
|
int plen = 0;
|
||||||
#if defined(WOLFSSL_XILINX_CRYPT_VERSAL)
|
#if defined(WOLFSSL_XILINX_CRYPT_VERSAL)
|
||||||
byte buf[sizeof(p) + AES_BLOCK_SIZE];
|
byte buf[sizeof(p) + AES_BLOCK_SIZE];
|
||||||
byte bufA[sizeof(a) + 1];
|
byte bufA[sizeof(a) + 1];
|
||||||
@@ -21482,7 +21482,7 @@ exit_rsa:
|
|||||||
WOLFSSL_TEST_SUBROUTINE wc_test_ret_t rsa_test(void)
|
WOLFSSL_TEST_SUBROUTINE wc_test_ret_t rsa_test(void)
|
||||||
{
|
{
|
||||||
wc_test_ret_t ret;
|
wc_test_ret_t ret;
|
||||||
size_t bytes;
|
size_t bytes = 0;
|
||||||
WC_RNG rng;
|
WC_RNG rng;
|
||||||
#if defined(WOLFSSL_SMALL_STACK) && !defined(WOLFSSL_NO_MALLOC)
|
#if defined(WOLFSSL_SMALL_STACK) && !defined(WOLFSSL_NO_MALLOC)
|
||||||
byte* tmp = NULL;
|
byte* tmp = NULL;
|
||||||
@@ -22781,7 +22781,11 @@ WOLFSSL_TEST_SUBROUTINE wc_test_ret_t dh_test(void)
|
|||||||
{
|
{
|
||||||
wc_test_ret_t ret;
|
wc_test_ret_t ret;
|
||||||
word32 bytes;
|
word32 bytes;
|
||||||
word32 idx = 0, privSz, pubSz, privSz2, pubSz2;
|
word32 idx = 0;
|
||||||
|
word32 privSz = 0;
|
||||||
|
word32 pubSz = 0;
|
||||||
|
word32 privSz2 = 0;
|
||||||
|
word32 pubSz2 = 0;
|
||||||
#ifndef WC_NO_RNG
|
#ifndef WC_NO_RNG
|
||||||
WC_RNG rng;
|
WC_RNG rng;
|
||||||
int rngInit = 0;
|
int rngInit = 0;
|
||||||
|
Reference in New Issue
Block a user