From: Niels Möller Date: Sat, 3 Sep 2016 14:07:56 +0000 (+0200) Subject: Fix pointed signedness warnings in md5-compat-test. X-Git-Tag: nettle_3.3_release_20161001~32 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=fa56eecc12ed7d315fa2b477292796ffcd7de0ff;p=thirdparty%2Fnettle.git Fix pointed signedness warnings in md5-compat-test. --- diff --git a/ChangeLog b/ChangeLog index d2f0532e..ad317200 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,16 +1,18 @@ 2016-09-03 Niels Möller - * testsuite/eddsa-verify-test.c (test_eddsa): Use LDATA. - * testsuite/pbkdf2-test.c (test_main): Likewise. - * testsuite/pkcs1-test.c (test_main): Likewise. + * testsuite/rsa-encrypt-test.c (test_main): Fix pointer + signednesss warning. * testsuite/testutils.h (US): New macro, for unsigned string literals. (LDATA): Use the US macro, to eliminate pointer signedness warnings. - * testsuite/rsa-encrypt-test.c (test_main): Fix pointer - signednesss warning. + * testsuite/eddsa-verify-test.c (test_eddsa): Use LDATA. + * testsuite/pbkdf2-test.c (test_main): Likewise. + * testsuite/pkcs1-test.c (test_main): Likewise. + + * testsuite/md5-compat-test.c (test_main): Use US macro. 2016-08-29 Niels Möller diff --git a/testsuite/md5-compat-test.c b/testsuite/md5-compat-test.c index c7c1112a..e2234009 100644 --- a/testsuite/md5-compat-test.c +++ b/testsuite/md5-compat-test.c @@ -13,38 +13,38 @@ test_main(void) H("D41D8CD98F00B204 E9800998ECF8427E"))); MD5Init(&ctx); - MD5Update(&ctx, "a", 1); + MD5Update(&ctx, US("a"), 1); MD5Final(digest, &ctx); ASSERT(MEMEQ(MD5_DIGEST_SIZE, digest, H("0CC175B9C0F1B6A8 31C399E269772661"))); MD5Init(&ctx); - MD5Update(&ctx, "abc", 3); + MD5Update(&ctx, US("abc"), 3); MD5Final(digest, &ctx); ASSERT(MEMEQ(MD5_DIGEST_SIZE, digest, H("900150983cd24fb0 D6963F7D28E17F72"))); MD5Init(&ctx); - MD5Update(&ctx, "message digest", 14); + MD5Update(&ctx, US("message digest"), 14); MD5Final(digest, &ctx); ASSERT(MEMEQ(MD5_DIGEST_SIZE, digest, H("F96B697D7CB7938D 525A2F31AAF161D0"))); MD5Init(&ctx); - MD5Update(&ctx, "abcdefghijklmnopqrstuvwxyz", 26); + MD5Update(&ctx, US("abcdefghijklmnopqrstuvwxyz"), 26); MD5Final(digest, &ctx); ASSERT(MEMEQ(MD5_DIGEST_SIZE, digest, H("C3FCD3D76192E400 7DFB496CCA67E13B"))); MD5Init(&ctx); - MD5Update(&ctx, "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", 62); + MD5Update(&ctx, US("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789"), 62); MD5Final(digest, &ctx); ASSERT(MEMEQ(MD5_DIGEST_SIZE, digest, H("D174AB98D277D9F5 A5611C2C9F419D9F"))); MD5Init(&ctx); - MD5Update(&ctx, "1234567890123456789012345678901234567890" - "1234567890123456789012345678901234567890", + MD5Update(&ctx, US("1234567890123456789012345678901234567890" + "1234567890123456789012345678901234567890"), 80); MD5Final(digest, &ctx); ASSERT(MEMEQ(MD5_DIGEST_SIZE, digest,