mirror of
				https://github.com/cuberite/polarssl.git
				synced 2025-10-30 19:20:40 -04:00 
			
		
		
		
	Cleanup up non-prototyped functions (static) and const-correctness
More fixes based on the compiler directives -Wcast-qual -Wwrite-strings -Wmissing-prototypes -Wmissing-declarations. Not everything with regards to -Wcast-qual has been fixed as some have unwanted consequences for the rest of the code.
This commit is contained in:
		
							parent
							
								
									169b7f4a13
								
							
						
					
					
						commit
						b6c5d2e1a6
					
				| @ -86,7 +86,7 @@ void pem_init( pem_context *ctx ); | |||||||
|  * |  * | ||||||
|  * \return          0 on success, ior a specific PEM error code |  * \return          0 on success, ior a specific PEM error code | ||||||
|  */ |  */ | ||||||
| int pem_read_buffer( pem_context *ctx, char *header, char *footer, | int pem_read_buffer( pem_context *ctx, const char *header, const char *footer, | ||||||
|                      const unsigned char *data, |                      const unsigned char *data, | ||||||
|                      const unsigned char *pwd, |                      const unsigned char *pwd, | ||||||
|                      size_t pwdlen, size_t *use_len ); |                      size_t pwdlen, size_t *use_len ); | ||||||
|  | |||||||
| @ -383,11 +383,11 @@ struct _ssl_handshake_params | |||||||
|     sha2_context fin_sha2; |     sha2_context fin_sha2; | ||||||
|     sha4_context fin_sha4; |     sha4_context fin_sha4; | ||||||
| 
 | 
 | ||||||
|     void (*update_checksum)(ssl_context *, unsigned char *, size_t); |     void (*update_checksum)(ssl_context *, const unsigned char *, size_t); | ||||||
|     void (*calc_verify)(ssl_context *, unsigned char *); |     void (*calc_verify)(ssl_context *, unsigned char *); | ||||||
|     void (*calc_finished)(ssl_context *, unsigned char *, int); |     void (*calc_finished)(ssl_context *, unsigned char *, int); | ||||||
|     int  (*tls_prf)(unsigned char *, size_t, char *, |     int  (*tls_prf)(const unsigned char *, size_t, const char *, | ||||||
|                     unsigned char *, size_t, |                     const unsigned char *, size_t, | ||||||
|                     unsigned char *, size_t); |                     unsigned char *, size_t); | ||||||
| 
 | 
 | ||||||
|     size_t pmslen;                      /*!<  premaster length        */ |     size_t pmslen;                      /*!<  premaster length        */ | ||||||
|  | |||||||
| @ -66,7 +66,7 @@ extern "C" { | |||||||
|  * \param ctx      XTEA context to be initialized |  * \param ctx      XTEA context to be initialized | ||||||
|  * \param key      the secret key |  * \param key      the secret key | ||||||
|  */ |  */ | ||||||
| void xtea_setup( xtea_context *ctx, unsigned char key[16] ); | void xtea_setup( xtea_context *ctx, const unsigned char key[16] ); | ||||||
| 
 | 
 | ||||||
| /**
 | /**
 | ||||||
|  * \brief          XTEA cipher function |  * \brief          XTEA cipher function | ||||||
| @ -80,7 +80,7 @@ void xtea_setup( xtea_context *ctx, unsigned char key[16] ); | |||||||
|  */ |  */ | ||||||
| int xtea_crypt_ecb( xtea_context *ctx, | int xtea_crypt_ecb( xtea_context *ctx, | ||||||
|                     int mode, |                     int mode, | ||||||
|                     unsigned char input[8], |                     const unsigned char input[8], | ||||||
|                     unsigned char output[8] ); |                     unsigned char output[8] ); | ||||||
| 
 | 
 | ||||||
| /**
 | /**
 | ||||||
| @ -100,7 +100,7 @@ int xtea_crypt_cbc( xtea_context *ctx, | |||||||
|                     int mode, |                     int mode, | ||||||
|                     size_t length, |                     size_t length, | ||||||
|                     unsigned char iv[8], |                     unsigned char iv[8], | ||||||
|                     unsigned char *input, |                     const unsigned char *input, | ||||||
|                     unsigned char *output); |                     unsigned char *output); | ||||||
| 
 | 
 | ||||||
