out = BIO_push(ssl_bio, out);
p = "GET / HTTP/1.0\r\n\r\n";
- len = strlen(p);
+ len = (int)strlen(p);
off = 0;
for (;;) {
/* Output tag */
printf("Tag:\n");
- BIO_dump_fp(stdout, outtag, ccm_tag_len);
+ BIO_dump_fp(stdout, outtag, (int)ccm_tag_len);
ret = 1;
err:
#include <openssl/bio.h>
#include <openssl/evp.h>
+#ifdef OPENSSL_SYS_WINDOWS
+# define fileno _fileno
+#endif
+
/*-
* This demonstration will show how to digest data using
* a BIO configured with a message digest
*out_len = buf_len;
*out = buf;
fprintf(stdout, "Encrypted:\n");
- BIO_dump_indent_fp(stdout, buf, buf_len, 2);
+ BIO_dump_indent_fp(stdout, buf, (int)buf_len, 2);
fprintf(stdout, "\n");
ret = 1;
*out_len = buf_len;
*out = buf;
fprintf(stdout, "Decrypted:\n");
- BIO_dump_indent_fp(stdout, buf, buf_len, 2);
+ BIO_dump_indent_fp(stdout, buf, (int)buf_len, 2);
fprintf(stdout, "\n");
ret = 1;
struct sockaddr_in sa = {0};
/* Retrieve the file descriptor for a new UDP socket */
- if ((fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
+ if ((fd = (int)socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
fprintf(stderr, "cannot create socket");
goto err;
}
struct sockaddr_in sa = {0};
/* Retrieve the file descriptor for a new UDP socket */
- if ((fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
+ if ((fd = (int)socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
fprintf(stderr, "cannot create socket");
return -1;
}
}
if (total_read != total_written)
- fprintf(stderr, "Failed to echo data [read: %lu, written: %lu]\n",
+ fprintf(stderr, "Failed to echo data [read: %zu, written: %zu]\n",
total_read, total_written);
/*
if (max_threads == 0)
threads = 1;
else if (max_threads < parallel_cost)
- threads = max_threads;
+ threads = (unsigned int)max_threads;
}
/* Set password */
}
printf("Shared secret (%s):\n", local_peer->name);
- BIO_dump_indent_fp(stdout, local_peer->secret, local_peer->secret_len, 2);
+ BIO_dump_indent_fp(stdout, local_peer->secret, (int)local_peer->secret_len, 2);
putchar('\n');
ret = 1;
}
printf("Generated MAC:\n");
- BIO_dump_indent_fp(stdout, out, out_len, 2);
+ BIO_dump_indent_fp(stdout, out, (int)out_len, 2);
putchar('\n');
if (out_len != sizeof(expected_output)) {
}
printf("Generated MAC:\n");
- BIO_dump_indent_fp(stdout, out, out_len, 2);
+ BIO_dump_indent_fp(stdout, out, (int)out_len, 2);
putchar('\n');
if (out_len != sizeof(expected_output)) {
}
printf("Generated MAC:\n");
- BIO_dump_indent_fp(stdout, out, out_len, 2);
+ BIO_dump_indent_fp(stdout, out, (int)out_len, 2);
putchar('\n');
if (out_len != sizeof(expected_output)) {
}
printf("Generated MAC:\n");
- BIO_dump_indent_fp(stdout, out, out_len, 2);
+ BIO_dump_indent_fp(stdout, out, (int)out_len, 2);
putchar('\n');
if (out_len != sizeof(expected_output)) {
* This example loads the PEM data from a memory buffer
* Use BIO_new_fp() to load a PEM file instead
*/
- in = BIO_new_mem_buf(dsapem, strlen(dsapem));
+ in = BIO_new_mem_buf(dsapem, (int)strlen(dsapem));
if (in == NULL) {
fprintf(stderr, "BIO_new_mem_buf() failed\n");
goto cleanup;
fprintf(stdout, "Curve name: %s\n", out_curvename);
fprintf(stdout, "Public key:\n");
- BIO_dump_indent_fp(stdout, out_pubkey, out_pubkey_len, 2);
+ BIO_dump_indent_fp(stdout, out_pubkey, (int)out_pubkey_len, 2);
fprintf(stdout, "Private Key:\n");
- BIO_dump_indent_fp(stdout, out_privkey, out_privkey_len, 2);
+ BIO_dump_indent_fp(stdout, out_privkey, (int)out_privkey_len, 2);
ret = 1;
cleanup:
if (EVP_PKEY_get_octet_string_param(pkey, OSSL_PKEY_PARAM_FFC_SEED, seed,
sizeof(seed), &seedlen) > 0) {
BIO_printf(bio, " %s\n", OSSL_PKEY_PARAM_FFC_SEED);
- BIO_dump(bio, seed, seedlen);
+ BIO_dump(bio, seed, (int)seedlen);
}
if (EVP_PKEY_get_int_param(pkey, OSSL_PKEY_PARAM_FFC_GINDEX, &gindex) > 0) {
if (gindex != -1)
if (rts == NULL)
return NULL;
- if ((rts->rts_pattern = strdup(fill_pattern)) == NULL) {
+ if ((rts->rts_pattern = OPENSSL_strdup(fill_pattern)) == NULL) {
OPENSSL_free(rts);
return NULL;
}
- rts->rts_pattern_len = strlen(fill_pattern);
+ rts->rts_pattern_len = (unsigned int)strlen(fill_pattern);
rts->rts_len = fsize;
rb = (struct response_buffer *)rts;
if (rtf == NULL)
return NULL;
- if ((rtf->rtf_pattern = strdup(fill_pattern)) == NULL) {
+ if ((rtf->rtf_pattern = OPENSSL_strdup(fill_pattern)) == NULL) {
OPENSSL_free(rtf);
return NULL;
