fix lots o warnings

This commit is contained in:
toddouska 2012-05-17 17:44:54 -07:00
parent 7c91372621
commit 5bc728b882
6 changed files with 172 additions and 103 deletions

View File

@ -1591,9 +1591,9 @@ static int GetDate(DecodedCert* cert, int dateType)
int length; int length;
byte date[MAX_DATE_SIZE]; byte date[MAX_DATE_SIZE];
byte b; byte b;
word32 startIdx = 0;
#ifdef CYASSL_CERT_GEN #ifdef CYASSL_CERT_GEN
word32 startIdx = 0;
if (dateType == BEFORE) if (dateType == BEFORE)
cert->beforeDate = &cert->source[cert->srcIdx]; cert->beforeDate = &cert->source[cert->srcIdx];
else else
@ -2073,25 +2073,25 @@ static int ConfirmSignature(DecodedCert* cert, const byte* key, word32 keySz,
static void DecodeBasicCaConstraint(byte* input, int sz, DecodedCert* cert) static void DecodeBasicCaConstraint(byte* input, int sz, DecodedCert* cert)
{ {
word32 index = 0; word32 idx = 0;
int length = 0; int length = 0;
CYASSL_ENTER("DecodeBasicCaConstraint"); CYASSL_ENTER("DecodeBasicCaConstraint");
if (GetSequence(input, &index, &length, sz) < 0) return; if (GetSequence(input, &idx, &length, sz) < 0) return;
if (input[index++] != ASN_BOOLEAN) if (input[idx++] != ASN_BOOLEAN)
{ {
CYASSL_MSG("\tfail: constraint not BOOLEAN"); CYASSL_MSG("\tfail: constraint not BOOLEAN");
return; return;
} }
if (GetLength(input, &index, &length, sz) < 0) if (GetLength(input, &idx, &length, sz) < 0)
{ {
CYASSL_MSG("\tfail: length"); CYASSL_MSG("\tfail: length");
return; return;
} }
if (input[index]) if (input[idx])
cert->isCA = 1; cert->isCA = 1;
} }
@ -2103,69 +2103,68 @@ static void DecodeBasicCaConstraint(byte* input, int sz, DecodedCert* cert)
static void DecodeCrlDist(byte* input, int sz, DecodedCert* cert) static void DecodeCrlDist(byte* input, int sz, DecodedCert* cert)
{ {
word32 index = 0; word32 idx = 0;
int length = 0; int length = 0;
word32 oid;
CYASSL_ENTER("DecodeCrlDist"); CYASSL_ENTER("DecodeCrlDist");
/* Unwrap the list of Distribution Points*/ /* Unwrap the list of Distribution Points*/
if (GetSequence(input, &index, &length, sz) < 0) return; if (GetSequence(input, &idx, &length, sz) < 0) return;
/* Unwrap a single Distribution Point */ /* Unwrap a single Distribution Point */
if (GetSequence(input, &index, &length, sz) < 0) return; if (GetSequence(input, &idx, &length, sz) < 0) return;
/* The Distribution Point has three explicit optional members /* The Distribution Point has three explicit optional members
* First check for a DistributionPointName * First check for a DistributionPointName
*/ */
if (input[index] == (ASN_CONSTRUCTED | ASN_CONTEXT_SPECIFIC | 0)) if (input[idx] == (ASN_CONSTRUCTED | ASN_CONTEXT_SPECIFIC | 0))
{ {
index++; idx++;
if (GetLength(input, &index, &length, sz) < 0) return; if (GetLength(input, &idx, &length, sz) < 0) return;
if (input[index] == if (input[idx] ==
(ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED | CRLDP_FULL_NAME)) (ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED | CRLDP_FULL_NAME))
{ {
index++; idx++;
if (GetLength(input, &index, &length, sz) < 0) return; if (GetLength(input, &idx, &length, sz) < 0) return;
if (input[index] == (ASN_CONTEXT_SPECIFIC | GENERALNAME_URI)) if (input[idx] == (ASN_CONTEXT_SPECIFIC | GENERALNAME_URI))
{ {
index++; idx++;
if (GetLength(input, &index, &length, sz) < 0) return; if (GetLength(input, &idx, &length, sz) < 0) return;
