Most of them resolve unsigned vs. non-unsigned issues or function
declaration. I had to do some casts (Ben, forgive me, I didn't dare
to go deeper. I might dare more tomorrow...). And, uhmmm, remove a
few CR's :-)...
And now I've fixed my software so it won't make garbage of this
mail...
Index: CHANGES
===================================================================
RCS file: /src/packages/openssl/repository//openssl/CHANGES,v
retrieving revision 1.125
diff -u -r1.125 CHANGES
--- CHANGES 1999/03/07 15:21:08 1.125
+++ CHANGES 1999/03/08 16:54:33
@@ -5,6 +5,95 @@
Changes between 0.9.1c and 0.9.2
+ *) Added inclusion of string.h apps/nseq.c so strcmp would get correctly
+ declared.
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) In apps/ca.c, make sure conf.h gets included before x509v3.h, or some
+ functions will not be declared.
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) In apps/req.c:make_REQ(), change `unsigned char *p, *q' to `char *',
+ to avoid complaints from the compiler.
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) In apps/s_socket.c:nbio_sock_error() and
+ crypto/bio/b_sock.c:BIO_sock_error(), make sure size is an unsigned
+ int, or the compiler may complain about the call to getsockopt(),
+ which should take an unsigned int as last argument. For similar
+ reasons, make len in apps/s_socket.c:do_accept() and in
+ crypto/bio/b_sock.c:BIO_accept() an unsigned int.
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) In crypto/conf/test.c, make sure the ERR_xxx functions are properly
+ declared by including err.h.
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) In crypto/des/destest.c, I can't understand why cbc_data isn't
+ unsigned. Changed.
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) In crypto/des/enc_read.c:des_enc_read(), made unnet and tmpbuf
+ unsigned, because the compiler complained again. A couple of
+ casts (are they necessary) for malloc() were changed, and buf
+ is cast (unsigned char *) when given to des_pcbc_encrypt() and
+ des_cbc_encrypt(), because I don't dare changed the type for
+ buf just yet. Similar things have been done with outbuf, shortbuf,
+ p and cp in crypto/des/enc_writ.c:des_enc_write().
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) It's a good thing for printf() if stdlib.h gets included in
+ crypto/des/rpw.c, as well as in crypto/pem/ctx_size.c.
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) I added some casts in crypto/des/str2key.c. Please forgive me,
+ but my compiler won't stop complaining otherwise.
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) Added a bunch of casts in crypto/evp/bio_ok.c. They were needed
+ to get the compiler happy about the calls to EVP_DigestUpdate().
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) Changed md_len in crypto/pkcs7/pk7_doit.c from int to unsigned int.
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) Added inclusion of string.h in crypto/rsa/rsa_oaep_test.c so memcpy
+ and memcmp would get correctly declared.
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) Make sure Makefile.org and crypto/Makefile.ssl defines CC when
+ making links in the subdirectories. This ensures we use the
+ same compiler to compile crypto/pem/ctx_size.c as for all the rest.
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) In crypto/x509/by_dir.c:add_cert_dir(), there's a bug that can cause
+ a segment violation or something similar if the directory spec. didn't
+ end with a LIST_SEPARATOR_CHAR. When that happens, we're done and
+ simply break out of the loop.
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) In crypto/x509v3/v3_alt.c:v2i_GENERAL_NAME() and
+ crypto/x509v3/v3_ia5.c:s2i_ASN1_IA5STRING(), we need a cast on the
+ second argument to ASN1_STRING_set().
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) In crypto/x509v3/v3_conf.c:do_ext_conf(), ext_der and p change
+ type from char * to unsigned char *. Same things happens to p
+ in crypto/x509v3/v3_prn.c:X509V3_EXT_print().
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) In crypto/x509v3/v3_skey.c:s2i_skey_id(), diglen is cast to unsigned
+ int when sent to EVP_DigestFinal. I blame my compiler or the ASN1
+ function API :-).
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) OK, my compiler is picky... It commented about the CR's it found in
+ ssl/ssl_ciph.c... Go figure...
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
+ *) In ssl/ssl_sess.c:ssl_get_prev_session(), buf and p are made unsigned.
+ [Richard Levitte <[EMAIL PROTECTED]>]
+
*) Fix the generation of two part addresses in perl.
