keys. Overlooked in 2016-08-16 change.
* testsuite/yarrow-test.c (test_main): Fix pointer
- signednesss warning.
+ signednesss warnings.
* testsuite/sexp-format-test.c (test_main): Likewise.
* testsuite/rsa-encrypt-test.c (test_main): Likewise.
+ * tools/nettle-lfib-stream.c (main): Likewise.
* testsuite/testutils.c (test_armor): Change ascii argument to
const char *.
argument to test_armor.
* testsuite/base64-test.c (test_main): Likewise.
- * tools/nettle-lfib-stream.c (main): Fix pointer signedness warning.
+ * tools/nettle-pbkdf2.c (main): Fix some pointer signedness warning.
+ * tools/nettle-hash.c (hash_file): Likewise.
2016-08-29 Niels Möller <nisse@lysator.liu.se>
unsigned output_length = DEFAULT_LENGTH;
char password[MAX_PASSWORD];
size_t password_length;
- char *output;
+ uint8_t *output;
size_t salt_length;
- char *salt;
+ uint8_t *salt;
int raw = 0;
int hex_salt = 0;
int c;
return EXIT_FAILURE;
}
- salt = strdup (argv[0]);
- salt_length = strlen(salt);
+ salt = (uint8_t *) strdup (argv[0]);
+ salt_length = strlen(argv[0]);
if (hex_salt)
{
base16_decode_init (&base16);
if (!base16_decode_update (&base16,
- &salt_length,
- salt, salt_length, salt)
+ &salt_length, salt,
+ salt_length, salt)
|| !base16_decode_final (&base16))
die ("Invalid salt (expecting hex encoding).\n");
}
die ("Reading password input failed: %s.\n", strerror (errno));
output = xalloc (output_length);
- pbkdf2_hmac_sha256 (password_length, password, iterations, salt_length, salt,
+ pbkdf2_hmac_sha256 (password_length, (const uint8_t *) password,
+ iterations, salt_length, salt,
output_length, output);
free (salt);