cert->extCrlInfoSz = length; cert->extCrlInfoSz = length;
cert->extCrlInfo = input + index; cert->extCrlInfo = input + idx;
index += length; idx += length;
} }
else else
/* This isn't a URI, skip it. */ /* This isn't a URI, skip it. */
index += length; idx += length;
} }
else else
/* This isn't a FULLNAME, skip it. */ /* This isn't a FULLNAME, skip it. */
index += length; idx += length;
} }
/* Check for reasonFlags */ /* Check for reasonFlags */
if (index < (word32)sz && if (idx < (word32)sz &&
input[index] == (ASN_CONSTRUCTED | ASN_CONTEXT_SPECIFIC | 1)) input[idx] == (ASN_CONSTRUCTED | ASN_CONTEXT_SPECIFIC | 1))
{ {
index++; idx++;
if (GetLength(input, &index, &length, sz) < 0) return; if (GetLength(input, &idx, &length, sz) < 0) return;
index += length; idx += length;
} }
/* Check for cRLIssuer */ /* Check for cRLIssuer */
if (index < (word32)sz && if (idx < (word32)sz &&
input[index] == (ASN_CONSTRUCTED | ASN_CONTEXT_SPECIFIC | 2)) input[idx] == (ASN_CONSTRUCTED | ASN_CONTEXT_SPECIFIC | 2))
{ {
index++; idx++;
if (GetLength(input, &index, &length, sz) < 0) return; if (GetLength(input, &idx, &length, sz) < 0) return;
index += length; idx += length;
} }
if (index < (word32)sz) if (idx < (word32)sz)
{ {
CYASSL_MSG("\tThere are more CRL Distribution Point records, " CYASSL_MSG("\tThere are more CRL Distribution Point records, "
"but we only use the first one."); "but we only use the first one.");
@ -2181,38 +2180,38 @@ static void DecodeAuthInfo(byte* input, int sz, DecodedCert* cert)
* any issues, return without saving the record. * any issues, return without saving the record.
*/ */
{ {
word32 index = 0; word32 idx = 0;
int length = 0; int length = 0;
word32 oid; word32 oid;
/* Unwrap the list of AIAs */ /* Unwrap the list of AIAs */
if (GetSequence(input, &index, &length, sz) < 0) return; if (GetSequence(input, &idx, &length, sz) < 0) return;
/* Unwrap a single AIA */ /* Unwrap a single AIA */
if (GetSequence(input, &index, &length, sz) < 0) return; if (GetSequence(input, &idx, &length, sz) < 0) return;
oid = 0; oid = 0;
if (GetObjectId(input, &index, &oid, sz) < 0) return; if (GetObjectId(input, &idx, &oid, sz) < 0) return;
/* Only supporting URIs right now. */ /* Only supporting URIs right now. */
if (input[index] == (ASN_CONTEXT_SPECIFIC | GENERALNAME_URI)) if (input[idx] == (ASN_CONTEXT_SPECIFIC | GENERALNAME_URI))
{ {
index++; idx++;
if (GetLength(input, &index, &length, sz) < 0) return; if (GetLength(input, &idx, &length, sz) < 0) return;
cert->extAuthInfoSz = length; cert->extAuthInfoSz = length;
cert->extAuthInfo = input + index; cert->extAuthInfo = input + idx;
index += length; idx += length;
} }
else else
{ {
/* Skip anything else. */ /* Skip anything else. */
index++; idx++;
if (GetLength(input, &index, &length, sz) < 0) return; if (GetLength(input, &idx, &length, sz) < 0) return;
index += length; idx += length;
} }
if (index < (word32)sz) if (idx < (word32)sz)
{ {
CYASSL_MSG("\tThere are more Authority Information Access records, " CYASSL_MSG("\tThere are more Authority Information Access records, "
"but we only use first one."); "but we only use first one.");
@ -2228,7 +2227,7 @@ static void DecodeCertExtensions(DecodedCert* cert)
* index. It is works starting with the recorded extensions pointer. * index. It is works starting with the recorded extensions pointer.