[Kenji Miyake <[EMAIL PROTECTED]>, integrated by Ben Laurie]
Index: Makefile.org
===================================================================
RCS file: /src/packages/openssl/repository//openssl/Makefile.org,v
retrieving revision 1.14
diff -u -r1.14 Makefile.org
--- Makefile.org 1999/03/07 14:01:55 1.14
+++ Makefile.org 1999/03/08 14:09:40
@@ -238,7 +238,7 @@
@$(TOP)/util/mklink.sh include $(EXHEADER)
@for i in $(DIRS); do \
(cd $$i && echo "making links in $$i..." && \
- $(MAKE) SDIRS='${SDIRS}' links ) || exit 1; \
+ $(MAKE) SDIRS='${SDIRS}' CC='$(CC)' links ) || exit 1; \
done;
@(OPENSSL="`pwd`/apps/openssl"; export OPENSSL; sh tools/c_rehash certs)
Index: apps/ca.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/apps/ca.c,v
retrieving revision 1.17
diff -u -r1.17 ca.c
--- apps/ca.c 1999/03/06 19:33:24 1.17
+++ apps/ca.c 1999/03/08 14:59:17
@@ -64,6 +64,7 @@
#include <sys/types.h>
#include <sys/stat.h>
#include "apps.h"
+#include "conf.h"
#include "bio.h"
#include "err.h"
#include "bn.h"
@@ -73,7 +74,6 @@
#include "x509v3.h"
#include "objects.h"
#include "pem.h"
-#include "conf.h"
#ifndef W_OK
#include <sys/file.h>
Index: apps/nseq.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/apps/nseq.c,v
retrieving revision 1.2
diff -u -r1.2 nseq.c
--- apps/nseq.c 1999/01/31 11:19:17 1.2
+++ apps/nseq.c 1999/03/08 14:58:07
@@ -57,6 +57,7 @@
*/
#include <stdio.h>
+#include <string.h>
#include "pem.h"
#include "err.h"
#include "apps.h"
Index: apps/req.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/apps/req.c,v
retrieving revision 1.15
diff -u -r1.15 req.c
--- apps/req.c 1999/03/06 19:33:24 1.15
+++ apps/req.c 1999/03/08 15:01:26
@@ -831,7 +831,7 @@
int attribs;
{
int ret=0,i;
- unsigned char *p,*q;
+ char *p,*q;
X509_REQ_INFO *ri;
char buf[100];
int nid,min,max;
Index: apps/s_socket.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/apps/s_socket.c,v
retrieving revision 1.2
diff -u -r1.2 s_socket.c
--- apps/s_socket.c 1998/12/22 15:59:55 1.2
+++ apps/s_socket.c 1999/03/08 15:06:47
@@ -218,7 +218,8 @@
int nbio_sock_error(sock)
int sock;
{
- int j,i,size;
+ int j,i;
+ unsigned int size;
size=sizeof(int);
i=getsockopt(sock,SOL_SOCKET,SO_ERROR,(char *)&j,&size);
@@ -376,7 +377,7 @@
int ret,i;
struct hostent *h1,*h2;
static struct sockaddr_in from;
- int len;
+ unsigned int len;
/* struct linger ling; */
if (!sock_init()) return(0);
Index: crypto/Makefile.ssl
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/Makefile.ssl,v
retrieving revision 1.12
diff -u -r1.12 Makefile.ssl
--- crypto/Makefile.ssl 1999/03/06 14:32:14 1.12
+++ crypto/Makefile.ssl 1999/03/08 14:12:57
@@ -75,7 +75,7 @@
@$(TOP)/util/point.sh Makefile.ssl Makefile
@for i in $(SDIRS); do \
(cd $$i; echo "making links in crypto/$$i..."; \
- $(MAKE) links ); \
+ $(MAKE) CC='$(CC)' links ); \
done;
lib: $(LIBOBJ)
Index: crypto/bio/b_sock.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/bio/b_sock.c,v
retrieving revision 1.3
diff -u -r1.3 b_sock.c
--- crypto/bio/b_sock.c 1999/02/25 10:54:27 1.3
+++ crypto/bio/b_sock.c 1999/03/08 15:13:17
@@ -200,7 +200,8 @@
int BIO_sock_error(sock)
int sock;
{
