Skip to content

Commit a44bda3

Browse files
authored
Merge pull request #75 from yan-foto/feature/warnings-fix
Fix compiler warnings
2 parents 510c4ec + 3bb4bdc commit a44bda3

File tree

139 files changed

+19076
-92
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

139 files changed

+19076
-92
lines changed

.travis.yml

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
os: linux
2+
dist: focal
3+
language: c
4+
5+
addons:
6+
apt:
7+
update: true
8+
packages:
9+
- libcunit1
10+
- cmake
11+
12+
script:
13+
- cd tests
14+
- mkdir build && cd build
15+
- cmake -DCMAKE_BUILD_TYPE=Debug ..
16+
- make
17+
- ./unittest

app-support/access-control.c

Lines changed: 22 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@
1111
#include "access-control.h"
1212
#include "security-bootstrapping.h"
1313
#include "../ndn-services.h"
14+
#include "../ndn-error-code.h"
1415
#include "../encode/key-storage.h"
1516
#include "../encode/signed-interest.h"
1617
#include "../encode/encrypted-payload.h"
@@ -22,6 +23,8 @@
2223
#include "../util/msg-queue.h"
2324
#include "../util/uniform-time.h"
2425

26+
#include <inttypes.h>
27+
2528
#define KEY_LIFTIME 60000
2629

2730
/* Logging Level: ERROR, DEBUG */
@@ -100,7 +103,7 @@ _init_ac_state()
100103
_ac_initialized = true;
101104
}
102105

103-
void
106+
void
104107
_ac_timeout()
105108
{
106109
ndn_time_ms_t now = ndn_time_now_ms();
@@ -138,23 +141,25 @@ _on_ac_notification(const uint8_t* interest, uint32_t interest_size, void* userd
138141
ndn_interest_from_block(&notification, interest, interest_size);
139142
// /[home-prefix]/NDN_SD_AC/NOTIFY/[service-id]/keyid
140143
NDN_LOG_DEBUG("[ACCESSCTL] Notification: ");
141-
NDN_LOG_DEBUG_NAME(&notification);
144+
NDN_LOG_DEBUG_NAME(&notification.name);
142145

143146
ndn_aes_key_t* key = ndn_ac_get_key_for_service(notification.name.components[3].value[0]);
144147
uint32_t keyid;
145148
ndn_decoder_t decoder;
146149
decoder_init(&decoder, notification.name.components[4].value, notification.name.components[4].size);
147150
decoder_get_uint32_value(&decoder, &keyid);
148151
if (key && key->key_id <= keyid) {
149-
NDN_LOG_DEBUG("[ACCESSCTL] Enforced update for Service %u, KeyID %lu\n",
152+
NDN_LOG_DEBUG("[ACCESSCTL] Enforced update for Service %" PRIu32 ", KeyID %" PRIu32 "\n",
150153
notification.name.components[3].value[0], keyid);
151154
for (int i = 0; i < 10; i++) {
152155
if (_ac_self_state.self_services[i] == notification.name.components[3].value[0])
153156
_express_ekey_interest(notification.name.components[3].value[0]);
154157
if (_ac_self_state.access_services[i] == notification.name.components[3].value[0])
155-
_express_dkey_interest(notification.name.components[3].value[0]);
158+
_express_dkey_interest(notification.name.components[3].value[0]);
156159
}
157160
}
161+
162+
return NDN_SUCCESS;
158163
}
159164

160165
/**
@@ -205,7 +210,7 @@ _on_ekey_data(const uint8_t* raw_data, uint32_t data_size, void* userdata)
205210
NDN_LOG_ERROR("[ACCESSCTL] Cannot get the AES KeyID, Error code is %d\n", ret);
206211
return;
207212
}
208-
NDN_LOG_DEBUG("[ACCESSCTL] AES KeyID = %lu \n", keyid);
213+
NDN_LOG_DEBUG("[ACCESSCTL] AES KeyID = %" PRIu32 "\n", keyid);
209214

