Skip to content

Commit

Permalink
Merge pull request #8181 from gojimmypi/dev-compiler-message
Browse files Browse the repository at this point in the history
Initialize vars & change types to appease Windows/VS
  • Loading branch information
douzzer authored Dec 17, 2024
2 parents 058138e + 5d86031 commit 22e9508
Show file tree
Hide file tree
Showing 15 changed files with 89 additions and 55 deletions.
4 changes: 2 additions & 2 deletions src/bio.c
Original file line number Diff line number Diff line change
Expand Up @@ -1371,15 +1371,15 @@ long wolfSSL_BIO_get_mem_ptr(WOLFSSL_BIO *bio, WOLFSSL_BUF_MEM **ptr)
int closeFlag)
{
if (!bio || !bufMem ||
(closeFlag != BIO_NOCLOSE && closeFlag != BIO_CLOSE))
(closeFlag != WOLFSSL_BIO_NOCLOSE && closeFlag != WOLFSSL_BIO_CLOSE))
return BAD_FUNC_ARG;

if (bio->mem_buf)
if (closeFlag == BIO_CLOSE)
wolfSSL_BUF_MEM_free(bio->mem_buf);

bio->mem_buf = bufMem;
bio->shutdown = closeFlag;
bio->shutdown = closeFlag ? WOLFSSL_BIO_CLOSE : WOLFSSL_BIO_NOCLOSE;

bio->wrSz = (int)bio->mem_buf->length;
bio->wrSzReset = bio->wrSz;
Expand Down
11 changes: 8 additions & 3 deletions src/dtls.c
Original file line number Diff line number Diff line change
Expand Up @@ -716,9 +716,14 @@ static int SendStatelessReplyDtls13(const WOLFSSL* ssl, WolfSSL_CH* ch)
* and if they don't match we will error out there anyway. */
byte modes;

/* TLSX_PreSharedKey_Parse_ClientHello uses word16 length */
if (tlsx.size > WOLFSSL_MAX_16BIT) {
ERROR_OUT(BUFFER_ERROR, dtls13_cleanup);
}

/* Ask the user for the ciphersuite matching this identity */
if (TLSX_PreSharedKey_Parse_ClientHello(&parsedExts,
tlsx.elements, tlsx.size, ssl->heap) == 0)
tlsx.elements, (word16)tlsx.size, ssl->heap) == 0)
FindPskSuiteFromExt(ssl, parsedExts, &pskInfo, &suites);
/* Revert to full handshake if PSK parsing failed */

Expand All @@ -729,8 +734,8 @@ static int SendStatelessReplyDtls13(const WOLFSSL* ssl, WolfSSL_CH* ch)
goto dtls13_cleanup;
if (!tlsxFound)
ERROR_OUT(PSK_KEY_ERROR, dtls13_cleanup);
ret = TLSX_PskKeyModes_Parse_Modes(tlsx.elements, tlsx.size,
client_hello, &modes);
ret = TLSX_PskKeyModes_Parse_Modes(tlsx.elements, (word16)tlsx.size,
client_hello, &modes);
if (ret != 0)
goto dtls13_cleanup;
if ((modes & (1 << PSK_DHE_KE)) &&
Expand Down
10 changes: 5 additions & 5 deletions src/pk.c
Original file line number Diff line number Diff line change
Expand Up @@ -3562,7 +3562,7 @@ int wolfSSL_RSA_padding_add_PKCS1_PSS_mgf1(WOLFSSL_RSA *rsa, unsigned char *em,
const WOLFSSL_EVP_MD *mgf1Hash, int saltLen)
{
int ret = 1;
enum wc_HashType hashType;
enum wc_HashType hashType = WC_HASH_TYPE_NONE;
int hashLen = 0;
int emLen = 0;
int mgf = 0;
Expand Down Expand Up @@ -7876,7 +7876,7 @@ static int wolfssl_dhparams_to_der(WOLFSSL_DH* dh, unsigned char** out,
int ret = WC_NO_ERR_TRACE(WOLFSSL_FATAL_ERROR);
int err = 0;
byte* der = NULL;
word32 derSz;
word32 derSz = 0;
DhKey* key = NULL;

(void)heap;
Expand Down Expand Up @@ -7933,7 +7933,7 @@ static int wolfssl_dhparams_to_der(WOLFSSL_DH* dh, unsigned char** out,
int wolfSSL_PEM_write_DHparams(XFILE fp, WOLFSSL_DH* dh)
{
int ret = 1;
int derSz;
int derSz = 0;
byte* derBuf = NULL;
void* heap = NULL;