- int j,i,size;
+ int j,i;
+ unsigned int size;
size=sizeof(int);
@@ -611,7 +612,7 @@
static struct sockaddr_in from;
unsigned long l;
unsigned short port;
- int len;
+ unsigned int len;
char *p;
memset((char *)&from,0,sizeof(from));
Index: crypto/conf/test.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/conf/test.c,v
retrieving revision 1.2
diff -u -r1.2 test.c
--- crypto/conf/test.c 1999/01/02 15:05:08 1.2
+++ crypto/conf/test.c 1999/03/08 15:16:48
@@ -59,6 +59,7 @@
#include <stdio.h>
#include <stdlib.h>
#include "conf.h"
+#include "err.h"
main()
{
Index: crypto/des/destest.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/des/destest.c,v
retrieving revision 1.4
diff -u -r1.4 destest.c
--- crypto/des/destest.c 1999/02/13 19:03:14 1.4
+++ crypto/des/destest.c 1999/03/08 15:19:01
@@ -229,7 +229,7 @@
/* Changed the following text constant to binary so it will work on ebcdic
* machines :-) */
/* static char cbc_data[40]="7654321 Now is the time for \0001"; */
-static char cbc_data[40]={
+static unsigned char cbc_data[40]={
0x37,0x36,0x35,0x34,0x33,0x32,0x31,0x20,
0x4E,0x6F,0x77,0x20,0x69,0x73,0x20,0x74,
0x68,0x65,0x20,0x74,0x69,0x6D,0x65,0x20,
Index: crypto/des/enc_read.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/des/enc_read.c,v
retrieving revision 1.2
diff -u -r1.2 enc_read.c
--- crypto/des/enc_read.c 1999/02/13 18:52:20 1.2
+++ crypto/des/enc_read.c 1999/03/08 15:25:09
@@ -77,17 +77,17 @@
/* extra unencrypted data
* for when a block of 100 comes in but is des_read one byte at
* a time. */
- static char *unnet=NULL;
+ static unsigned char *unnet=NULL;
static int unnet_start=0;
static int unnet_left=0;
- static char *tmpbuf=NULL;
+ static unsigned char *tmpbuf=NULL;
int i;
long num=0,rnum;
unsigned char *p;
if (tmpbuf == NULL)
{
- tmpbuf=(char *)malloc(BSIZE);
+ tmpbuf=(unsigned char *)malloc(BSIZE);
if (tmpbuf == NULL) return(-1);
}
if (net == NULL)
@@ -97,7 +97,7 @@
}
if (unnet == NULL)
{
- unnet=(char *)malloc(BSIZE);
+ unnet=(unsigned char *)malloc(BSIZE);
if (unnet == NULL) return(-1);
}
/* left over data from last decrypt */
@@ -200,10 +200,12 @@
else
{
if (des_rw_mode & DES_PCBC_MODE)
- des_pcbc_encrypt(net,buf,num,sched,iv,
+ des_pcbc_encrypt(net,(unsigned char *)buf,num,
+ sched,iv,
DES_DECRYPT);
else
- des_cbc_encrypt(net,buf,num,sched,iv,
+ des_cbc_encrypt(net,(unsigned char *)buf,num,
+ sched,iv,
DES_DECRYPT);
}
}
Index: crypto/des/enc_writ.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/des/enc_writ.c,v
retrieving revision 1.2
diff -u -r1.2 enc_writ.c
--- crypto/des/enc_writ.c 1999/02/13 18:52:20 1.2
+++ crypto/des/enc_writ.c 1999/03/08 15:27:38
@@ -76,15 +76,15 @@
long rnum;
int i,j,k,outnum;
- static char *outbuf=NULL;
- char shortbuf[8];
- char *p;
- const char *cp;
+ static unsigned char *outbuf=NULL;
+ unsigned char shortbuf[8];
+ unsigned char *p;
+ const unsigned char *cp;
static int start=1;
if (outbuf == NULL)
{
- outbuf=(char *)malloc(BSIZE+HDRSIZE);
+ outbuf=(unsigned char *)malloc(BSIZE+HDRSIZE);
if (outbuf == NULL) return(-1);
}
/* If we are sending less than 8 bytes, the same char will look
@@ -126,7 +126,7 @@
}
else
{
- cp=buf;
