mirror of
				https://github.com/cuberite/polarssl.git
				synced 2025-10-30 03:00:21 -04:00 
			
		
		
		
	Fix a few more warnings in small configurations
This commit is contained in:
		
							parent
							
								
									4fee79b885
								
							
						
					
					
						commit
						a7496f00ff
					
				| @ -1237,10 +1237,10 @@ static int ssl_parse_server_key_exchange( ssl_context *ssl ) | |||||||
| { | { | ||||||
|     int ret; |     int ret; | ||||||
|     const ssl_ciphersuite_t *ciphersuite_info = ssl->transform_negotiate->ciphersuite_info; |     const ssl_ciphersuite_t *ciphersuite_info = ssl->transform_negotiate->ciphersuite_info; | ||||||
|     unsigned char *p, *end; |  | ||||||
| #if defined(POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED) ||                       \ | #if defined(POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED) ||                       \ | ||||||
|     defined(POLARSSL_KEY_EXCHANGE_ECDHE_RSA_ENABLED) ||                     \ |     defined(POLARSSL_KEY_EXCHANGE_ECDHE_RSA_ENABLED) ||                     \ | ||||||
|     defined(POLARSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) |     defined(POLARSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) | ||||||
|  |     unsigned char *p, *end; | ||||||
|     size_t sig_len, params_len; |     size_t sig_len, params_len; | ||||||
|     unsigned char hash[64]; |     unsigned char hash[64]; | ||||||
|     md_type_t md_alg = POLARSSL_MD_NONE; |     md_type_t md_alg = POLARSSL_MD_NONE; | ||||||
| @ -1287,8 +1287,12 @@ static int ssl_parse_server_key_exchange( ssl_context *ssl ) | |||||||
| 
 | 
 | ||||||
|     SSL_DEBUG_BUF( 3,   "server key exchange", ssl->in_msg + 4, ssl->in_hslen - 4 ); |     SSL_DEBUG_BUF( 3,   "server key exchange", ssl->in_msg + 4, ssl->in_hslen - 4 ); | ||||||
| 
 | 
 | ||||||
|  | #if defined(POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED) ||                       \ | ||||||
|  |     defined(POLARSSL_KEY_EXCHANGE_ECDHE_RSA_ENABLED) ||                     \ | ||||||
|  |     defined(POLARSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) | ||||||
|     p   = ssl->in_msg + 4; |     p   = ssl->in_msg + 4; | ||||||
|     end = ssl->in_msg + ssl->in_hslen; |     end = ssl->in_msg + ssl->in_hslen; | ||||||
|  | #endif | ||||||
| 
 | 
 | ||||||
| #if defined(POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED) | #if defined(POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED) | ||||||
|     if( ciphersuite_info->key_exchange == POLARSSL_KEY_EXCHANGE_DHE_RSA ) |     if( ciphersuite_info->key_exchange == POLARSSL_KEY_EXCHANGE_DHE_RSA ) | ||||||
| @ -1318,6 +1322,9 @@ static int ssl_parse_server_key_exchange( ssl_context *ssl ) | |||||||
| #if defined(POLARSSL_KEY_EXCHANGE_PSK_ENABLED) | #if defined(POLARSSL_KEY_EXCHANGE_PSK_ENABLED) | ||||||
|     if( ciphersuite_info->key_exchange == POLARSSL_KEY_EXCHANGE_PSK ) |     if( ciphersuite_info->key_exchange == POLARSSL_KEY_EXCHANGE_PSK ) | ||||||
|     { |     { | ||||||
|  |         unsigned char *p = ssl->in_msg + 4; | ||||||
|  |         unsigned char *end = ssl->in_msg + ssl->in_hslen; | ||||||
|  | 
 | ||||||