Expand Down Expand Up @@ -16501,7 +16501,7 @@ int pkcs8_encode(WOLFSSL_EVP_PKEY* pkey, byte* key, word32* keySz)
{
int ret = 0;
int algId = 0;
const byte* curveOid;
const byte* curveOid = 0;
word32 oidSz = 0;

/* Get the details of the private key. */
Expand Down Expand Up @@ -16587,7 +16587,7 @@ static int pem_write_mem_pkcs8privatekey(byte** pem, int* pemSz,
int ret = 0;
char password[NAME_SZ];
byte* key = NULL;
word32 keySz;
word32 keySz = 0;
int type = PKCS8_PRIVATEKEY_TYPE;

/* Validate parameters. */
Expand Down
6 changes: 3 additions & 3 deletions src/ssl.c
Original file line number Diff line number Diff line change
Expand Up @@ -2185,7 +2185,7 @@ int wolfSSL_CTX_mcast_set_member_id(WOLFSSL_CTX* ctx, word16 id)

WOLFSSL_ENTER("wolfSSL_CTX_mcast_set_member_id");

if (ctx == NULL || id > 255)
if (ctx == NULL || id > WOLFSSL_MAX_8BIT)
ret = BAD_FUNC_ARG;

if (ret == 0) {
Expand Down Expand Up @@ -2320,7 +2320,7 @@ int wolfSSL_mcast_peer_add(WOLFSSL* ssl, word16 peerId, int sub)
int i;

WOLFSSL_ENTER("wolfSSL_mcast_peer_add");
if (ssl == NULL || peerId > 255)
if (ssl == NULL || peerId > WOLFSSL_MAX_8BIT)
return BAD_FUNC_ARG;

if (!sub) {
Expand Down Expand Up @@ -2376,7 +2376,7 @@ int wolfSSL_mcast_peer_known(WOLFSSL* ssl, unsigned short peerId)

WOLFSSL_ENTER("wolfSSL_mcast_peer_known");

if (ssl == NULL || peerId > 255) {
if (ssl == NULL || peerId > WOLFSSL_MAX_8BIT) {
return BAD_FUNC_ARG;
}

Expand Down
6 changes: 4 additions & 2 deletions src/ssl_asn1.c
Original file line number Diff line number Diff line change
Expand Up @@ -282,10 +282,12 @@ static int wolfssl_i2d_asn1_items(const void* obj, byte* buf,
len = 0;
break;
}

if (buf != NULL && tmp != NULL && !mem->ex && mem->tag >= 0) {
/* Encode the implicit tag */
byte imp[ASN_TAG_SZ + MAX_LENGTH_SZ];
SetImplicit(tmp[0], mem->tag, 0, imp, 0);
/* Encode the implicit tag; There's other stuff in the upper bits
* of the integer tag, so strip out everything else for value. */
SetImplicit(tmp[0], (byte)(mem->tag), 0, imp, 0);
tmp[0] = imp[0];
}
len += ret;
Expand Down
2 changes: 1 addition & 1 deletion src/ssl_load.c
Original file line number Diff line number Diff line change
Expand Up @@ -5094,7 +5094,7 @@ int wolfSSL_CTX_use_certificate_ASN1(WOLFSSL_CTX *ctx, int derSz,
int wolfSSL_CTX_use_RSAPrivateKey(WOLFSSL_CTX* ctx, WOLFSSL_RSA* rsa)
{
int ret = 1;
int derSize;
int derSize = 0;
unsigned char* der = NULL;
unsigned char* p;

Expand Down
2 changes: 1 addition & 1 deletion src/ssl_p7p12.c
Original file line number Diff line number Diff line change
Expand Up @@ -948,7 +948,7 @@ int wolfSSL_PEM_write_bio_PKCS7(WOLFSSL_BIO* bio, PKCS7* p7)
int pemSz = -1;
enum wc_HashType hashType;
byte hashBuf[WC_MAX_DIGEST_SIZE];
word32 hashSz = -1;
word32 hashSz = 0;

WOLFSSL_ENTER("wolfSSL_PEM_write_bio_PKCS7");

