1
0
Fork 0
mirror of https://github.com/transmission/transmission synced 2024-12-28 10:38:45 +00:00
transmission/libtransmission/crypto-utils-fallback.cc
Charles Kerr c472cbd88d
refactor: only use [[maybe_unused]] if arg might be used (#2033)
* refactor: [[maybe_unused]] iff arg _might_ be used

If the arg is never used, comment out its name.
If the arg is _sometimes_ used e.g. with ifdefs, use [[maybe_unused]].
2021-10-24 11:41:54 -05:00

98 lines
2.3 KiB
C++

/*
* This file Copyright (C) 2014 Mnemosyne LLC
*
* It may be used under the GNU GPL versions 2 or 3
* or any future license endorsed by Mnemosyne LLC.
*
*/
/* This file is designed specifically to be included by other source files to
implement missing (or duplicate) functionality without exposing internal
details in header files. */
#include "transmission.h"
#include "crypto-utils.h"
#include "tr-assert.h"
#include "tr-macros.h"
#include "utils.h"
/***
****
***/
#ifdef TR_CRYPTO_DH_SECRET_FALLBACK
/* Most Diffie-Hellman backends handle secret key in the very same way: by
manually allocating memory for it and storing the value in plain form. */
struct tr_dh_secret
{
size_t key_length;
uint8_t key[];
};
static struct tr_dh_secret* tr_dh_secret_new(size_t key_length)
{
auto* handle = static_cast<struct tr_dh_secret*>(tr_malloc(sizeof(struct tr_dh_secret) + key_length));
handle->key_length = key_length;
return handle;
}
static void tr_dh_secret_align(struct tr_dh_secret* handle, size_t current_key_length)
{
tr_dh_align_key(handle->key, current_key_length, handle->key_length);
}
bool tr_dh_secret_derive(
tr_dh_secret_t raw_handle,
void const* prepend_data,
size_t prepend_data_size,
void const* append_data,
size_t append_data_size,
uint8_t* hash)
{
TR_ASSERT(raw_handle != nullptr);
TR_ASSERT(hash != nullptr);
auto* handle = static_cast<struct tr_dh_secret*>(raw_handle);
return tr_sha1(
hash,
prepend_data == nullptr ? "" : prepend_data,
prepend_data == nullptr ? 0 : (int)prepend_data_size,
handle->key,
(int)handle->key_length,
append_data,
append_data == nullptr ? 0 : (int)append_data_size,
nullptr);
}
void tr_dh_secret_free(tr_dh_secret_t handle)
{
tr_free(handle);
}
#endif /* TR_CRYPTO_DH_SECRET_FALLBACK */
#ifdef TR_CRYPTO_X509_FALLBACK
tr_x509_store_t tr_ssl_get_x509_store(tr_ssl_ctx_t /*handle*/)
{
return nullptr;
}
bool tr_x509_store_add(tr_x509_store_t /*handle*/, tr_x509_cert_t /*cert*/)
{
return false;
}
tr_x509_cert_t tr_x509_cert_new(void const* /*der*/, size_t /*der_length*/)
{
return nullptr;
}
void tr_x509_cert_free(tr_x509_cert_t /*handle*/)
{
}
#endif /* TR_CRYPTO_X509_FALLBACK */