}
- rtf->rtf_pattern_len = strlen(fill_pattern);
+ rtf->rtf_pattern_len = (unsigned int)strlen(fill_pattern);
t = time(&t);
ctime_r(&t, date_str);
POLL_PRINTA(pe->pe_poll_item.events),
POLL_PRINTA(~pe->pe_want_mask));
}
- pm->pm_event_count = i;
+ pm->pm_event_count = (unsigned int)i;
pm->pm_need_rebuild = 0;
return 0;
return rv;
}
pes->pes_wpos += read_len;
- pes->pes_wpos_sz -= read_len;
+ pes->pes_wpos_sz -= (unsigned int)read_len;
rv = parse_request(pes);
struct sockaddr_in sa = {0};
/* Retrieve the file descriptor for a new UDP socket */
- if ((fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
+ if ((fd = (int)socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
DPRINTF(stderr, "cannot create socket");
return -1;
}
int fd = -1;
struct sockaddr_in sa = {0};
- if ((fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
+ if ((fd = (int)socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
fprintf(stderr, "cannot create socket");
goto err;
}
EVP_PKEY_CTX_free(pkey_ctx);
fprintf(stdout, "Generating signature:\n");
- BIO_dump_indent_fp(stdout, sig_value, sig_len, 2);
+ BIO_dump_indent_fp(stdout, sig_value, (int)sig_len, 2);
fprintf(stdout, "\n");
return ret;
}
*sig_out_len = sig_len;
*sig_out_value = sig_value;
fprintf(stdout, "Generating signature:\n");
- BIO_dump_indent_fp(stdout, sig_value, sig_len, 2);
+ BIO_dump_indent_fp(stdout, sig_value, (int)sig_len, 2);
fprintf(stdout, "\n");
ret = 1;
}
*sig_out_len = sig_len;
*sig_out_value = sig_value;
- BIO_dump_indent_fp(stdout, sig_value, sig_len, 2);
+ BIO_dump_indent_fp(stdout, sig_value, (int)sig_len, 2);
fprintf(stdout, "\n");
ret = 1;
#include <sys/socket.h>
#include <arpa/inet.h>
#include <netinet/in.h>
+
+#define SOCKET int
+#define closesocket(s) close(s)
+
#else
#include <winsock.h>
+#include <ws2tcpip.h>
#endif
static const int server_port = 4433;
*/
static volatile flag server_running = true;
-static int create_socket(flag isServer)
+static SOCKET create_socket(flag isServer)
{
- int s;
+ SOCKET s;
int optval = 1;
struct sockaddr_in addr;
addr.sin_addr.s_addr = INADDR_ANY;
/* Reuse the address; good for quick restarts */
- if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval))
+ if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (void *)&optval, sizeof(optval))
< 0) {
perror("setsockopt(SO_REUSEADDR) failed");
exit(EXIT_FAILURE);
SSL_CTX *ssl_ctx = NULL;
SSL *ssl = NULL;
- int server_skt = -1;
- int client_skt = -1;
+ SOCKET server_skt = -1;
+ SOCKET client_skt = -1;
/* used by fgets */
char buffer[BUFFERSIZE];
while (server_running) {
/* Wait for TCP connection from client */
client_skt = accept(server_skt, (struct sockaddr*) &addr,
- &addr_len);
+ &addr_len);
if (client_skt < 0) {
perror("Unable to accept");
exit(EXIT_FAILURE);
/* Create server SSL structure using newly accepted client socket */
ssl = SSL_new(ssl_ctx);
- if (!SSL_set_fd(ssl, client_skt)) {
+ if (!SSL_set_fd(ssl, (int)client_skt)) {
ERR_print_errors_fp(stderr);
exit(EXIT_FAILURE);
}
/* Echo loop */
while (true) {
/* Get message from client; will fail if client closes connection */
- if ((rxlen = SSL_read(ssl, rxbuf, rxcap)) <= 0) {
+ if ((rxlen = SSL_read(ssl, rxbuf, (int)rxcap)) <= 0) {
if (rxlen == 0) {
printf("Client closed connection\n");
} else {
/* Cleanup for next client */
SSL_shutdown(ssl);
SSL_free(ssl);
- close(client_skt);
+ closesocket(client_skt);
/*
* Set client_skt to -1 to avoid double close when
* server_running become false before next accept
/* Create client SSL structure using dedicated client socket */
ssl = SSL_new(ssl_ctx);
- if (!SSL_set_fd(ssl, client_skt)) {
+ if (!SSL_set_fd(ssl, (int)client_skt)) {
ERR_print_errors_fp(stderr);
goto exit;
}
break;
}
/* Send it to the server */
- if ((result = SSL_write(ssl, txbuf, strlen(txbuf))) <= 0) {
+ if ((result = SSL_write(ssl, txbuf, (int)strlen(txbuf))) <= 0) {
printf("Server closed connection\n");
ERR_print_errors_fp(stderr);
break;
}
/* Wait for the echo */
- rxlen = SSL_read(ssl, rxbuf, rxcap);
+ rxlen = SSL_read(ssl, rxbuf, (int)rxcap);
if (rxlen <= 0) {
printf("Server closed connection\n");
ERR_print_errors_fp(stderr);
SSL_CTX_free(ssl_ctx);
if (client_skt != -1)
- close(client_skt);
+ closesocket(client_skt);
if (server_skt != -1)
- close(server_skt);
+ closesocket(server_skt);
printf("sslecho exiting\n");