Expand Down
7 changes: 4 additions & 3 deletions src/ssl_sess.c
Original file line number Diff line number Diff line change
Expand Up @@ -3754,7 +3754,7 @@ static int wolfSSL_DupSessionEx(const WOLFSSL_SESSION* input,
byte* ticketNonceLen, byte* preallocUsed)
{
#ifdef HAVE_SESSION_TICKET
int ticLenAlloc = 0;
word16 ticLenAlloc = 0;
byte *ticBuff = NULL;
#endif
const size_t copyOffset = OFFSETOF(WOLFSSL_SESSION, heap) +
Expand Down Expand Up @@ -4170,7 +4170,8 @@ int wolfSSL_SESSION_set1_id(WOLFSSL_SESSION *s,
if (sid_len > ID_LEN) {
return WOLFSSL_FAILURE;
}
s->sessionIDSz = sid_len;

s->sessionIDSz = (byte)sid_len;
if (sid != s->sessionID) {
XMEMCPY(s->sessionID, sid, sid_len);
}
Expand All @@ -4186,7 +4187,7 @@ int wolfSSL_SESSION_set1_id_context(WOLFSSL_SESSION *s,
if (sid_ctx_len > ID_LEN) {
return WOLFSSL_FAILURE;
}
s->sessionCtxSz = sid_ctx_len;
s->sessionCtxSz = (byte)sid_ctx_len;
if (sid_ctx != s->sessionCtx) {
XMEMCPY(s->sessionCtx, sid_ctx, sid_ctx_len);
}
Expand Down
35 changes: 25 additions & 10 deletions src/tls13.c
Original file line number Diff line number Diff line change
Expand Up @@ -4018,6 +4018,10 @@ static int WritePSKBinders(WOLFSSL* ssl, byte* output, word32 idx)

WOLFSSL_ENTER("WritePSKBinders");

if (idx > WOLFSSL_MAX_16BIT) {
return INPUT_SIZE_E;
}

ext = TLSX_Find(ssl->extensions, TLSX_PRE_SHARED_KEY);
if (ext == NULL)
return SANITY_MSG_E;
Expand All @@ -4033,7 +4037,7 @@ static int WritePSKBinders(WOLFSSL* ssl, byte* output, word32 idx)
#ifdef WOLFSSL_DTLS13
if (ssl->options.dtls)
ret = Dtls13HashHandshake(ssl, output + Dtls13GetRlHeaderLength(ssl, 0),
idx - Dtls13GetRlHeaderLength(ssl, 0));
(word16)idx - Dtls13GetRlHeaderLength(ssl, 0));
else
#endif /* WOLFSSL_DTLS13 */
ret = HashOutput(ssl, output, (int)idx, 0);
Expand Down Expand Up @@ -6270,7 +6274,7 @@ static int CheckPreSharedKeys(WOLFSSL* ssl, const byte* input, word32 helloSz,
return ret;

if (*usingPSK != 0) {
word16 modes;
word32 modes;
#ifdef WOLFSSL_EARLY_DATA
TLSX* extEarlyData;

Expand Down Expand Up @@ -10862,14 +10866,18 @@ int DoTls13Finished(WOLFSSL* ssl, const byte* input, word32* inOutIdx,

if (sniff == NO_SNIFF) {
ret = BuildTls13HandshakeHmac(ssl, secret, mac, &finishedSz);

if (finishedSz > WOLFSSL_MAX_8BIT) {
return BUFFER_ERROR;
}
#ifdef WOLFSSL_HAVE_TLS_UNIQUE
if (ssl->options.side == WOLFSSL_CLIENT_END) {
XMEMCPY(ssl->serverFinished, mac, finishedSz);
ssl->serverFinished_len = finishedSz;
ssl->serverFinished_len = (byte)finishedSz;
}
else {
XMEMCPY(ssl->clientFinished, mac, finishedSz);
ssl->clientFinished_len = finishedSz;
ssl->clientFinished_len = (byte)finishedSz;
}
#endif /* WOLFSSL_HAVE_TLS_UNIQUE */
if (ret != 0)
Expand Down Expand Up @@ -10951,7 +10959,7 @@ int DoTls13Finished(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
*/
static int SendTls13Finished(WOLFSSL* ssl)
{
int finishedSz = ssl->specs.hash_size;
byte finishedSz = ssl->specs.hash_size;
byte* input;
byte* output;
int ret;
Expand Down Expand Up @@ -11811,9 +11819,9 @@ static int SendTls13NewSessionTicket(WOLFSSL* ssl)
{
byte* output;
int ret;
word32 length;
int sendSz;
word16 extSz;
word32 length;
word32 idx = RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ;

