mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-30 10:47:28 +02:00
Dismiss unused warnings for rsa_test.
This commit is contained in:
@ -14558,22 +14558,12 @@ WOLFSSL_TEST_SUBROUTINE int rsa_test(void)
|
|||||||
RsaKey caKey[1];
|
RsaKey caKey[1];
|
||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
#if !defined(NO_ASN) || !defined(WOLFSSL_RSA_PUBLIC_ONLY) \
|
|
||||||
|| defined(WOLFSSL_PUBLIC_MP)
|
|
||||||
word32 idx = 0;
|
word32 idx = 0;
|
||||||
#endif
|
|
||||||
#if !defined(WC_NO_RNG) && !defined(WC_NO_RSA_OAEP) && \
|
|
||||||
((!defined(WOLFSSL_RSA_VERIFY_ONLY) && !defined(WOLFSSL_RSA_PUBLIC_ONLY)) || \
|
|
||||||
defined(WOLFSSL_PUBLIC_MP))
|
|
||||||
const char inStr[] = TEST_STRING;
|
const char inStr[] = TEST_STRING;
|
||||||
const word32 inLen = (word32)TEST_STRING_SZ;
|
const word32 inLen = (word32)TEST_STRING_SZ;
|
||||||
const word32 outSz = RSA_TEST_BYTES;
|
const word32 outSz = RSA_TEST_BYTES;
|
||||||
const word32 plainSz = RSA_TEST_BYTES;
|
const word32 plainSz = RSA_TEST_BYTES;
|
||||||
#endif
|
|
||||||
#if (!defined(WOLFSSL_RSA_PUBLIC_ONLY) && !defined(WOLFSSL_RSA_VERIFY_ONLY) && \
|
|
||||||
!defined(WC_NO_RNG)) || defined(WOLFSSL_PUBLIC_MP)
|
|
||||||
byte* res;
|
byte* res;
|
||||||
#endif
|
|
||||||
#ifndef NO_SIG_WRAPPER
|
#ifndef NO_SIG_WRAPPER
|
||||||
int modLen;
|
int modLen;
|
||||||
#endif
|
#endif
|
||||||
@ -14591,9 +14581,6 @@ WOLFSSL_TEST_SUBROUTINE int rsa_test(void)
|
|||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if !defined(WC_NO_RNG) && !defined(WC_NO_RSA_OAEP) && \
|
|
||||||
((!defined(WOLFSSL_RSA_VERIFY_ONLY) && !defined(WOLFSSL_RSA_PUBLIC_ONLY)) || \
|
|
||||||
defined(WOLFSSL_PUBLIC_MP))
|
|
||||||
DECLARE_VAR(in, byte, TEST_STRING_SZ, HEAP_HINT);
|
DECLARE_VAR(in, byte, TEST_STRING_SZ, HEAP_HINT);
|
||||||
DECLARE_VAR(out, byte, RSA_TEST_BYTES, HEAP_HINT);
|
DECLARE_VAR(out, byte, RSA_TEST_BYTES, HEAP_HINT);
|
||||||
DECLARE_VAR(plain, byte, RSA_TEST_BYTES, HEAP_HINT);
|
DECLARE_VAR(plain, byte, RSA_TEST_BYTES, HEAP_HINT);
|
||||||
@ -14604,7 +14591,6 @@ WOLFSSL_TEST_SUBROUTINE int rsa_test(void)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
XMEMCPY(in, inStr, inLen);
|
XMEMCPY(in, inStr, inLen);
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifdef WOLFSSL_SMALL_STACK
|
#ifdef WOLFSSL_SMALL_STACK
|
||||||
if (key == NULL)
|
if (key == NULL)
|
||||||
@ -14816,9 +14802,6 @@ WOLFSSL_TEST_SUBROUTINE int rsa_test(void)
|
|||||||
TEST_SLEEP();
|
TEST_SLEEP();
|
||||||
|
|
||||||
#elif defined(WOLFSSL_PUBLIC_MP)
|
#elif defined(WOLFSSL_PUBLIC_MP)
|
||||||
(void)outSz;
|
|
||||||
(void)inLen;
|
|
||||||
(void)res;
|
|
||||||
{
|
{
|
||||||
static byte signature_2048[] = {
|
static byte signature_2048[] = {
|
||||||
0x07, 0x6f, 0xc9, 0x85, 0x73, 0x9e, 0x21, 0x79,
|
0x07, 0x6f, 0xc9, 0x85, 0x73, 0x9e, 0x21, 0x79,
|
||||||
@ -15272,8 +15255,6 @@ WOLFSSL_TEST_SUBROUTINE int rsa_test(void)
|
|||||||
}
|
}
|
||||||
|
|
||||||
FreeDecodedCert(cert);
|
FreeDecodedCert(cert);
|
||||||
#else
|
|
||||||
(void)bytes;