+ cp=(unsigned char *)buf;
rnum=((len+7)/8*8); /* round up to nearest eight */
}
Index: crypto/des/rpw.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/des/rpw.c,v
retrieving revision 1.1.1.2
diff -u -r1.1.1.2 rpw.c
--- crypto/des/rpw.c 1998/12/21 10:55:03 1.1.1.2
+++ crypto/des/rpw.c 1999/03/08 15:29:35
@@ -57,6 +57,7 @@
*/
#include <stdio.h>
+#include <stdlib.h>
#include "des.h"
int main(argc,argv)
Index: crypto/des/str2key.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/des/str2key.c,v
retrieving revision 1.2
diff -u -r1.2 str2key.c
--- crypto/des/str2key.c 1999/02/13 18:52:21 1.2
+++ crypto/des/str2key.c 1999/03/08 15:32:12
@@ -94,7 +94,7 @@
des_check_key=0;
des_set_key(key,ks);
des_check_key=i;
- des_cbc_cksum(str,key,length,ks,key);
+ des_cbc_cksum((unsigned char *)str,key,length,ks,key);
memset(ks,0,sizeof(ks));
des_set_odd_parity(key);
}
@@ -158,9 +158,9 @@
i=des_check_key;
des_check_key=0;
des_set_key(key1,ks);
- des_cbc_cksum(str,key1,length,ks,key1);
+ des_cbc_cksum((unsigned char *)str,key1,length,ks,key1);
des_set_key(key2,ks);
- des_cbc_cksum(str,key2,length,ks,key2);
+ des_cbc_cksum((unsigned char *)str,key2,length,ks,key2);
des_check_key=i;
memset(ks,0,sizeof(ks));
des_set_odd_parity(key1);
Index: crypto/evp/bio_ok.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/evp/bio_ok.c,v
retrieving revision 1.2
diff -u -r1.2 bio_ok.c
--- crypto/evp/bio_ok.c 1999/03/03 02:01:19 1.2
+++ crypto/evp/bio_ok.c 1999/03/08 16:52:20
@@ -480,7 +480,7 @@
longswap(&(ctx->buf[ctx->buf_len]), md->digest->md_size);
ctx->buf_len+= md->digest->md_size;
- EVP_DigestUpdate(md, WELLKNOWN, strlen(WELLKNOWN));
+ EVP_DigestUpdate(md, (unsigned char *)WELLKNOWN, strlen(WELLKNOWN));
md->digest->final(&(ctx->buf[ctx->buf_len]), &(md->md.base[0]));
ctx->buf_len+= md->digest->md_size;
ctx->blockout= 1;
@@ -504,7 +504,7 @@
longswap(&(md->md.base[0]), md->digest->md_size);
ctx->buf_off+= md->digest->md_size;
- EVP_DigestUpdate(md, WELLKNOWN, strlen(WELLKNOWN));
+ EVP_DigestUpdate(md, (unsigned char *)WELLKNOWN, strlen(WELLKNOWN));
md->digest->final(tmp, &(md->md.base[0]));
ret= memcmp(&(ctx->buf[ctx->buf_off]), tmp, md->digest->md_size) == 0;
ctx->buf_off+= md->digest->md_size;
@@ -537,7 +537,7 @@
tl= swapem(tl);
memcpy(ctx->buf, &tl, OK_BLOCK_BLOCK);
tl= swapem(tl);
- EVP_DigestUpdate(md, &(ctx->buf[OK_BLOCK_BLOCK]), tl);
+ EVP_DigestUpdate(md, (unsigned char *)&(ctx->buf[OK_BLOCK_BLOCK]), tl);
md->digest->final(&(ctx->buf[ctx->buf_len]), &(md->md.base[0]));
ctx->buf_len+= md->digest->md_size;
ctx->blockout= 1;
@@ -557,7 +557,7 @@
tl= swapem(tl);
if (ctx->buf_len < tl+ OK_BLOCK_BLOCK+ md->digest->md_size) return;
- EVP_DigestUpdate(md, &(ctx->buf[OK_BLOCK_BLOCK]), tl);
+ EVP_DigestUpdate(md, (unsigned char *)&(ctx->buf[OK_BLOCK_BLOCK]), tl);
md->digest->final(tmp, &(md->md.base[0]));
if(memcmp(&(ctx->buf[tl+ OK_BLOCK_BLOCK]), tmp, md->digest->md_size) == 0)
{
Index: crypto/pem/ctx_size.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/pem/ctx_size.c,v
retrieving revision 1.2
diff -u -r1.2 ctx_size.c
--- crypto/pem/ctx_size.c 1999/01/31 15:00:12 1.2
+++ crypto/pem/ctx_size.c 1999/03/08 15:41:21
