mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-29 08:24:28 +01:00
Rename time and index parameter to avoid name conflict.
As noted in #557, several functions use 'index' resp. 'time' as parameter names in their declaration and/or definition, causing name conflicts with the functions in the C standard library of the same name some compilers warn about. This commit renames the arguments accordingly.
This commit is contained in:
parent
840bace417
commit
61937d4a83
@ -172,6 +172,8 @@ Bugfix
|
|||||||
The PK and RSA modules use different types for passing hash length and
|
The PK and RSA modules use different types for passing hash length and
|
||||||
without these checks the type cast could lead to data loss. Found by Guido
|
without these checks the type cast could lead to data loss. Found by Guido
|
||||||
Vranken.
|
Vranken.
|
||||||
|
* Avoid shadowing of time and index functions through mbed TLS function
|
||||||
|
arguments. Found by inestlerode. Fixes #557.
|
||||||
|
|
||||||
= mbed TLS 2.4.2 branch released 2017-03-08
|
= mbed TLS 2.4.2 branch released 2017-03-08
|
||||||
|
|
||||||
|
@ -461,7 +461,7 @@ int mbedtls_ecp_tls_write_point( const mbedtls_ecp_group *grp, const mbedtls_ecp
|
|||||||
* \brief Set a group using well-known domain parameters
|
* \brief Set a group using well-known domain parameters
|
||||||
*
|
*
|
||||||
* \param grp Destination group
|
* \param grp Destination group
|
||||||
* \param index Index in the list of well-known domain parameters
|
* \param id Index in the list of well-known domain parameters
|
||||||
*
|
*
|
||||||
* \return 0 if successful,
|
* \return 0 if successful,
|
||||||
* MBEDTLS_ERR_MPI_XXX if initialization failed
|
* MBEDTLS_ERR_MPI_XXX if initialization failed
|
||||||
@ -470,7 +470,7 @@ int mbedtls_ecp_tls_write_point( const mbedtls_ecp_group *grp, const mbedtls_ecp
|
|||||||
* \note Index should be a value of RFC 4492's enum NamedCurve,
|
* \note Index should be a value of RFC 4492's enum NamedCurve,
|
||||||
* usually in the form of a MBEDTLS_ECP_DP_XXX macro.
|
* usually in the form of a MBEDTLS_ECP_DP_XXX macro.
|
||||||
*/
|
*/
|
||||||
int mbedtls_ecp_group_load( mbedtls_ecp_group *grp, mbedtls_ecp_group_id index );
|
int mbedtls_ecp_group_load( mbedtls_ecp_group *grp, mbedtls_ecp_group_id id );
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Set a group from a TLS ECParameters record
|
* \brief Set a group from a TLS ECParameters record
|
||||||
|
@ -247,12 +247,12 @@ int mbedtls_x509_serial_gets( char *buf, size_t size, const mbedtls_x509_buf *se
|
|||||||
* \note Intended usage is "if( is_past( valid_to ) ) ERROR".
|
* \note Intended usage is "if( is_past( valid_to ) ) ERROR".
|
||||||
* Hence the return value of 1 if on internal errors.
|
* Hence the return value of 1 if on internal errors.
|
||||||
*
|
*
|
||||||
* \param time mbedtls_x509_time to check
|
* \param to mbedtls_x509_time to check
|
||||||
*
|
*
|
||||||
* \return 1 if the given time is in the past or an error occured,
|
* \return 1 if the given time is in the past or an error occured,
|
||||||
* 0 otherwise.
|
* 0 otherwise.
|
||||||
*/
|
*/
|
||||||
int mbedtls_x509_time_is_past( const mbedtls_x509_time *time );
|
int mbedtls_x509_time_is_past( const mbedtls_x509_time *to );
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Check a given mbedtls_x509_time against the system time
|
* \brief Check a given mbedtls_x509_time against the system time
|
||||||
@ -261,12 +261,12 @@ int mbedtls_x509_time_is_past( const mbedtls_x509_time *time );
|
|||||||
* \note Intended usage is "if( is_future( valid_from ) ) ERROR".
|
* \note Intended usage is "if( is_future( valid_from ) ) ERROR".
|
||||||
* Hence the return value of 1 if on internal errors.
|
* Hence the return value of 1 if on internal errors.