*/ */
{ {
word32 index = 0; word32 idx = 0;
int sz = cert->extensionsSz; int sz = cert->extensionsSz;
byte* input = cert->extensions; byte* input = cert->extensions;
int length; int length;
@ -2238,59 +2237,59 @@ static void DecodeCertExtensions(DecodedCert* cert)
if (input == NULL || sz == 0) return; if (input == NULL || sz == 0) return;
if (input[index++] != ASN_EXTENSIONS)return; if (input[idx++] != ASN_EXTENSIONS)return;
if (GetLength(input, &index, &length, sz) < 0) return; if (GetLength(input, &idx, &length, sz) < 0) return;
if (GetSequence(input, &index, &length, sz) < 0) return; if (GetSequence(input, &idx, &length, sz) < 0) return;
while (index < (word32)sz) { while (idx < (word32)sz) {
if (GetSequence(input, &index, &length, sz) < 0) { if (GetSequence(input, &idx, &length, sz) < 0) {
CYASSL_MSG("\tfail: should be a SEQUENCE"); CYASSL_MSG("\tfail: should be a SEQUENCE");
return; return;
} }
oid = 0; oid = 0;
if (GetObjectId(input, &index, &oid, sz) < 0) { if (GetObjectId(input, &idx, &oid, sz) < 0) {
CYASSL_MSG("\tfail: OBJECT ID"); CYASSL_MSG("\tfail: OBJECT ID");
return; return;
} }
/* check for critical flag */ /* check for critical flag */
if (input[index] == ASN_BOOLEAN) { if (input[idx] == ASN_BOOLEAN) {
CYASSL_MSG("\tfound optional critical flag, moving past"); CYASSL_MSG("\tfound optional critical flag, moving past");
index += (ASN_BOOL_SIZE + 1); idx += (ASN_BOOL_SIZE + 1);
} }
/* process the extension based on the OID */ /* process the extension based on the OID */
if (input[index++] != ASN_OCTET_STRING) { if (input[idx++] != ASN_OCTET_STRING) {
CYASSL_MSG("\tfail: should be an OCTET STRING"); CYASSL_MSG("\tfail: should be an OCTET STRING");
return; return;
} }
if (GetLength(input, &index, &length, sz) < 0) { if (GetLength(input, &idx, &length, sz) < 0) {
CYASSL_MSG("\tfail: extension data length"); CYASSL_MSG("\tfail: extension data length");
return; return;
} }
switch (oid) { switch (oid) {
case BASIC_CA_OID: case BASIC_CA_OID:
DecodeBasicCaConstraint(&input[index], length, cert); DecodeBasicCaConstraint(&input[idx], length, cert);
break; break;
case CRL_DIST_OID: case CRL_DIST_OID:
DecodeCrlDist(&input[index], length, cert); DecodeCrlDist(&input[idx], length, cert);
break; break;
case AUTH_INFO_OID: case AUTH_INFO_OID:
DecodeAuthInfo(&input[index], length, cert); DecodeAuthInfo(&input[idx], length, cert);
break; break;
default: default:
CYASSL_MSG("\tExtension type not handled, skipping"); CYASSL_MSG("\tExtension type not handled, skipping");
break; break;
} }
index += length; idx += length;
} }
return; return;
@ -4668,7 +4667,7 @@ int ParseCRL(DecodedCRL* dcrl, const byte* buff, long sz)
len += idx; len += idx;
while (idx < len) { while (idx < (word32)len) {
if (GetRevoked(buff, &idx, dcrl, sz) < 0) if (GetRevoked(buff, &idx, dcrl, sz) < 0)
return ASN_PARSE_E; return ASN_PARSE_E;
} }

View File

@ -415,7 +415,7 @@ int fp_cmp_d(fp_int *a, fp_digit b);
