pajoye Sun Jul 30 09:18:07 2006 UTC
Modified files: (Branch: PHP_5_2)
/php-src/ext/openssl openssl.c
Log:
- silent compiler warnings (signess)
http://cvs.php.net/viewvc.cgi/php-src/ext/openssl/openssl.c?r1=1.98.2.5.2.4&r2=1.98.2.5.2.5&diff_format=u
Index: php-src/ext/openssl/openssl.c
diff -u php-src/ext/openssl/openssl.c:1.98.2.5.2.4
php-src/ext/openssl/openssl.c:1.98.2.5.2.5
--- php-src/ext/openssl/openssl.c:1.98.2.5.2.4 Sat Jul 29 23:03:55 2006
+++ php-src/ext/openssl/openssl.c Sun Jul 30 09:18:06 2006
@@ -18,7 +18,7 @@
+----------------------------------------------------------------------+
*/
-/* $Id: openssl.c,v 1.98.2.5.2.4 2006/07/29 23:03:55 pajoye Exp $ */
+/* $Id: openssl.c,v 1.98.2.5.2.5 2006/07/30 09:18:06 pajoye Exp $ */
#ifdef HAVE_CONFIG_H
#include "config.h"
@@ -268,7 +268,7 @@
obj_cnt++;
ne = X509_NAME_get_entry(name, j);
str = X509_NAME_ENTRY_get_data(ne);
- add_next_index_stringl(subentries, str->data,
str->length, 1);
+ add_next_index_stringl(subentries, (char
*)str->data, str->length, 1);
}
last = j;
}
@@ -280,7 +280,7 @@
zval_dtor(subentries);
FREE_ZVAL(subentries);
if (obj_cnt) {
- add_assoc_stringl(subitem, sname, str->data,
str->length, 1);
+ add_assoc_stringl(subitem, sname, (char
*)str->data, str->length, 1);
}
}
}
@@ -290,7 +290,7 @@
static void add_assoc_asn1_string(zval * val, char * key, ASN1_STRING * str)
/* {{{ */
{
- add_assoc_stringl(val, key, str->data, str->length, 1);
+ add_assoc_stringl(val, key, (char *)str->data, str->length, 1);
}
/* }}} */
@@ -314,7 +314,7 @@
return (time_t)-1;
}
- strbuf = estrdup(timestr->data);
+ strbuf = estrdup((char *)timestr->data);
memset(&thetime, 0, sizeof(thetime));
@@ -982,7 +982,7 @@
add_assoc_long(return_value, "validFrom_time_t",
asn1_time_to_time_t(X509_get_notBefore(cert) TSRMLS_CC));
add_assoc_long(return_value, "validTo_time_t",
asn1_time_to_time_t(X509_get_notAfter(cert) TSRMLS_CC));
- tmpstr = X509_alias_get0(cert, NULL);
+ tmpstr = (char *)X509_alias_get0(cert, NULL);
if (tmpstr) {
add_assoc_string(return_value, "alias", tmpstr, 1);
}
@@ -1298,8 +1298,8 @@
/* apply values from the dn hash */
zend_hash_internal_pointer_reset_ex(HASH_OF(dn), &hpos);
while(zend_hash_get_current_data_ex(HASH_OF(dn), (void**)&item,
&hpos) == SUCCESS) {
- char * strindex; int strindexlen;
- long intindex;
+ char * strindex; uint strindexlen;
+ ulong intindex;
zend_hash_get_current_key_ex(HASH_OF(dn), &strindex,
&strindexlen, &intindex, 0, &hpos);
@@ -1372,8 +1372,8 @@
if (attribs) {
zend_hash_internal_pointer_reset_ex(HASH_OF(attribs),
&hpos);
while(zend_hash_get_current_data_ex(HASH_OF(attribs),
(void**)&item, &hpos) == SUCCESS) {
- char * strindex; int strindexlen;
- long intindex;
+ char * strindex; uint strindexlen;
+ ulong intindex;
zend_hash_get_current_key_ex(HASH_OF(attribs),
&strindex, &strindexlen, &intindex, 0, &hpos);
convert_to_string_ex(item);
@@ -2065,7 +2065,7 @@
} else {
cipher = NULL;
}
- if (PEM_write_bio_PrivateKey(bio_out, key, cipher, passphrase,
passphrase_len, NULL, NULL)) {
+ if (PEM_write_bio_PrivateKey(bio_out, key, cipher, (unsigned
char *)passphrase, passphrase_len, NULL, NULL)) {
/* Success!
* If returning the output as a string, do so now */
RETVAL_TRUE;
@@ -2116,7 +2116,7 @@
} else {
cipher = NULL;
}
- if (PEM_write_bio_PrivateKey(bio_out, key, cipher, passphrase,
passphrase_len, NULL, NULL)) {
+ if (PEM_write_bio_PrivateKey(bio_out, key, cipher, (unsigned
char *)passphrase, passphrase_len, NULL, NULL)) {
/* Success!