| #ifdef __cplusplus | #ifdef __cplusplus | ||||||
|  | |||||||
| @ -1,7 +1,7 @@ | |||||||
| /*
 | /*
 | ||||||
|  *  CTR_DRBG implementation based on AES-256 (NIST SP 800-90) |  *  CTR_DRBG implementation based on AES-256 (NIST SP 800-90) | ||||||
|  * |  * | ||||||
|  *  Copyright (C) 2006-2011, Brainspark B.V. |  *  Copyright (C) 2006-2013, Brainspark B.V. | ||||||
|  * |  * | ||||||
|  *  This file is part of PolarSSL (http://www.polarssl.org)
 |  *  This file is part of PolarSSL (http://www.polarssl.org)
 | ||||||
|  *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> |  *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> | ||||||
| @ -42,7 +42,7 @@ | |||||||
|  * Non-public function wrapped by ctr_crbg_init(). Necessary to allow NIST |  * Non-public function wrapped by ctr_crbg_init(). Necessary to allow NIST | ||||||
|  * tests to succeed (which require known length fixed entropy) |  * tests to succeed (which require known length fixed entropy) | ||||||
|  */ |  */ | ||||||
| int ctr_drbg_init_entropy_len( | static int ctr_drbg_init_entropy_len( | ||||||
|                    ctr_drbg_context *ctx, |                    ctr_drbg_context *ctx, | ||||||
|                    int (*f_entropy)(void *, unsigned char *, size_t), |                    int (*f_entropy)(void *, unsigned char *, size_t), | ||||||
|                    void *p_entropy, |                    void *p_entropy, | ||||||
| @ -98,7 +98,7 @@ void ctr_drbg_set_reseed_interval( ctr_drbg_context *ctx, int interval ) | |||||||
|     ctx->reseed_interval = interval; |     ctx->reseed_interval = interval; | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| int block_cipher_df( unsigned char *output, | static int block_cipher_df( unsigned char *output, | ||||||
|                             const unsigned char *data, size_t data_len ) |                             const unsigned char *data, size_t data_len ) | ||||||
| { | { | ||||||
|     unsigned char buf[CTR_DRBG_MAX_SEED_INPUT + CTR_DRBG_BLOCKSIZE + 16]; |     unsigned char buf[CTR_DRBG_MAX_SEED_INPUT + CTR_DRBG_BLOCKSIZE + 16]; | ||||||
| @ -180,7 +180,7 @@ int block_cipher_df( unsigned char *output, | |||||||
|     return( 0 ); |     return( 0 ); | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| int ctr_drbg_update_internal( ctr_drbg_context *ctx, | static int ctr_drbg_update_internal( ctr_drbg_context *ctx, | ||||||
|                               const unsigned char data[CTR_DRBG_SEEDLEN] ) |                               const unsigned char data[CTR_DRBG_SEEDLEN] ) | ||||||
| { | { | ||||||
|     unsigned char tmp[CTR_DRBG_SEEDLEN]; |     unsigned char tmp[CTR_DRBG_SEEDLEN]; | ||||||
| @ -449,7 +449,8 @@ unsigned char result_nopr[16] = | |||||||
|       0x9d, 0x90, 0x3e, 0x07, 0x7c, 0x6f, 0x21, 0x8f }; |       0x9d, 0x90, 0x3e, 0x07, 0x7c, 0x6f, 0x21, 0x8f }; | ||||||
| 
 | 
 | ||||||
| int test_offset; | int test_offset; | ||||||
| int ctr_drbg_self_test_entropy( void *data, unsigned char *buf, size_t len ) | static int ctr_drbg_self_test_entropy( void *data, unsigned char *buf, | ||||||
|  |                                        size_t len ) | ||||||
| { | { | ||||||
|     unsigned char *p = data; |     unsigned char *p = data; | ||||||
|     memcpy( buf, p + test_offset, len ); |     memcpy( buf, p + test_offset, len ); | ||||||
|  | |||||||
| @ -1296,7 +1296,7 @@ int ecp_self_test( int verbose ) | |||||||
|     ecp_point R; |     ecp_point R; | ||||||
|     mpi m; |     mpi m; | ||||||
|     unsigned long add_c_prev, dbl_c_prev; |     unsigned long add_c_prev, dbl_c_prev; | ||||||
|     char *exponents[] = |     const char *exponents[] = | ||||||
|     { |     { | ||||||
|         "000000000000000000000000000000000000000000000000", /* zero */ |         "000000000000000000000000000000000000000000000000", /* zero */ | ||||||
|         "000000000000000000000000000000000000000000000001", /* one */ |         "000000000000000000000000000000000000000000000001", /* one */ | ||||||
|  | |||||||
| @ -1,7 +1,7 @@ | |||||||
| /*
 | /*
 | ||||||
|  *  Entropy accumulator implementation |  *  Entropy accumulator implementation | ||||||
