diff options
author | Rich Salz <rsalz@akamai.com> | 2016-02-13 22:33:56 -0500 |
---|---|---|
committer | Rich Salz <rsalz@openssl.org> | 2016-02-22 13:39:44 -0500 |
commit | a773b52a61bb269e75ebbac01cfca9ebcb6c78b9 (patch) | |
tree | b70a39274abcb667620e2bb8f99570cad672ea65 /ssl | |
parent | 5de75fb4fb0a0f724c259a5477603c7d0dfd2235 (diff) | |
download | openssl-a773b52a61bb269e75ebbac01cfca9ebcb6c78b9.tar.gz |
Remove unused parameters from internal functions
Reviewed-by: Richard Levitte <levitte@openssl.org>
Diffstat (limited to 'ssl')
-rw-r--r-- | ssl/d1_lib.c | 3 | ||||
-rw-r--r-- | ssl/record/rec_layer_d1.c | 6 | ||||
-rw-r--r-- | ssl/record/record_locl.h | 3 | ||||
-rw-r--r-- | ssl/record/ssl3_record.c | 5 | ||||
-rw-r--r-- | ssl/ssl_locl.h | 5 | ||||
-rw-r--r-- | ssl/statem/statem_dtls.c | 13 | ||||
-rw-r--r-- | ssl/statem/statem_srvr.c | 2 |
7 files changed, 16 insertions, 21 deletions
diff --git a/ssl/d1_lib.c b/ssl/d1_lib.c index 8b3e941570..d9c4ec6503 100644 --- a/ssl/d1_lib.c +++ b/ssl/d1_lib.c @@ -890,8 +890,7 @@ end: static int dtls1_set_handshake_header(SSL *s, int htype, unsigned long len) { - unsigned char *p = (unsigned char *)s->init_buf->data; - dtls1_set_message_header(s, p, htype, len, 0, len); + dtls1_set_message_header(s, htype, len, 0, len); s->init_num = (int)len + DTLS1_HM_HEADER_LENGTH; s->init_off = 0; /* Buffer the message to handle re-xmits */ diff --git a/ssl/record/rec_layer_d1.c b/ssl/record/rec_layer_d1.c index 49e8f462f4..a1b0e9e7db 100644 --- a/ssl/record/rec_layer_d1.c +++ b/ssl/record/rec_layer_d1.c @@ -231,7 +231,7 @@ void DTLS_RECORD_LAYER_set_write_sequence(RECORD_LAYER *rl, unsigned char *seq) } static int have_handshake_fragment(SSL *s, int type, unsigned char *buf, - int len, int peek); + int len); /* copy buffered record into SSL structure */ static int dtls1_copy_record(SSL *s, pitem *item) @@ -424,7 +424,7 @@ int dtls1_read_bytes(SSL *s, int type, int *recvd_type, unsigned char *buf, /* * check whether there's a handshake message (client hello?) waiting */ - if ((ret = have_handshake_fragment(s, type, buf, len, peek))) + if ((ret = have_handshake_fragment(s, type, buf, len))) return ret; /* @@ -986,7 +986,7 @@ int dtls1_read_bytes(SSL *s, int type, int *recvd_type, unsigned char *buf, * is started. */ static int have_handshake_fragment(SSL *s, int type, unsigned char *buf, - int len, int peek) + int len) { if ((type == SSL3_RT_HANDSHAKE) diff --git a/ssl/record/record_locl.h b/ssl/record/record_locl.h index 2a4b663307..333d3c947d 100644 --- a/ssl/record/record_locl.h +++ b/ssl/record/record_locl.h @@ -198,8 +198,7 @@ __owur int ssl3_do_compress(SSL *ssl); __owur int ssl3_do_uncompress(SSL *ssl); void ssl3_cbc_copy_mac(unsigned char *out, const SSL3_RECORD *rec, unsigned md_size); -__owur int ssl3_cbc_remove_padding(const SSL *s, - SSL3_RECORD *rec, +__owur int ssl3_cbc_remove_padding(SSL3_RECORD *rec, unsigned block_size, unsigned mac_size); __owur int tls1_cbc_remove_padding(const SSL *s, SSL3_RECORD *rec, diff --git a/ssl/record/ssl3_record.c b/ssl/record/ssl3_record.c index 5eb152eeb5..7f89cc0a1c 100644 --- a/ssl/record/ssl3_record.c +++ b/ssl/record/ssl3_record.c @@ -631,7 +631,7 @@ int ssl3_enc(SSL *s, int send) if (EVP_MD_CTX_md(s->read_hash) != NULL) mac_size = EVP_MD_CTX_size(s->read_hash); if ((bs != 1) && !send) - return ssl3_cbc_remove_padding(s, rec, bs, mac_size); + return ssl3_cbc_remove_padding(rec, bs, mac_size); } return (1); } @@ -1018,8 +1018,7 @@ int tls1_mac(SSL *ssl, unsigned char *md, int send) * 1: if the padding was valid * -1: otherwise. */ -int ssl3_cbc_remove_padding(const SSL *s, - SSL3_RECORD *rec, +int ssl3_cbc_remove_padding(SSL3_RECORD *rec, unsigned block_size, unsigned mac_size) { unsigned padding_length, good; diff --git a/ssl/ssl_locl.h b/ssl/ssl_locl.h index 30c868f655..fbca4f9b35 100644 --- a/ssl/ssl_locl.h +++ b/ssl/ssl_locl.h @@ -1919,7 +1919,7 @@ __owur int ssl_choose_client_version(SSL *s, int version); __owur long tls1_default_timeout(void); __owur int dtls1_do_write(SSL *s, int type); void dtls1_set_message_header(SSL *s, - unsigned char *p, unsigned char mt, + unsigned char mt, unsigned long len, unsigned long frag_off, unsigned long frag_len); @@ -1928,8 +1928,7 @@ __owur int dtls1_write_app_data_bytes(SSL *s, int type, const void *buf, int len __owur int dtls1_read_failed(SSL *s, int code); __owur int dtls1_buffer_message(SSL *s, int ccs); -__owur int dtls1_retransmit_message(SSL *s, unsigned short seq, - unsigned long frag_off, int *found); +__owur int dtls1_retransmit_message(SSL *s, unsigned short seq, int *found); __owur int dtls1_get_queue_priority(unsigned short seq, int is_ccs); int dtls1_retransmit_buffered_messages(SSL *s); void dtls1_clear_record_buffer(SSL *s); diff --git a/ssl/statem/statem_dtls.c b/ssl/statem/statem_dtls.c index 09f5df1ec7..a3090ef490 100644 --- a/ssl/statem/statem_dtls.c +++ b/ssl/statem/statem_dtls.c @@ -1078,7 +1078,7 @@ int dtls1_retransmit_buffered_messages(SSL *s) if (dtls1_retransmit_message(s, (unsigned short) dtls1_get_queue_priority (frag->msg_header.seq, - frag->msg_header.is_ccs), 0, + frag->msg_header.is_ccs), &found) <= 0 && found) { fprintf(stderr, "dtls1_retransmit_message() failed\n"); return -1; @@ -1152,8 +1152,7 @@ int dtls1_buffer_message(SSL *s, int is_ccs) } int -dtls1_retransmit_message(SSL *s, unsigned short seq, unsigned long frag_off, - int *found) +dtls1_retransmit_message(SSL *s, unsigned short seq, int *found) { int ret; /* XDTLS: for now assuming that read/writes are blocking */ @@ -1242,10 +1241,10 @@ void dtls1_clear_record_buffer(SSL *s) } } -void dtls1_set_message_header(SSL *s, unsigned char *p, - unsigned char mt, unsigned long len, - unsigned long frag_off, - unsigned long frag_len) +void dtls1_set_message_header(SSL *s, + unsigned char mt, unsigned long len, + unsigned long frag_off, + unsigned long frag_len) { if (frag_off == 0) { s->d1->handshake_write_seq = s->d1->next_handshake_write_seq; diff --git a/ssl/statem/statem_srvr.c b/ssl/statem/statem_srvr.c index 6b372232e1..7e63376f00 100644 --- a/ssl/statem/statem_srvr.c +++ b/ssl/statem/statem_srvr.c @@ -948,7 +948,7 @@ int dtls_construct_hello_verify_request(SSL *s) len = dtls_raw_hello_verify_request(&buf[DTLS1_HM_HEADER_LENGTH], s->d1->cookie, s->d1->cookie_len); - dtls1_set_message_header(s, buf, DTLS1_MT_HELLO_VERIFY_REQUEST, len, 0, + dtls1_set_message_header(s, DTLS1_MT_HELLO_VERIFY_REQUEST, len, 0, len); len += DTLS1_HM_HEADER_LENGTH; |