mirror of
https://github.com/shadps4-emu/ext-cryptopp.git
synced 2024-11-23 09:59:42 +00:00
Clear unused warnings with MSVC
This commit is contained in:
parent
3185e93fe3
commit
95bc90adc4
@ -414,6 +414,7 @@ std::string ChaChaTLS_Policy::AlgorithmProvider() const
|
|||||||
void ChaChaTLS_Policy::CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length)
|
void ChaChaTLS_Policy::CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length)
|
||||||
{
|
{
|
||||||
CRYPTOPP_ASSERT(key); CRYPTOPP_ASSERT(length == 32);
|
CRYPTOPP_ASSERT(key); CRYPTOPP_ASSERT(length == 32);
|
||||||
|
CRYPTOPP_UNUSED(length);
|
||||||
|
|
||||||
// ChaChaTLS is always 20 rounds. Fetch Rounds() to avoid a spurious failure.
|
// ChaChaTLS is always 20 rounds. Fetch Rounds() to avoid a spurious failure.
|
||||||
int rounds = params.GetIntValueWithDefault(Name::Rounds(), ROUNDS);
|
int rounds = params.GetIntValueWithDefault(Name::Rounds(), ROUNDS);
|
||||||
@ -509,6 +510,7 @@ std::string XChaCha20_Policy::AlgorithmProvider() const
|
|||||||
void XChaCha20_Policy::CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length)
|
void XChaCha20_Policy::CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length)
|
||||||
{
|
{
|
||||||
CRYPTOPP_ASSERT(key); CRYPTOPP_ASSERT(length == 32);
|
CRYPTOPP_ASSERT(key); CRYPTOPP_ASSERT(length == 32);
|
||||||
|
CRYPTOPP_UNUSED(length);
|
||||||
|
|
||||||
// Use previous rounds as the default value
|
// Use previous rounds as the default value
|
||||||
int rounds = params.GetIntValueWithDefault(Name::Rounds(), m_rounds);
|
int rounds = params.GetIntValueWithDefault(Name::Rounds(), m_rounds);
|
||||||
|
@ -314,7 +314,7 @@ void Poly1305_Base<T>::Restart()
|
|||||||
|
|
||||||
void Poly1305TLS_Base::UncheckedSetKey(const byte *key, unsigned int length, const NameValuePairs ¶ms)
|
void Poly1305TLS_Base::UncheckedSetKey(const byte *key, unsigned int length, const NameValuePairs ¶ms)
|
||||||
{
|
{
|
||||||
CRYPTOPP_UNUSED(params);
|
CRYPTOPP_UNUSED(params); CRYPTOPP_UNUSED(length);
|
||||||
CRYPTOPP_ASSERT(key && length >= 32);
|
CRYPTOPP_ASSERT(key && length >= 32);
|
||||||
|
|
||||||
// key is {r,s} pair. r is the additional key that gets clamped, s is the nonce.
|
// key is {r,s} pair. r is the additional key that gets clamped, s is the nonce.
|
||||||
|
@ -870,6 +870,7 @@ bool ed25519Verifier::VerifyAndRestart(PK_MessageAccumulator &messageAccumulator
|
|||||||
bool ed25519Verifier::VerifyStream(std::istream& stream, const byte *signature, size_t signatureLen) const
|
bool ed25519Verifier::VerifyStream(std::istream& stream, const byte *signature, size_t signatureLen) const
|
||||||
{
|
{
|
||||||
CRYPTOPP_ASSERT(signatureLen == SIGNATURE_LENGTH);
|
CRYPTOPP_ASSERT(signatureLen == SIGNATURE_LENGTH);
|
||||||
|
CRYPTOPP_UNUSED(signatureLen);
|
||||||
|
|
||||||
const ed25519PublicKey& pk = static_cast<const ed25519PublicKey&>(GetPublicKey());
|
const ed25519PublicKey& pk = static_cast<const ed25519PublicKey&>(GetPublicKey());
|
||||||
int ret = Donna::ed25519_sign_open(stream, pk.GetPublicKeyBytePtr(), signature);
|
int ret = Donna::ed25519_sign_open(stream, pk.GetPublicKeyBytePtr(), signature);
|
||||||
|
Loading…
Reference in New Issue
Block a user