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef WOLFSSL_CERT_EXT
|
#ifdef WOLFSSL_CERT_EXT
|
||||||
@ -15636,50 +15617,52 @@ WOLFSSL_TEST_SUBROUTINE int rsa_test(void)
|
|||||||
exit_rsa:
|
exit_rsa:
|
||||||
|
|
||||||
#ifdef WOLFSSL_SMALL_STACK
|
#ifdef WOLFSSL_SMALL_STACK
|
||||||
|
|
||||||
if (key != NULL) {
|
if (key != NULL) {
|
||||||
wc_FreeRsaKey(key);
|
wc_FreeRsaKey(key);
|
||||||
XFREE(key, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
XFREE(key, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
}
|
}
|
||||||
#if defined(WOLFSSL_CERT_EXT) || defined(WOLFSSL_CERT_GEN)
|
#if defined(WOLFSSL_CERT_EXT) || defined(WOLFSSL_CERT_GEN)
|
||||||
if (keypub != NULL) {
|
if (keypub != NULL) {
|
||||||
wc_FreeRsaKey(keypub);
|
wc_FreeRsaKey(keypub);
|
||||||
XFREE(keypub, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
XFREE(keypub, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
#if defined(HAVE_NTRU)
|
#if defined(HAVE_NTRU)
|
||||||
if (caKey != NULL) {
|
if (caKey != NULL) {
|
||||||
wc_FreeRsaKey(caKey);
|
wc_FreeRsaKey(caKey);
|
||||||
XFREE(caKey, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
XFREE(caKey, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
#ifdef WOLFSSL_TEST_CERT
|
#ifdef WOLFSSL_TEST_CERT
|
||||||
if (cert != NULL)
|
if (cert != NULL)
|
||||||
XFREE(cert, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
XFREE(cert, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#else
|
#else
|
||||||
|
|
||||||
wc_FreeRsaKey(key);
|
wc_FreeRsaKey(key);
|
||||||
#if defined(WOLFSSL_CERT_EXT) || defined(WOLFSSL_CERT_GEN)
|
#if defined(WOLFSSL_CERT_EXT) || defined(WOLFSSL_CERT_GEN)
|
||||||
wc_FreeRsaKey(keypub);
|
wc_FreeRsaKey(keypub);
|
||||||
#endif
|
#endif
|
||||||
#if defined(HAVE_NTRU)
|
#if defined(HAVE_NTRU)
|
||||||
wc_FreeRsaKey(caKey);
|
wc_FreeRsaKey(caKey);
|
||||||
#endif
|
#endif
|
||||||
|
#endif /* WOLFSSL_SMALL_STACK */
|
||||||
#endif
|
|
||||||
|
|
||||||
XFREE(der, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
XFREE(der, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
XFREE(tmp, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
XFREE(tmp, HEAP_HINT, DYNAMIC_TYPE_TMP_BUFFER);
|
||||||
wc_FreeRng(&rng);
|
wc_FreeRng(&rng);
|
||||||
|
|
||||||
#if (!defined(WOLFSSL_RSA_VERIFY_ONLY) || defined(WOLFSSL_PUBLIC_MP)) && \
|
|
||||||
!defined(WC_NO_RSA_OAEP) && !defined(WC_NO_RNG)
|
|
||||||
FREE_VAR(in, HEAP_HINT);
|
FREE_VAR(in, HEAP_HINT);
|
||||||
FREE_VAR(out, HEAP_HINT);
|
FREE_VAR(out, HEAP_HINT);
|
||||||
FREE_VAR(plain, HEAP_HINT);
|
FREE_VAR(plain, HEAP_HINT);
|
||||||
#endif
|
|
||||||
|
(void)res;
|
||||||
|
(void)bytes;
|
||||||
|
(void)in;
|
||||||
|
(void)out;
|
||||||
|
(void)plain;
|
||||||
|
(void)inLen;
|
||||||
|
(void)outSz;
|
||||||
|
(void)plainSz;
|
||||||
|
|
||||||
/* ret can be greater then 0 with certgen but all negative values should
|
/* ret can be greater then 0 with certgen but all negative values should
|
||||||
* be returned and treated as an error */
|
* be returned and treated as an error */
|
||||||
|
Reference in New Issue
Block a user