Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/crypto/external/bsd/netpgp/dist/src/lib clean up some lint t...
details: https://anonhg.NetBSD.org/src/rev/0e2999dffd6f
branches: trunk
changeset: 752739:0e2999dffd6f
user: agc <agc%NetBSD.org@localhost>
date: Fri Mar 05 16:30:05 2010 +0000
description:
clean up some lint that crept in.
diffstat:
crypto/external/bsd/netpgp/dist/src/lib/keyring.c | 3 ++-
crypto/external/bsd/netpgp/dist/src/lib/netpgp.c | 4 ++--
2 files changed, 4 insertions(+), 3 deletions(-)
diffs (41 lines):
diff -r 4fada1177259 -r 0e2999dffd6f crypto/external/bsd/netpgp/dist/src/lib/keyring.c
--- a/crypto/external/bsd/netpgp/dist/src/lib/keyring.c Fri Mar 05 16:01:09 2010 +0000
+++ b/crypto/external/bsd/netpgp/dist/src/lib/keyring.c Fri Mar 05 16:30:05 2010 +0000
@@ -57,7 +57,7 @@
#if defined(__NetBSD__)
__COPYRIGHT("@(#) Copyright (c) 2009 The NetBSD Foundation, Inc. All rights reserved.");
-__RCSID("$NetBSD: keyring.c,v 1.28 2010/03/05 16:01:09 agc Exp $");
+__RCSID("$NetBSD: keyring.c,v 1.29 2010/03/05 16:30:05 agc Exp $");
#endif
#ifdef HAVE_FCNTL_H
@@ -975,6 +975,7 @@
__ops_memory_t *mem;
char *cp;
+ __OPS_USED(io);
__ops_setup_memory_write(&output, &mem, 128);
if (keydata->type == OPS_PTAG_CT_PUBLIC_KEY) {
__ops_write_xfer_pubkey(output, keydata, 1);
diff -r 4fada1177259 -r 0e2999dffd6f crypto/external/bsd/netpgp/dist/src/lib/netpgp.c
--- a/crypto/external/bsd/netpgp/dist/src/lib/netpgp.c Fri Mar 05 16:01:09 2010 +0000
+++ b/crypto/external/bsd/netpgp/dist/src/lib/netpgp.c Fri Mar 05 16:30:05 2010 +0000
@@ -34,7 +34,7 @@
#if defined(__NetBSD__)
__COPYRIGHT("@(#) Copyright (c) 2009 The NetBSD Foundation, Inc. All rights reserved.");
-__RCSID("$NetBSD: netpgp.c,v 1.41 2010/03/05 16:01:09 agc Exp $");
+__RCSID("$NetBSD: netpgp.c,v 1.42 2010/03/05 16:30:05 agc Exp $");
#endif
#include <sys/types.h>
@@ -725,7 +725,7 @@
io = netpgp->io;
/* generate a new key for 'id' */
uid.userid = (uint8_t *) id;
- keypair = __ops_rsa_new_selfsign_key(numbits, (uint32_t) 65537, &uid);
+ keypair = __ops_rsa_new_selfsign_key(numbits, 65537UL, &uid);
if (keypair == NULL) {
(void) fprintf(io->errs, "Cannot generate key\n");
return 0;
Home |
Main Index |
Thread Index |
Old Index