Skip to content

Fix some possibly-undefined variable warnings #284

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

gilles-peskine-arm
Copy link
Collaborator

Forward port of Mbed-TLS/mbedtls#2663 contributed by @apple-ihack-geek. The runtime behavior was always correct, but some compilers warned that they weren't sure about it.

apple-ihack-geek and others added 2 commits September 30, 2019 17:24
These initial values shouldn't be used, but in case they accidentally
get used after a code change, fail safe.
@gilles-peskine-arm gilles-peskine-arm added bug Something isn't working needs: review The pull request is ready for review. This generally means that it has no known issues. labels Sep 30, 2019
@Patater Patater added needs: backports Needs backports to Mbed TLS branches and removed needs: review The pull request is ready for review. This generally means that it has no known issues. labels Oct 21, 2019
@yanesca yanesca added needs: ci Needs a passing full CI run and removed needs: backports Needs backports to Mbed TLS branches labels Nov 7, 2019
@gilles-peskine-arm
Copy link
Collaborator Author

gilles-peskine-arm commented Nov 8, 2019

New CI run with repaired CI: https://jenkins-internal.mbed.com/job/mbed-crypto-pr/job/PR-284-merge/14/ → PASS

@gilles-peskine-arm
Copy link
Collaborator Author

CI and review are ok. The backports are approved and pass CI, but the original submitter hasn't signed the CLA as far as I can see. Since it isn't vital to keep the branches in synch here, I am merging the PR into Mbed Crypto which doesn't require a CLA.

@gilles-peskine-arm gilles-peskine-arm merged commit 7a9899f into ARMmbed:development Nov 12, 2019
gilles-peskine-arm added a commit to gilles-peskine-arm/mbed-crypto that referenced this pull request Nov 15, 2019
* ARMmbed#292: Make psa_close_key(0) and psa_destroy_key(0) succeed
* ARMmbed#299: Allow xxx_drbg_set_entropy_len before xxx_drbg_seed
* ARMmbed#259: Check `len` against buffers size upper bound in PSA tests
* ARMmbed#288: Add ECDSA tests with hash and key of different lengths
* ARMmbed#305: CTR_DRBG: grab a nonce from the entropy source if needed
* ARMmbed#316: Stop transactions from being reentrant
* ARMmbed#317: getting_started: Make it clear that keys are passed in
* ARMmbed#314: Fix pk_write with EC key to use a constant size for the private value
* ARMmbed#298: Test a build without any asymmetric cryptography
* ARMmbed#284: Fix some possibly-undefined variable warnings
* ARMmbed#315: Define MBEDTLS_PK_SIGNATURE_MAX_SIZE
* ARMmbed#318: Finish side-porting commits from mbedtls-restricted that missed the split
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working needs: ci Needs a passing full CI run
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants