Fix sign-compare warnings.
authorDr. Stephen Henson <steve@openssl.org>
Sun, 11 Jan 2009 15:58:51 +0000 (15:58 +0000)
committerDr. Stephen Henson <steve@openssl.org>
Sun, 11 Jan 2009 15:58:51 +0000 (15:58 +0000)
ssl/s2_pkt.c
ssl/t1_enc.c

index 9c1d1313c1fd4e919f13a475cd4db971f5bddaf1..1a54765fec2c354444251d40c63bb0c03f38e008 100644 (file)
@@ -130,7 +130,7 @@ static int ssl2_read_internal(SSL *s, void *buf, int len, int peek)
        unsigned char mac[MAX_MAC_SIZE];
        unsigned char *p;
        int i;
-       int mac_size;
+       unsigned int mac_size;
 
  ssl2_read_again:
        if (SSL_in_init(s) && !s->in_handshake)
index b482f6cf9c0dd0b2c74db3a03763c34859a82600..d9b93f585714553a0f50137596cb4dc7fc0a34cf 100644 (file)
@@ -805,7 +805,7 @@ int tls1_final_finish_mac(SSL *s,
                {
                if (mask & s->s3->tmp.new_cipher->algorithm2)
                        {
-                       int hashsize = EVP_MD_size(md);
+                       unsigned int hashsize = EVP_MD_size(md);
                        if (hashsize < 0 || hashsize > (sizeof buf - (size_t)(q-buf)))
                                {
                                /* internal error: 'buf' is too small for this cipersuite! */