|         if( ssl_parse_server_psk_hint( ssl, &p, end ) != 0 ) |         if( ssl_parse_server_psk_hint( ssl, &p, end ) != 0 ) | ||||||
|         { |         { | ||||||
|             SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); |             SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); | ||||||
| @ -1329,6 +1336,9 @@ static int ssl_parse_server_key_exchange( ssl_context *ssl ) | |||||||
| #if defined(POLARSSL_KEY_EXCHANGE_DHE_PSK_ENABLED) | #if defined(POLARSSL_KEY_EXCHANGE_DHE_PSK_ENABLED) | ||||||
|     if( ciphersuite_info->key_exchange == POLARSSL_KEY_EXCHANGE_DHE_PSK ) |     if( ciphersuite_info->key_exchange == POLARSSL_KEY_EXCHANGE_DHE_PSK ) | ||||||
|     { |     { | ||||||
|  |         unsigned char *p = ssl->in_msg + 4; | ||||||
|  |         unsigned char *end = ssl->in_msg + ssl->in_hslen; | ||||||
|  | 
 | ||||||
|         if( ssl_parse_server_psk_hint( ssl, &p, end ) != 0 ) |         if( ssl_parse_server_psk_hint( ssl, &p, end ) != 0 ) | ||||||
|         { |         { | ||||||
|             SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); |             SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); | ||||||
| @ -1336,7 +1346,7 @@ static int ssl_parse_server_key_exchange( ssl_context *ssl ) | |||||||
|         } |         } | ||||||
|         if( ssl_parse_server_dh_params( ssl, &p, end ) != 0 ) |         if( ssl_parse_server_dh_params( ssl, &p, end ) != 0 ) | ||||||
|         { |         { | ||||||
|             SSL_DEBUG_MSG( 1, ( "failed to parsebad server key exchange message" ) ); |             SSL_DEBUG_MSG( 1, ( "bad server key exchange message" ) ); | ||||||
|             return( POLARSSL_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE ); |             return( POLARSSL_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE ); | ||||||
|         } |         } | ||||||
|     } |     } | ||||||
|  | |||||||
| @ -1809,16 +1809,16 @@ static int ssl_write_certificate_request( ssl_context *ssl ) | |||||||
| static int ssl_write_server_key_exchange( ssl_context *ssl ) | static int ssl_write_server_key_exchange( ssl_context *ssl ) | ||||||
| { | { | ||||||
|     int ret; |     int ret; | ||||||
|     size_t n = 0, len; |     size_t n = 0; | ||||||
|     unsigned char *p = ssl->out_msg + 4; |  | ||||||
|     const ssl_ciphersuite_t *ciphersuite_info; |     const ssl_ciphersuite_t *ciphersuite_info; | ||||||
| 
 | 
 | ||||||
| #if defined(POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED) ||                       \ | #if defined(POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED) ||                       \ | ||||||
|     defined(POLARSSL_KEY_EXCHANGE_DHE_PSK_ENABLED) ||                       \ |     defined(POLARSSL_KEY_EXCHANGE_DHE_PSK_ENABLED) ||                       \ | ||||||
|     defined(POLARSSL_KEY_EXCHANGE_ECDHE_RSA_ENABLED) ||                     \ |     defined(POLARSSL_KEY_EXCHANGE_ECDHE_RSA_ENABLED) ||                     \ | ||||||
|     defined(POLARSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) |     defined(POLARSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) | ||||||
|  |     unsigned char *p = ssl->out_msg + 4; | ||||||
