aboutsummaryrefslogtreecommitdiffstats
path: root/g10/seckey-cert.c
diff options
context:
space:
mode:
authorWerner Koch <[email protected]>2006-11-21 11:00:14 +0000
committerWerner Koch <[email protected]>2006-11-21 11:00:14 +0000
commite50c5f39cc2ea399eead30ef451d7d5e24c13fe6 (patch)
tree37f73eb8abf85a3a6505a5a7c30b1e4c8e8d85d5 /g10/seckey-cert.c
parentMade some PIN pads work. (diff)
downloadgnupg-e50c5f39cc2ea399eead30ef451d7d5e24c13fe6.tar.gz
gnupg-e50c5f39cc2ea399eead30ef451d7d5e24c13fe6.zip
No more warnings for AMD64 (at least when cross-compiling). Thus tehre is a
good chance that gpg2 will now work. Other cleanups. Updated gettext.
Diffstat (limited to 'g10/seckey-cert.c')
-rw-r--r--g10/seckey-cert.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/g10/seckey-cert.c b/g10/seckey-cert.c
index a059aa00f..4a22a4524 100644
--- a/g10/seckey-cert.c
+++ b/g10/seckey-cert.c
@@ -45,7 +45,7 @@ do_check( PKT_secret_key *sk, const char *tryagain_text, int mode,
byte *buffer;
u16 csum=0;
int i, res;
- unsigned int nbytes;
+ size_t nbytes;
if( sk->is_protected ) { /* remove the protection */
DEK *dek = NULL;
@@ -194,7 +194,7 @@ do_check( PKT_secret_key *sk, const char *tryagain_text, int mode,
for(i=pubkey_get_npkey(sk->pubkey_algo);
i < pubkey_get_nskey(sk->pubkey_algo); i++ ) {
byte *p;
- int ndata;
+ size_t ndata;
unsigned int ndatabits;
assert (gcry_mpi_get_flag (sk->skey[i], GCRYMPI_FLAG_OPAQUE));
@@ -337,7 +337,7 @@ protect_secret_key( PKT_secret_key *sk, DEK *dek )
{
int i,j, rc = 0;
byte *buffer;
- unsigned nbytes;
+ size_t nbytes;
u16 csum;
if( !dek )
@@ -370,8 +370,8 @@ protect_secret_key( PKT_secret_key *sk, DEK *dek )
gcry_cipher_setiv (cipher_hd, sk->protect.iv, sk->protect.ivlen);
if( sk->version >= 4 ) {
byte *bufarr[PUBKEY_MAX_NSKEY];
- unsigned narr[PUBKEY_MAX_NSKEY];
- unsigned nbits[PUBKEY_MAX_NSKEY];
+ size_t narr[PUBKEY_MAX_NSKEY];
+ unsigned int nbits[PUBKEY_MAX_NSKEY];
int ndata=0;
byte *p, *data;