|
||||||
*
|
*
|
||||||
* \param time mbedtls_x509_time to check
|
* \param from mbedtls_x509_time to check
|
||||||
*
|
*
|
||||||
* \return 1 if the given time is in the future or an error occured,
|
* \return 1 if the given time is in the future or an error occured,
|
||||||
* 0 otherwise.
|
* 0 otherwise.
|
||||||
*/
|
*/
|
||||||
int mbedtls_x509_time_is_future( const mbedtls_x509_time *time );
|
int mbedtls_x509_time_is_future( const mbedtls_x509_time *from );
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \brief Checkup routine
|
* \brief Checkup routine
|
||||||
@ -295,7 +295,7 @@ int mbedtls_x509_get_sig_alg( const mbedtls_x509_buf *sig_oid, const mbedtls_x50
|
|||||||
mbedtls_md_type_t *md_alg, mbedtls_pk_type_t *pk_alg,
|
mbedtls_md_type_t *md_alg, mbedtls_pk_type_t *pk_alg,
|
||||||
void **sig_opts );
|
void **sig_opts );
|
||||||
int mbedtls_x509_get_time( unsigned char **p, const unsigned char *end,
|
int mbedtls_x509_get_time( unsigned char **p, const unsigned char *end,
|
||||||
mbedtls_x509_time *time );
|
mbedtls_x509_time *t );
|
||||||
int mbedtls_x509_get_serial( unsigned char **p, const unsigned char *end,
|
int mbedtls_x509_get_serial( unsigned char **p, const unsigned char *end,
|
||||||
mbedtls_x509_buf *serial );
|
mbedtls_x509_buf *serial );
|
||||||
int mbedtls_x509_get_ext( unsigned char **p, const unsigned char *end,
|
int mbedtls_x509_get_ext( unsigned char **p, const unsigned char *end,
|
||||||
|
@ -169,10 +169,10 @@ static void cmac_xor_block( unsigned char *output, const unsigned char *input1,
|
|||||||
const unsigned char *input2,
|
const unsigned char *input2,
|
||||||
const size_t block_size )
|
const size_t block_size )
|
||||||
{
|
{
|
||||||
size_t index;
|
size_t idx;
|
||||||
|
|
||||||
for( index = 0; index < block_size; index++ )
|
for( idx = 0; idx < block_size; idx++ )
|
||||||
output[ index ] = input1[ index ] ^ input2[ index ];
|
output[ idx ] = input1[ idx ] ^ input2[ idx ];
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@ -132,24 +132,24 @@ int mbedtls_entropy_add_source( mbedtls_entropy_context *ctx,
|
|||||||
mbedtls_entropy_f_source_ptr f_source, void *p_source,
|
mbedtls_entropy_f_source_ptr f_source, void *p_source,
|
||||||
size_t threshold, int strong )
|
size_t threshold, int strong )
|
||||||
{
|
{
|
||||||
int index, ret = 0;
|
int idx, ret = 0;
|
||||||
|
|
||||||
#if defined(MBEDTLS_THREADING_C)
|
#if defined(MBEDTLS_THREADING_C)
|
||||||
if( ( ret = mbedtls_mutex_lock( &ctx->mutex ) ) != 0 )
|
if( ( ret = mbedtls_mutex_lock( &ctx->mutex ) ) != 0 )
|
||||||
return( ret );
|
return( ret );
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
index = ctx->source_count;
|
idx = ctx->source_count;
|
||||||
if( index >= MBEDTLS_ENTROPY_MAX_SOURCES )
|
if( idx >= MBEDTLS_ENTROPY_MAX_SOURCES )
|
||||||
{
|
{
|
||||||
ret = MBEDTLS_ERR_ENTROPY_MAX_SOURCES;
|
ret = MBEDTLS_ERR_ENTROPY_MAX_SOURCES;
|
||||||
goto exit;
|
goto exit;
|
||||||
}
|
}
|
||||||
|
|
||||||
ctx->source[index].f_source = f_source;
|
ctx->source[idx].f_source = f_source;
|
||||||
ctx->source[index].p_source = p_source;
|
ctx->source[idx].p_source = p_source;
|
||||||
ctx->source[index].threshold = threshold;
|
ctx->source[idx].threshold = threshold;
|
||||||
ctx->source[index].strong = strong;
|
ctx->source[idx].strong = strong;
|
||||||
|
|
||||||
ctx->source_count++;
|
ctx->source_count++;
|
||||||
|
|
||||||
|
@ -496,25 +496,25 @@ static int x509_parse_int( unsigned char **p, size_t n, int *res )
