- Cleaned up warning-generating code

This commit is contained in:
Paul Bakker 2011-01-18 16:17:47 +00:00
parent f917e42c9b
commit d61e7d98cb
5 changed files with 18 additions and 4 deletions

View File

@ -97,7 +97,7 @@ int pkcs11_decrypt( pkcs11_context *ctx,
int mode, int *olen, int mode, int *olen,
const unsigned char *input, const unsigned char *input,
unsigned char *output, unsigned char *output,
int output_max_len ); unsigned int output_max_len );
/** /**
* \brief Do a private RSA to sign a message digest * \brief Do a private RSA to sign a message digest

View File

@ -366,6 +366,8 @@ int cipher_finish( cipher_context_t *ctx, unsigned char *output, int *olen)
int cipher_self_test( int verbose ) int cipher_self_test( int verbose )
{ {
((void) verbose);
return( 0 ); return( 0 );
} }

View File

@ -203,31 +203,43 @@ int des3_crypt_cbc_wrap( void *ctx, operation_t operation, int length,
int des_setkey_dec_wrap( void *ctx, const unsigned char *key, int key_length ) int des_setkey_dec_wrap( void *ctx, const unsigned char *key, int key_length )
{ {
((void) key_length);
return des_setkey_dec( (des_context *) ctx, key ); return des_setkey_dec( (des_context *) ctx, key );
} }
int des_setkey_enc_wrap( void *ctx, const unsigned char *key, int key_length ) int des_setkey_enc_wrap( void *ctx, const unsigned char *key, int key_length )
{ {
((void) key_length);
return des_setkey_enc( (des_context *) ctx, key ); return des_setkey_enc( (des_context *) ctx, key );
} }
int des3_set2key_dec_wrap( void *ctx, const unsigned char *key, int key_length ) int des3_set2key_dec_wrap( void *ctx, const unsigned char *key, int key_length )
{ {
((void) key_length);
return des3_set2key_dec( (des3_context *) ctx, key ); return des3_set2key_dec( (des3_context *) ctx, key );
} }
int des3_set2key_enc_wrap( void *ctx, const unsigned char *key, int key_length ) int des3_set2key_enc_wrap( void *ctx, const unsigned char *key, int key_length )
{ {
((void) key_length);
return des3_set2key_enc( (des3_context *) ctx, key ); return des3_set2key_enc( (des3_context *) ctx, key );
} }
int des3_set3key_dec_wrap( void *ctx, const unsigned char *key, int key_length ) int des3_set3key_dec_wrap( void *ctx, const unsigned char *key, int key_length )
{ {
((void) key_length);
return des3_set3key_dec( (des3_context *) ctx, key ); return des3_set3key_dec( (des3_context *) ctx, key );
} }
int des3_set3key_enc_wrap( void *ctx, const unsigned char *key, int key_length ) int des3_set3key_enc_wrap( void *ctx, const unsigned char *key, int key_length )
{ {
((void) key_length);
return des3_set3key_enc( (des3_context *) ctx, key ); return des3_set3key_enc( (des3_context *) ctx, key );
} }

View File

@ -116,7 +116,7 @@ int pkcs11_decrypt( pkcs11_context *ctx,
int mode, int *olen, int mode, int *olen,
const unsigned char *input, const unsigned char *input,
unsigned char *output, unsigned char *output,
int output_max_len ) unsigned int output_max_len )
{ {
size_t input_len, output_len; size_t input_len, output_len;

View File

@ -776,7 +776,7 @@ static int x509_get_ns_cert_type( unsigned char **p,
unsigned char *ns_cert_type) unsigned char *ns_cert_type)
{ {
int ret; int ret;
x509_bitstring bs = {0}; x509_bitstring bs = { 0, 0, NULL };
if( ( ret = asn1_get_bitstring( p, end, &bs ) ) != 0 ) if( ( ret = asn1_get_bitstring( p, end, &bs ) ) != 0 )
return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret ); return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );
@ -795,7 +795,7 @@ static int x509_get_key_usage( unsigned char **p,
unsigned char *key_usage) unsigned char *key_usage)
{ {
int ret; int ret;
x509_bitstring bs = {0}; x509_bitstring bs = { 0, 0, NULL };
if( ( ret = asn1_get_bitstring( p, end, &bs ) ) != 0 ) if( ( ret = asn1_get_bitstring( p, end, &bs ) ) != 0 )
return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret ); return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS | ret );