|  * |  * | ||||||
|  *  Copyright (C) 2006-2011, Brainspark B.V. |  *  Copyright (C) 2006-2013, Brainspark B.V. | ||||||
|  * |  * | ||||||
|  *  This file is part of PolarSSL (http://www.polarssl.org)
 |  *  This file is part of PolarSSL (http://www.polarssl.org)
 | ||||||
|  *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> |  *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> | ||||||
| @ -81,7 +81,7 @@ int entropy_add_source( entropy_context *ctx, | |||||||
| /*
 | /*
 | ||||||
|  * Entropy accumulator update |  * Entropy accumulator update | ||||||
|  */ |  */ | ||||||
| int entropy_update( entropy_context *ctx, unsigned char source_id, | static int entropy_update( entropy_context *ctx, unsigned char source_id, | ||||||
|                            const unsigned char *data, size_t len ) |                            const unsigned char *data, size_t len ) | ||||||
| { | { | ||||||
|     unsigned char header[2]; |     unsigned char header[2]; | ||||||
|  | |||||||
| @ -1,7 +1,7 @@ | |||||||
| /*
 | /*
 | ||||||
|  *  NIST SP800-38D compliant GCM implementation |  *  NIST SP800-38D compliant GCM implementation | ||||||
|  * |  * | ||||||
|  *  Copyright (C) 2006-2012, Brainspark B.V. |  *  Copyright (C) 2006-2013, Brainspark B.V. | ||||||
|  * |  * | ||||||
|  *  This file is part of PolarSSL (http://www.polarssl.org)
 |  *  This file is part of PolarSSL (http://www.polarssl.org)
 | ||||||
|  *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> |  *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> | ||||||
| @ -123,7 +123,8 @@ static const uint64_t last4[16] = | |||||||
|     0x9180, 0x8da0, 0xa9c0, 0xb5e0 |     0x9180, 0x8da0, 0xa9c0, 0xb5e0 | ||||||
| }; | }; | ||||||
| 
 | 
 | ||||||
| void gcm_mult( gcm_context *ctx, const unsigned char x[16], unsigned char output[16] ) | static void gcm_mult( gcm_context *ctx, const unsigned char x[16], | ||||||
|  |                       unsigned char output[16] ) | ||||||
| { | { | ||||||
|     int i = 0; |     int i = 0; | ||||||
|     unsigned char z[16]; |     unsigned char z[16]; | ||||||
|  | |||||||
| @ -5,7 +5,7 @@ | |||||||
|  * |  * | ||||||
|  * \author Adriaan de Jong <dejong@fox-it.com> |  * \author Adriaan de Jong <dejong@fox-it.com> | ||||||
|  * |  * | ||||||
|  *  Copyright (C) 2006-2010, Brainspark B.V. |  *  Copyright (C) 2006-2013, Brainspark B.V. | ||||||
|  * |  * | ||||||
|  *  This file is part of PolarSSL (http://www.polarssl.org)
 |  *  This file is part of PolarSSL (http://www.polarssl.org)
 | ||||||
|  *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> |  *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> | ||||||
| @ -76,7 +76,7 @@ static void md2_finish_wrap( void *ctx, unsigned char *output ) | |||||||
|     md2_finish( (md2_context *) ctx, output ); |     md2_finish( (md2_context *) ctx, output ); | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| int md2_file_wrap( const char *path, unsigned char *output ) | static int md2_file_wrap( const char *path, unsigned char *output ) | ||||||
| { | { | ||||||
| #if defined(POLARSSL_FS_IO) | #if defined(POLARSSL_FS_IO) | ||||||
|     return md2_file( path, output ); |     return md2_file( path, output ); | ||||||
| @ -246,7 +246,7 @@ static void md5_finish_wrap( void *ctx, unsigned char *output ) | |||||||
|     md5_finish( (md5_context *) ctx, output ); |     md5_finish( (md5_context *) ctx, output ); | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| int md5_file_wrap( const char *path, unsigned char *output ) | static int md5_file_wrap( const char *path, unsigned char *output ) | ||||||
| { | { | ||||||
| #if defined(POLARSSL_FS_IO) | #if defined(POLARSSL_FS_IO) | ||||||
|     return md5_file( path, output ); |     return md5_file( path, output ); | ||||||
|  | |||||||
| @ -351,7 +351,7 @@ static const oid_descriptor_t *oid_descriptor_from_buf( | |||||||
|                 const unsigned char *oid, |                 const unsigned char *oid, | ||||||
|                 size_t len ) |                 size_t len ) | ||||||
| { | { | ||||||
