@@ -10798,9 +10798,8 @@ static void AddFragHeaders(byte* output, word32 fragSz, word32 fragOffset,
1079810798}
1079910799#endif
1080010800
10801- #if !defined(NO_WOLFSSL_SERVER) || \
10802- (!defined(NO_WOLFSSL_CLIENT) && !defined(NO_CERTS) && \
10803- !defined(WOLFSSL_NO_CLIENT_AUTH))
10801+ #endif /* !WOLFSSL_NO_TLS12 */
10802+
1080410803/**
1080510804 * Send the handshake message. This function handles fragmenting the message
1080610805 * so that it will fit into the desired MTU or the max fragment size.
@@ -10814,8 +10813,8 @@ static void AddFragHeaders(byte* output, word32 fragSz, word32 fragOffset,
1081410813 * @param type Type of message being sent
1081510814 * @return 0 on success and negative otherwise
1081610815 */
10817- static int SendHandshakeMsg(WOLFSSL* ssl, byte* input, word32 inputSz ,
10818- enum HandShakeType type, const char* packetName)
10816+ WC_MAYBE_UNUSED static int SendHandshakeMsg(WOLFSSL* ssl, byte* input,
10817+ word32 inputSz, enum HandShakeType type, const char* packetName)
1081910818{
1082010819 int maxFrag;
1082110820 int ret = 0;
@@ -10976,10 +10975,6 @@ static int SendHandshakeMsg(WOLFSSL* ssl, byte* input, word32 inputSz,
1097610975 ssl->options.buildingMsg = 0;
1097710976 return ret;
1097810977}
10979- #endif /* !NO_WOLFSSL_SERVER || (!NO_WOLFSSL_CLIENT && !NO_CERTS &&
10980- * !WOLFSSL_NO_CLIENT_AUTH) */
10981-
10982- #endif /* !WOLFSSL_NO_TLS12 */
1098310978
1098410979
1098510980/* return bytes received, WOLFSSL_FATAL_ERROR on error,
0 commit comments