210215
// set lifetime
211216
expires_in = KEY_LIFTIME;
@@ -220,8 +225,8 @@ _on_ekey_data(const uint8_t* raw_data, uint32_t data_size, void* userdata)
220225
if (_ac_self_state.self_services[i] == service) {
221226
_ac_self_state.ekeys[i].key_id = keyid;
222227
_ac_self_state.ekeys[i].expires_at = expires_in + now;
223-
NDN_LOG_DEBUG("[ACCESSCTL] New expiration time is %ld, New keyid is %u\n",
224-
_ac_self_state.ekeys[i].expires_at, _ac_self_state.ekeys[i].key_id);
228+
NDN_LOG_DEBUG("[ACCESSCTL] New expiration time is %ld, New keyid is %u\n",
229+
_ac_self_state.ekeys[i].expires_at, _ac_self_state.ekeys[i].key_id);
225230
ndn_aes_key_init(ekey, value, NDN_AES_BLOCK_SIZE, _ac_self_state.ekeys[i].key_id);
226231
_ac_self_state.ekeys[i].in_renewal = false;
227232
}
@@ -250,7 +255,7 @@ _on_ekey_data(const uint8_t* raw_data, uint32_t data_size, void* userdata)
250255
}
251256
#if ENABLE_NDN_LOG_DEBUG
252257
m_measure_tp2 = ndn_time_now_us();
253-
NDN_LOG_DEBUG("[ACCESSCTL] Key update: %lluus\n", m_measure_tp2 - m_measure_tp1);
258+
NDN_LOG_DEBUG("[ACCESSCTL] Key update: %" PRI_ndn_time_us_t "\n", m_measure_tp2 - m_measure_tp1);
254259
#endif
255260

256261
// _ac_timeout();
@@ -305,7 +310,7 @@ _on_dkey_data(const uint8_t* raw_data, uint32_t data_size, void* userdata)
305310
NDN_LOG_ERROR("[ACCESSCTL] Cannot get the AES KeyID, Error code is %d\n", ret);
306311
return;
307312
}
308-
NDN_LOG_DEBUG("[ACCESSCTL] AES KeyID = %lu \n", keyid);
313+
NDN_LOG_DEBUG("[ACCESSCTL] AES KeyID = %" PRIu32 " \n", keyid);
309314

310315
// set lifetime to 3000ms
311316
expires_in = KEY_LIFTIME;
@@ -320,8 +325,8 @@ _on_dkey_data(const uint8_t* raw_data, uint32_t data_size, void* userdata)
320325
if (_ac_self_state.access_services[i] == service) {
321326
_ac_self_state.ekeys[i].key_id = keyid;
322327
_ac_self_state.access_keys[i].expires_at = expires_in + now;
323-
NDN_LOG_DEBUG("[ACCESSCTL] New expiration time is %ld, New keyid is %u\n",
324-
_ac_self_state.access_keys[i].expires_at, _ac_self_state.access_keys[i].key_id);
328+
NDN_LOG_DEBUG("[ACCESSCTL] New expiration time is %ld, New keyid is %u\n",
329+
_ac_self_state.access_keys[i].expires_at, _ac_self_state.access_keys[i].key_id);
325330
ndn_aes_key_init(access_key, value, NDN_AES_BLOCK_SIZE, _ac_self_state.access_keys[i].key_id);
326331
_ac_self_state.access_keys[i].in_renewal = false;
327332
}
@@ -391,7 +396,7 @@ _express_ekey_interest(uint8_t service)
391396

392397
// signature signing
393398
ndn_name_t* self_identity = ndn_key_storage_get_self_identity(service);
394-
ndn_name_t* self_identity_key = ndn_key_storage_get_self_identity_key(service);
399+
ndn_ecc_prv_t* self_identity_key = ndn_key_storage_get_self_identity_key(service);
395400
if (self_identity == NULL || self_identity_key == NULL) {
396401
NDN_LOG_ERROR("[ACCESSCTL] Cannot find proper identity to sign");
397402
return NDN_AC_KEY_NOT_FOUND;
@@ -569,16 +574,16 @@ ndn_ac_after_bootstrapping()
569574

