Commit 0e1c318e authored by Emilia Kasper's avatar Emilia Kasper
Browse files

Build fixes



Various build fixes, mostly uncovered by clang's unused-const-variable
and unused-function errors.

Reviewed-by: default avatarKurt Roeckx <kurt@openssl.org>
parent 8bc8450a
Loading
Loading
Loading
Loading
+1 −1
Original line number Diff line number Diff line
@@ -68,7 +68,7 @@

#include "ec_lcl.h"

static const char EC_version[] = "EC" OPENSSL_VERSION_PTEXT;
const char EC_version[] = "EC" OPENSSL_VERSION_PTEXT;


/* functions for EC_GROUP objects */
+0 −1
Original line number Diff line number Diff line
@@ -113,7 +113,6 @@ typedef u64 smallfelem[NLIMBS];

/* This is the value of the prime as four 64-bit words, little-endian. */
static const u64 kPrime[4] = { 0xfffffffffffffffful, 0xffffffff, 0, 0xffffffff00000001ul };
static const limb bottom32bits = 0xffffffff;
static const u64 bottom63bits = 0x7ffffffffffffffful;

/* bin32_to_felem takes a little-endian byte array and converts it into felem
+2 −2
Original line number Diff line number Diff line
@@ -1366,7 +1366,7 @@ static const struct nistp_test_params nistp_tests_params[] =
		},
	};

void nistp_single_test(const struct nistp_test_params *test)
static void nistp_single_test(const struct nistp_test_params *test)
	{
	BN_CTX *ctx;
	BIGNUM *p, *a, *b, *x, *y, *n, *m, *order;
@@ -1469,7 +1469,7 @@ void nistp_single_test(const struct nistp_test_params *test)
	BN_CTX_free(ctx);
	}

void nistp_tests()
static void nistp_tests()
	{
	unsigned i;

+0 −3
Original line number Diff line number Diff line
@@ -114,9 +114,6 @@ static const ENGINE_CMD_DEFN dynamic_cmd_defns[] = {
		ENGINE_CMD_FLAG_NO_INPUT},
	{0, NULL, NULL, 0}
	};
static const ENGINE_CMD_DEFN dynamic_cmd_defns_empty[] = {
	{0, NULL, NULL, 0}
	};

/* Loading code stores state inside the ENGINE structure via the "ex_data"
 * element. We load all our state into a single structure and use that as a
+2 −0
Original line number Diff line number Diff line
@@ -384,6 +384,7 @@ padlock_available(void)
}

#ifndef OPENSSL_NO_AES
#ifndef AES_ASM
/* Our own htonl()/ntohl() */
static inline void
padlock_bswapl(AES_KEY *ks)
@@ -397,6 +398,7 @@ padlock_bswapl(AES_KEY *ks)
	}
}
#endif
#endif

/* Force key reload from memory to the CPU microcode.
   Loading EFLAGS from the stack clears EFLAGS[30]