* If returning the output as a string, do so now */
@@ -2676,7 +2676,7 @@
case EVP_PKEY_RSA:
case EVP_PKEY_RSA2:
successful = (RSA_private_encrypt(data_len,
- data,
+ (unsigned char *)data,
cryptedbuf,
pkey->pkey.rsa,
padding) == cryptedlen);
@@ -2688,7 +2688,7 @@
if (successful) {
zval_dtor(crypted);
cryptedbuf[cryptedlen] = '\0';
- ZVAL_STRINGL(crypted, cryptedbuf, cryptedlen, 0);
+ ZVAL_STRINGL(crypted, (char *)cryptedbuf, cryptedlen, 0);
cryptedbuf = NULL;
RETVAL_TRUE;
}
@@ -2734,7 +2734,7 @@
case EVP_PKEY_RSA:
case EVP_PKEY_RSA2:
cryptedlen = RSA_private_decrypt(data_len,
- data,
+ (unsigned char *)data,
crypttemp,
pkey->pkey.rsa,
padding);
@@ -2753,7 +2753,7 @@
if (successful) {
zval_dtor(crypted);
cryptedbuf[cryptedlen] = '\0';
- ZVAL_STRINGL(crypted, cryptedbuf, cryptedlen, 0);
+ ZVAL_STRINGL(crypted, (char *)cryptedbuf, cryptedlen, 0);
cryptedbuf = NULL;
RETVAL_TRUE;
}
@@ -2799,7 +2799,7 @@
case EVP_PKEY_RSA:
case EVP_PKEY_RSA2:
successful = (RSA_public_encrypt(data_len,
- data,
+ (unsigned char *)data,
cryptedbuf,
pkey->pkey.rsa,
padding) == cryptedlen);
@@ -2812,7 +2812,7 @@
if (successful) {
zval_dtor(crypted);
cryptedbuf[cryptedlen] = '\0';
- ZVAL_STRINGL(crypted, cryptedbuf, cryptedlen, 0);
+ ZVAL_STRINGL(crypted, (char *)cryptedbuf, cryptedlen, 0);
cryptedbuf = NULL;
RETVAL_TRUE;
}
@@ -2858,7 +2858,7 @@
case EVP_PKEY_RSA:
case EVP_PKEY_RSA2:
cryptedlen = RSA_public_decrypt(data_len,
- data,
+ (unsigned char *)data,
crypttemp,
pkey->pkey.rsa,
padding);
@@ -2879,7 +2879,7 @@
if (successful) {
zval_dtor(crypted);
cryptedbuf[cryptedlen] = '\0';
- ZVAL_STRINGL(crypted, cryptedbuf, cryptedlen, 0);
+ ZVAL_STRINGL(crypted, (char *)cryptedbuf, cryptedlen, 0);
cryptedbuf = NULL;
RETVAL_TRUE;
}
@@ -2948,10 +2948,10 @@
EVP_SignInit(&md_ctx, mdtype);
EVP_SignUpdate(&md_ctx, data, data_len);
- if (EVP_SignFinal (&md_ctx, sigbuf, &siglen, pkey)) {
+ if (EVP_SignFinal (&md_ctx, sigbuf,(unsigned int *)&siglen, pkey)) {
zval_dtor(signature);
sigbuf[siglen] = '\0';
- ZVAL_STRINGL(signature, sigbuf, siglen, 0);
+ ZVAL_STRINGL(signature, (char *)sigbuf, siglen, 0);
RETVAL_TRUE;
} else {
efree(sigbuf);
@@ -2995,7 +2995,7 @@
EVP_VerifyInit (&md_ctx, mdtype);
EVP_VerifyUpdate (&md_ctx, data, data_len);
- err = EVP_VerifyFinal (&md_ctx, signature, signature_len, pkey);
+ err = EVP_VerifyFinal (&md_ctx, (unsigned char *)signature,
signature_len, pkey);
if (keyresource == -1) {
EVP_PKEY_free(pkey);
@@ -3063,7 +3063,7 @@
/* allocate one byte extra to make room for \0 */
buf = emalloc(data_len + EVP_CIPHER_CTX_block_size(&ctx));
- if (!EVP_SealInit(&ctx, EVP_rc4(), eks, eksl, NULL, pkeys, nkeys) ||
!EVP_SealUpdate(&ctx, buf, &len1, data, data_len)) {
+ if (!EVP_SealInit(&ctx, EVP_rc4(), eks, eksl, NULL, pkeys, nkeys) ||
!EVP_SealUpdate(&ctx, buf, &len1, (unsigned char *)data, data_len)) {
RETVAL_FALSE;
efree(buf);
goto clean_exit;
@@ -3075,7 +3075,7 @@
zval_dtor(sealdata);
buf[len1 + len2] = '\0';
buf = erealloc(buf, len1 + len2 + 1);
- ZVAL_STRINGL(sealdata, buf, len1 + len2, 0);
+ ZVAL_STRINGL(sealdata, (char *)buf, len1 + len2, 0);
zval_dtor(ekeys);
array_init(ekeys);
@@ -3139,7 +3139,7 @@
}
buf = emalloc(data_len + 1);
- if (EVP_OpenInit(&ctx, EVP_rc4(), ekey, ekey_len, NULL, pkey) &&
EVP_OpenUpdate(&ctx, buf, &len1, data, data_len)) {
+ if (EVP_OpenInit(&ctx, EVP_rc4(), (unsigned char *)ekey, ekey_len,
NULL, pkey) && EVP_OpenUpdate(&ctx, buf, &len1, (unsigned char *)data,
data_len)) {
if (!EVP_OpenFinal(&ctx, buf + len1, &len2) || (len1 + len2 ==
0)) {
efree(buf);
if (keyresource == -1) {
--
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php