570575
int
571576
ndn_ac_trigger_expiration(uint8_t service, uint32_t received_keyid)
572-
{
577+
{
573578
int ret = -1;
574579
// check if it's a local key
575580
ndn_aes_key_t* aes_key = ndn_ac_get_key_for_service(service);
576581
if (aes_key->key_id < received_keyid) {
577-
NDN_LOG_DEBUG("[ACCESSCTL] Local Decryption Key %ld forced expired\n", aes_key->key_id);
582+
NDN_LOG_DEBUG("[ACCESSCTL] Local Decryption Key %" PRIu32 " forced expired\n", aes_key->key_id);
578583
_express_dkey_interest(service);
579584
}
580585
else {
581-
NDN_LOG_DEBUG("[ACCESSCTL] Notifying Encryption Key %ld forced expired\n", received_keyid);
586+
NDN_LOG_DEBUG("[ACCESSCTL] Notifying Encryption Key %" PRIu32 " forced expired\n", received_keyid);
582587
ndn_interest_t interest;
583588
ndn_interest_init(&interest);
584589
ndn_key_storage_t* storage = ndn_key_storage_get_instance();
@@ -596,4 +601,6 @@ ndn_ac_trigger_expiration(uint8_t service, uint32_t received_keyid)
596601
ret = ndn_forwarder_express_interest_struct(&interest, NULL, NULL, NULL);
597602
if (ret != 0) return ret;
598603
}
604+
605+
return NDN_SUCCESS;
599606
}

app-support/ndn-sig-verifier.c

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,6 @@ sig_verifier_on_data(const uint8_t* raw_data, uint32_t data_size, void* userdata
5454
if (result == NDN_SUCCESS) {
5555
// add the received certificate to key storage
5656
ndn_key_storage_add_trusted_certificate(&cert);
57-
uint32_t keyid_from_cert = key_id_from_cert_name(&cert.name);
5857
ndn_ecc_pub_t* pub_key = NULL;
5958
// verify the original interest/data
6059
if (dataptr->is_interest) {
@@ -172,7 +171,7 @@ ndn_sig_verifier_verify_int(const uint8_t* raw_pkt, size_t pkt_size,
172171

173172
#if ENABLE_NDN_LOG_DEBUG
174173
m_measure_tp2 = ndn_time_now_us();
175-
NDN_LOG_DEBUG("[SIGVERIFIER] DATA-PKT-DECODING: %lluus\n", m_measure_tp2 - m_measure_tp1);
174+
NDN_LOG_DEBUG("[SIGVERIFIER] DATA-PKT-DECODING: %" PRI_ndn_time_us_t "\n", m_measure_tp2 - m_measure_tp1);
176175
#endif
177176

178177
if (!ndn_interest_is_signed(&interest)) {
@@ -256,7 +255,7 @@ ndn_sig_verifier_verify_int(const uint8_t* raw_pkt, size_t pkt_size,
256255
}
257256

258257
void
259-
ndn_sig_verifier_verify_data(const uint8_t* raw_pkt, size_t pkt_size,
258+
ndn_sig_verifier_verify_data(const uint8_t* raw_pkt, size_t pkt_size,
260259
on_data_verification_success on_success, void* on_success_userdata,
261260
on_data_verification_failure on_failure, void* on_failure_userdata)
262261
{
@@ -271,7 +270,7 @@ ndn_sig_verifier_verify_data(const uint8_t* raw_pkt, size_t pkt_size,
271270

272271
#if ENABLE_NDN_LOG_DEBUG
273272
m_measure_tp2 = ndn_time_now_us();
274-
NDN_LOG_DEBUG("[SIGVERIFIER] DATA-PKT-DECODING: %lluus\n", m_measure_tp2 - m_measure_tp1);
273+
NDN_LOG_DEBUG("[SIGVERIFIER] DATA-PKT-DECODING: %" PRI_ndn_time_us_t "\n", m_measure_tp2 - m_measure_tp1);
275274
#endif
276275

277276
if (data.signature.sig_type < 0 || data.signature.sig_type > 4) {
@@ -308,7 +307,7 @@ ndn_sig_verifier_verify_data(const uint8_t* raw_pkt, size_t pkt_size,
308307

309308
#if ENABLE_NDN_LOG_DEBUG
310309
m_measure_tp2 = ndn_time_now_us();
311-
NDN_LOG_DEBUG("[SIGVERIFIER] DATA-PKT-ECDSA-VERIFY: %lluus\n", m_measure_tp2 - m_measure_tp1);
310+
NDN_LOG_DEBUG("[SIGVERIFIER] DATA-PKT-ECDSA-VERIFY: %" PRI_ndn_time_us_t "\n", m_measure_tp2 - m_measure_tp1);
312311
#endif
313312

314313
if (result == NDN_SUCCESS) on_success(&data, on_success_userdata);
@@ -333,7 +332,7 @@ ndn_sig_verifier_verify_data(const uint8_t* raw_pkt, size_t pkt_size,
333332