@@ -57,6 +57,7 @@
*/
#include <stdio.h>
+#include <stdlib.h>
#include <string.h>
#include "evp.h"
Index: crypto/pkcs7/pk7_doit.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/pkcs7/pk7_doit.c,v
retrieving revision 1.6
diff -u -r1.6 pk7_doit.c
--- crypto/pkcs7/pk7_doit.c 1999/03/05 02:05:15 1.6
+++ crypto/pkcs7/pk7_doit.c 1999/03/08 15:48:58
@@ -721,7 +721,7 @@
if ((sk != NULL) && (sk_num(sk) != 0))
{
unsigned char md_dat[EVP_MAX_MD_SIZE];
- int md_len;
+ unsigned int md_len;
ASN1_OCTET_STRING *message_digest;
EVP_DigestFinal(&mdc_tmp,md_dat,&md_len);
Index: crypto/rsa/rsa_oaep_test.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/rsa/rsa_oaep_test.c,v
retrieving revision 1.3
diff -u -r1.3 rsa_oaep_test.c
--- crypto/rsa/rsa_oaep_test.c 1999/02/23 07:47:30 1.3
+++ crypto/rsa/rsa_oaep_test.c 1999/03/08 15:55:07
@@ -1,6 +1,7 @@
/* test vectors from p1ovect1.txt */
#include <stdio.h>
+#include <string.h>
#include "e_os.h"
#include "rsa.h"
Index: crypto/x509/by_dir.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/x509/by_dir.c,v
retrieving revision 1.3
diff -u -r1.3 by_dir.c
--- crypto/x509/by_dir.c 1999/01/30 14:05:52 1.3
+++ crypto/x509/by_dir.c 1999/03/08 16:04:52
@@ -206,7 +206,12 @@
ss=s;
s=p+1;
len=(int)(p-ss);
- if (len == 0) continue;
+ if (len == 0)
+ {
+ if (ss == p)
+ break;
+ continue;
+ }
for (j=0; j<ctx->num_dirs; j++)
if (strncmp(ctx->dirs[j],ss,(unsigned int)len) == 0)
continue;
Index: crypto/x509v3/v3_alt.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/x509v3/v3_alt.c,v
retrieving revision 1.8
diff -u -r1.8 v3_alt.c
--- crypto/x509v3/v3_alt.c 1999/03/06 02:34:07 1.8
+++ crypto/x509v3/v3_alt.c 1999/03/08 16:09:38
@@ -408,7 +408,8 @@
if(is_string) {
if(!(gen->d.ia5 = ASN1_IA5STRING_new()) ||
- !ASN1_STRING_set(gen->d.ia5, value, strlen(value))) {
+ !ASN1_STRING_set(gen->d.ia5, (unsigned char *)value,
+ strlen(value))) {
X509V3err(X509V3_F_V2I_GENERAL_NAME,ERR_R_MALLOC_FAILURE);
goto err;
}
Index: crypto/x509v3/v3_conf.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/x509v3/v3_conf.c,v
retrieving revision 1.6
diff -u -r1.6 v3_conf.c
--- crypto/x509v3/v3_conf.c 1999/03/06 19:33:28 1.6
+++ crypto/x509v3/v3_conf.c 1999/03/08 16:10:08
@@ -124,7 +124,7 @@
X509V3_EXT_METHOD *method;
STACK *nval;
char *ext_struc;
- char *ext_der, *p;
+ unsigned char *ext_der, *p;
int ext_len;
ASN1_OCTET_STRING *ext_oct;
if(ext_nid == NID_undef) {
Index: crypto/x509v3/v3_ia5.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/x509v3/v3_ia5.c,v
retrieving revision 1.2
diff -u -r1.2 v3_ia5.c
--- crypto/x509v3/v3_ia5.c 1999/02/22 01:26:29 1.2
+++ crypto/x509v3/v3_ia5.c 1999/03/08 16:13:30
@@ -113,7 +113,8 @@
return NULL;
}
if(!(ia5 = ASN1_IA5STRING_new())) goto err;
- if(!ASN1_STRING_set((ASN1_STRING *)ia5, str, strlen(str))) {
+ if(!ASN1_STRING_set((ASN1_STRING *)ia5, (unsigned char *)str,
+ strlen(str))) {
ASN1_IA5STRING_free(ia5);
goto err;
}
Index: crypto/x509v3/v3_prn.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/x509v3/v3_prn.c,v
retrieving revision 1.3
diff -u -r1.3 v3_prn.c
--- crypto/x509v3/v3_prn.c 1999/02/22 01:26:29 1.3
