Fix gcc warnings.
authorUlf Möller <ulf@openssl.org>
Sun, 20 Feb 2000 20:59:21 +0000 (20:59 +0000)
committerUlf Möller <ulf@openssl.org>
Sun, 20 Feb 2000 20:59:21 +0000 (20:59 +0000)
apps/passwd.c
apps/s_client.c
crypto/bio/bss_log.c
doc/crypto/EVP_DigestInit.pod
util/libeay.num

index 6b8aafa1571128ca643af4138368d923f22efd3b..d3893d7f83b3d06efa0a3390f3f5d3414bbc66b2 100644 (file)
@@ -20,7 +20,7 @@
 # include <openssl/des.h>
 #endif
 #ifndef NO_APR1
-# include <openssl/des.h>
+# include <openssl/md5.h>
 #endif
 
 
@@ -323,13 +323,13 @@ static char *apr1_crypt(const char *passwd, const char *salt)
                MD5_CTX md2;
 
                MD5_Init(&md2);
-               MD5_Update(&md2, (i & 1) ?     passwd : buf,
+               MD5_Update(&md2, (i & 1) ? (unsigned char *) passwd : buf,
                                 (i & 1) ? passwd_len : sizeof buf);
                if (i % 3)
                        MD5_Update(&md2, salt_out, salt_len);
                if (i % 7)
                        MD5_Update(&md2, passwd, passwd_len);
-               MD5_Update(&md2, (i & 1) ?        buf : passwd,
+               MD5_Update(&md2, (i & 1) ? buf : (unsigned char *) passwd,
                                 (i & 1) ? sizeof buf : passwd_len);
                MD5_Final(buf, &md2);
                }
index ac19f4eed9b6f401cdb8133620d11a8085fbeeb1..c4c3b0e94a59b6b6746bd2f061d0b719f35f2218 100644 (file)
@@ -508,6 +508,7 @@ re_start:
                         * are any keypresses. Note: this is a hack, in a proper
                         * Windows application we wouldn't do this.
                         */
+                       i=0;
                        if(!write_tty) {
                                if(read_tty) {
                                        tv.tv_sec = 1;
index 497c8aee615b5a5efa9f52d7cb1cf0506414b5df..b52fbe1d4c61c9d4352bba092ae63abde9e8a24a 100644 (file)
@@ -133,11 +133,10 @@ static int MS_CALLBACK slg_write(BIO *b, char *in, int inl)
        char* buf= in;
        char* pp;
 #if defined(WIN32)
-       LPTSTR lpszStrings[2];
+       LPCSTR lpszStrings[2];
        WORD evtype= EVENTLOG_ERROR_TYPE;
        int pid = _getpid();
        char pidbuf[20];
-       int pidbufl;
 #else
        int priority;
 #endif
index b21e1013b30c19f50b94bc65acf6ec9c758a76f4..dd6dcb1b6171b3592d51a938af5d74ea0fb48a7c 100644 (file)
@@ -115,7 +115,7 @@ EVP_md_null(), EVP_MD *EVP_md2(), EVP_MD *EVP_md5(), EVP_MD *EVP_sha(),
 EVP_sha1(), EVP_dss(), EVP_dss1(), EVP_mdc2() and EVP_ripemd160() return
 pointers to the corresponding EVP_MD structures.
 
-B<EVP_get_digestbyname>, B<EVP_get_digestbynid> and B<EVP_get_digestbyobj>
+EVP_get_digestbyname(), EVP_get_digestbynid() and EVP_get_digestbyobj()
 return either an B<EVP_MD> structure or NULL if an error occurs.
 
 =head1 NOTES
index e3a0f692c8868fbf246ef8b040860b5b73bb465e..812f439dd88714b3123b858430cf2988b2fe2bb0 100755 (executable)
@@ -1304,13 +1304,12 @@ i2d_SXNETID                             1329
 d2i_SXNETID                             1330
 SXNETID_new                             1331
 SXNETID_free                            1332
-DSA_SIG_new                                                            1333
-DSA_SIG_free                                                   1334
-DSA_do_sign                                                            1335
-DSA_do_verify                                                  1336
-d2i_DSA_SIG                                                            1337
-i2d_DSA_SIG                                                            1338
-
+DSA_SIG_new                             1333
+DSA_SIG_free                            1334
+DSA_do_sign                             1335
+DSA_do_verify                           1336
+d2i_DSA_SIG                             1337
+i2d_DSA_SIG                             1338
 i2d_ASN1_VISIBLESTRING                  1339
 d2i_ASN1_VISIBLESTRING                  1340
 i2d_ASN1_UTF8STRING                     1341