Skip to content

Commit

Permalink
Remove warnings
Browse files Browse the repository at this point in the history
  • Loading branch information
guanzhi committed May 17, 2024
1 parent 7cc5b77 commit d56eeaa
Show file tree
Hide file tree
Showing 15 changed files with 176 additions and 460 deletions.
5 changes: 3 additions & 2 deletions CMakeLists.txt
Original file line number Diff line number Diff line change
Expand Up @@ -133,6 +133,7 @@ set(tools
tools/sm4_ctr_sm3_hmac.c
tools/sm3.c
tools/sm3hmac.c
tools/sm3_pbkdf2.c
tools/sm3xmss_keygen.c
tools/sm2keygen.c
tools/sm2sign.c
Expand All @@ -148,7 +149,6 @@ set(tools
tools/zuc.c
tools/rand.c
tools/ghash.c
tools/pbkdf2.c
tools/certgen.c
tools/certparse.c
tools/certverify.c
Expand Down Expand Up @@ -507,13 +507,14 @@ endif()

if (ENABLE_SDF)
message(STATUS "ENABLE_SDF is ON")
add_definitions(-DENABLE_SDF)
list(APPEND src
src/sdf/sdf.c
src/sdf/sdf_lib.c
src/sdf/sdf_meth.c
src/sdf/sdf_ext.c
src/sdf/sdf_sansec.c)
list(APPEND tools tools/sdfutil.c)
list(APPEND tools tools/sdfutil.c tools/sdftest.c)
endif()


Expand Down
2 changes: 1 addition & 1 deletion include/gmssl/tls.h
Original file line number Diff line number Diff line change
Expand Up @@ -408,7 +408,7 @@ typedef struct {
#define tls_record_protocol(record) (((uint16_t)((record)[1]) << 8) | (record)[2])
#define tls_record_data(record) ((record)+TLS_RECORD_HEADER_SIZE)
#define tls_record_data_length(record) (((uint16_t)((record)[3]) << 8) | (record)[4])
#define tls_record_length(record) (TLS_RECORD_HEADER_SIZE + tls_record_data_length(record))
#define tls_record_length(record) ((size_t)(TLS_RECORD_HEADER_SIZE + tls_record_data_length(record)))

int tls_record_set_type(uint8_t *record, int type);
int tls_record_set_protocol(uint8_t *record, int protocol);
Expand Down
2 changes: 1 addition & 1 deletion src/asn1.c
Original file line number Diff line number Diff line change
Expand Up @@ -191,7 +191,7 @@ int asn1_length_from_der(size_t *len, const uint8_t **in, size_t *inlen)

} else {
uint8_t buf[4] = {0};
int nbytes = *(*in)++ & 0x7f;
size_t nbytes = *(*in)++ & 0x7f;
(*inlen)--;

if (nbytes < 1 || nbytes > 4) {
Expand Down
2 changes: 1 addition & 1 deletion src/debug.c
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ int format_bytes(FILE *fp, int format, int indent, const char *str, const uint8_
return -1;
}

for (i = 0; i < indent; i++) {
for (i = 0; i < (size_t)indent; i++) {
fprintf(fp, " ");
}
fprintf(fp, "%s: ", str);
Expand Down
2 changes: 1 addition & 1 deletion src/hmac.c
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ int hmac_init(HMAC_CTX *ctx, const DIGEST *digest, const uint8_t *key, size_t ke
uint8_t i_key[DIGEST_MAX_BLOCK_SIZE] = {0};
uint8_t o_key[DIGEST_MAX_BLOCK_SIZE] = {0};
size_t blocksize;
int i;
size_t i;

if (!ctx || !digest || !key || !keylen) {
error_print();
Expand Down
2 changes: 1 addition & 1 deletion src/sm4_ccm.c
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,7 @@ int sm4_ccm_encrypt(const SM4_KEY *sm4_key, const uint8_t *iv, size_t ivlen,
if (aadlen < ((1<<16) - (1<<8))) {
length_to_bytes(aadlen, 2, block);
alen = 2;
} else if (aadlen < ((size_t)1<<32)) {
} else if ((uint64_t)aadlen < ((uint64_t)1<<32)) {
block[0] = 0xff;
block[1] = 0xfe;
length_to_bytes(aadlen, 4, block + 2);
Expand Down
1 change: 0 additions & 1 deletion tests/sm4_cbctest.c
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,6 @@ static int test_sm4_cbc_test_vectors(void)
uint8_t *ciphertext;
size_t ciphertext_len;
uint8_t *encrypted;
size_t encrypted_len;
size_t i;

for (i = 0; i < sizeof(tests)/sizeof(tests[0]); i++) {
Expand Down
2 changes: 0 additions & 2 deletions tests/sm4_ctrtest.c
Original file line number Diff line number Diff line change
Expand Up @@ -87,9 +87,7 @@ static int test_sm4_ctr_test_vectors(void)

SM4_KEY sm4_key;
uint8_t *encrypted;
size_t encrypted_len;
uint8_t *decrypted;
size_t decrypted_len;
size_t i;

for (i = 0; i < sizeof(tests)/sizeof(tests[0]); i++) {
Expand Down
2 changes: 1 addition & 1 deletion tests/sm4test.c
Original file line number Diff line number Diff line change
Expand Up @@ -192,7 +192,7 @@ static int speed_sm4_encrypt(void)
size_t nbytes = 16 * 1024 * 1024;
clock_t begin, end;
double seconds;
int i;
size_t i;

sm4_set_encrypt_key(&sm4_key, key);
for (i = 0; i < nbytes/sizeof(buf); i++) {
Expand Down
53 changes: 0 additions & 53 deletions tools/copyright.sh

This file was deleted.