|     unsigned char *dig_signed = p; |     unsigned char *dig_signed = p; | ||||||
|     size_t dig_signed_len = 0; |     size_t dig_signed_len = 0, len; | ||||||
|     ((void) dig_signed); |     ((void) dig_signed); | ||||||
|     ((void) dig_signed_len); |     ((void) dig_signed_len); | ||||||
| #endif | #endif | ||||||
| @ -2355,7 +2355,6 @@ static int ssl_parse_client_key_exchange( ssl_context *ssl ) | |||||||
| { | { | ||||||
|     int ret; |     int ret; | ||||||
|     const ssl_ciphersuite_t *ciphersuite_info; |     const ssl_ciphersuite_t *ciphersuite_info; | ||||||
|     unsigned char *p, *end; |  | ||||||
| 
 | 
 | ||||||
|     ciphersuite_info = ssl->transform_negotiate->ciphersuite_info; |     ciphersuite_info = ssl->transform_negotiate->ciphersuite_info; | ||||||
| 
 | 
 | ||||||
| @ -2379,12 +2378,12 @@ static int ssl_parse_client_key_exchange( ssl_context *ssl ) | |||||||
|         return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE ); |         return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE ); | ||||||
|     } |     } | ||||||
| 
 | 
 | ||||||
|     p = ssl->in_msg + 4; |  | ||||||
|     end = ssl->in_msg + ssl->in_msglen; |  | ||||||
| 
 |  | ||||||
| #if defined(POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED) | #if defined(POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED) | ||||||
|     if( ciphersuite_info->key_exchange == POLARSSL_KEY_EXCHANGE_DHE_RSA ) |     if( ciphersuite_info->key_exchange == POLARSSL_KEY_EXCHANGE_DHE_RSA ) | ||||||
|     { |     { | ||||||
|  |         unsigned char *p = ssl->in_msg + 4; | ||||||
|  |         unsigned char *end = ssl->in_msg + ssl->in_msglen; | ||||||
|  | 
 | ||||||
|         if( ( ret = ssl_parse_client_dh_public( ssl, &p, end ) ) != 0 ) |         if( ( ret = ssl_parse_client_dh_public( ssl, &p, end ) ) != 0 ) | ||||||
|         { |         { | ||||||
|             SSL_DEBUG_RET( 1, ( "ssl_parse_client_dh_public" ), ret ); |             SSL_DEBUG_RET( 1, ( "ssl_parse_client_dh_public" ), ret ); | ||||||
| @ -2436,6 +2435,9 @@ static int ssl_parse_client_key_exchange( ssl_context *ssl ) | |||||||
| #if defined(POLARSSL_KEY_EXCHANGE_PSK_ENABLED) | #if defined(POLARSSL_KEY_EXCHANGE_PSK_ENABLED) | ||||||
|     if( ciphersuite_info->key_exchange == POLARSSL_KEY_EXCHANGE_PSK ) |     if( ciphersuite_info->key_exchange == POLARSSL_KEY_EXCHANGE_PSK ) | ||||||
|     { |     { | ||||||
|  |         unsigned char *p = ssl->in_msg + 4; | ||||||
|  |         unsigned char *end = ssl->in_msg + ssl->in_msglen; | ||||||
|  | 
 | ||||||
|         if( ( ret = ssl_parse_client_psk_identity( ssl, &p, end ) ) != 0 ) |         if( ( ret = ssl_parse_client_psk_identity( ssl, &p, end ) ) != 0 ) | ||||||
|         { |         { | ||||||
|             SSL_DEBUG_RET( 1, ( "ssl_parse_client_psk_identity" ), ret ); |             SSL_DEBUG_RET( 1, ( "ssl_parse_client_psk_identity" ), ret ); | ||||||
| @ -2462,6 +2464,8 @@ static int ssl_parse_client_key_exchange( ssl_context *ssl ) | |||||||
|     if( ciphersuite_info->key_exchange == POLARSSL_KEY_EXCHANGE_DHE_PSK ) |     if( ciphersuite_info->key_exchange == POLARSSL_KEY_EXCHANGE_DHE_PSK ) | ||||||
|     { |     { | ||||||
