aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/pkcs7
diff options
context:
space:
mode:
authorDr. Stephen Henson <steve@openssl.org>1999-03-14 13:31:42 +0000
committerDr. Stephen Henson <steve@openssl.org>1999-03-14 13:31:42 +0000
commit0b415fb0ed560eb52f77f9239cc1e9393ed65173 (patch)
tree58422e4046a052aacf5a0bc0826bd65d20087348 /crypto/pkcs7
parent199d59e5a1683aec183bf4eacbc096663357c46b (diff)
downloadopenssl-0b415fb0ed560eb52f77f9239cc1e9393ed65173.tar.gz
Using int for the digest length in EVP_DigestFinal() broke some compilers.
Changed to unsigned int: also need an evil cast in pk7_doit.c because a signed, unsigned comparison chokes VC++.
Diffstat (limited to 'crypto/pkcs7')
-rw-r--r--crypto/pkcs7/pk7_doit.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/crypto/pkcs7/pk7_doit.c b/crypto/pkcs7/pk7_doit.c
index 2e27f7d3da..88229c08ba 100644
--- a/crypto/pkcs7/pk7_doit.c
+++ b/crypto/pkcs7/pk7_doit.c
@@ -721,7 +721,7 @@ PKCS7_SIGNER_INFO *si;
if ((sk != NULL) && (sk_num(sk) != 0))
{
unsigned char md_dat[EVP_MAX_MD_SIZE];
- int md_len;
+ unsigned int md_len;
ASN1_OCTET_STRING *message_digest;
EVP_DigestFinal(&mdc_tmp,md_dat,&md_len);
@@ -731,7 +731,7 @@ PKCS7_SIGNER_INFO *si;
PKCS7err(PKCS7_F_PKCS7_DATAVERIFY,PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST);
goto err;
}
- if ((message_digest->length != md_len) ||
+ if ((message_digest->length != (int)md_len) ||
(memcmp(message_digest->data,md_dat,md_len)))
{
#if 0