void fp_add_d(fp_int *a, fp_digit b, fp_int *c); void fp_add_d(fp_int *a, fp_digit b, fp_int *c);
/* c = a - b */ /* c = a - b */
/*void fp_sub_d(fp_int *a, fp_digit b, fp_int *c);*/ void fp_sub_d(fp_int *a, fp_digit b, fp_int *c);
/* c = a * b */ /* c = a * b */
void fp_mul_d(fp_int *a, fp_digit b, fp_int *c); void fp_mul_d(fp_int *a, fp_digit b, fp_int *c);

View File

@ -384,7 +384,6 @@ CYASSL_API char* CyaSSL_alert_type_string_long(int);
CYASSL_API char* CyaSSL_alert_desc_string_long(int); CYASSL_API char* CyaSSL_alert_desc_string_long(int);
CYASSL_API char* CyaSSL_state_string_long(CYASSL*); CYASSL_API char* CyaSSL_state_string_long(CYASSL*);
CYASSL_API void CyaSSL_RSA_free(CYASSL_RSA*);
CYASSL_API CYASSL_RSA* CyaSSL_RSA_generate_key(int, unsigned long, CYASSL_API CYASSL_RSA* CyaSSL_RSA_generate_key(int, unsigned long,
void(*)(int, int, void*), void*); void(*)(int, int, void*), void*);
CYASSL_API void CyaSSL_CTX_set_tmp_rsa_callback(CYASSL_CTX*, CYASSL_API void CyaSSL_CTX_set_tmp_rsa_callback(CYASSL_CTX*,

View File

@ -149,12 +149,13 @@ int CheckCertCRL(CYASSL_CRL* crl, DecodedCert* cert)
CYASSL_MSG("Issuing missing CRL callback"); CYASSL_MSG("Issuing missing CRL callback");
url[0] = '\0'; url[0] = '\0';
if (cert->extCrlInfoSz < sizeof(url) -1 ) { if (cert->extCrlInfoSz < (int)sizeof(url) -1 ) {
XMEMCPY(url, cert->extCrlInfo, cert->extCrlInfoSz); XMEMCPY(url, cert->extCrlInfo, cert->extCrlInfoSz);
url[cert->extCrlInfoSz] = '\0'; url[cert->extCrlInfoSz] = '\0';
} }
else else {
CYASSL_MSG("CRL url too long"); CYASSL_MSG("CRL url too long");
}
crl->cm->cbMissingCRL(url); crl->cm->cbMissingCRL(url);
} }
} }
@ -233,8 +234,9 @@ int BufferLoadCRL(CYASSL_CRL* crl, const byte* buff, long sz, int type)
} }
else { else {
ret = AddCRL(crl, &dcrl); ret = AddCRL(crl, &dcrl);
if (ret != 0) if (ret != 0) {
CYASSL_MSG("AddCRL error"); CYASSL_MSG("AddCRL error");
}
} }
FreeDecodedCRL(&dcrl); FreeDecodedCRL(&dcrl);

View File

@ -460,6 +460,7 @@ void InitSuites(Suites* suites, ProtocolVersion pv, byte haveDH, byte havePSK,
(void)haveDH; (void)haveDH;
(void)havePSK; (void)havePSK;
(void)haveNTRU; (void)haveNTRU;
(void)haveStaticECC;
if (suites->setSuites) if (suites->setSuites)
return; /* trust user settings, don't override */ return; /* trust user settings, don't override */

138
src/ssl.c
View File

@ -1089,6 +1089,9 @@ int AddCA(CYASSL_CERT_MANAGER* cm, buffer der, int type, int verify)
if (ssl) if (ssl)
ssl->options.haveECDSA = 1; ssl->options.haveECDSA = 1;
break; break;
default:
CYASSL_MSG("Not ECDSA cert signature");
break;
} }
FreeDecodedCert(&cert); FreeDecodedCert(&cert);
@ -1166,6 +1169,8 @@ int ProcessFile(CYASSL_CTX* ctx, const char* fname, int format, int type,
long sz = 0; long sz = 0;
XFILE* file = XFOPEN(fname, "rb"); XFILE* file = XFOPEN(fname, "rb");
(void)crl;
if (!file) return SSL_BAD_FILE; if (!file) return SSL_BAD_FILE;
XFSEEK(file, 0, XSEEK_END); XFSEEK(file, 0, XSEEK_END);
sz = XFTELL(file); sz = XFTELL(file);
