提交 a0aa8b4b 编写于 作者: N Nils Larsch

fix signed vs. unsigned warning

上级 2c059d58
...@@ -224,7 +224,7 @@ static unsigned int psk_client_cb(SSL *ssl, const char *hint, char *identity, ...@@ -224,7 +224,7 @@ static unsigned int psk_client_cb(SSL *ssl, const char *hint, char *identity,
/* lookup PSK identity and PSK key based on the given identity hint here */ /* lookup PSK identity and PSK key based on the given identity hint here */
ret = snprintf(identity, max_identity_len, psk_identity); ret = snprintf(identity, max_identity_len, psk_identity);
if (ret < 0 || ret > max_identity_len) if (ret < 0 || (unsigned int)ret > max_identity_len)
goto out_err; goto out_err;
if (c_debug) if (c_debug)
BIO_printf(bio_c_out, "created identity '%s' len=%d\n", identity, ret); BIO_printf(bio_c_out, "created identity '%s' len=%d\n", identity, ret);
...@@ -237,7 +237,7 @@ static unsigned int psk_client_cb(SSL *ssl, const char *hint, char *identity, ...@@ -237,7 +237,7 @@ static unsigned int psk_client_cb(SSL *ssl, const char *hint, char *identity,
return 0; return 0;
} }
if (BN_num_bytes(bn) > max_psk_len) if ((unsigned int)BN_num_bytes(bn) > max_psk_len)
{ {
BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n", BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n",
max_psk_len, BN_num_bytes(bn)); max_psk_len, BN_num_bytes(bn));
......
...@@ -889,7 +889,7 @@ int MAIN(int argc, char *argv[]) ...@@ -889,7 +889,7 @@ int MAIN(int argc, char *argv[])
} }
else if (strcmp(*argv,"-psk") == 0) else if (strcmp(*argv,"-psk") == 0)
{ {
int i; size_t i;
if (--argc < 1) goto bad; if (--argc < 1) goto bad;
psk_key=*(++argv); psk_key=*(++argv);
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册