[email protected] (Niels Möller) writes:

> Hmm, maybe, in the
>
>   (0 ? (encrypt)(&(ctx)->cipher, 0, (void *)0, (void *)0)
>
> part of macro, intended for typechecking, one could change the 0
> constant for the size argument to some larger constant which doesn't fit
> in a plain int.

I've now done this, and I've also changed the type of the pointer
arguments to be more specific.

Nikos, if you have the time, it would be nice if you could build gnutls
without the
https://gitorious.org/gnutls/gnutls/commit/488cfe9a57840faeb2e35250757d8d33da32064f
fix, and with the nettle header files from master, and see if you get
any warnings (on a 64-bit arch, where size_t is larger than unsigned
int).

Regards,
/Niels

-- 
Niels Möller. PGP-encrypted email is preferred. Keyid C0B98E26.
Internet email is subject to wholesale government surveillance.
_______________________________________________
nettle-bugs mailing list
[email protected]
http://lists.lysator.liu.se/mailman/listinfo/nettle-bugs

Reply via email to