|     const unsigned char *p = (unsigned char *) struct_set; |     const unsigned char *p = (const unsigned char *) struct_set; | ||||||
|     const oid_descriptor_t *cur; |     const oid_descriptor_t *cur; | ||||||
| 
 | 
 | ||||||
|     if( struct_set == NULL || oid == NULL ) |     if( struct_set == NULL || oid == NULL ) | ||||||
|  | |||||||
| @ -178,7 +178,9 @@ static void pem_aes_decrypt( unsigned char aes_iv[16], unsigned int keylen, | |||||||
| 
 | 
 | ||||||
| #endif /* POLARSSL_MD5_C && (POLARSSL_AES_C || POLARSSL_DES_C) */ | #endif /* POLARSSL_MD5_C && (POLARSSL_AES_C || POLARSSL_DES_C) */ | ||||||
| 
 | 
 | ||||||
| int pem_read_buffer( pem_context *ctx, char *header, char *footer, const unsigned char *data, const unsigned char *pwd, size_t pwdlen, size_t *use_len ) | int pem_read_buffer( pem_context *ctx, const char *header, const char *footer, | ||||||
|  |                      const unsigned char *data, const unsigned char *pwd, | ||||||
|  |                      size_t pwdlen, size_t *use_len ) | ||||||
| { | { | ||||||
|     int ret, enc; |     int ret, enc; | ||||||
|     size_t len; |     size_t len; | ||||||
|  | |||||||
| @ -195,7 +195,7 @@ static int ssl_parse_signature_algorithms_ext( ssl_context *ssl, | |||||||
| } | } | ||||||
| 
 | 
 | ||||||
| #if defined(POLARSSL_ECP_C) | #if defined(POLARSSL_ECP_C) | ||||||
| int ssl_parse_supported_elliptic_curves( ssl_context *ssl, | static int ssl_parse_supported_elliptic_curves( ssl_context *ssl, | ||||||
|                                                 const unsigned char *buf, |                                                 const unsigned char *buf, | ||||||
|                                                 size_t len ) |                                                 size_t len ) | ||||||
| { | { | ||||||
| @ -231,7 +231,7 @@ int ssl_parse_supported_elliptic_curves( ssl_context *ssl, | |||||||
|     return( 0 ); |     return( 0 ); | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| int ssl_parse_supported_point_formats( ssl_context *ssl, | static int ssl_parse_supported_point_formats( ssl_context *ssl, | ||||||
|                                               const unsigned char *buf, |                                               const unsigned char *buf, | ||||||
|                                               size_t len ) |                                               size_t len ) | ||||||
| { | { | ||||||
|  | |||||||
| @ -96,8 +96,9 @@ static size_t ssl_rsa_key_len( void *ctx ) | |||||||
| /*
 | /*
 | ||||||
|  * Key material generation |  * Key material generation | ||||||
|  */ |  */ | ||||||
| static int ssl3_prf( unsigned char *secret, size_t slen, char *label, | static int ssl3_prf( const unsigned char *secret, size_t slen, | ||||||
|                      unsigned char *random, size_t rlen, |                      const char *label, | ||||||
|  |                      const unsigned char *random, size_t rlen, | ||||||
|                      unsigned char *dstbuf, size_t dlen ) |                      unsigned char *dstbuf, size_t dlen ) | ||||||
| { | { | ||||||
|     size_t i; |     size_t i; | ||||||
| @ -140,13 +141,14 @@ static int ssl3_prf( unsigned char *secret, size_t slen, char *label, | |||||||
|     return( 0 ); |     return( 0 ); | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| static int tls1_prf( unsigned char *secret, size_t slen, char *label, | static int tls1_prf( const unsigned char *secret, size_t slen, | ||||||
|                      unsigned char *random, size_t rlen, |                      const char *label, | ||||||
|  |                      const unsigned char *random, size_t rlen, | ||||||
|                      unsigned char *dstbuf, size_t dlen ) |                      unsigned char *dstbuf, size_t dlen ) | ||||||
| { | { | ||||||
|     size_t nb, hs; |     size_t nb, hs; | ||||||
|     size_t i, j, k; |     size_t i, j, k; | ||||||
|     unsigned char *S1, *S2; |     const unsigned char *S1, *S2; | ||||||
|     unsigned char tmp[128]; |     unsigned char tmp[128]; | ||||||
|     unsigned char h_i[20]; |     unsigned char h_i[20]; | ||||||