334333
#if ENABLE_NDN_LOG_DEBUG
335334
m_measure_tp2 = ndn_time_now_us();
336-
NDN_LOG_DEBUG("[SIGVERIFIER] DATA-PKT-HMAC-VERIFY: %lluus\n", m_measure_tp2 - m_measure_tp1);
335+
NDN_LOG_DEBUG("[SIGVERIFIER] DATA-PKT-HMAC-VERIFY: %" PRI_ndn_time_us_t "\n", m_measure_tp2 - m_measure_tp1);
337336
#endif
338337

339338
if (result == NDN_SUCCESS) on_success(&data, on_success_userdata);
@@ -347,7 +346,7 @@ ndn_sig_verifier_verify_data(const uint8_t* raw_pkt, size_t pkt_size,
347346
memcpy(&cert_interest.name, &data.signature.key_locator_name, sizeof(ndn_name_t));
348347
#if ENABLE_NDN_LOG_DEBUG
349348
NDN_LOG_DEBUG("[SIGVERIFIER] Interest Sent out from SigVerifier: ");
350-
NDN_LOG_DEBUG_NAME(&cert_interest);
349+
NDN_LOG_DEBUG_NAME(&cert_interest.name);
351350
#endif
352351
ndn_interest_set_CanBePrefix(&cert_interest, true);
353352
ndn_interest_set_MustBeFresh(&cert_interest, false);

app-support/pub-sub.c

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ _on_new_content_verify_success(ndn_data_t* data, void* userdata)
209209

210210
#if ENABLE_NDN_LOG_DEBUG
211211
m_measure_tp2 = ndn_time_now_us();
212-
NDN_LOG_DEBUG("[PUB/SUB] SUB-NEW-DATA-AES-DEC: %lluus\n", m_measure_tp2 - m_measure_tp1);
212+
NDN_LOG_DEBUG("[PUB/SUB] SUB-NEW-DATA-AES-DEC: %" PRI_ndn_time_us_t "\n", m_measure_tp2 - m_measure_tp1);
213213
#endif
214214

215215
if (ret != NDN_SUCCESS) {
@@ -254,14 +254,14 @@ _on_new_content_verify_success(ndn_data_t* data, void* userdata)
254254

255255
#if ENABLE_NDN_LOG_DEBUG
256256
m_measure_tp2 = ndn_time_now_us();
257-
NDN_LOG_DEBUG("[PUB/SUB] SUB-NEW-DATA-SCHEMA-VERIFY: %lluus\n", m_measure_tp2 - m_measure_tp1);
257+
NDN_LOG_DEBUG("[PUB/SUB] SUB-NEW-DATA-SCHEMA-VERIFY: %" PRI_ndn_time_us_t "\n", m_measure_tp2 - m_measure_tp1);
258258
#endif
259259

260260
if (ret != NDN_SUCCESS) {
261261
NDN_LOG_ERROR("[PUB/SUB] Cannot verify incoming content against trust schemas. Error code: %d\n", ret);
262262
return;
263263
}
264-
NDN_LOG_DEBUG("[PUB/SUB] NEW-DATA-FINSIH-VERIFICATION-TP: %llu ms\n", ndn_time_now_ms());
264+
NDN_LOG_DEBUG("[PUB/SUB] NEW-DATA-FINSIH-VERIFICATION-TP: %" PRI_ndn_time_us_t " ms\n", ndn_time_now_ms());
265265
// command FORMAT: /home/service/CMD/identifier[0,2]/command
266266
// data FORMAT: /home/service/DATA/identifier[0,2]/data-identifier
267267

@@ -310,7 +310,7 @@ _on_new_content(const uint8_t* raw_data, uint32_t data_size, void* userdata)
310310
return;
311311
}
312312
NDN_LOG_INFO("[PUB/SUB] Received new published content/command");
313-
NDN_LOG_DEBUG("[PUB/SUB] NEW-DATA-ARRIVE-TP: %llu ms\n", ndn_time_now_ms());
313+
NDN_LOG_DEBUG("[PUB/SUB] NEW-DATA-ARRIVE-TP: %" PRI_ndn_time_us_t " ms\n", ndn_time_now_ms());
314314
NDN_LOG_DEBUG("[PUB/SUB] SUB-NEW-DATA-PKT-SIZE: %u Bytes\n", data_size);
315315
topic->received_content = true;
316316
memcpy(topic->last_digest, pkt_encoding_buf, 16);
@@ -627,7 +627,7 @@ ps_publish_content(uint8_t service, const ps_event_t* event)
627627

