@@ -3018,7 +3018,7 @@ int GetMyVersion(const byte* input, word32* inOutIdx,
30183018#else
30193019 ASNGetData dataASN[intASN_Length];
30203020 int ret;
3021- byte num;
3021+ byte num = 0 ;
30223022
30233023 /* Clear dynamic data and set the version number variable. */
30243024 XMEMSET(dataASN, 0, sizeof(dataASN));
@@ -3085,7 +3085,7 @@ int GetShortInt(const byte* input, word32* inOutIdx, int* number, word32 maxIdx)
30853085#else
30863086 ASNGetData dataASN[intASN_Length];
30873087 int ret;
3088- word32 num;
3088+ word32 num = 0 ;
30893089
30903090 /* Clear dynamic data and set the 32-bit number variable. */
30913091 XMEMSET(dataASN, 0, sizeof(dataASN));
@@ -6767,7 +6767,7 @@ int ToTraditionalInline_ex(const byte* input, word32* inOutIdx, word32 sz,
67676767 DECL_ASNGETDATA(dataASN, pkcs8KeyASN_Length);
67686768 int ret = 0;
67696769 word32 oid = 9;
6770- byte version;
6770+ byte version = 0 ;
67716771 word32 idx;
67726772
67736773 /* Check validity of parameters. */
@@ -8685,7 +8685,7 @@ int DecryptContent(byte* input, word32 sz, const char* password, int passwordSz)
86858685 int version;
86868686 word32 idx = 0;
86878687 word32 pIdx = 0;
8688- word32 iterations;
8688+ word32 iterations = 0 ;
86898689 word32 keySz = 0;
86908690 word32 saltSz = 0;
86918691 word32 shaOid = 0;
@@ -33081,7 +33081,7 @@ int wc_EccPrivateKeyDecode(const byte* input, word32* inOutIdx, ecc_key* key,
3308133081 return ret;
3308233082#else
3308333083 DECL_ASNGETDATA(dataASN, eccKeyASN_Length);
33084- byte version;
33084+ byte version = 0 ;
3308533085 int ret = 0;
3308633086 int curve_id = ECC_CURVE_DEF;
3308733087#if defined(HAVE_PKCS8) || defined(HAVE_PKCS12) || defined(SM2)
@@ -36113,7 +36113,7 @@ int OcspResponseDecode(OcspResponse* resp, void* cm, void* heap, int noVerify)
3611336113 int ret = 0;
3611436114 word32 idx = 0, size = resp->maxIdx;
3611536115 byte* source = resp->source;
36116- byte status;
36116+ byte status = 0 ;
3611736117 byte* basic;
3611836118 word32 basicSz;
3611936119
0 commit comments