|
|||||||
return( 0 );
|
return( 0 );
|
||||||
}
|
}
|
||||||
|
|
||||||
static int x509_date_is_valid(const mbedtls_x509_time *time)
|
static int x509_date_is_valid(const mbedtls_x509_time *t)
|
||||||
{
|
{
|
||||||
int ret = MBEDTLS_ERR_X509_INVALID_DATE;
|
int ret = MBEDTLS_ERR_X509_INVALID_DATE;
|
||||||
|
|
||||||
CHECK_RANGE( 0, 9999, time->year );
|
CHECK_RANGE( 0, 9999, t->year );
|
||||||
CHECK_RANGE( 0, 23, time->hour );
|
CHECK_RANGE( 0, 23, t->hour );
|
||||||
CHECK_RANGE( 0, 59, time->min );
|
CHECK_RANGE( 0, 59, t->min );
|
||||||
CHECK_RANGE( 0, 59, time->sec );
|
CHECK_RANGE( 0, 59, t->sec );
|
||||||
|
|
||||||
switch( time->mon )
|
switch( t->mon )
|
||||||
{
|
{
|
||||||
case 1: case 3: case 5: case 7: case 8: case 10: case 12:
|
case 1: case 3: case 5: case 7: case 8: case 10: case 12:
|
||||||
CHECK_RANGE( 1, 31, time->day );
|
CHECK_RANGE( 1, 31, t->day );
|
||||||
break;
|
break;
|
||||||
case 4: case 6: case 9: case 11:
|
case 4: case 6: case 9: case 11:
|
||||||
CHECK_RANGE( 1, 30, time->day );
|
CHECK_RANGE( 1, 30, t->day );
|
||||||
break;
|
break;
|
||||||
case 2:
|
case 2:
|
||||||
CHECK_RANGE( 1, 28 + (time->year % 4 == 0), time->day );
|
CHECK_RANGE( 1, 28 + (t->year % 4 == 0), t->day );
|
||||||
break;
|
break;
|
||||||
default:
|
default:
|
||||||
return( ret );
|
return( ret );
|
||||||
@ -528,7 +528,7 @@ static int x509_date_is_valid(const mbedtls_x509_time *time)
|
|||||||
* field.
|
* field.
|
||||||
*/
|
*/
|
||||||
static int x509_parse_time( unsigned char **p, size_t len, size_t yearlen,
|
static int x509_parse_time( unsigned char **p, size_t len, size_t yearlen,
|
||||||
mbedtls_x509_time *time )
|
mbedtls_x509_time *tm )
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
@ -542,26 +542,26 @@ static int x509_parse_time( unsigned char **p, size_t len, size_t yearlen,
|
|||||||
/*
|
/*
|
||||||
* Parse year, month, day, hour, minute
|
* Parse year, month, day, hour, minute
|
||||||
*/
|
*/
|
||||||
CHECK( x509_parse_int( p, yearlen, &time->year ) );
|
CHECK( x509_parse_int( p, yearlen, &tm->year ) );
|
||||||
if ( 2 == yearlen )
|
if ( 2 == yearlen )
|
||||||
{
|
{
|
||||||
if ( time->year < 50 )
|
if ( tm->year < 50 )
|
||||||
time->year += 100;
|
tm->year += 100;
|
||||||
|
|
||||||
time->year += 1900;
|
tm->year += 1900;
|
||||||
}
|
}
|
||||||
|
|
||||||
CHECK( x509_parse_int( p, 2, &time->mon ) );
|
CHECK( x509_parse_int( p, 2, &tm->mon ) );
|
||||||
CHECK( x509_parse_int( p, 2, &time->day ) );
|
CHECK( x509_parse_int( p, 2, &tm->day ) );
|
||||||
CHECK( x509_parse_int( p, 2, &time->hour ) );
|
CHECK( x509_parse_int( p, 2, &tm->hour ) );
|
||||||
CHECK( x509_parse_int( p, 2, &time->min ) );
|
CHECK( x509_parse_int( p, 2, &tm->min ) );
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Parse seconds if present
|
* Parse seconds if present
|
||||||
*/
|
*/
|
||||||
if ( len >= 2 )
|
if ( len >= 2 )
|
||||||
{
|
{
|
||||||
CHECK( x509_parse_int( p, 2, &time->sec ) );
|
CHECK( x509_parse_int( p, 2, &tm->sec ) );
|
||||||
len -= 2;
|
len -= 2;
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@ -582,7 +582,7 @@ static int x509_parse_time( unsigned char **p, size_t len, size_t yearlen,
|
|||||||
if ( 0 != len )
|
if ( 0 != len )
|
||||||
return ( MBEDTLS_ERR_X509_INVALID_DATE );
|
return ( MBEDTLS_ERR_X509_INVALID_DATE );
|
||||||
|
|
||||||
CHECK( x509_date_is_valid( time ) );
|
CHECK( x509_date_is_valid( tm ) );