| 
 | 
 | ||||||
| @ -200,8 +202,9 @@ static int tls1_prf( unsigned char *secret, size_t slen, char *label, | |||||||
|     return( 0 ); |     return( 0 ); | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| static int tls_prf_sha256( unsigned char *secret, size_t slen, char *label, | static int tls_prf_sha256( const unsigned char *secret, size_t slen, | ||||||
|                            unsigned char *random, size_t rlen, |                            const char *label, | ||||||
|  |                            const unsigned char *random, size_t rlen, | ||||||
|                            unsigned char *dstbuf, size_t dlen ) |                            unsigned char *dstbuf, size_t dlen ) | ||||||
| { | { | ||||||
|     size_t nb; |     size_t nb; | ||||||
| @ -240,8 +243,9 @@ static int tls_prf_sha256( unsigned char *secret, size_t slen, char *label, | |||||||
| } | } | ||||||
| 
 | 
 | ||||||
| #if defined(POLARSSL_SHA4_C) | #if defined(POLARSSL_SHA4_C) | ||||||
| static int tls_prf_sha384( unsigned char *secret, size_t slen, char *label, | static int tls_prf_sha384( const unsigned char *secret, size_t slen, | ||||||
|                            unsigned char *random, size_t rlen, |                            const char *label, | ||||||
|  |                            const unsigned char *random, size_t rlen, | ||||||
|                            unsigned char *dstbuf, size_t dlen ) |                            unsigned char *dstbuf, size_t dlen ) | ||||||
| { | { | ||||||
|     size_t nb; |     size_t nb; | ||||||
| @ -280,9 +284,9 @@ static int tls_prf_sha384( unsigned char *secret, size_t slen, char *label, | |||||||
| } | } | ||||||
| #endif | #endif | ||||||
| 
 | 
 | ||||||
| static void ssl_update_checksum_start(ssl_context *, unsigned char *, size_t); | static void ssl_update_checksum_start(ssl_context *, const unsigned char *, size_t); | ||||||
| static void ssl_update_checksum_md5sha1(ssl_context *, unsigned char *, size_t); | static void ssl_update_checksum_md5sha1(ssl_context *, const unsigned char *, size_t); | ||||||
| static void ssl_update_checksum_sha256(ssl_context *, unsigned char *, size_t); | static void ssl_update_checksum_sha256(ssl_context *, const unsigned char *, size_t); | ||||||
| 
 | 
 | ||||||
| static void ssl_calc_verify_ssl(ssl_context *,unsigned char *); | static void ssl_calc_verify_ssl(ssl_context *,unsigned char *); | ||||||
| static void ssl_calc_verify_tls(ssl_context *,unsigned char *); | static void ssl_calc_verify_tls(ssl_context *,unsigned char *); | ||||||
| @ -293,7 +297,7 @@ static void ssl_calc_finished_tls(ssl_context *,unsigned char *,int); | |||||||
| static void ssl_calc_finished_tls_sha256(ssl_context *,unsigned char *,int); | static void ssl_calc_finished_tls_sha256(ssl_context *,unsigned char *,int); | ||||||
| 
 | 
 | ||||||
| #if defined(POLARSSL_SHA4_C) | #if defined(POLARSSL_SHA4_C) | ||||||
| static void ssl_update_checksum_sha384(ssl_context *, unsigned char *, size_t); | static void ssl_update_checksum_sha384(ssl_context *, const unsigned char *, size_t); | ||||||
| static void ssl_calc_verify_tls_sha384(ssl_context *,unsigned char *); | static void ssl_calc_verify_tls_sha384(ssl_context *,unsigned char *); | ||||||
| static void ssl_calc_finished_tls_sha384(ssl_context *,unsigned char *,int); | static void ssl_calc_finished_tls_sha384(ssl_context *,unsigned char *,int); | ||||||
| #endif | #endif | ||||||
| @ -2229,8 +2233,8 @@ void ssl_optimize_checksum( ssl_context *ssl, | |||||||
|         ssl->handshake->update_checksum = ssl_update_checksum_sha256; |         ssl->handshake->update_checksum = ssl_update_checksum_sha256; | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| static void ssl_update_checksum_start( ssl_context *ssl, unsigned char *buf, | static void ssl_update_checksum_start( ssl_context *ssl, | ||||||
|                                        size_t len ) |                                        const unsigned char *buf, size_t len ) | ||||||
| { | { | ||||||