@ -1377,6 +1382,8 @@ int CyaSSL_CertManagerLoadCA(CYASSL_CERT_MANAGER* cm, const char* file,
/* turn on CRL if off and compiled in, set options */ /* turn on CRL if off and compiled in, set options */
int CyaSSL_CertManagerEnableCRL(CYASSL_CERT_MANAGER* cm, int options) int CyaSSL_CertManagerEnableCRL(CYASSL_CERT_MANAGER* cm, int options)
{ {
(void)options;
CYASSL_ENTER("CyaSSL_CertManagerEnableCRL"); CYASSL_ENTER("CyaSSL_CertManagerEnableCRL");
if (cm == NULL) if (cm == NULL)
return BAD_FUNC_ARG; return BAD_FUNC_ARG;
@ -4136,26 +4143,6 @@ int CyaSSL_set_compression(CYASSL* ssl)
return 0; /* failure */ return 0; /* failure */
} }
if (key)
CYASSL_MSG("have key");
if (iv)
CYASSL_MSG("have iv");
if (enc == 1) {
CYASSL_MSG("encrypt side");
}
else if (enc == 0) {
CYASSL_MSG("decrypt side");
}
else {
CYASSL_MSG("no side");
if (ctx->enc)
CYASSL_MSG("no side enc");
else
CYASSL_MSG("no side dec");
}
if (ctx->cipherType == AES_128_CBC_TYPE || (type && if (ctx->cipherType == AES_128_CBC_TYPE || (type &&
XSTRNCMP(type, "AES128-CBC", 10) == 0)) { XSTRNCMP(type, "AES128-CBC", 10) == 0)) {
CYASSL_MSG("AES-128-CBC"); CYASSL_MSG("AES-128-CBC");
@ -4323,13 +4310,6 @@ int CyaSSL_set_compression(CYASSL* ssl)
return 0; /* failure */ return 0; /* failure */
} }
if (ctx->enc)
CYASSL_MSG("encrypting");
else
CYASSL_MSG("decrypting");
switch (ctx->cipherType) { switch (ctx->cipherType) {
case AES_128_CBC_TYPE : case AES_128_CBC_TYPE :
@ -5851,6 +5831,9 @@ static int initGlobalRNG = 0;
CYASSL_MSG("CyaSSL_RAND_seed"); CYASSL_MSG("CyaSSL_RAND_seed");
(void)seed;
(void)len;
if (initGlobalRNG == 0) { if (initGlobalRNG == 0) {
if (InitRng(&globalRNG) < 0) { if (InitRng(&globalRNG) < 0) {
CYASSL_MSG("CyaSSL Init Global RNG failed"); CYASSL_MSG("CyaSSL Init Global RNG failed");
@ -5893,12 +5876,14 @@ static int initGlobalRNG = 0;
void CyaSSL_BN_CTX_init(CYASSL_BN_CTX* ctx) void CyaSSL_BN_CTX_init(CYASSL_BN_CTX* ctx)
{ {
(void)ctx;
CYASSL_MSG("CyaSSL_BN_CTX_init"); CYASSL_MSG("CyaSSL_BN_CTX_init");
} }
void CyaSSL_BN_CTX_free(CYASSL_BN_CTX* ctx) void CyaSSL_BN_CTX_free(CYASSL_BN_CTX* ctx)
{ {
(void)ctx;
CYASSL_MSG("CyaSSL_BN_CTX_free"); CYASSL_MSG("CyaSSL_BN_CTX_free");
/* do free since static ctx that does nothing */ /* do free since static ctx that does nothing */
@ -5986,6 +5971,7 @@ static int initGlobalRNG = 0;
int CyaSSL_BN_mod(CYASSL_BIGNUM* r, const CYASSL_BIGNUM* a, int CyaSSL_BN_mod(CYASSL_BIGNUM* r, const CYASSL_BIGNUM* a,
const CYASSL_BIGNUM* b, const CYASSL_BN_CTX* c) const CYASSL_BIGNUM* b, const CYASSL_BN_CTX* c)
{ {
(void)c;
CYASSL_MSG("CyaSSL_BN_mod"); CYASSL_MSG("CyaSSL_BN_mod");
if (r == NULL || a == NULL || b == NULL) if (r == NULL || a == NULL || b == NULL)
@ -6117,8 +6103,9 @@ static int initGlobalRNG = 0;
return NULL; return NULL;
} }
} }
else else {
CYASSL_MSG("CyaSSL_BN_bin2bn wants return bignum"); CYASSL_MSG("CyaSSL_BN_bin2bn wants return bignum");
}
return ret; return ret;
} }
