Resolve unused "typeH" warning.

This commit is contained in:
David Garske
2016-03-17 15:56:51 -07:00
parent e1787fe160
commit 0e43fca1f3

View File

@@ -2106,7 +2106,7 @@ int DhAgree(WOLFSSL* ssl,
{
int ret;
DhKey dhKey;
#if defined(WOLFSSL_ASYNC_CRYPT_TEST)
if (ssl->options.side == WOLFSSL_SERVER_END &&
ssl->asyncCryptTest.type == ASYNC_TEST_NONE)
@@ -13408,7 +13408,7 @@ static word32 QSH_KeyExchangeWrite(WOLFSSL* ssl, byte isServer)
XMEMCPY(es, ssl->arrays->client_identity, esSz);
es += esSz;
encSz = esSz + OPAQUE16_LEN;
ret = DhAgree(ssl,
serverP.buffer, serverP.length,
serverG.buffer, serverG.length,
@@ -15065,7 +15065,6 @@ int DoSessionTicket(WOLFSSL* ssl,
#if !defined(NO_DH) && !defined(NO_RSA)
case diffie_hellman_kea:
{
int typeH = 0;
enum wc_HashType hashType = WC_HASH_TYPE_NONE;
idx = RECORD_HEADER_SZ + HANDSHAKE_HEADER_SZ;
@@ -15173,28 +15172,24 @@ int DoSessionTicket(WOLFSSL* ssl,
case sha512_mac:
#ifdef WOLFSSL_SHA512
hashType = WC_HASH_TYPE_SHA512;
typeH = SHA512h;
#endif
break;
case sha384_mac:
#ifdef WOLFSSL_SHA384
hashType = WC_HASH_TYPE_SHA384;
typeH = SHA384h;
#endif
break;
case sha256_mac:
#ifndef NO_SHA256
hashType = WC_HASH_TYPE_SHA256;
typeH = SHA256h;
#endif
break;
case sha_mac:
#ifndef NO_OLD_TLS
hashType = WC_HASH_TYPE_SHA;
typeH = SHAh;
#endif
break;
@@ -15256,11 +15251,37 @@ int DoSessionTicket(WOLFSSL* ssl,
{
/* For TLS 1.2 re-encode signature */
if (IsAtLeastTLSv1_2(ssl)) {
int typeH = 0;
byte* encodedSig = (byte*)XMALLOC(MAX_ENCODED_SIG_SZ, NULL,
DYNAMIC_TYPE_TMP_BUFFER);
if (encodedSig == NULL) {
ERROR_OUT(MEMORY_E, exit_sske);
}
switch (ssl->suites->hashAlgo) {
case sha512_mac:
#ifdef WOLFSSL_SHA512
typeH = SHA512h;
#endif
break;
case sha384_mac:
#ifdef WOLFSSL_SHA384
typeH = SHA384h;
#endif
break;
case sha256_mac:
#ifndef NO_SHA256
typeH = SHA256h;
#endif
break;
case sha_mac:
#ifndef NO_OLD_TLS
typeH = SHAh;
#endif
break;
default:
break;
}
ssl->buffers.sig.length = wc_EncodeSignature(encodedSig,
ssl->buffers.sig.buffer, ssl->buffers.sig.length, typeH);
@@ -17120,7 +17141,7 @@ int DoSessionTicket(WOLFSSL* ssl,
if ((idx - begin) + clientPubSz > size) {
ERROR_OUT(BUFFER_ERROR, exit_dcke);
}
ret = DhAgree(ssl,
ssl->buffers.serverDH_P.buffer,
ssl->buffers.serverDH_P.length,