|      md5_update( &ssl->handshake->fin_md5 , buf, len ); |      md5_update( &ssl->handshake->fin_md5 , buf, len ); | ||||||
|     sha1_update( &ssl->handshake->fin_sha1, buf, len ); |     sha1_update( &ssl->handshake->fin_sha1, buf, len ); | ||||||
| @ -2240,22 +2244,22 @@ static void ssl_update_checksum_start( ssl_context *ssl, unsigned char *buf, | |||||||
| #endif | #endif | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| static void ssl_update_checksum_md5sha1( ssl_context *ssl, unsigned char *buf, | static void ssl_update_checksum_md5sha1( ssl_context *ssl, | ||||||
|                                          size_t len ) |                                          const unsigned char *buf, size_t len ) | ||||||
| { | { | ||||||
|      md5_update( &ssl->handshake->fin_md5 , buf, len ); |      md5_update( &ssl->handshake->fin_md5 , buf, len ); | ||||||
|     sha1_update( &ssl->handshake->fin_sha1, buf, len ); |     sha1_update( &ssl->handshake->fin_sha1, buf, len ); | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| static void ssl_update_checksum_sha256( ssl_context *ssl, unsigned char *buf, | static void ssl_update_checksum_sha256( ssl_context *ssl, | ||||||
|                                         size_t len ) |                                         const unsigned char *buf, size_t len ) | ||||||
| { | { | ||||||
|     sha2_update( &ssl->handshake->fin_sha2, buf, len ); |     sha2_update( &ssl->handshake->fin_sha2, buf, len ); | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| #if defined(POLARSSL_SHA4_C) | #if defined(POLARSSL_SHA4_C) | ||||||
| static void ssl_update_checksum_sha384( ssl_context *ssl, unsigned char *buf, | static void ssl_update_checksum_sha384( ssl_context *ssl, | ||||||
|                                         size_t len ) |                                         const unsigned char *buf, size_t len ) | ||||||
| { | { | ||||||
|     sha4_update( &ssl->handshake->fin_sha4, buf, len ); |     sha4_update( &ssl->handshake->fin_sha4, buf, len ); | ||||||
| } | } | ||||||
| @ -2382,7 +2386,7 @@ static void ssl_calc_finished_tls( | |||||||
|     md5_finish(  &md5, padbuf ); |     md5_finish(  &md5, padbuf ); | ||||||
|     sha1_finish( &sha1, padbuf + 16 ); |     sha1_finish( &sha1, padbuf + 16 ); | ||||||
| 
 | 
 | ||||||
|     ssl->handshake->tls_prf( session->master, 48, (char *) sender, |     ssl->handshake->tls_prf( session->master, 48, sender, | ||||||
|                              padbuf, 36, buf, len ); |                              padbuf, 36, buf, len ); | ||||||
| 
 | 
 | ||||||
|     SSL_DEBUG_BUF( 3, "calc finished result", buf, len ); |     SSL_DEBUG_BUF( 3, "calc finished result", buf, len ); | ||||||
| @ -2428,7 +2432,7 @@ static void ssl_calc_finished_tls_sha256( | |||||||
| 
 | 
 | ||||||
|     sha2_finish( &sha2, padbuf ); |     sha2_finish( &sha2, padbuf ); | ||||||
| 
 | 
 | ||||||
|     ssl->handshake->tls_prf( session->master, 48, (char *) sender, |     ssl->handshake->tls_prf( session->master, 48, sender, | ||||||
|                              padbuf, 32, buf, len ); |                              padbuf, 32, buf, len ); | ||||||
| 
 | 
 | ||||||
|     SSL_DEBUG_BUF( 3, "calc finished result", buf, len ); |     SSL_DEBUG_BUF( 3, "calc finished result", buf, len ); | ||||||
| @ -2474,7 +2478,7 @@ static void ssl_calc_finished_tls_sha384( | |||||||
| 
 | 
 | ||||||
|     sha4_finish( &sha4, padbuf ); |     sha4_finish( &sha4, padbuf ); | ||||||
| 
 | 
 | ||||||
|     ssl->handshake->tls_prf( session->master, 48, (char *) sender, |     ssl->handshake->tls_prf( session->master, 48, sender, | ||||||
|                              padbuf, 48, buf, len ); |                              padbuf, 48, buf, len ); | ||||||
| 
 | 
 | ||||||
|     SSL_DEBUG_BUF( 3, "calc finished result", buf, len ); |     SSL_DEBUG_BUF( 3, "calc finished result", buf, len ); | ||||||
| @ -2689,7 +2693,7 @@ int ssl_parse_finished( ssl_context *ssl ) | |||||||
|     return( 0 ); |     return( 0 ); | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| int ssl_handshake_init( ssl_context *ssl ) | static int ssl_handshake_init( ssl_context *ssl ) | ||||||