628628
#if ENABLE_NDN_LOG_DEBUG
629629
m_measure_tp2 = ndn_time_now_us();
630-
NDN_LOG_DEBUG("[PUB/SUB] PUB-CONTENT-DATA-AES-ENC: %lluus\n", m_measure_tp2 - m_measure_tp1);
630+
NDN_LOG_DEBUG("[PUB/SUB] PUB-CONTENT-DATA-AES-ENC: %" PRI_ndn_time_us_t "\n", m_measure_tp2 - m_measure_tp1);
631631
#endif
632632

633633

@@ -647,12 +647,12 @@ ps_publish_content(uint8_t service, const ps_event_t* event)
647647
}
648648
// select identity key
649649
ndn_name_t* signing_identity = ndn_key_storage_get_self_identity(service);
650-
ndn_name_t* signing_identity_key = ndn_key_storage_get_self_identity_key(service);
650+
ndn_ecc_prv_t* signing_identity_key = ndn_key_storage_get_self_identity_key(service);
651651
if (signing_identity == NULL || signing_identity_key == NULL) {
652652
NDN_LOG_ERROR("[PUB/SUB] Cannot find proper identity to sign");
653653
return;
654654
}
655-
ret = tlv_make_data(topic->cache, sizeof(topic->cache), &topic->cache_size, 7,
655+
ret = tlv_make_data(topic->cache, sizeof(topic->cache), (size_t *) &topic->cache_size, 7,
656656
TLV_DATAARG_NAME_PTR, &name,
657657
TLV_DATAARG_CONTENT_BUF, pkt_encoding_buf,
658658
TLV_DATAARG_CONTENT_SIZE, used_size,
@@ -749,7 +749,7 @@ ps_publish_command(uint8_t service, const char* scope, const ps_event_t* event)
749749

750750
#if ENABLE_NDN_LOG_DEBUG
751751
m_measure_tp2 = ndn_time_now_us();
752-
NDN_LOG_DEBUG("[PUB/SUB] PUB-COMMAND-DATA-AES-ENC: %lluus\n", m_measure_tp2 - m_measure_tp1);
752+
NDN_LOG_DEBUG("[PUB/SUB] PUB-COMMAND-DATA-AES-ENC: %" PRI_ndn_time_us_t "\n", m_measure_tp2 - m_measure_tp1);
753753
#endif
754754

755755
uint32_t default_freshness_period = 0;
@@ -762,12 +762,12 @@ ps_publish_command(uint8_t service, const char* scope, const ps_event_t* event)
762762
}
763763
// select identity key
764764
ndn_name_t* signing_identity = ndn_key_storage_get_self_identity(service);
765-
ndn_name_t* signing_identity_key = ndn_key_storage_get_self_identity_key(service);
765+
ndn_ecc_prv_t* signing_identity_key = ndn_key_storage_get_self_identity_key(service);
766766
if (signing_identity == NULL || signing_identity_key == NULL) {
767767
NDN_LOG_ERROR("[PUB/SUB] Cannot find proper identity to sign");
768768
return;
769769
}
770-
ret = tlv_make_data(topic->cache, sizeof(topic->cache), &topic->cache_size, 7,
770+
ret = tlv_make_data(topic->cache, sizeof(topic->cache), (size_t *) &topic->cache_size, 7,
771771
TLV_DATAARG_NAME_PTR, &name,
772772
TLV_DATAARG_CONTENT_BUF, pkt_encoding_buf,
773773
TLV_DATAARG_CONTENT_SIZE, used_size,
@@ -796,7 +796,7 @@ ps_publish_command(uint8_t service, const char* scope, const ps_event_t* event)
796796

797797
// send out the notification Interest
798798
uint32_t buffer_length = 0;
799-
tlv_make_interest(pkt_encoding_buf, sizeof(pkt_encoding_buf), &buffer_length, 3,
799+
tlv_make_interest(pkt_encoding_buf, sizeof(pkt_encoding_buf), (size_t *) &buffer_length, 3,
800800
TLV_INTARG_NAME_PTR, &name,
801801
TLV_INTARG_CANBEPREFIX_BOOL, true,
802802
TLV_INTARG_MUSTBEFRESH_BOOL, true);

0 commit comments

Comments
 (0)