eap_tls_packet_t *pkt;
size_t len, reclen, msg_len_offset;
status_t status;
- char *kind;
+ char *kind DBG_UNUSED;
if (this->is_server)
{
while (reader->remaining(reader))
{
status_t status;
- chunk_t data;
if (reader->remaining(reader) > TLS_MAX_FRAGMENT_LEN)
{
this->alert->add(this->alert, TLS_FATAL, TLS_DECODE_ERROR);
return NEED_MORE;
}
- data = reader->peek(reader);
+#if DEBUG_LEVEL >= 3
+ chunk_t data = reader->peek(reader);
DBG3(DBG_TLS, "%B", &data);
+#endif
status = this->application->process(this->application, reader);
switch (status)
{
METHOD(tls_handshake_t, process, status_t,
private_tls_peer_t *this, tls_handshake_type_t type, bio_reader_t *reader)
{
- tls_handshake_type_t expected;
+ tls_handshake_type_t expected DBG_UNUSED;
if (this->tls->get_version_max(this->tls) < TLS_1_3)
{
METHOD(tls_handshake_t, process, status_t,
private_tls_server_t *this, tls_handshake_type_t type, bio_reader_t *reader)
{
- tls_handshake_type_t expected;
+ tls_handshake_type_t expected DBG_UNUSED;
if (this->tls->get_version_max(this->tls) < TLS_1_3)
{