WOLFSSL_START(WC_FUNC_NEW_SESSION_TICKET_SEND);
Expand Down Expand Up @@ -11884,7 +11892,7 @@ static int SendTls13NewSessionTicket(WOLFSSL* ssl)
/* Nonce */
length += TICKET_NONCE_LEN_SZ + DEF_TICKET_NONCE_SZ;

sendSz = (int)(idx + length + MAX_MSG_EXTRA);
sendSz = (word16)(idx + length + MAX_MSG_EXTRA);

/* Check buffers are big enough and grow if needed. */
if ((ret = CheckAvailableSize(ssl, sendSz)) != 0)
Expand Down Expand Up @@ -11940,6 +11948,10 @@ static int SendTls13NewSessionTicket(WOLFSSL* ssl)
idx += EXTS_SZ;
#endif

if (idx > WOLFSSL_MAX_16BIT) {
return BAD_LENGTH_E;
}

ssl->options.haveSessionId = 1;

SetupSession(ssl);
Expand All @@ -11952,12 +11964,15 @@ static int SendTls13NewSessionTicket(WOLFSSL* ssl)

#ifdef WOLFSSL_DTLS13
if (ssl->options.dtls)
return Dtls13HandshakeSend(ssl, output, sendSz, idx, session_ticket, 0);
return Dtls13HandshakeSend(ssl, output, (word16)sendSz,
(word16)idx, session_ticket, 0);
#endif /* WOLFSSL_DTLS13 */

/* This message is always encrypted. */
sendSz = BuildTls13Message(ssl, output, sendSz, output + RECORD_HEADER_SZ,
idx - RECORD_HEADER_SZ, handshake, 0, 0, 0);
sendSz = BuildTls13Message(ssl, output, sendSz,
output + RECORD_HEADER_SZ,
(word16)idx - RECORD_HEADER_SZ,
handshake, 0, 0, 0);
if (sendSz < 0)
return sendSz;

Expand Down
7 changes: 6 additions & 1 deletion src/x509.c
Original file line number Diff line number Diff line change
Expand Up @@ -1478,9 +1478,14 @@ int wolfSSL_X509_add_ext(WOLFSSL_X509 *x509, WOLFSSL_X509_EXTENSION *ext,
return WOLFSSL_FAILURE;
}

/* ext->crit is WOLFSSL_ASN1_BOOLEAN */
if (ext->crit != 0 && ext->crit != -1) {
return WOLFSSL_FAILURE;
}

/* x509->custom_exts now owns the buffers and they must be managed. */
x509->custom_exts[x509->customExtCount].oid = oid;
x509->custom_exts[x509->customExtCount].crit = ext->crit;
x509->custom_exts[x509->customExtCount].crit = (byte)ext->crit;
x509->custom_exts[x509->customExtCount].val = val;
x509->custom_exts[x509->customExtCount].valSz = ext->value.length;
x509->customExtCount++;
Expand Down
9 changes: 6 additions & 3 deletions wolfcrypt/src/asn.c
Original file line number Diff line number Diff line change
Expand Up @@ -13548,7 +13548,7 @@ static int GenerateDNSEntryIPString(DNS_entry* entry, void* heap)
static int GenerateDNSEntryRIDString(DNS_entry* entry, void* heap)
{
int i, j, ret = 0;
int nameSz = 0;
word16 nameSz = 0;
#if !defined(WOLFCRYPT_ONLY) && defined(OPENSSL_EXTRA)
int nid = 0;
#endif
Expand All @@ -13557,7 +13557,7 @@ static int GenerateDNSEntryRIDString(DNS_entry* entry, void* heap)
word32 idx = 0;
word16 tmpName[MAX_OID_SZ];
char oidName[MAX_OID_SZ];
char* finalName;
char* finalName = NULL;

if (entry == NULL || entry->type != ASN_RID_TYPE) {
return BAD_FUNC_ARG;
Expand Down Expand Up @@ -13615,7 +13615,10 @@ static int GenerateDNSEntryRIDString(DNS_entry* entry, void* heap)
}

if (ret == 0) {
nameSz = (int)XSTRLEN((const char*)finalName);
nameSz = (word16)XSTRLEN((const char*)finalName);
if (nameSz > MAX_OID_SZ) {
return BUFFER_E;
}

entry->ridString = (char*)XMALLOC((word32)(nameSz + 1), heap,
DYNAMIC_TYPE_ALTNAME);
Expand Down
2 changes: 1 addition & 1 deletion wolfcrypt/src/dsa.c
Original file line number Diff line number Diff line change
Expand Up @@ -173,7 +173,7 @@ int wc_MakeDsaKey(WC_RNG *rng, DsaKey *dsa)
return MEMORY_E;
}

