|
From: Ian R. <iro...@us...> - 2006-04-09 22:46:45
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv13910 Modified Files: RSA.xs Log Message: warning free Index: RSA.xs =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/RSA.xs,v retrieving revision 1.57 retrieving revision 1.58 diff -C2 -d -r1.57 -r1.58 *** RSA.xs 9 Apr 2006 22:24:36 -0000 1.57 --- RSA.xs 9 Apr 2006 22:46:39 -0000 1.58 *************** *** 85,94 **** } ! char* get_message_digest(SV* text_SV, int hash_method) { ! int text_length; unsigned char* text; ! text = SvPV(text_SV, text_length); switch(hash_method) --- 85,94 ---- } ! unsigned char* get_message_digest(SV* text_SV, int hash_method) { ! STRLEN text_length; unsigned char* text; ! text = (unsigned char*) SvPV(text_SV, text_length); switch(hash_method) *************** *** 133,137 **** RSA*(*p_loader)(BIO*, RSA**, pem_password_cb*, void*)) { ! int keyStringLength; char* keyString; --- 133,137 ---- RSA*(*p_loader)(BIO*, RSA**, pem_password_cb*, void*)) { ! STRLEN keyStringLength; char* keyString; *************** *** 153,169 **** SV* rsa_crypt(rsaData* p_rsa, SV* p_from, ! int (*p_crypt)(int, unsigned char*, unsigned char*, RSA*, int)) { ! int from_length, to_length; int size; unsigned char* from; ! unsigned char* to; SV* sv; ! from = SvPV(p_from, from_length); size = RSA_size(p_rsa->rsa); CHECK_NEW(to, size, char); ! to_length = p_crypt(from_length, from, to, p_rsa->rsa, p_rsa->padding); if (to_length < 0) --- 153,170 ---- SV* rsa_crypt(rsaData* p_rsa, SV* p_from, ! int (*p_crypt)(int, const unsigned char*, unsigned char*, RSA*, int)) { ! STRLEN from_length, to_length; int size; unsigned char* from; ! char* to; SV* sv; ! from = (unsigned char*) SvPV(p_from, from_length); size = RSA_size(p_rsa->rsa); CHECK_NEW(to, size, char); ! to_length = p_crypt( ! from_length, from, (unsigned char*) to, p_rsa->rsa, p_rsa->padding); if (to_length < 0) *************** *** 286,291 **** RSA* rsa; BN_CTX* ctx; ! BIGNUM* p_minus_1; ! BIGNUM* q_minus_1; int error; CODE: --- 287,292 ---- RSA* rsa; BN_CTX* ctx; ! BIGNUM* p_minus_1 = NULL; ! BIGNUM* q_minus_1 = NULL; int error; CODE: *************** *** 427,431 **** SV* random_bytes_SV; PREINIT: ! int random_bytes_length; char* random_bytes; CODE: --- 428,432 ---- SV* random_bytes_SV; PREINIT: ! STRLEN random_bytes_length; char* random_bytes; CODE: *************** *** 494,500 **** SV* text_SV; PREINIT: ! unsigned char* signature; ! char* digest; ! int signature_length; CODE: { --- 495,501 ---- SV* text_SV; PREINIT: ! char* signature; ! unsigned char* digest; ! unsigned int signature_length; CODE: { *************** *** 510,514 **** digest, get_digest_length(p_rsa->hashMode), ! signature, &signature_length, p_rsa->rsa)); --- 511,515 ---- digest, get_digest_length(p_rsa->hashMode), ! (unsigned char*) signature, &signature_length, p_rsa->rsa)); *************** *** 529,536 **** { unsigned char* sig; ! char* digest; ! int sig_length; ! sig = SvPV(sig_SV, sig_length); if (RSA_size(p_rsa->rsa) < sig_length) { --- 530,537 ---- { unsigned char* sig; ! unsigned char* digest; ! STRLEN sig_length; ! sig = (unsigned char*) SvPV(sig_SV, sig_length); if (RSA_size(p_rsa->rsa) < sig_length) { |