size_t link_len, id_len;
var_cell_t *cell;
size_t cell_len;
- int pos;
+ ssize_t pos;
int server_mode;
tor_assert(conn->_base.state == OR_CONN_STATE_OR_HANDSHAKING_V3);
*
* If <b>server</b> is false and <b>signing_key</b> is provided, calculate the
* entire authenticator, signed with <b>signing_key</b>.
+ * DOCDOC return value
*/
int
connection_or_compute_authenticate_cell_body(or_connection_t *conn,
tor_assert(ptr - out == V3_AUTH_FIXED_PART_LEN);
if (server)
- return ptr-out;
+ return V3_AUTH_FIXED_PART_LEN; // ptr-out
/* Time: 8 octets. */
{
tor_assert(ptr - out == V3_AUTH_BODY_LEN);
if (!signing_key)
- return ptr - out;
+ return V3_AUTH_BODY_LEN; // ptr - out
{
int siglen;
ptr += siglen;
tor_assert(ptr <= out+outlen);
- return ptr - out;
+ return (int)(ptr - out);
}
}
var_cell_t *cell;
crypto_pk_env_t *pk = tor_tls_get_my_client_auth_key();
int authlen;
- int cell_maxlen;
+ size_t cell_maxlen;
/* XXXX make sure we're actually supposed to send this! */
if (!pk) {