diff options
author | Geoff Thorpe <geoff@openssl.org> | 2003-10-29 21:24:15 +0100 |
---|---|---|
committer | Geoff Thorpe <geoff@openssl.org> | 2003-10-29 21:24:15 +0100 |
commit | 27545970134d703ed96027aac9b67eced124eec3 (patch) | |
tree | 2f878acf303cc26e3b6db6a0ec25c10c91e3d32d /crypto/rand/md_rand.c | |
parent | BN_CTX is opaque and the static initialiser BN_CTX_init() is not used (diff) | |
download | openssl-27545970134d703ed96027aac9b67eced124eec3.tar.xz openssl-27545970134d703ed96027aac9b67eced124eec3.zip |
A general spring-cleaning (in autumn) to fix up signed/unsigned warnings.
I have tried to convert 'len' type variable declarations to unsigned as a
means to address these warnings when appropriate, but when in doubt I have
used casts in the comparisons instead. The better solution (that would get
us all lynched by API users) would be to go through and convert all the
function prototypes and structure definitions to use unsigned variables
except when signed is necessary. The proliferation of (signed) "int" for
strictly non-negative uses is unfortunate.
Diffstat (limited to 'crypto/rand/md_rand.c')
-rw-r--r-- | crypto/rand/md_rand.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/rand/md_rand.c b/crypto/rand/md_rand.c index eeffc0df4c..66b229c9b9 100644 --- a/crypto/rand/md_rand.c +++ b/crypto/rand/md_rand.c @@ -300,7 +300,7 @@ static void ssleay_rand_add(const void *buf, int num, double add) * other thread's seeding remains without effect (except for * the incremented counter). By XORing it we keep at least as * much entropy as fits into md. */ - for (k = 0; k < sizeof md; k++) + for (k = 0; k < (int)sizeof(md); k++) { md[k] ^= local_md[k]; } |