summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJeffrey Walton <noloader@gmail.com>2019-02-22 08:38:20 -0500
committerJeffrey Walton <noloader@gmail.com>2019-02-22 08:38:20 -0500
commit95bc90adc4b4afb3408a9b7f29ff949b494a1e1c (patch)
treecd39fafa57de15e1d61964e4f36266aecb6c0cf5
parent3185e93fe303369280b23e2dfa65ff85a875c2cb (diff)
downloadcryptopp-git-95bc90adc4b4afb3408a9b7f29ff949b494a1e1c.tar.gz
Clear unused warnings with MSVC
-rw-r--r--chacha.cpp2
-rw-r--r--poly1305.cpp2
-rw-r--r--xed25519.cpp1
3 files changed, 4 insertions, 1 deletions
diff --git a/chacha.cpp b/chacha.cpp
index e16a5008..dccde301 100644
--- a/chacha.cpp
+++ b/chacha.cpp
@@ -414,6 +414,7 @@ std::string ChaChaTLS_Policy::AlgorithmProvider() const
void ChaChaTLS_Policy::CipherSetKey(const NameValuePairs &params, const byte *key, size_t length)
{
CRYPTOPP_ASSERT(key); CRYPTOPP_ASSERT(length == 32);
+ CRYPTOPP_UNUSED(length);
// ChaChaTLS is always 20 rounds. Fetch Rounds() to avoid a spurious failure.
int rounds = params.GetIntValueWithDefault(Name::Rounds(), ROUNDS);
@@ -509,6 +510,7 @@ std::string XChaCha20_Policy::AlgorithmProvider() const
void XChaCha20_Policy::CipherSetKey(const NameValuePairs &params, const byte *key, size_t length)
{
CRYPTOPP_ASSERT(key); CRYPTOPP_ASSERT(length == 32);
+ CRYPTOPP_UNUSED(length);
// Use previous rounds as the default value
int rounds = params.GetIntValueWithDefault(Name::Rounds(), m_rounds);
diff --git a/poly1305.cpp b/poly1305.cpp
index e22cb7f5..9f3f97aa 100644
--- a/poly1305.cpp
+++ b/poly1305.cpp
@@ -314,7 +314,7 @@ void Poly1305_Base<T>::Restart()
void Poly1305TLS_Base::UncheckedSetKey(const byte *key, unsigned int length, const NameValuePairs &params)
{
- CRYPTOPP_UNUSED(params);
+ CRYPTOPP_UNUSED(params); CRYPTOPP_UNUSED(length);
CRYPTOPP_ASSERT(key && length >= 32);
// key is {r,s} pair. r is the additional key that gets clamped, s is the nonce.
diff --git a/xed25519.cpp b/xed25519.cpp
index 0ab77876..42694050 100644
--- a/xed25519.cpp
+++ b/xed25519.cpp
@@ -870,6 +870,7 @@ bool ed25519Verifier::VerifyAndRestart(PK_MessageAccumulator &messageAccumulator
bool ed25519Verifier::VerifyStream(std::istream& stream, const byte *signature, size_t signatureLen) const
{
CRYPTOPP_ASSERT(signatureLen == SIGNATURE_LENGTH);
+ CRYPTOPP_UNUSED(signatureLen);
const ed25519PublicKey& pk = static_cast<const ed25519PublicKey&>(GetPublicKey());
int ret = Donna::ed25519_sign_open(stream, pk.GetPublicKeyBytePtr(), signature);