@ -6126,6 +6113,8 @@ static int initGlobalRNG = 0;
int CyaSSL_mask_bits(CYASSL_BIGNUM* bn, int n) int CyaSSL_mask_bits(CYASSL_BIGNUM* bn, int n)
{ {
(void)bn;
(void)n;
CYASSL_MSG("CyaSSL_BN_mask_bits"); CYASSL_MSG("CyaSSL_BN_mask_bits");
return -1; return -1;
@ -6134,12 +6123,14 @@ static int initGlobalRNG = 0;
int CyaSSL_BN_rand(CYASSL_BIGNUM* bn, int bits, int top, int bottom) int CyaSSL_BN_rand(CYASSL_BIGNUM* bn, int bits, int top, int bottom)
{ {
byte buffer[1024]; byte buff[1024];
RNG tmpRNG; RNG tmpRNG;
RNG* rng = &tmpRNG; RNG* rng = &tmpRNG;
int ret; int ret;
int len = bits/8; int len = bits/8;
(void)top;
(void)bottom;
CYASSL_MSG("CyaSSL_BN_rand"); CYASSL_MSG("CyaSSL_BN_rand");
if (bn == NULL || bn->internal == NULL) { if (bn == NULL || bn->internal == NULL) {
@ -6159,11 +6150,11 @@ static int initGlobalRNG = 0;
rng = &globalRNG; rng = &globalRNG;
} }
RNG_GenerateBlock(rng, buffer, len); RNG_GenerateBlock(rng, buff, len);
buffer[0] |= 0x80 | 0x40; buff[0] |= 0x80 | 0x40;
buffer[len-1] |= 0x01; buff[len-1] |= 0x01;
if (mp_read_unsigned_bin((mp_int*)bn->internal,buffer,len) != MP_OKAY) { if (mp_read_unsigned_bin((mp_int*)bn->internal,buff,len) != MP_OKAY) {
CYASSL_MSG("mp read bin failed"); CYASSL_MSG("mp read bin failed");
return 0; return 0;
} }
@ -6174,6 +6165,9 @@ static int initGlobalRNG = 0;
int CyaSSL_BN_is_bit_set(const CYASSL_BIGNUM* bn, int n) int CyaSSL_BN_is_bit_set(const CYASSL_BIGNUM* bn, int n)
{ {
(void)bn;
(void)n;
CYASSL_MSG("CyaSSL_BN_is_bit_set"); CYASSL_MSG("CyaSSL_BN_is_bit_set");
return 0; return 0;
@ -6246,6 +6240,9 @@ static int initGlobalRNG = 0;
CYASSL_BIGNUM* CyaSSL_BN_copy(CYASSL_BIGNUM* r, const CYASSL_BIGNUM* bn) CYASSL_BIGNUM* CyaSSL_BN_copy(CYASSL_BIGNUM* r, const CYASSL_BIGNUM* bn)
{ {
(void)r;
(void)bn;
CYASSL_MSG("CyaSSL_BN_copy"); CYASSL_MSG("CyaSSL_BN_copy");
return NULL; return NULL;
@ -6254,6 +6251,9 @@ static int initGlobalRNG = 0;
int CyaSSL_BN_set_word(CYASSL_BIGNUM* bn, unsigned long w) int CyaSSL_BN_set_word(CYASSL_BIGNUM* bn, unsigned long w)
{ {
(void)bn;
(void)w;
CYASSL_MSG("CyaSSL_BN_set_word"); CYASSL_MSG("CyaSSL_BN_set_word");
return -1; return -1;
@ -6262,6 +6262,9 @@ static int initGlobalRNG = 0;
int CyaSSL_BN_dec2bn(CYASSL_BIGNUM** bn, const char* str) int CyaSSL_BN_dec2bn(CYASSL_BIGNUM** bn, const char* str)
{ {
(void)bn;
(void)str;
CYASSL_MSG("CyaSSL_BN_dec2bn"); CYASSL_MSG("CyaSSL_BN_dec2bn");
return -1; return -1;
@ -6270,6 +6273,8 @@ static int initGlobalRNG = 0;
char* CyaSSL_BN_bn2dec(const CYASSL_BIGNUM* bn) char* CyaSSL_BN_bn2dec(const CYASSL_BIGNUM* bn)
{ {
(void)bn;
CYASSL_MSG("CyaSSL_BN_bn2dec"); CYASSL_MSG("CyaSSL_BN_bn2dec");
return NULL; return NULL;
@ -6585,6 +6590,8 @@ static int initGlobalRNG = 0;
int CyaSSL_DSA_generate_key(CYASSL_DSA* dsa) int CyaSSL_DSA_generate_key(CYASSL_DSA* dsa)
{ {
(void)dsa;
CYASSL_MSG("CyaSSL_DSA_generate_key"); CYASSL_MSG("CyaSSL_DSA_generate_key");
return 0; /* key gen not needed by server */ return 0; /* key gen not needed by server */