|         size_t n; |         size_t n; | ||||||
|  |         unsigned char *p = ssl->in_msg + 4; | ||||||
|  |         unsigned char *end = ssl->in_msg + ssl->in_msglen; | ||||||
| 
 | 
 | ||||||
|         if( ( ret = ssl_parse_client_psk_identity( ssl, &p, end ) ) != 0 ) |         if( ( ret = ssl_parse_client_psk_identity( ssl, &p, end ) ) != 0 ) | ||||||
|         { |         { | ||||||
|  | |||||||
| @ -49,7 +49,7 @@ int main( int argc, char *argv[] ) | |||||||
|     ((void) argv); |     ((void) argv); | ||||||
| 
 | 
 | ||||||
|     printf("POLARSSL_ECDSA_C and/or " |     printf("POLARSSL_ECDSA_C and/or " | ||||||
|            "POLARSSL_ENTROPY_C and/or POLARSSL_CTR_DRBG_C not defined\n" |            "POLARSSL_ENTROPY_C and/or POLARSSL_CTR_DRBG_C not defined\n"); | ||||||
|     return( 0 ); |     return( 0 ); | ||||||
| } | } | ||||||
| #else | #else | ||||||
|  | |||||||
| @ -406,7 +406,9 @@ int main( int argc, char *argv[] ) | |||||||
| 
 | 
 | ||||||
|         ssl_set_own_cert( &ssl, &clicert, &pkey ); |         ssl_set_own_cert( &ssl, &clicert, &pkey ); | ||||||
| 
 | 
 | ||||||
|  | #if defined(POLARSSL_SSL_SERVER_NAME_INDICATION) | ||||||
|         ssl_set_hostname( &ssl, opt.server_name ); |         ssl_set_hostname( &ssl, opt.server_name ); | ||||||
|  | #endif | ||||||
| 
 | 
 | ||||||
|         /*
 |         /*
 | ||||||
|          * 4. Handshake |          * 4. Handshake | ||||||
|  | |||||||
| @ -335,7 +335,10 @@ void decrypt_test_vec( int cipher_id, int pad_mode, | |||||||
|     unsigned char clear[200]; |     unsigned char clear[200]; | ||||||
|     unsigned char ad[200]; |     unsigned char ad[200]; | ||||||
|     unsigned char tag[20]; |     unsigned char tag[20]; | ||||||
|     size_t key_len, iv_len, cipher_len, clear_len, ad_len, tag_len; |     size_t key_len, iv_len, cipher_len, clear_len; | ||||||
|  | #if defined(POLARSSL_CIPHER_MODE_AEAD) | ||||||
|  |     size_t ad_len, tag_len; | ||||||
|  | #endif | ||||||
|     cipher_context_t ctx; |     cipher_context_t ctx; | ||||||
|     unsigned char output[200]; |     unsigned char output[200]; | ||||||
|     size_t outlen, total_len; |     size_t outlen, total_len; | ||||||
| @ -352,8 +355,13 @@ void decrypt_test_vec( int cipher_id, int pad_mode, | |||||||
|     iv_len = unhexify( iv, hex_iv ); |     iv_len = unhexify( iv, hex_iv ); | ||||||
|     cipher_len = unhexify( cipher, hex_cipher ); |     cipher_len = unhexify( cipher, hex_cipher ); | ||||||
|     clear_len = unhexify( clear, hex_clear ); |     clear_len = unhexify( clear, hex_clear ); | ||||||
|  | #if defined(POLARSSL_CIPHER_MODE_AEAD) | ||||||
|     ad_len = unhexify( ad, hex_ad ); |     ad_len = unhexify( ad, hex_ad ); | ||||||
|     tag_len = unhexify( tag, hex_tag ); |     tag_len = unhexify( tag, hex_tag ); | ||||||
|  | #else | ||||||
|  |     ((void) hex_ad); | ||||||
|  |     ((void) hex_tag); | ||||||
|  | #endif | ||||||
| 
 | 
 | ||||||
|     /* Prepare context */ |     /* Prepare context */ | ||||||
|     TEST_ASSERT( 0 == cipher_init_ctx( &ctx, |     TEST_ASSERT( 0 == cipher_init_ctx( &ctx, | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user
	 Manuel Pégourié-Gonnard
						Manuel Pégourié-Gonnard