diff options
author | Jeffrey Walton <noloader@gmail.com> | 2019-02-22 08:38:20 -0500 |
---|---|---|
committer | Jeffrey Walton <noloader@gmail.com> | 2019-02-22 08:38:20 -0500 |
commit | 95bc90adc4b4afb3408a9b7f29ff949b494a1e1c (patch) | |
tree | cd39fafa57de15e1d61964e4f36266aecb6c0cf5 | |
parent | 3185e93fe303369280b23e2dfa65ff85a875c2cb (diff) | |
download | cryptopp-git-95bc90adc4b4afb3408a9b7f29ff949b494a1e1c.tar.gz |
Clear unused warnings with MSVC
-rw-r--r-- | chacha.cpp | 2 | ||||
-rw-r--r-- | poly1305.cpp | 2 | ||||
-rw-r--r-- | xed25519.cpp | 1 |
3 files changed, 4 insertions, 1 deletions
@@ -414,6 +414,7 @@ std::string ChaChaTLS_Policy::AlgorithmProvider() const void ChaChaTLS_Policy::CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length)
{
CRYPTOPP_ASSERT(key); CRYPTOPP_ASSERT(length == 32);
+ CRYPTOPP_UNUSED(length);
// ChaChaTLS is always 20 rounds. Fetch Rounds() to avoid a spurious failure.
int rounds = params.GetIntValueWithDefault(Name::Rounds(), ROUNDS);
@@ -509,6 +510,7 @@ std::string XChaCha20_Policy::AlgorithmProvider() const void XChaCha20_Policy::CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length)
{
CRYPTOPP_ASSERT(key); CRYPTOPP_ASSERT(length == 32);
+ CRYPTOPP_UNUSED(length);
// Use previous rounds as the default value
int rounds = params.GetIntValueWithDefault(Name::Rounds(), m_rounds);
diff --git a/poly1305.cpp b/poly1305.cpp index e22cb7f5..9f3f97aa 100644 --- a/poly1305.cpp +++ b/poly1305.cpp @@ -314,7 +314,7 @@ void Poly1305_Base<T>::Restart() void Poly1305TLS_Base::UncheckedSetKey(const byte *key, unsigned int length, const NameValuePairs ¶ms)
{
- CRYPTOPP_UNUSED(params);
+ CRYPTOPP_UNUSED(params); CRYPTOPP_UNUSED(length);
CRYPTOPP_ASSERT(key && length >= 32);
// key is {r,s} pair. r is the additional key that gets clamped, s is the nonce.
diff --git a/xed25519.cpp b/xed25519.cpp index 0ab77876..42694050 100644 --- a/xed25519.cpp +++ b/xed25519.cpp @@ -870,6 +870,7 @@ bool ed25519Verifier::VerifyAndRestart(PK_MessageAccumulator &messageAccumulator bool ed25519Verifier::VerifyStream(std::istream& stream, const byte *signature, size_t signatureLen) const
{
CRYPTOPP_ASSERT(signatureLen == SIGNATURE_LENGTH);
+ CRYPTOPP_UNUSED(signatureLen);
const ed25519PublicKey& pk = static_cast<const ed25519PublicKey&>(GetPublicKey());
int ret = Donna::ed25519_sign_open(stream, pk.GetPublicKeyBytePtr(), signature);
|