| { | { | ||||||
|     if( ssl->transform_negotiate ) |     if( ssl->transform_negotiate ) | ||||||
|         ssl_transform_free( ssl->transform_negotiate ); |         ssl_transform_free( ssl->transform_negotiate ); | ||||||
|  | |||||||
| @ -1,7 +1,7 @@ | |||||||
| /*
 | /*
 | ||||||
|  *  X.509 certificate and private key decoding |  *  X.509 certificate and private key decoding | ||||||
|  * |  * | ||||||
|  *  Copyright (C) 2006-2011, Brainspark B.V. |  *  Copyright (C) 2006-2013, Brainspark B.V. | ||||||
|  * |  * | ||||||
|  *  This file is part of PolarSSL (http://www.polarssl.org)
 |  *  This file is part of PolarSSL (http://www.polarssl.org)
 | ||||||
|  *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> |  *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> | ||||||
| @ -1113,7 +1113,7 @@ static int x509_get_sig_alg( const x509_buf *sig_oid, md_type_t *md_alg, | |||||||
| /*
 | /*
 | ||||||
|  * Parse and fill a single X.509 certificate in DER format |  * Parse and fill a single X.509 certificate in DER format | ||||||
|  */ |  */ | ||||||
| int x509parse_crt_der_core( x509_cert *crt, const unsigned char *buf, | static int x509parse_crt_der_core( x509_cert *crt, const unsigned char *buf, | ||||||
|                                    size_t buflen ) |                                    size_t buflen ) | ||||||
| { | { | ||||||
|     int ret; |     int ret; | ||||||
| @ -1813,7 +1813,7 @@ int x509parse_crl( x509_crl *chain, const unsigned char *buf, size_t buflen ) | |||||||
| /*
 | /*
 | ||||||
|  * Load all data from a file into a given buffer. |  * Load all data from a file into a given buffer. | ||||||
|  */ |  */ | ||||||
| int load_file( const char *path, unsigned char **buf, size_t *n ) | static int load_file( const char *path, unsigned char **buf, size_t *n ) | ||||||
| { | { | ||||||
|     FILE *f; |     FILE *f; | ||||||
| 
 | 
 | ||||||
| @ -1994,7 +1994,7 @@ int x509parse_keyfile( rsa_context *rsa, const char *path, const char *pwd ) | |||||||
|         ret = x509parse_key( rsa, buf, n, NULL, 0 ); |         ret = x509parse_key( rsa, buf, n, NULL, 0 ); | ||||||
|     else |     else | ||||||
|         ret = x509parse_key( rsa, buf, n, |         ret = x509parse_key( rsa, buf, n, | ||||||
|                 (unsigned char *) pwd, strlen( pwd ) ); |                 (const unsigned char *) pwd, strlen( pwd ) ); | ||||||
| 
 | 
 | ||||||
|     memset( buf, 0, n + 1 ); |     memset( buf, 0, n + 1 ); | ||||||
|     free( buf ); |     free( buf ); | ||||||
| @ -3101,7 +3101,7 @@ static int x509parse_verifycrl(x509_cert *crt, x509_cert *ca, | |||||||
|     return flags; |     return flags; | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| int x509_wildcard_verify( const char *cn, x509_buf *name ) | static int x509_wildcard_verify( const char *cn, x509_buf *name ) | ||||||
| { | { | ||||||
|     size_t i; |     size_t i; | ||||||
|     size_t cn_idx = 0; |     size_t cn_idx = 0; | ||||||
|  | |||||||
| @ -1,7 +1,7 @@ | |||||||
| /*
 | /*
 | ||||||
|  * X509 buffer writing functionality |  * X509 buffer writing functionality | ||||||
|  * |  * | ||||||
|  *  Copyright (C) 2006-2012, Brainspark B.V. |  *  Copyright (C) 2006-2013, Brainspark B.V. | ||||||
|  * |  * | ||||||
|  *  This file is part of PolarSSL (http://www.polarssl.org)
 |  *  This file is part of PolarSSL (http://www.polarssl.org)
 | ||||||
|  *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> |  *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> | ||||||
| @ -109,7 +109,7 @@ int x509_write_key_der( unsigned char *buf, size_t size, rsa_context *rsa ) | |||||||
|     return( len ); |     return( len ); | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| int x509_write_name( unsigned char **p, unsigned char *start, char *oid, | static int x509_write_name( unsigned char **p, unsigned char *start, char *oid, | ||||||
|                             char *name ) |                             char *name ) | ||||||
| { | { | ||||||
|     int ret; |     int ret; | ||||||
| @ -141,8 +141,8 @@ int x509_write_name( unsigned char **p, unsigned char *start, char *oid, | |||||||
