- Major type rewrite of int to size_t for most variables and arguments used for buffer lengths and loops
diff --git a/programs/pkey/dh_client.c b/programs/pkey/dh_client.c
index 8b9ced4..2001898 100644
--- a/programs/pkey/dh_client.c
+++ b/programs/pkey/dh_client.c
@@ -44,7 +44,8 @@
{
FILE *f;
- int ret, n, buflen;
+ int ret;
+ size_t n, buflen;
int server_fd = -1;
unsigned char *p, *end;
@@ -123,7 +124,7 @@
}
n = buflen = ( buf[0] << 8 ) | buf[1];
- if( buflen < 1 || buflen > (int) sizeof( buf ) )
+ if( buflen < 1 || buflen > sizeof( buf ) )
{
printf( " failed\n ! Got an invalid buffer length\n\n" );
goto exit;
@@ -134,7 +135,7 @@
*/
memset( buf, 0, sizeof( buf ) );
- if( ( ret = net_recv( &server_fd, buf, n ) ) != n )
+ if( ( ret = net_recv( &server_fd, buf, n ) ) != (int) n )
{
printf( " failed\n ! net_recv returned %d\n\n", ret );
goto exit;
@@ -162,7 +163,7 @@
printf( "\n . Verifying the server's RSA signature" );
fflush( stdout );
- if( ( n = (int)( end - p ) ) != rsa.len )
+ if( ( n = (size_t) ( end - p ) ) != rsa.len )
{
ret = 1;
printf( " failed\n ! Invalid RSA signature size\n\n" );
@@ -192,7 +193,7 @@
goto exit;
}
- if( ( ret = net_send( &server_fd, buf, n ) ) != n )
+ if( ( ret = net_send( &server_fd, buf, n ) ) != (int) n )
{
printf( " failed\n ! net_send returned %d\n\n", ret );
goto exit;