@@ -371,10 +371,9 @@ asn1::ASN1ParseResult ReadASN1Container(const Array<uint8_t>& data, const asn1::
371
371
size_t bytesLeft = static_cast <size_t >(length);
372
372
373
373
while (bytesLeft > 0 ) {
374
- long elemLength = 0 ;
375
- int elemTag = 0 ;
376
- int elemClass = 0 ;
377
- bool isConstructed = false ;
374
+ long elemLength = 0 ;
375
+ int elemTag = 0 ;
376
+ int elemClass = 0 ;
378
377
379
378
const unsigned char * nextPtr = elemPtr;
380
379
err = GetASN1Object (&nextPtr, elemLength, elemTag, elemClass, isConstructed, static_cast <long >(bytesLeft));
@@ -413,7 +412,7 @@ Error VerifyRSASignature(const RSAPublicKey& pubKey, mbedtls_md_type_t hash, Pad
413
412
{
414
413
mbedtls_rsa_context rsa;
415
414
mbedtls_rsa_init (&rsa);
416
- auto releaseRSA = DeferRelease (&rsa, mbedtls_rsa_free);
415
+ [[maybe_unused]] auto releaseRSA = DeferRelease (&rsa, mbedtls_rsa_free);
417
416
418
417
int ret = mbedtls_rsa_import_raw (&rsa, pubKey.GetN ().Get (), pubKey.GetN ().Size (), nullptr , 0 , // P - unused
419
418
nullptr , 0 , // Q - unused
@@ -500,16 +499,16 @@ Error VerifyECDSASignature(const ECDSAPublicKey& pubKey, const Array<uint8_t>& d
500
499
mbedtls_ecp_keypair keypair;
501
500
502
501
mbedtls_ecp_group_init (&grp);
503
- auto grpRelease = DeferRelease (&grp, mbedtls_ecp_group_free);
502
+ [[maybe_unused]] auto grpRelease = DeferRelease (&grp, mbedtls_ecp_group_free);
504
503
505
504
mbedtls_ecp_point_init (&ecPoint);
506
- auto QRelease = DeferRelease (&ecPoint, mbedtls_ecp_point_free);
505
+ [[maybe_unused]] auto QRelease = DeferRelease (&ecPoint, mbedtls_ecp_point_free);
507
506
508
507
mbedtls_ecdsa_init (&ctx);
509
- auto ctxRelease = DeferRelease (&ctx, mbedtls_ecdsa_free);
508
+ [[maybe_unused]] auto ctxRelease = DeferRelease (&ctx, mbedtls_ecdsa_free);
510
509
511
510
mbedtls_ecp_keypair_init (&keypair);
512
- auto keypairRelease = DeferRelease (&keypair, mbedtls_ecp_keypair_free);
511
+ [[maybe_unused]] auto keypairRelease = DeferRelease (&keypair, mbedtls_ecp_keypair_free);
513
512
514
513
// Init public key.
515
514
mbedtls_asn1_buf oidBuf;
@@ -547,10 +546,10 @@ Error VerifyECDSASignature(const ECDSAPublicKey& pubKey, const Array<uint8_t>& d
547
546
mbedtls_mpi r, s;
548
547
549
548
mbedtls_mpi_init (&r);
550
- auto releaseR = DeferRelease (&r, mbedtls_mpi_free);
549
+ [[maybe_unused]] auto releaseR = DeferRelease (&r, mbedtls_mpi_free);
551
550
552
551
mbedtls_mpi_init (&s);
553
- auto releaseS = DeferRelease (&s, mbedtls_mpi_free);
552
+ [[maybe_unused]] auto releaseS = DeferRelease (&s, mbedtls_mpi_free);
554
553
555
554
size_t rsLen = signature.Size () / 2 ;
556
555
@@ -1135,8 +1134,8 @@ Error MbedTLSCryptoProvider::Verify(const Array<x509::Certificate>& rootCerts,
1135
1134
1136
1135
mbedtls_x509_crt_init (&root);
1137
1136
mbedtls_x509_crt_init (&interm);
1138
- auto releaseRoot = DeferRelease (&root, mbedtls_x509_crt_free);
1139
- auto releaseInterm = DeferRelease (&interm, mbedtls_x509_crt_free);
1137
+ [[maybe_unused]] auto releaseRoot = DeferRelease (&root, mbedtls_x509_crt_free);
1138
+ [[maybe_unused]] auto releaseInterm = DeferRelease (&interm, mbedtls_x509_crt_free);
1140
1139
1141
1140
// Load root certificates.
1142
1141
for (const auto & r : rootCerts) {
@@ -1295,7 +1294,7 @@ asn1::ASN1ParseResult MbedTLSCryptoProvider::ReadBigInt(
1295
1294
1296
1295
mbedtls_mpi mpi;
1297
1296
mbedtls_mpi_init (&mpi);
1298
- auto mpiRelease = DeferRelease (&mpi, mbedtls_mpi_free);
1297
+ [[maybe_unused]] auto mpiRelease = DeferRelease (&mpi, mbedtls_mpi_free);
1299
1298
1300
1299
int ret = mbedtls_asn1_get_mpi (const_cast <uint8_t **>(&p), end, &mpi);
1301
1300
if (ret != 0 ) {
@@ -1755,6 +1754,7 @@ const PublicKeyItf& MbedTLSCryptoProvider::MbedTLSRSAPrivKey::GetPublic() const
1755
1754
{
1756
1755
assert (false );
1757
1756
1757
+ // cppcheck-suppress nullPointer
1758
1758
return *static_cast <PublicKeyItf*>(nullptr );
1759
1759
}
1760
1760
@@ -2201,13 +2201,13 @@ Error MbedTLSCryptoProvider::GetX509CertExtensions(x509::Certificate& cert, mbed
2201
2201
ret = mbedtls_asn1_get_tag (&p, gnEnd, &gnLen, MBEDTLS_ASN1_CONTEXT_SPECIFIC | 6 );
2202
2202
if (ret == 0 ) {
2203
2203
StaticString<cURLLen> str;
2204
- if (auto err
2204
+ if (auto insErr
2205
2205
= str.Insert (str.begin (), reinterpret_cast <char *>(p), reinterpret_cast <char *>(p) + gnLen);
2206
- !err .IsNone ()) {
2207
- return AOS_ERROR_WRAP (err );
2206
+ !insErr .IsNone ()) {
2207
+ return AOS_ERROR_WRAP (insErr );
2208
2208
}
2209
2209
2210
- if (auto err = cert.mIssuerURLs .PushBack (str); !err .IsNone ()) {
2210
+ if (auto pushErr = cert.mIssuerURLs .PushBack (str); !pushErr .IsNone ()) {
2211
2211
return AOS_ERROR_WRAP (err);
2212
2212
}
2213
2213
}
0 commit comments