+++ crypto/x509v3/v3_prn.c 1999/03/08 16:14:27
@@ -89,7 +89,8 @@
X509_EXTENSION *ext;
int flag;
{
- char *ext_str = NULL, *p, *value = NULL;
+ char *ext_str = NULL, *value = NULL;
+ unsigned char *p;
X509V3_EXT_METHOD *method;
STACK *nval = NULL;
int ok = 1;
Index: crypto/x509v3/v3_skey.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/crypto/x509v3/v3_skey.c,v
retrieving revision 1.3
diff -u -r1.3 v3_skey.c
--- crypto/x509v3/v3_skey.c 1999/03/06 02:34:07 1.3
+++ crypto/x509v3/v3_skey.c 1999/03/08 16:19:46
@@ -151,7 +151,7 @@
EVP_DigestInit(&md, EVP_sha1());
EVP_DigestUpdate(&md, pk->data, pk->length);
- EVP_DigestFinal(&md, pkey_dig, &diglen);
+ EVP_DigestFinal(&md, pkey_dig, (unsigned int *)&diglen);
if(!ASN1_OCTET_STRING_set(oct, pkey_dig, diglen)) {
X509V3err(X509V3_F_S2I_S2I_SKEY_ID,ERR_R_MALLOC_FAILURE);
Index: ssl/ssl_ciph.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/ssl/ssl_ciph.c,v
retrieving revision 1.6
diff -u -r1.6 ssl_ciph.c
--- ssl/ssl_ciph.c 1999/03/06 12:09:36 1.6
+++ ssl/ssl_ciph.c 1999/03/08 16:20:06
@@ -616,7 +616,7 @@
char *buf;
int len;
{
- int is_export,pkl,kl;
+ int is_export,pkl,kl;
char *ver,*exp;
char *kx,*au,*enc,*mac;
unsigned long alg,alg2;
@@ -625,10 +625,10 @@
alg=cipher->algorithms;
alg2=cipher->algorithm2;
- is_export=SSL_IS_EXPORT(alg);
+ is_export=SSL_IS_EXPORT(alg);
pkl=SSL_EXPORT_PKEYLENGTH(alg);
kl=SSL_EXPORT_KEYLENGTH(alg);
- exp=is_export?" export":"";
+ exp=is_export?" export":"";
if (alg & SSL_SSLV2)
ver="SSLv2";
@@ -640,7 +640,7 @@
switch (alg&SSL_MKEY_MASK)
{
case SSL_kRSA:
- kx=is_export?(pkl == 512 ? "RSA(512)" : "RSA(1024)"):"RSA";
+ kx=is_export?(pkl == 512 ? "RSA(512)" : "RSA(1024)"):"RSA";
break;
case SSL_kDHr:
kx="DH/RSA";
@@ -652,7 +652,7 @@
kx="Fortezza";
break;
case SSL_kEDH:
- kx=is_export?(pkl == 512 ? "DH(512)" : "DH(1024)"):"DH";
+ kx=is_export?(pkl == 512 ? "DH(512)" : "DH(1024)"):"DH";
break;
default:
kx="unknown";
@@ -681,17 +681,17 @@
switch (alg&SSL_ENC_MASK)
{
case SSL_DES:
- enc=(is_export && kl == 5)?"DES(40)":"DES(56)";
+ enc=(is_export && kl == 5)?"DES(40)":"DES(56)";
break;
case SSL_3DES:
enc="3DES(168)";
break;
case SSL_RC4:
- enc=is_export?(kl == 5 ? "RC4(40)" : "RC4(56)")
+ enc=is_export?(kl == 5 ? "RC4(40)" : "RC4(56)")
:((alg2&SSL2_CF_8_BYTE_ENC)?"RC4(64)":"RC4(128)");
break;
case SSL_RC2:
- enc=is_export?(kl == 5 ? "RC2(40)" : "RC2(56)"):"RC2(128)";
+ enc=is_export?(kl == 5 ? "RC2(40)" : "RC2(56)"):"RC2(128)";
break;
case SSL_IDEA:
enc="IDEA(128)";
Index: ssl/ssl_sess.c
===================================================================
RCS file: /src/packages/openssl/repository//openssl/ssl/ssl_sess.c,v
retrieving revision 1.4
diff -u -r1.4 ssl_sess.c
--- ssl/ssl_sess.c 1999/02/21 20:03:24 1.4
+++ ssl/ssl_sess.c 1999/03/08 16:20:39
@@ -241,7 +241,7 @@
if (ret->cipher == NULL)
{
- char buf[5],*p;
+ unsigned char buf[5],*p;
unsigned long l;
p=buf;
--
Richard Levitte \ Spannv�gen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken \ S-161 43 BROMMA \ T: +46-8-26 52 47
\ SWEDEN \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis -- [EMAIL PROTECTED]
Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]