|     return( len ); |     return( len ); | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| int x509_write_sig( unsigned char **p, unsigned char *start, const char *oid, | static int x509_write_sig( unsigned char **p, unsigned char *start, | ||||||
|                     unsigned char *sig, size_t size ) |                            const char *oid, unsigned char *sig, size_t size ) | ||||||
| { | { | ||||||
|     int ret; |     int ret; | ||||||
|     size_t len = 0; |     size_t len = 0; | ||||||
|  | |||||||
| @ -57,7 +57,7 @@ | |||||||
| /*
 | /*
 | ||||||
|  * XTEA key schedule |  * XTEA key schedule | ||||||
|  */ |  */ | ||||||
| void xtea_setup( xtea_context *ctx, unsigned char key[16] ) | void xtea_setup( xtea_context *ctx, const unsigned char key[16] ) | ||||||
| { | { | ||||||
|     int i; |     int i; | ||||||
| 
 | 
 | ||||||
| @ -72,8 +72,8 @@ void xtea_setup( xtea_context *ctx, unsigned char key[16] ) | |||||||
| /*
 | /*
 | ||||||
|  * XTEA encrypt function |  * XTEA encrypt function | ||||||
|  */ |  */ | ||||||
| int xtea_crypt_ecb( xtea_context *ctx, int mode, unsigned char input[8], | int xtea_crypt_ecb( xtea_context *ctx, int mode, | ||||||
|                      unsigned char output[8]) |                     const unsigned char input[8], unsigned char output[8]) | ||||||
| { | { | ||||||
|     uint32_t *k, v0, v1, i; |     uint32_t *k, v0, v1, i; | ||||||
| 
 | 
 | ||||||
| @ -114,17 +114,14 @@ int xtea_crypt_ecb( xtea_context *ctx, int mode, unsigned char input[8], | |||||||
| /*
 | /*
 | ||||||
|  * XTEA-CBC buffer encryption/decryption |  * XTEA-CBC buffer encryption/decryption | ||||||
|  */ |  */ | ||||||
| int xtea_crypt_cbc( xtea_context *ctx, | int xtea_crypt_cbc( xtea_context *ctx, int mode, size_t length, | ||||||
|                     int mode, |                     unsigned char iv[8], const unsigned char *input, | ||||||
|                     size_t length, |  | ||||||
|                     unsigned char iv[8], |  | ||||||
|                     unsigned char *input, |  | ||||||
|                     unsigned char *output) |                     unsigned char *output) | ||||||
| { | { | ||||||
|     int i; |     int i; | ||||||
|     unsigned char temp[8]; |     unsigned char temp[8]; | ||||||
| 
 | 
 | ||||||
|     if(length % 8) |     if( length % 8 ) | ||||||
|         return( POLARSSL_ERR_XTEA_INVALID_INPUT_LENGTH ); |         return( POLARSSL_ERR_XTEA_INVALID_INPUT_LENGTH ); | ||||||
| 
 | 
 | ||||||
|     if( mode == XTEA_DECRYPT ) |     if( mode == XTEA_DECRYPT ) | ||||||
| @ -225,7 +222,7 @@ int xtea_self_test( int verbose ) | |||||||
| 
 | 
 | ||||||
|         memcpy( buf, xtea_test_pt[i], 8 ); |         memcpy( buf, xtea_test_pt[i], 8 ); | ||||||
| 
 | 
 | ||||||
|         xtea_setup( &ctx, (unsigned char *) xtea_test_key[i] ); |         xtea_setup( &ctx, xtea_test_key[i] ); | ||||||
|         xtea_crypt_ecb( &ctx, XTEA_ENCRYPT, buf, buf ); |         xtea_crypt_ecb( &ctx, XTEA_ENCRYPT, buf, buf ); | ||||||
| 
 | 
 | ||||||
|         if( memcmp( buf, xtea_test_ct[i], 8 ) != 0 ) |         if( memcmp( buf, xtea_test_ct[i], 8 ) != 0 ) | ||||||
|  | |||||||
| @ -28,7 +28,7 @@ typedef UINT32 uint32_t; | |||||||
| } | } | ||||||
| #endif | #endif | ||||||
| 
 | 
 | ||||||
| int unhexify(unsigned char *obuf, const char *ibuf) | static int unhexify(unsigned char *obuf, const char *ibuf) | ||||||
| { | { | ||||||
|     unsigned char c, c2; |     unsigned char c, c2; | ||||||
|     int len = strlen(ibuf) / 2; |     int len = strlen(ibuf) / 2; | ||||||
| @ -62,7 +62,7 @@ int unhexify(unsigned char *obuf, const char *ibuf) | |||||||
|     return len; |     return len; | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| void hexify(unsigned char *obuf, const unsigned char *ibuf, int len) | static void hexify(unsigned char *obuf, const unsigned char *ibuf, int len) | ||||||
| { | { | ||||||
|     unsigned char l, h; |     unsigned char l, h; | ||||||
| 
 | 
 | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user
	 Paul Bakker
						Paul Bakker