@@ -15772,11 +15772,13 @@ static int test_wc_PKCS7_EncodeSignedData(void)
1577215772 {
1577315773 int signedSz = 0, i;
1577415774 encodeSignedDataStream strm;
15775- int numberOfChunkSizes = 4;
15776- word32 chunkSizes[] = { 4080, 4096, 5000, 9999 };
15775+ static const int numberOfChunkSizes = 4;
15776+ static const word32 chunkSizes[] = { 4080, 4096, 5000, 9999 };
1577715777 /* chunkSizes were chosen to test around the default 4096 octet string
1577815778 * size used in pkcs7.c */
1577915779
15780+ XMEMSET(&strm, 0, sizeof(strm));
15781+
1578015782 ExpectNotNull(pkcs7 = wc_PKCS7_New(HEAP_HINT, testDevId));
1578115783 ExpectIntEQ(wc_PKCS7_Init(pkcs7, HEAP_HINT, INVALID_DEVID), 0);
1578215784
@@ -33032,7 +33034,7 @@ static int test_wolfSSL_PKCS8_d2i(void)
3303233034 bio = NULL;
3303333035
3303433036 /* https://github.com/wolfSSL/wolfssl/issues/8610 */
33035- bytes = (int)XSTRLEN((void *)pkcs8_buffer);
33037+ bytes = (int)XSTRLEN((char *)pkcs8_buffer);
3303633038 ExpectNotNull(bio = BIO_new_mem_buf((void*)pkcs8_buffer, bytes));
3303733039 ExpectIntEQ(BIO_get_mem_data(bio, &p), bytes);
3303833040 ExpectIntEQ(XMEMCMP(p, pkcs8_buffer, bytes), 0);
0 commit comments