Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Samer El-Haj-Mahmoud <samer.el-haj-mahm...@hp.com> --- NetworkPkg/IpSecDxe/Ikev2/Info.c | 3 +-- NetworkPkg/IpSecDxe/Ikev2/Payload.c | 15 +-------------- NetworkPkg/IpSecDxe/Ikev2/Sa.c | 6 +----- NetworkPkg/IpSecDxe/Ikev2/Utility.c | 3 +-- NetworkPkg/IpSecDxe/IpSecImpl.c | 4 +--- 5 files changed, 5 insertions(+), 26 deletions(-)
diff --git a/NetworkPkg/IpSecDxe/Ikev2/Info.c b/NetworkPkg/IpSecDxe/Ikev2/Info.c index d297564..d74a9b9 100644 --- a/NetworkPkg/IpSecDxe/Ikev2/Info.c +++ b/NetworkPkg/IpSecDxe/Ikev2/Info.c @@ -1,6 +1,7 @@ /** @file The Implementations for Information Exchange. + (C) Copyright 2014 - 2015 Hewlett-Packard Development Company, + L.P.<BR> Copyright (c) 2010, Intel Corporation. All rights reserved.<BR> This program and the accompanying materials @@ -211,7 +212,6 @@ Ikev2InfoParser ( { IKEV2_CHILD_SA_SESSION *ChildSaSession; IKEV2_SA_SESSION *IkeSaSession; - IKE_PAYLOAD *NotifyPayload; IKE_PAYLOAD *DeletePayload; IKE_PAYLOAD *IkePayload; IKEV2_DELETE *Delete; @@ -229,7 +229,6 @@ Ikev2InfoParser ( IkeSaSession = (IKEV2_SA_SESSION *) SaSession; - NotifyPayload = NULL; DeletePayload = NULL; Private = NULL; RespondPacket = NULL; diff --git a/NetworkPkg/IpSecDxe/Ikev2/Payload.c b/NetworkPkg/IpSecDxe/Ikev2/Payload.c index 012e8c2..32a23e2 100644 --- a/NetworkPkg/IpSecDxe/Ikev2/Payload.c +++ b/NetworkPkg/IpSecDxe/Ikev2/Payload.c @@ -1,6 +1,7 @@ /** @file The implementation of Payloads Creation. + (C) Copyright 2014 - 2015 Hewlett-Packard Development Company, + L.P.<BR> Copyright (c) 2010 - 2015, Intel Corporation. All rights reserved.<BR> This program and the accompanying materials @@ -284,7 +285,6 @@ Ikev2GenerateCertIdPayload ( IKE_PAYLOAD *IdPayload; IKEV2_ID *Id; UINTN IdSize; - UINT8 IpVersion; UINTN SubjectSize; UINT8 *CertSubject; @@ -304,7 +304,6 @@ Ikev2GenerateCertIdPayload ( SubjectSize = 0; CertSubject = NULL; - IpVersion = CommonSession->UdpService->IpVersion; IpSecCryptoIoGetSubjectFromCert ( InCert, CertSize, @@ -615,7 +614,6 @@ Ikev2CertGenerateAuthPayload ( UINTN DigestSize; PRF_DATA_FRAGMENT Fragments[3]; UINT8 *KeyBuf; - UINTN KeySize; IKE_PAYLOAD *AuthPayload; IKEV2_AUTH *PayloadBuf; EFI_STATUS Status; @@ -663,7 +661,6 @@ Ikev2CertGenerateAuthPayload ( ASSERT (KeyBuf != NULL); CopyMem (KeyBuf, Digest, DigestSize); - KeySize = DigestSize; // // Calculate Prf(SK_Pi/r, IDi/r) @@ -2558,14 +2555,12 @@ Ikev2DecryptPacket ( IKEV2_CHILD_SA_SESSION *ChildSaSession; EFI_STATUS Status; UINT8 PadLen; - UINTN CryptKeyLength; HASH_DATA_FRAGMENT Fragments[1]; IvSize = 0; IkeSaSession = NULL; CryptBlockSize = 0; CheckSumSize = 0; - CryptKeyLength = 0; // // Check if the first payload is the Encrypted payload @@ -2583,7 +2578,6 @@ Ikev2DecryptPacket ( if (SessionCommon->IkeSessionType == IkeSessionTypeIkeSa) { CryptBlockSize = (UINT8) IpSecGetEncryptBlockSize ((UINT8) SessionCommon->SaParams->EncAlgId); - CryptKeyLength = IpSecGetEncryptKeyLength ((UINT8) SessionCommon->SaParams->EncAlgId); CheckSumSize = (UINT8) IpSecGetIcvLength ((UINT8) SessionCommon->SaParams->IntegAlgId); IkeSaSession = IKEV2_SA_SESSION_FROM_COMMON (SessionCommon); @@ -2592,7 +2586,6 @@ Ikev2DecryptPacket ( ChildSaSession = IKEV2_CHILD_SA_SESSION_FROM_COMMON (SessionCommon); IkeSaSession = ChildSaSession->IkeSaSession; CryptBlockSize = (UINT8) IpSecGetEncryptBlockSize ((UINT8) IkeSaSession->SessionCommon.SaParams->EncAlgId); - CryptKeyLength = IpSecGetEncryptKeyLength ((UINT8) IkeSaSession->SessionCommon.SaParams->EncAlgId); CheckSumSize = (UINT8) IpSecGetIcvLength ((UINT8) IkeSaSession->SessionCommon.SaParams->IntegAlgId); } else { // @@ -2768,7 +2761,6 @@ Ikev2EncryptPacket ( UINT8 *EncryptPayloadBuf; // Contain whole Encrypted Payload UINTN EncryptPayloadSize; // Total size of the Encrypted payload UINT8 *IntegrityBuf; // Buffer to be intergity - UINT32 IntegrityBufSize; // Buffer size of IntegrityBuf UINT8 *IvBuffer; // Initialization Vector UINT8 IvSize; // Iv Size UINT8 CheckSumSize; // Integrity Check Sum Size depends on intergrity Auth @@ -2780,7 +2772,6 @@ Ikev2EncryptPacket ( EFI_STATUS Status; LIST_ENTRY *Entry; IKE_PAYLOAD *IkePayload; - UINTN CryptKeyLength; HASH_DATA_FRAGMENT Fragments[1]; Status = EFI_SUCCESS; @@ -2795,7 +2786,6 @@ Ikev2EncryptPacket ( IkeSaSession = NULL; CryptBlockSize = 0; CheckSumSize = 0; - CryptKeyLength = 0; IntegrityBuf = NULL; // // Get the Block Size @@ -2803,7 +2793,6 @@ Ikev2EncryptPacket ( if (SessionCommon->IkeSessionType == IkeSessionTypeIkeSa) { CryptBlockSize = (UINT8) IpSecGetEncryptBlockSize ((UINT8) SessionCommon->SaParams->EncAlgId); - CryptKeyLength = IpSecGetEncryptKeyLength ((UINT8) SessionCommon->SaParams->EncAlgId); CheckSumSize = (UINT8) IpSecGetIcvLength ((UINT8) SessionCommon->SaParams->IntegAlgId); IkeSaSession = IKEV2_SA_SESSION_FROM_COMMON (SessionCommon); @@ -2812,7 +2801,6 @@ Ikev2EncryptPacket ( ChildSaSession = IKEV2_CHILD_SA_SESSION_FROM_COMMON (SessionCommon); IkeSaSession = ChildSaSession->IkeSaSession; CryptBlockSize = (UINT8) IpSecGetEncryptBlockSize ((UINT8) IkeSaSession->SessionCommon.SaParams->EncAlgId); - CryptKeyLength = IpSecGetEncryptKeyLength ((UINT8) IkeSaSession->SessionCommon.SaParams->EncAlgId); CheckSumSize = (UINT8) IpSecGetIcvLength ((UINT8) IkeSaSession->SessionCommon.SaParams->IntegAlgId); } @@ -2919,7 +2907,6 @@ Ikev2EncryptPacket ( Status = EFI_OUT_OF_RESOURCES; goto ON_EXIT; } - IntegrityBufSize = IkePacket->Header->Length; IkeHdrHostToNet (IkePacket->Header); CopyMem (IntegrityBuf, IkePacket->Header, sizeof (IKE_HEADER)); diff --git a/NetworkPkg/IpSecDxe/Ikev2/Sa.c b/NetworkPkg/IpSecDxe/Ikev2/Sa.c index ae13e4d..9482a60 100644 --- a/NetworkPkg/IpSecDxe/Ikev2/Sa.c +++ b/NetworkPkg/IpSecDxe/Ikev2/Sa.c @@ -1,6 +1,7 @@ /** @file The operations for IKEv2 SA. + (C) Copyright 2014 - 2015 Hewlett-Packard Development Company, + L.P.<BR> Copyright (c) 2010 - 2011, Intel Corporation. All rights reserved.