From 50a3be6df7e851a830142f5e4611b2b1f0b8861c Mon Sep 17 00:00:00 2001 From: Daniel Pouzzner Date: Fri, 28 Feb 2025 15:29:58 -0600 Subject: [PATCH] wolfcrypt/src/sp_int.c. src/ssl_asn1.c. src/internal.c: rename several declarations to avoid shadowing global functions, for the convenience of obsolete (pre-4v8) gcc -Wshadow. --- src/internal.c | 4 ++-- src/ssl_asn1.c | 26 +++++++++++++------------- wolfcrypt/src/sp_int.c | 4 ++-- 3 files changed, 17 insertions(+), 17 deletions(-) diff --git a/src/internal.c b/src/internal.c index 8d2a9be52..aa9387267 100644 --- a/src/internal.c +++ b/src/internal.c @@ -25346,12 +25346,12 @@ int SendAsyncData(WOLFSSL* ssl) * 2 in SCR and we have plain data ready * Early data logic may bypass this logic in TLSv1.3 when appropriate. */ -static int ssl_in_handshake(WOLFSSL *ssl, int send) +static int ssl_in_handshake(WOLFSSL *ssl, int sending_data) { int SendAsyncData = 1; (void)SendAsyncData; if (IsSCR(ssl)) { - if (send) { + if (sending_data) { /* allow sending data in SCR */ return 0; } else { diff --git a/src/ssl_asn1.c b/src/ssl_asn1.c index d1cdbdb2f..d05c235ca 100644 --- a/src/ssl_asn1.c +++ b/src/ssl_asn1.c @@ -1093,36 +1093,36 @@ static int wolfssl_asn1_integer_require_len(WOLFSSL_ASN1_INTEGER* a, int len, */ WOLFSSL_ASN1_INTEGER* wolfSSL_ASN1_INTEGER_dup(const WOLFSSL_ASN1_INTEGER* src) { - WOLFSSL_ASN1_INTEGER* dup = NULL; + WOLFSSL_ASN1_INTEGER* dst = NULL; WOLFSSL_ENTER("wolfSSL_ASN1_INTEGER_dup"); - /* Check for object to duplicate. */ + /* Check for object to dstlicate. */ if (src != NULL) { /* Create a new ASN.1 INTEGER object to be copied into. */ - dup = wolfSSL_ASN1_INTEGER_new(); + dst = wolfSSL_ASN1_INTEGER_new(); } /* Check for object to copy into. */ - if (dup != NULL) { + if (dst != NULL) { /* Copy simple fields. */ - dup->length = src->length; - dup->negative = src->negative; - dup->type = src->type; + dst->length = src->length; + dst->negative = src->negative; + dst->type = src->type; if (!src->isDynamic) { /* Copy over data from/to fixed buffer. */ - XMEMCPY(dup->intData, src->intData, WOLFSSL_ASN1_INTEGER_MAX); + XMEMCPY(dst->intData, src->intData, WOLFSSL_ASN1_INTEGER_MAX); } - else if (wolfssl_asn1_integer_require_len(dup, src->length, 0) == 0) { - wolfSSL_ASN1_INTEGER_free(dup); - dup = NULL; + else if (wolfssl_asn1_integer_require_len(dst, src->length, 0) == 0) { + wolfSSL_ASN1_INTEGER_free(dst); + dst = NULL; } else { - XMEMCPY(dup->data, src->data, (size_t)src->length); + XMEMCPY(dst->data, src->data, (size_t)src->length); } } - return dup; + return dst; } #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */ diff --git a/wolfcrypt/src/sp_int.c b/wolfcrypt/src/sp_int.c index b0dfa25b6..7ea5c2d77 100644 --- a/wolfcrypt/src/sp_int.c +++ b/wolfcrypt/src/sp_int.c @@ -8216,7 +8216,7 @@ int sp_addmod_ct(const sp_int* a, const sp_int* b, const sp_int* m, sp_int* r) * @return MP_OKAY on success. */ static void _sp_submod_ct(const sp_int* a, const sp_int* b, const sp_int* m, - unsigned int max, sp_int* r) + unsigned int max_size, sp_int* r) { #ifndef SQR_MUL_ASM sp_int_sword w; @@ -8237,7 +8237,7 @@ static void _sp_submod_ct(const sp_int* a, const sp_int* b, const sp_int* m, l = 0; h = 0; #endif - for (i = 0; i < max; i++) { + for (i = 0; i < max_size; i++) { /* Values past 'used' are not initialized. */ mask_a += (i == a->used); mask_b += (i == b->used);