From a39a1c1d87eb4bb32447d7f8c150c6a051ba13db Mon Sep 17 00:00:00 2001 From: David Garske Date: Thu, 24 Feb 2022 16:18:42 -0800 Subject: [PATCH] More fixups from cppcheck and clang-tidy. --- src/ssl.c | 11 +++++------ tests/api.c | 2 ++ wolfssl/internal.h | 4 ++-- wolfssl/ssl.h | 3 ++- 4 files changed, 11 insertions(+), 9 deletions(-) diff --git a/src/ssl.c b/src/ssl.c index 7df0b69ff..3fcb151e4 100644 --- a/src/ssl.c +++ b/src/ssl.c @@ -5266,7 +5266,7 @@ int AddCA(WOLFSSL_CERT_MANAGER* cm, DerBuffer** pDer, int type, int verify) #define SESSIONS_PER_ROW 3 #define SESSION_ROWS 11 #endif - #define INVALID_SESSION_ROW -1 + #define INVALID_SESSION_ROW (-1) #ifdef NO_SESSION_CACHE_ROW_LOCK #undef ENABLE_SESSION_CACHE_ROW_LOCK @@ -15511,6 +15511,7 @@ int wolfSSL_GetSessionFromCache(WOLFSSL* ssl, WOLFSSL_SESSION* output) return WOLFSSL_FAILURE; #endif + XMEMSET(bogusID, 0, sizeof(bogusID)); if (!IsAtLeastTLSv1_3(ssl->version) && ssl->arrays != NULL) id = ssl->arrays->sessionID; else if (ssl->session->haveAltSessionID) { @@ -15767,8 +15768,6 @@ int wolfSSL_SetSession(WOLFSSL* ssl, WOLFSSL_SESSION* session) SESSION_ROW_UNLOCK(sessRow); sessRow = NULL; } - /* Make sure we don't access this anymore */ - session = NULL; if (ret != WOLFSSL_SUCCESS) return ret; @@ -24095,10 +24094,10 @@ int wolfSSL_DupSession(const WOLFSSL_SESSION* input, WOLFSSL_SESSION* output, } else { tmp = (byte*)XREALLOC(ticBuff, input->ticketLen, - input->heap, DYNAMIC_TYPE_SESSION_TICK); + output->heap, DYNAMIC_TYPE_SESSION_TICK); if (tmp == NULL) { WOLFSSL_MSG("Failed to allocate memory for ticket"); - XFREE(ticBuff, input->heap, DYNAMIC_TYPE_SESSION_TICK); + XFREE(ticBuff, output->heap, DYNAMIC_TYPE_SESSION_TICK); output->ticket = NULL; output->ticketLen = 0; output->ticketLenAlloc = 0; @@ -24142,7 +24141,7 @@ int wolfSSL_DupSession(const WOLFSSL_SESSION* input, WOLFSSL_SESSION* output, } else { if (ticBuff != NULL) - XFREE(ticBuff, input->heap, DYNAMIC_TYPE_SESSION_TICK); + XFREE(ticBuff, output->heap, DYNAMIC_TYPE_SESSION_TICK); output->ticket = output->_staticTicket; output->ticketLenAlloc = 0; } diff --git a/tests/api.c b/tests/api.c index f8336579f..8a0cf5f72 100644 --- a/tests/api.c +++ b/tests/api.c @@ -39320,6 +39320,8 @@ static void test_wolfSSL_SESSION(void) #else AssertIntEQ(wolfSSL_SESSION_has_ticket(sess), 0); #endif +#else + (void)sess; #endif /* OPENSSL_EXTRA */ /* Retain copy of the session for later testing */ diff --git a/wolfssl/internal.h b/wolfssl/internal.h index adf49dad3..286c54838 100644 --- a/wolfssl/internal.h +++ b/wolfssl/internal.h @@ -4611,13 +4611,13 @@ struct WOLFSSL { */ #ifdef WOLFSSL_HAVE_ERROR_QUEUE #define CLEAR_ASN_NO_PEM_HEADER_ERROR(err) \ - err = wolfSSL_ERR_peek_last_error(); \ + (err) = wolfSSL_ERR_peek_last_error(); \ if (ERR_GET_LIB(err) == ERR_LIB_PEM && \ ERR_GET_REASON(err) == PEM_R_NO_START_LINE) { \ wc_RemoveErrorNode(-1); \ } #else -#define CLEAR_ASN_NO_PEM_HEADER_ERROR(err) (void)err; +#define CLEAR_ASN_NO_PEM_HEADER_ERROR(err) (void)(err); #endif /* diff --git a/wolfssl/ssl.h b/wolfssl/ssl.h index b25942dd8..bd82cf1e6 100644 --- a/wolfssl/ssl.h +++ b/wolfssl/ssl.h @@ -2852,7 +2852,8 @@ WOLFSSL_API int wolfSSL_make_eap_keys(WOLFSSL* ssl, void* key, unsigned int len, WOLFSSL_API int wolfSSL_Unload_trust_peers(WOLFSSL* ssl); #endif WOLFSSL_API int wolfSSL_CTX_trust_peer_buffer(WOLFSSL_CTX* ctx, - const unsigned char*, long, int); + const unsigned char* in, + long sz, int format); #endif WOLFSSL_API int wolfSSL_CTX_load_verify_buffer_ex(WOLFSSL_CTX* ctx, const unsigned char* in, long sz, int format,