]> git.ipfire.org Git - thirdparty/nettle.git/commitdiff
Fix some warnigns for nettle-hash and nettle-pbkdf.
authorNiels Möller <nisse@lysator.liu.se>
Sat, 3 Sep 2016 18:10:28 +0000 (20:10 +0200)
committerNiels Möller <nisse@lysator.liu.se>
Sat, 3 Sep 2016 18:10:28 +0000 (20:10 +0200)
ChangeLog
tools/nettle-hash.c
tools/nettle-pbkdf2.c

index a52f14d591bafdd2b40031a9dfa5d52a33802269..6f846c8fa559d985e80c19857ca72fb77fb28be7 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
        keys. Overlooked in 2016-08-16 change.
 
        * testsuite/yarrow-test.c (test_main): Fix pointer
-       signednesss warning.
+       signednesss warnings.
        * testsuite/sexp-format-test.c (test_main): Likewise.
        * testsuite/rsa-encrypt-test.c (test_main): Likewise.
+       * tools/nettle-lfib-stream.c (main): Likewise.
 
        * testsuite/testutils.c (test_armor): Change ascii argument to
        const char *.
@@ -25,7 +26,8 @@
        argument to test_armor.
        * testsuite/base64-test.c (test_main): Likewise.
 
-       * tools/nettle-lfib-stream.c (main): Fix pointer signedness warning.
+       * tools/nettle-pbkdf2.c (main): Fix some pointer signedness warning.
+       * tools/nettle-hash.c (hash_file): Likewise.
 
 2016-08-29  Niels Möller  <nisse@lysator.liu.se>
 
index b669a6eeda09ae830038170a4565b6c1ac45ec9c..fc991ee97ee76d41abd2b6dbd0ef9f679e960f86 100644 (file)
@@ -79,7 +79,7 @@ hash_file(const struct nettle_hash *hash, void *ctx, FILE *f)
 {
   for (;;)
     {
-      char buffer[BUFSIZE];
+      uint8_t buffer[BUFSIZE];
       size_t res = fread(buffer, 1, sizeof(buffer), f);
       if (ferror(f))
        return 0;
index 16040c386ce710fa7416976ca6a65b4b9e4ee292..e2e8c782bc9b169795ebbc83f0e28981ea246ba5 100644 (file)
@@ -71,9 +71,9 @@ main (int argc, char **argv)
   unsigned output_length = DEFAULT_LENGTH;
   char password[MAX_PASSWORD];
   size_t password_length;
-  char *output;
+  uint8_t *output;
   size_t salt_length;
-  char *salt;
+  uint8_t *salt;
   int raw = 0;
   int hex_salt = 0;
   int c;
@@ -141,8 +141,8 @@ main (int argc, char **argv)
       return EXIT_FAILURE;
     }
 
-  salt = strdup (argv[0]);
-  salt_length = strlen(salt);
+  salt = (uint8_t *) strdup (argv[0]);
+  salt_length = strlen(argv[0]);
   
   if (hex_salt)
     {
@@ -150,8 +150,8 @@ main (int argc, char **argv)
 
       base16_decode_init (&base16);
       if (!base16_decode_update (&base16,
-                                &salt_length,
-                                salt, salt_length, salt)
+                                &salt_length, salt, 
+                                salt_length, salt)
          || !base16_decode_final (&base16))
        die ("Invalid salt (expecting hex encoding).\n");
     }
@@ -164,7 +164,8 @@ main (int argc, char **argv)
     die ("Reading password input failed: %s.\n", strerror (errno));
 
   output = xalloc (output_length);
-  pbkdf2_hmac_sha256 (password_length, password, iterations, salt_length, salt,
+  pbkdf2_hmac_sha256 (password_length, (const uint8_t *) password, 
+                     iterations, salt_length, salt,
                      output_length, output);
 
   free (salt);