16 changes: 8 additions & 8 deletions tools/gmssl.c
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,6 @@ extern int crlget_main(int argc, char **argv);
extern int crlgen_main(int argc, char **argv);
extern int crlparse_main(int argc, char **argv);
extern int crlverify_main(int argc, char **argv);
extern int pbkdf2_main(int argc, char **argv);
extern int reqgen_main(int argc, char **argv);
extern int reqparse_main(int argc, char **argv);
extern int reqsign_main(int argc, char **argv);
Expand All @@ -34,8 +33,8 @@ extern int sm2encrypt_main(int argc, char **argv);
extern int sm2decrypt_main(int argc, char **argv);
extern int sm3_main(int argc, char **argv);
extern int sm3hmac_main(int argc, char **argv);
extern int sm3_pbkdf2_main(int argc, char **argv);
extern int sm3xmss_keygen_main(int argc, char **argv);
extern int sm4_main(int argc, char **argv);
extern int sm4_ecb_main(int argc, char **argv);
extern int sm4_cbc_main(int argc, char **argv);
extern int sm4_ctr_main(int argc, char **argv);
Expand Down Expand Up @@ -68,6 +67,7 @@ extern int tls13_client_main(int argc, char **argv);
extern int tls13_server_main(int argc, char **argv);
#ifdef ENABLE_SDF
extern int sdfutil_main(int argc, char **argv);
extern int sdftest_main(int argc, char **argv);
#endif
#ifdef ENABLE_SKF
extern int skfutil_main(int argc, char **argv);
Expand All @@ -88,8 +88,8 @@ static const char *options =
" sm2decrypt Decrypt with SM2 private key\n"
" sm3 Generate SM3 hash\n"
" sm3hmac Generate SM3 HMAC tag\n"
" sm3_pbkdf2 Hash password into key using PBKDF2 algoritm\n"
" sm3xmss_keygen Generate SM3-XMSS keypair\n"
" sm4 Encrypt or decrypt with SM4\n"
" sm4_ecb Encrypt or decrypt with SM4 ECB\n"
" sm4_cbc Encrypt or decrypt with SM4 CBC\n"
" sm4_ctr Encrypt or decrypt with SM4 CTR\n"
Expand All @@ -109,7 +109,6 @@ static const char *options =
" sm9verify Verify SM9 signature\n"
" sm9encrypt SM9 public key encryption\n"
" sm9decrypt SM9 decryption\n"
" pbkdf2 Generate key from password\n"
" reqgen Generate certificate signing request (CSR)\n"
" reqsign Generate certificate from CSR\n"
" reqparse Parse and print a CSR\n"
Expand All @@ -128,6 +127,7 @@ static const char *options =
" cmsverify Verify CMS SignedData\n"
#ifdef ENABLE_SDF
" sdfutil SDF crypto device utility\n"
" sdftest Test vendor's SDF library and device\n"
#endif
#ifdef ENABLE_SKF
" skfutil SKF crypto device utility\n"
Expand Down Expand Up @@ -186,8 +186,6 @@ int main(int argc, char **argv)
return reqparse_main(argc, argv);
} else if (!strcmp(*argv, "reqsign")) {
return reqsign_main(argc, argv);
} else if (!strcmp(*argv, "pbkdf2")) {
return pbkdf2_main(argc, argv);
} else if (!strcmp(*argv, "sm2keygen")) {
return sm2keygen_main(argc, argv);
} else if (!strcmp(*argv, "sm2sign")) {
Expand All @@ -202,10 +200,10 @@ int main(int argc, char **argv)
return sm3_main(argc, argv);
} else if (!strcmp(*argv, "sm3hmac")) {
return sm3hmac_main(argc, argv);
} else if (!strcmp(*argv, "sm3_pbkdf2")) {
return sm3_pbkdf2_main(argc, argv);
} else if (!strcmp(*argv, "sm3xmss_keygen")) {
return sm3xmss_keygen_main(argc, argv);
} else if (!strcmp(*argv, "sm4")) {
return sm4_main(argc, argv);
#if ENABLE_SM4_ECB
} else if (!strcmp(*argv, "sm4_ecb")) {
return sm4_ecb_main(argc, argv);
Expand Down Expand Up @@ -281,6 +279,8 @@ int main(int argc, char **argv)
#ifdef ENABLE_SDF
} else if (!strcmp(*argv, "sdfutil")) {
return sdfutil_main(argc, argv);
} else if (!strcmp(*argv, "sdftest")) {
return sdftest_main(argc, argv);
#endif
#ifdef ENABLE_SKF
} else if (!strcmp(*argv, "skfutil")) {
Expand Down
Loading

0 comments on commit d56eeaa

Please sign in to comment.