mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-02 12:14:38 +02:00
fix scan-build warnings
This commit is contained in:
@@ -299,7 +299,9 @@ THREAD_RETURN WOLFSSL_THREAD client_test(void* args)
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
case 'C' :
|
case 'C' :
|
||||||
|
#ifdef HAVE_CRL
|
||||||
disableCRL = 1;
|
disableCRL = 1;
|
||||||
|
#endif
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case 'u' :
|
case 'u' :
|
||||||
|
@@ -6059,6 +6059,8 @@ static int TimingPadVerify(WOLFSSL* ssl, const byte* input, int padLen, int t,
|
|||||||
byte* dummy = sizeof(dmy) < MAX_PAD_SIZE ? (byte*) ssl : dmy;
|
byte* dummy = sizeof(dmy) < MAX_PAD_SIZE ? (byte*) ssl : dmy;
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
|
|
||||||
|
(void)dmy;
|
||||||
|
|
||||||
if ( (t + padLen + 1) > pLen) {
|
if ( (t + padLen + 1) > pLen) {
|
||||||
WOLFSSL_MSG("Plain Len not long enough for pad/mac");
|
WOLFSSL_MSG("Plain Len not long enough for pad/mac");
|
||||||
PadCheck(dummy, (byte)padLen, MAX_PAD_SIZE);
|
PadCheck(dummy, (byte)padLen, MAX_PAD_SIZE);
|
||||||
@@ -6295,6 +6297,8 @@ static INLINE int VerifyMac(WOLFSSL* ssl, const byte* input, word32 msgSz,
|
|||||||
byte dmy[sizeof(WOLFSSL) >= MAX_PAD_SIZE ? 1 : MAX_PAD_SIZE] = {0};
|
byte dmy[sizeof(WOLFSSL) >= MAX_PAD_SIZE ? 1 : MAX_PAD_SIZE] = {0};
|
||||||
byte* dummy = sizeof(dmy) < MAX_PAD_SIZE ? (byte*) ssl : dmy;
|
byte* dummy = sizeof(dmy) < MAX_PAD_SIZE ? (byte*) ssl : dmy;
|
||||||
|
|
||||||
|
(void)dmy;
|
||||||
|
|
||||||
if (pad > (msgSz - digestSz - 1)) {
|
if (pad > (msgSz - digestSz - 1)) {
|
||||||
WOLFSSL_MSG("Plain Len not long enough for pad/mac");
|
WOLFSSL_MSG("Plain Len not long enough for pad/mac");
|
||||||
pad = 0; /* no bad read */
|
pad = 0; /* no bad read */
|
||||||
|
Reference in New Issue
Block a user