* @v len Length of buffer
*/
static void tls_generate_random ( void *data, size_t len ) {
-#warning "Placeholder"
+ /* FIXME: Some real random data source would be nice... */
memset ( data, 0x01, len );
}
return rc;
}
-#warning "AES needs to be fixed to not require this"
+ /* FIXME: AES needs to be fixed to not require this */
AES_convert_key ( rx_cipherspec->cipher_ctx );
DBGC ( tls, "TLS %p RX key:\n", tls );
struct tls_cipherspec *pending,
struct tls_cipherspec *active ) {
-#warning "Why is this disabled?"
+ /* FIXME: Why is this disabled? */
#if 0
/* Sanity check */
if ( ( pending->pubkey == &crypto_null ) ||
* @ret rc Return status code
*/
static int tls_send_client_key_exchange ( struct tls_session *tls ) {
-#warning "Hack alert"
+ /* FIXME: Hack alert */
RSA_CTX *rsa_ctx;
RSA_pub_key_new ( &rsa_ctx, tls->rsa_mod, tls->rsa_mod_len,
tls->rsa_pub_exp, tls->rsa_pub_exp_len );
key_xchg.encrypted_pre_master_secret_len
= htons ( sizeof ( key_xchg.encrypted_pre_master_secret ) );
-#warning "Hack alert"
+ /* FIXME: Hack alert */
DBGC ( tls, "RSA encrypting plaintext, modulus, exponent:\n" );
DBGC_HD ( tls, &tls->pre_master_secret,
sizeof ( tls->pre_master_secret ) );
uint8_t *cert = certificate->asn1_start;
int offset = 0;
+ /* FIXME */
+ (void) len;
+
if (asn1_next_obj(cert, &offset, ASN1_SEQUENCE) < 0 ||
asn1_next_obj(cert, &offset, ASN1_SEQUENCE) < 0 ||
asn1_skip_obj(cert, &offset, ASN1_EXPLICIT_TAG) ||
static int tls_new_finished ( struct tls_session *tls,
void *data, size_t len ) {
-#warning "Handle this properly"
+ /* FIXME: Handle this properly */
tls->tx_state = TLS_TX_DATA;
( void ) data;
( void ) len;
void *mac;
void *padding;
-#warning "TLSv1.1 has an explicit IV"
+ /* FIXME: TLSv1.1 has an explicit IV */
iv_len = 0;
/* Calculate block-ciphered struct length */
}
iv_len = tls->rx_cipherspec.cipher->blocksize;
-#warning "TLSv1.1 uses an explicit IV"
+ /* FIXME: TLSv1.1 uses an explicit IV */
iv_len = 0;
mac_len = tls->rx_cipherspec.digest->digestsize;