|
||||||
|
|
||||||
return ( 0 );
|
return ( 0 );
|
||||||
}
|
}
|
||||||
@ -593,7 +593,7 @@ static int x509_parse_time( unsigned char **p, size_t len, size_t yearlen,
|
|||||||
* generalTime GeneralizedTime }
|
* generalTime GeneralizedTime }
|
||||||
*/
|
*/
|
||||||
int mbedtls_x509_get_time( unsigned char **p, const unsigned char *end,
|
int mbedtls_x509_get_time( unsigned char **p, const unsigned char *end,
|
||||||
mbedtls_x509_time *time )
|
mbedtls_x509_time *tm )
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
size_t len, year_len;
|
size_t len, year_len;
|
||||||
@ -619,7 +619,7 @@ int mbedtls_x509_get_time( unsigned char **p, const unsigned char *end,
|
|||||||
if( ret != 0 )
|
if( ret != 0 )
|
||||||
return( MBEDTLS_ERR_X509_INVALID_DATE + ret );
|
return( MBEDTLS_ERR_X509_INVALID_DATE + ret );
|
||||||
|
|
||||||
return x509_parse_time( p, len, year_len, time );
|
return x509_parse_time( p, len, year_len, tm );
|
||||||
}
|
}
|
||||||
|
|
||||||
int mbedtls_x509_get_sig( unsigned char **p, const unsigned char *end, mbedtls_x509_buf *sig )
|
int mbedtls_x509_get_sig( unsigned char **p, const unsigned char *end, mbedtls_x509_buf *sig )
|
||||||
|
@ -264,7 +264,7 @@ int mbedtls_x509write_crt_set_ns_cert_type( mbedtls_x509write_cert *ctx,
|
|||||||
}
|
}
|
||||||
|
|
||||||
static int x509_write_time( unsigned char **p, unsigned char *start,
|
static int x509_write_time( unsigned char **p, unsigned char *start,
|
||||||
const char *time, size_t size )
|
const char *t, size_t size )
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
size_t len = 0;
|
size_t len = 0;
|
||||||
@ -272,10 +272,10 @@ static int x509_write_time( unsigned char **p, unsigned char *start,
|
|||||||
/*
|
/*
|
||||||
* write MBEDTLS_ASN1_UTC_TIME if year < 2050 (2 bytes shorter)
|
* write MBEDTLS_ASN1_UTC_TIME if year < 2050 (2 bytes shorter)
|
||||||
*/
|
*/
|
||||||
if( time[0] == '2' && time[1] == '0' && time [2] < '5' )
|
if( t[0] == '2' && t[1] == '0' && t[2] < '5' )
|
||||||
{
|
{
|
||||||
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_raw_buffer( p, start,
|
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_raw_buffer( p, start,
|
||||||
(const unsigned char *) time + 2,
|
(const unsigned char *) t + 2,
|
||||||
size - 2 ) );
|
size - 2 ) );
|
||||||
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_len( p, start, len ) );
|
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_len( p, start, len ) );
|
||||||
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_tag( p, start, MBEDTLS_ASN1_UTC_TIME ) );
|
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_tag( p, start, MBEDTLS_ASN1_UTC_TIME ) );
|
||||||
@ -283,7 +283,7 @@ static int x509_write_time( unsigned char **p, unsigned char *start,
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_raw_buffer( p, start,
|
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_raw_buffer( p, start,
|
||||||
(const unsigned char *) time,
|
(const unsigned char *) t,
|
||||||
size ) );
|
size ) );
|
||||||
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_len( p, start, len ) );
|
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_len( p, start, len ) );
|
||||||
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_tag( p, start, MBEDTLS_ASN1_GENERALIZED_TIME ) );
|
MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_tag( p, start, MBEDTLS_ASN1_GENERALIZED_TIME ) );
|
||||||
|
Loading…
Reference in New Issue
Block a user