@ -6595,6 +6602,14 @@ static int initGlobalRNG = 0;
unsigned char* seed, int seedLen, int* counterRet, unsigned char* seed, int seedLen, int* counterRet,
unsigned long* hRet, void* cb) unsigned long* hRet, void* cb)
{ {
(void)dsa;
(void)bits;
(void)seed;
(void)seedLen;
(void)counterRet;
(void)hRet;
(void)cb;
CYASSL_MSG("CyaSSL_DSA_generate_parameters_ex"); CYASSL_MSG("CyaSSL_DSA_generate_parameters_ex");
return 0; /* key gen not needed by server */ return 0; /* key gen not needed by server */
@ -6838,6 +6853,9 @@ static int initGlobalRNG = 0;
int CyaSSL_RSA_blinding_on(CYASSL_RSA* rsa, CYASSL_BN_CTX* bn) int CyaSSL_RSA_blinding_on(CYASSL_RSA* rsa, CYASSL_BN_CTX* bn)
{ {
(void)rsa;
(void)bn;
CYASSL_MSG("CyaSSL_RSA_blinding_on"); CYASSL_MSG("CyaSSL_RSA_blinding_on");
return 1; /* on by default */ return 1; /* on by default */
@ -6847,6 +6865,12 @@ static int initGlobalRNG = 0;
int CyaSSL_RSA_public_encrypt(int len, unsigned char* fr, int CyaSSL_RSA_public_encrypt(int len, unsigned char* fr,
unsigned char* to, CYASSL_RSA* rsa, int padding) unsigned char* to, CYASSL_RSA* rsa, int padding)
{ {
(void)len;
(void)fr;
(void)to;
(void)rsa;
(void)padding;
CYASSL_MSG("CyaSSL_RSA_public_encrypt"); CYASSL_MSG("CyaSSL_RSA_public_encrypt");
return -1; return -1;
@ -6856,6 +6880,12 @@ static int initGlobalRNG = 0;
int CyaSSL_RSA_private_decrypt(int len, unsigned char* fr, int CyaSSL_RSA_private_decrypt(int len, unsigned char* fr,
unsigned char* to, CYASSL_RSA* rsa, int padding) unsigned char* to, CYASSL_RSA* rsa, int padding)
{ {
(void)len;
(void)fr;
(void)to;
(void)rsa;
(void)padding;
CYASSL_MSG("CyaSSL_RSA_private_decrypt"); CYASSL_MSG("CyaSSL_RSA_private_decrypt");
return -1; return -1;
@ -6970,7 +7000,7 @@ static int initGlobalRNG = 0;
*sigLen = RsaSSL_Sign(encodedSig, signSz, sigRet, outLen, *sigLen = RsaSSL_Sign(encodedSig, signSz, sigRet, outLen,
(RsaKey*)rsa->internal, rng); (RsaKey*)rsa->internal, rng);
if (sigLen < 0) { if (*sigLen <= 0) {
CYASSL_MSG("Bad Rsa Sign"); CYASSL_MSG("Bad Rsa Sign");
return 0; return 0;
} }
@ -6983,6 +7013,12 @@ static int initGlobalRNG = 0;
int CyaSSL_RSA_public_decrypt(int flen, unsigned char* from, int CyaSSL_RSA_public_decrypt(int flen, unsigned char* from,
unsigned char* to, CYASSL_RSA* rsa, int padding) unsigned char* to, CYASSL_RSA* rsa, int padding)
{ {
(void)flen;
(void)from;
(void)to;
(void)rsa;
(void)padding;
CYASSL_MSG("CyaSSL_RSA_public_decrypt"); CYASSL_MSG("CyaSSL_RSA_public_decrypt");
return -1; return -1;
@ -7061,8 +7097,9 @@ static int initGlobalRNG = 0;
CYASSL_MSG("sha hmac"); CYASSL_MSG("sha hmac");
ctx->type = SHA; ctx->type = SHA;
} }
else else {
CYASSL_MSG("bad init type"); CYASSL_MSG("bad init type");
}
} }
if (key && keylen) { if (key && keylen) {
@ -7118,6 +7155,8 @@ static int initGlobalRNG = 0;
void CyaSSL_HMAC_cleanup(CYASSL_HMAC_CTX* ctx) void CyaSSL_HMAC_cleanup(CYASSL_HMAC_CTX* ctx)
{ {
(void)ctx;
