Module Name:    src
Committed By:   agc
Date:           Sun Aug 15 16:10:56 UTC 2010

Modified Files:
        src/crypto/external/bsd/netpgp/dist/src/lib: bufgap.c compress.c
            keyring.c netpgp.c packet-parse.c signature.c validate.c writer.c

Log Message:
fix some more amd64 lint


To generate a diff of this commit:
cvs rdiff -u -r1.3 -r1.4 src/crypto/external/bsd/netpgp/dist/src/lib/bufgap.c
cvs rdiff -u -r1.16 -r1.17 \
    src/crypto/external/bsd/netpgp/dist/src/lib/compress.c
cvs rdiff -u -r1.42 -r1.43 \
    src/crypto/external/bsd/netpgp/dist/src/lib/keyring.c
cvs rdiff -u -r1.68 -r1.69 \
    src/crypto/external/bsd/netpgp/dist/src/lib/netpgp.c
cvs rdiff -u -r1.39 -r1.40 \
    src/crypto/external/bsd/netpgp/dist/src/lib/packet-parse.c
cvs rdiff -u -r1.30 -r1.31 \
    src/crypto/external/bsd/netpgp/dist/src/lib/signature.c
cvs rdiff -u -r1.37 -r1.38 \
    src/crypto/external/bsd/netpgp/dist/src/lib/validate.c
cvs rdiff -u -r1.26 -r1.27 \
    src/crypto/external/bsd/netpgp/dist/src/lib/writer.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/crypto/external/bsd/netpgp/dist/src/lib/bufgap.c
diff -u src/crypto/external/bsd/netpgp/dist/src/lib/bufgap.c:1.3 src/crypto/external/bsd/netpgp/dist/src/lib/bufgap.c:1.4
--- src/crypto/external/bsd/netpgp/dist/src/lib/bufgap.c:1.3	Mon Dec 14 23:29:56 2009
+++ src/crypto/external/bsd/netpgp/dist/src/lib/bufgap.c	Sun Aug 15 16:10:56 2010
@@ -1,4 +1,4 @@
-/* $NetBSD: bufgap.c,v 1.3 2009/12/14 23:29:56 agc Exp $ */
+/* $NetBSD: bufgap.c,v 1.4 2010/08/15 16:10:56 agc Exp $ */
 
 /*-
  * Copyright (c) 1996-2009 The NetBSD Foundation, Inc.
@@ -117,7 +117,7 @@
 	char	*cp;
 
 	if (n < 0) {
-		n = strlen(s);
+		n = (int)strlen(s);
 	}
 	NEWARRAY(char, cp, n + 1, "strnsave", return NULL);
 	(void) memcpy(cp, s, (size_t)n);
@@ -413,7 +413,7 @@
 	int	i;
 
 	if (n < 0) {
-		n = strlen(s);
+		n = (int)strlen(s);
 	}
 	for (i = 0 ; i < n ; i += rlen) {
 		if (bp->bbc + bp->abc == bp->size) {

Index: src/crypto/external/bsd/netpgp/dist/src/lib/compress.c
diff -u src/crypto/external/bsd/netpgp/dist/src/lib/compress.c:1.16 src/crypto/external/bsd/netpgp/dist/src/lib/compress.c:1.17
--- src/crypto/external/bsd/netpgp/dist/src/lib/compress.c:1.16	Sun Aug 15 07:52:26 2010
+++ src/crypto/external/bsd/netpgp/dist/src/lib/compress.c	Sun Aug 15 16:10:56 2010
@@ -57,7 +57,7 @@
 
 #if defined(__NetBSD__)
 __COPYRIGHT("@(#) Copyright (c) 2009 The NetBSD Foundation, Inc. All rights reserved.");
-__RCSID("$NetBSD: compress.c,v 1.16 2010/08/15 07:52:26 agc Exp $");
+__RCSID("$NetBSD: compress.c,v 1.17 2010/08/15 16:10:56 agc Exp $");
 #endif
 
 #ifdef HAVE_ZLIB_H
@@ -346,10 +346,12 @@
 
 	switch (type) {
 	case OPS_C_ZIP:
+		/* LINTED */ /* this is a lint problem in zlib.h header */
 		ret = (int)inflateInit2(&z.zstream, -15);
 		break;
 
 	case OPS_C_ZLIB:
+		/* LINTED */ /* this is a lint problem in zlib.h header */
 		ret = (int)inflateInit(&z.zstream);
 		break;
 
@@ -434,6 +436,7 @@
 
 	/* all other fields set to zero by use of calloc */
 
+	/* LINTED */ /* this is a lint problem in zlib.h header */
 	if ((int)deflateInit(&zip->stream, level) != Z_OK) {
 		(void) fprintf(stderr, "__ops_writez: can't initialise\n");
 		return 0;