<BR> This program and the accompanying materials @@ -1132,7 +1133,6 @@ Ikev2AuthCertParser ( IKE_PAYLOAD *TsiPayload; IKE_PAYLOAD *TsrPayload; IKE_PAYLOAD *CertPayload; - IKE_PAYLOAD *CertReqPayload; IKE_PAYLOAD *VerifiedAuthPayload; LIST_ENTRY *Entry; EFI_STATUS Status; @@ -1151,7 +1151,6 @@ Ikev2AuthCertParser ( TsiPayload = NULL; TsrPayload = NULL; CertPayload = NULL; - CertReqPayload = NULL; VerifiedAuthPayload = NULL; Status = EFI_INVALID_PARAMETER; @@ -1184,7 +1183,6 @@ Ikev2AuthCertParser ( CertPayload = IkePayload; } if (IkePayload->PayloadType == IKEV2_PAYLOAD_TYPE_CERTREQ) { - CertReqPayload = IkePayload; } } @@ -1478,7 +1476,6 @@ Ikev2GenerateSaKeys ( { EFI_STATUS Status; IKEV2_SA_PARAMS *SaParams; - IPSEC_PAD_ENTRY *Pad; PRF_DATA_FRAGMENT Fragments[4]; UINT64 InitiatorCookieNet; UINT64 ResponderCookieNet; @@ -1503,7 +1500,6 @@ Ikev2GenerateSaKeys ( // Ikev2GenerateSaDhComputeKey (IkeSaSession->IkeKeys->DhBuffer, KePayload); - Pad = IkeSaSession->Pad; // // Get the key length of Authenticaion, Encryption, PRF, and Integrity. diff --git a/NetworkPkg/IpSecDxe/Ikev2/Utility.c b/NetworkPkg/IpSecDxe/Ikev2/Utility.c index cb436b6..0ac65d9 100644 --- a/NetworkPkg/IpSecDxe/Ikev2/Utility.c +++ b/NetworkPkg/IpSecDxe/Ikev2/Utility.c @@ -1,6 +1,7 @@ /** @file The Common operations used by IKE Exchange Process. + (C) Copyright 2014 - 2015 Hewlett-Packard Development Company, + L.P.<BR> Copyright (c) 2010 - 2014, Intel Corporation. All rights reserved.<BR> This program and the accompanying materials @@ -571,7 +572,6 @@ Ikev2ChildSaSessionReg ( IKEV2_SESSION_COMMON *SessionCommon; IKEV2_CHILD_SA_SESSION *OldChildSaSession; IKEV2_SA_SESSION *IkeSaSession; - IKEV2_SA_PARAMS *SaParams; EFI_STATUS Status; UINT64 Lifetime; @@ -624,7 +624,6 @@ Ikev2ChildSaSessionReg ( // // Start to count the lifetime of the IKE SA. // - SaParams = SessionCommon->SaParams; if (ChildSaSession->Spd->Data->ProcessingPolicy->SaLifetime.HardLifetime != 0){ Lifetime = ChildSaSession->Spd->Data->ProcessingPolicy->SaLifetime.HardLifetime; } else { diff --git a/NetworkPkg/IpSecDxe/IpSecImpl.c b/NetworkPkg/IpSecDxe/IpSecImpl.c index 347bdd9..8f4df95 100644 --- a/NetworkPkg/IpSecDxe/IpSecImpl.c +++ b/NetworkPkg/IpSecDxe/IpSecImpl.c @@ -1,6 +1,7 @@ /** @file The implementation of IPsec. + (C) Copyright 2014 - 2015 Hewlett-Packard Development Company, + L.P.<BR> Copyright (c) 2009 - 2011, Intel Corporation. All rights reserved.<BR> This program and the accompanying materials @@ -898,7 +899,6 @@ IpSecIsIp6ExtsValid ( UINT32 Pointer; UINT8 *Option; UINT8 OptionLen; - BOOLEAN Flag; UINT8 CountD; UINT8 CountF; UINT8 CountA; @@ -918,7 +918,6 @@ IpSecIsIp6ExtsValid ( } Pointer = 0; - Flag = FALSE; CountD = 0; CountF = 0; CountA = 0; @@ -931,7 +930,6 @@ IpSecIsIp6ExtsValid ( return FALSE; } - Flag = TRUE; // // Fall through -- 1.9.5.msysgit.0 ------------------------------------------------------------------------------ Monitor 25 network devices or servers for free with OpManager! OpManager is web-based network management software that monitors network devices and physical & virtual servers, alerts via email & sms for fault. Monitor 25 devices for free with no restriction. Download now http://ad.doubleclick.net/ddm/clk/292181274;119417398;o _______________________________________________ edk2-devel mailing list edk2-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/edk2-devel