CYASSL_MSG("CyaSSL_HMAC_cleanup"); CYASSL_MSG("CyaSSL_HMAC_cleanup");
} }
@ -7146,6 +7185,7 @@ static int initGlobalRNG = 0;
CYASSL_RSA* CyaSSL_EVP_PKEY_get1_RSA(CYASSL_EVP_PKEY* key) CYASSL_RSA* CyaSSL_EVP_PKEY_get1_RSA(CYASSL_EVP_PKEY* key)
{ {
(void)key;
CYASSL_MSG("CyaSSL_EVP_PKEY_get1_RSA"); CYASSL_MSG("CyaSSL_EVP_PKEY_get1_RSA");
return NULL; return NULL;
@ -7154,6 +7194,7 @@ static int initGlobalRNG = 0;
CYASSL_DSA* CyaSSL_EVP_PKEY_get1_DSA(CYASSL_EVP_PKEY* key) CYASSL_DSA* CyaSSL_EVP_PKEY_get1_DSA(CYASSL_EVP_PKEY* key)
{ {
(void)key;
CYASSL_MSG("CyaSSL_EVP_PKEY_get1_DSA"); CYASSL_MSG("CyaSSL_EVP_PKEY_get1_DSA");
return NULL; return NULL;
@ -7205,6 +7246,8 @@ static int initGlobalRNG = 0;
void CyaSSL_3des_iv(CYASSL_EVP_CIPHER_CTX* ctx, int doset, void CyaSSL_3des_iv(CYASSL_EVP_CIPHER_CTX* ctx, int doset,
unsigned char* iv, int len) unsigned char* iv, int len)
{ {
(void)len;
CYASSL_MSG("CyaSSL_3des_iv"); CYASSL_MSG("CyaSSL_3des_iv");
if (ctx == NULL || iv == NULL) { if (ctx == NULL || iv == NULL) {
@ -7222,6 +7265,8 @@ static int initGlobalRNG = 0;
void CyaSSL_aes_ctr_iv(CYASSL_EVP_CIPHER_CTX* ctx, int doset, void CyaSSL_aes_ctr_iv(CYASSL_EVP_CIPHER_CTX* ctx, int doset,
unsigned char* iv, int len) unsigned char* iv, int len)
{ {
(void)len;
CYASSL_MSG("CyaSSL_aes_ctr_iv"); CYASSL_MSG("CyaSSL_aes_ctr_iv");
if (ctx == NULL || iv == NULL) { if (ctx == NULL || iv == NULL) {
@ -7342,6 +7387,14 @@ static int initGlobalRNG = 0;
unsigned char* passwd, int len, unsigned char* passwd, int len,
pem_password_cb cb, void* arg) pem_password_cb cb, void* arg)
{ {
(void)bio;
(void)rsa;
(void)cipher;
(void)passwd;
(void)len;
(void)cb;
(void)arg;
CYASSL_MSG("CyaSSL_PEM_write_bio_RSAPrivateKey"); CYASSL_MSG("CyaSSL_PEM_write_bio_RSAPrivateKey");
return -1; return -1;
@ -7354,6 +7407,14 @@ static int initGlobalRNG = 0;
unsigned char* passwd, int len, unsigned char* passwd, int len,
pem_password_cb cb, void* arg) pem_password_cb cb, void* arg)
{ {
(void)bio;
(void)rsa;
(void)cipher;
(void)passwd;
(void)len;
(void)cb;
(void)arg;
CYASSL_MSG("CyaSSL_PEM_write_bio_DSAPrivateKey"); CYASSL_MSG("CyaSSL_PEM_write_bio_DSAPrivateKey");
return -1; return -1;
@ -7364,6 +7425,11 @@ static int initGlobalRNG = 0;
CYASSL_EVP_PKEY* CyaSSL_PEM_read_bio_PrivateKey(CYASSL_BIO* bio, CYASSL_EVP_PKEY* CyaSSL_PEM_read_bio_PrivateKey(CYASSL_BIO* bio,
CYASSL_EVP_PKEY** key, pem_password_cb cb, void* arg) CYASSL_EVP_PKEY** key, pem_password_cb cb, void* arg)
{ {
(void)bio;
(void)key;
(void)cb;
(void)arg;
CYASSL_MSG("CyaSSL_PEM_read_bio_PrivateKey"); CYASSL_MSG("CyaSSL_PEM_read_bio_PrivateKey");
return NULL; return NULL;
@ -7380,6 +7446,8 @@ int CyaSSL_KeyPemToDer(const unsigned char* pem, int pemSz, unsigned char* buff,
int ret; int ret;
buffer der; buffer der;
(void)pass;
CYASSL_ENTER("CyaSSL_KeyPemToDer"); CYASSL_ENTER("CyaSSL_KeyPemToDer");
if (pem == NULL || buff == NULL || buffSz <= 0) { if (pem == NULL || buff == NULL || buffSz <= 0) {