SAVE_VECTOR_REGISTERS();
SAVE_VECTOR_REGISTERS(;);

#ifdef WOLFSSL_SMALL_STACK
if ((tmpQ = (mp_int *)XMALLOC(sizeof(*tmpQ), NULL, DYNAMIC_TYPE_WOLF_BIGINT)) == NULL)
Expand Down
24 changes: 13 additions & 11 deletions wolfcrypt/src/ecc.c
Original file line number Diff line number Diff line change
Expand Up @@ -12593,20 +12593,22 @@ static int build_lut(int idx, mp_int* a, mp_int* modulus, mp_digit mp,

/* make all single bit entries */
for (x = 1; x < FP_LUT; x++) {
if ((mp_copy(fp_cache[idx].LUT[1<<(x-1)]->x,
fp_cache[idx].LUT[1<<x]->x) != MP_OKAY) ||
(mp_copy(fp_cache[idx].LUT[1<<(x-1)]->y,
fp_cache[idx].LUT[1<<x]->y) != MP_OKAY) ||
(mp_copy(fp_cache[idx].LUT[1<<(x-1)]->z,
fp_cache[idx].LUT[1<<x]->z) != MP_OKAY)){
if ((mp_copy(fp_cache[idx].LUT[(unsigned int)(1 << (x-1))]->x,
fp_cache[idx].LUT[(unsigned int)(1 << x )]->x) != MP_OKAY) ||
(mp_copy(fp_cache[idx].LUT[(unsigned int)(1 << (x-1))]->y,
fp_cache[idx].LUT[(unsigned int)(1 << x )]->y) != MP_OKAY) ||
(mp_copy(fp_cache[idx].LUT[(unsigned int)(1 << (x-1))]->z,
fp_cache[idx].LUT[(unsigned int)(1 << x )]->z) != MP_OKAY)) {
err = MP_INIT_E;
goto errout;
} else {

/* now double it bitlen/FP_LUT times */
for (y = 0; y < lut_gap; y++) {
if ((err = ecc_projective_dbl_point_safe(fp_cache[idx].LUT[1<<x],
fp_cache[idx].LUT[1<<x], a, modulus, mp)) != MP_OKAY) {
if ((err = ecc_projective_dbl_point_safe(
fp_cache[idx].LUT[(unsigned int)(1<<x)],
fp_cache[idx].LUT[(unsigned int)(1<<x)],
a, modulus, mp)) != MP_OKAY) {
goto errout;
}
}
Expand Down Expand Up @@ -13173,7 +13175,7 @@ int ecc_mul2add(ecc_point* A, mp_int* kA,
ecc_point* C, mp_int* a, mp_int* modulus, void* heap)
{
int idx1 = -1, idx2 = -1, err, mpInit = 0;
mp_digit mp;
mp_digit mp = 0;
#ifdef WOLFSSL_SMALL_STACK
mp_int *mu = (mp_int *)XMALLOC(sizeof *mu, NULL, DYNAMIC_TYPE_ECC_BUFFER);

Expand Down Expand Up @@ -13321,7 +13323,7 @@ int wc_ecc_mulmod_ex(const mp_int* k, ecc_point *G, ecc_point *R, mp_int* a,
{
#if !defined(WOLFSSL_SP_MATH)
int idx, err = MP_OKAY;
mp_digit mp;
mp_digit mp = 0;
#ifdef WOLFSSL_SMALL_STACK
mp_int *mu = NULL;
#else
Expand Down Expand Up @@ -13497,7 +13499,7 @@ int wc_ecc_mulmod_ex2(const mp_int* k, ecc_point *G, ecc_point *R, mp_int* a,
{
#if !defined(WOLFSSL_SP_MATH)
int idx, err = MP_OKAY;
mp_digit mp;
mp_digit mp = 0;
#ifdef WOLFSSL_SMALL_STACK
mp_int *mu = NULL;
#else
Expand Down
Loading

0 comments on commit 22e9508

Please sign in to comment.