Browse Source

Shush some uninitialized variable warnings.

We seem to have tweaked some inlining one way or another and confused
the compiler's uninitialized value warning.

https://build.chromium.org/p/client.boringssl/builders/android_aarch64_rel/builds/1010/steps/ninja/logs/stdio

Change-Id: I0115da889eb7fffedaa4bd7ecc896f5b68215d68
Reviewed-on: https://boringssl-review.googlesource.com/15832
Commit-Queue: David Benjamin <davidben@google.com>
Commit-Queue: Adam Langley <agl@google.com>
Reviewed-by: Adam Langley <agl@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
kris/onging/CECPQ3_patch15
David Benjamin 7 years ago
committed by CQ bot account: commit-bot@chromium.org
parent
commit
5eb75e211e
1 changed files with 3 additions and 3 deletions
  1. +3
    -3
      crypto/rsa/rsa.c

+ 3
- 3
crypto/rsa/rsa.c View File

@@ -448,8 +448,8 @@ int RSA_sign(int hash_nid, const uint8_t *in, unsigned in_len, uint8_t *out,
unsigned *out_len, RSA *rsa) {
const unsigned rsa_size = RSA_size(rsa);
int ret = 0;
uint8_t *signed_msg;
size_t signed_msg_len;
uint8_t *signed_msg = NULL;
size_t signed_msg_len = 0;
int signed_msg_is_alloced = 0;
size_t size_t_out_len;

@@ -508,7 +508,7 @@ int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len,
uint8_t *buf = NULL;
int ret = 0;
uint8_t *signed_msg = NULL;
size_t signed_msg_len, len;
size_t signed_msg_len = 0, len;
int signed_msg_is_alloced = 0;

if (hash_nid == NID_md5_sha1 && msg_len != SSL_SIG_LENGTH) {


Loading…
Cancel
Save