mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-08-07 06:42:56 +03:00
Fix use of sizeof without brackets
Signed-off-by: Dave Rodgman <dave.rodgman@arm.com>
This commit is contained in:
@@ -659,7 +659,7 @@ int mbedtls_ccm_self_test(int verbose)
|
||||
mbedtls_ccm_init(&ctx);
|
||||
|
||||
if (mbedtls_ccm_setkey(&ctx, MBEDTLS_CIPHER_ID_AES, key_test_data,
|
||||
8 * sizeof key_test_data) != 0) {
|
||||
8 * sizeof(key_test_data)) != 0) {
|
||||
if (verbose != 0) {
|
||||
mbedtls_printf(" CCM: setup failed");
|
||||
}
|
||||
|
@@ -4507,7 +4507,7 @@ static const mbedtls_ecp_point brainpoolP512r1_T[32] = {
|
||||
defined(MBEDTLS_ECP_DP_CURVE448_ENABLED)
|
||||
/*
|
||||
* Create an MPI from embedded constants
|
||||
* (assumes len is an exact multiple of sizeof mbedtls_mpi_uint)
|
||||
* (assumes len is an exact multiple of sizeof(mbedtls_mpi_uint))
|
||||
*/
|
||||
static inline void ecp_mpi_load(mbedtls_mpi *X, const mbedtls_mpi_uint *p, size_t len)
|
||||
{
|
||||
@@ -5370,7 +5370,7 @@ static inline int ecp_mod_koblitz(mbedtls_mpi *N, mbedtls_mpi_uint *Rp, size_t p
|
||||
if (M.n > p_limbs + adjust) {
|
||||
M.n = p_limbs + adjust;
|
||||
}
|
||||
memset(Mp, 0, sizeof Mp);
|
||||
memset(Mp, 0, sizeof(Mp));
|
||||
memcpy(Mp, N->p + p_limbs - adjust, M.n * sizeof(mbedtls_mpi_uint));
|
||||
if (shift != 0) {
|
||||
MBEDTLS_MPI_CHK(mbedtls_mpi_shift_r(&M, shift));
|
||||
@@ -5396,7 +5396,7 @@ static inline int ecp_mod_koblitz(mbedtls_mpi *N, mbedtls_mpi_uint *Rp, size_t p
|
||||
if (M.n > p_limbs + adjust) {
|
||||
M.n = p_limbs + adjust;
|
||||
}
|
||||
memset(Mp, 0, sizeof Mp);
|
||||
memset(Mp, 0, sizeof(Mp));
|
||||
memcpy(Mp, N->p + p_limbs - adjust, M.n * sizeof(mbedtls_mpi_uint));
|
||||
if (shift != 0) {
|
||||
MBEDTLS_MPI_CHK(mbedtls_mpi_shift_r(&M, shift));
|
||||
|
@@ -677,7 +677,7 @@ int mbedtls_entropy_self_test(int verbose)
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
if ((ret = mbedtls_entropy_update_manual(&ctx, buf, sizeof buf)) != 0) {
|
||||
if ((ret = mbedtls_entropy_update_manual(&ctx, buf, sizeof(buf))) != 0) {
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
|
@@ -456,7 +456,7 @@ int mbedtls_ripemd160_self_test(int verbose)
|
||||
int i, ret = 0;
|
||||
unsigned char output[20];
|
||||
|
||||
memset(output, 0, sizeof output);
|
||||
memset(output, 0, sizeof(output));
|
||||
|
||||
for (i = 0; i < TESTS; i++) {
|
||||
if (verbose != 0) {
|
||||
|
@@ -1652,10 +1652,10 @@ cleanup:
|
||||
memset(&sb, 0, sizeof(sb));
|
||||
|
||||
while ((entry = readdir(dir)) != NULL) {
|
||||
snp_ret = mbedtls_snprintf(entry_name, sizeof entry_name,
|
||||
snp_ret = mbedtls_snprintf(entry_name, sizeof(entry_name),
|
||||
"%s/%s", path, entry->d_name);
|
||||
|
||||
if (snp_ret < 0 || (size_t) snp_ret >= sizeof entry_name) {
|
||||
if (snp_ret < 0 || (size_t) snp_ret >= sizeof(entry_name)) {
|
||||
ret = MBEDTLS_ERR_X509_BUFFER_TOO_SMALL;
|
||||
goto cleanup;
|
||||
} else if (stat(entry_name, &sb) == -1) {
|
||||
|
Reference in New Issue
Block a user