Index: src/crypto/external/bsd/netpgp/dist/src/lib/keyring.c
diff -u src/crypto/external/bsd/netpgp/dist/src/lib/keyring.c:1.42 src/crypto/external/bsd/netpgp/dist/src/lib/keyring.c:1.43
--- src/crypto/external/bsd/netpgp/dist/src/lib/keyring.c:1.42	Sun Aug 15 07:52:26 2010
+++ src/crypto/external/bsd/netpgp/dist/src/lib/keyring.c	Sun Aug 15 16:10:56 2010
@@ -57,7 +57,7 @@
 
 #if defined(__NetBSD__)
 __COPYRIGHT("@(#) Copyright (c) 2009 The NetBSD Foundation, Inc. All rights reserved.");
-__RCSID("$NetBSD: keyring.c,v 1.42 2010/08/15 07:52:26 agc Exp $");
+__RCSID("$NetBSD: keyring.c,v 1.43 2010/08/15 16:10:56 agc Exp $");
 #endif
 
 #ifdef HAVE_FCNTL_H
@@ -858,22 +858,22 @@
 	size_t			 j;
 	int			 i;
 
-	for (i = j = 0 ; j < len && userid[i] && userid[i + 1] ; i += 2, j++) {
+	for (i = 0, j = 0 ; j < len && userid[i] && userid[i + 1] ; i += 2, j++) {
 		if ((hi = strchr(uppers, userid[i])) == NULL) {
 			if ((hi = strchr(lowers, userid[i])) == NULL) {
 				break;
 			}
-			hichar = (hi - lowers);
+			hichar = (uint8_t)(hi - lowers);
 		} else {
-			hichar = (hi - uppers);
+			hichar = (uint8_t)(hi - uppers);
 		}
 		if ((lo = strchr(uppers, userid[i + 1])) == NULL) {
 			if ((lo = strchr(lowers, userid[i + 1])) == NULL) {
 				break;
 			}
-			lochar = (lo - lowers);
+			lochar = (uint8_t)(lo - lowers);
 		} else {
-			lochar = (lo - uppers);
+			lochar = (uint8_t)(lo - uppers);
 		}
 		keyid[j] = (hichar << 4) | (lochar);
 	}

Index: src/crypto/external/bsd/netpgp/dist/src/lib/netpgp.c
diff -u src/crypto/external/bsd/netpgp/dist/src/lib/netpgp.c:1.68 src/crypto/external/bsd/netpgp/dist/src/lib/netpgp.c:1.69
--- src/crypto/external/bsd/netpgp/dist/src/lib/netpgp.c:1.68	Sun Aug 15 07:52:27 2010
+++ src/crypto/external/bsd/netpgp/dist/src/lib/netpgp.c	Sun Aug 15 16:10:56 2010
@@ -34,7 +34,7 @@
 
 #if defined(__NetBSD__)
 __COPYRIGHT("@(#) Copyright (c) 2009 The NetBSD Foundation, Inc. All rights reserved.");
-__RCSID("$NetBSD: netpgp.c,v 1.68 2010/08/15 07:52:27 agc Exp $");
+__RCSID("$NetBSD: netpgp.c,v 1.69 2010/08/15 16:10:56 agc Exp $");
 #endif
 
 #include <sys/types.h>
@@ -367,7 +367,7 @@
 	if (s == NULL) {
 		return 0;
 	}
-	now = strtoull(s, NULL, 10);
+	now = (uint64_t)strtoull(s, NULL, 10);
 	if ((mult = strchr("hdwmy", s[strlen(s) - 1])) != NULL) {
 		switch(*mult) {
 		case 'h':
@@ -459,7 +459,7 @@
 			(void) fprintf(io->errs, "isarmoured: can't open '%s'\n", f);
 			return 0;
 		}
-		if (fgets(buf, sizeof(buf), fp) != NULL) {
+		if (fgets(buf, (int)sizeof(buf), fp) != NULL) {
 			armoured = (strncmp(buf, text, strlen(text)) == 0);
 		}
 		(void) fclose(fp);

Index: src/crypto/external/bsd/netpgp/dist/src/lib/packet-parse.c
diff -u src/crypto/external/bsd/netpgp/dist/src/lib/packet-parse.c:1.39 src/crypto/external/bsd/netpgp/dist/src/lib/packet-parse.c:1.40
--- src/crypto/external/bsd/netpgp/dist/src/lib/packet-parse.c:1.39	Fri Aug 13 18:29:40 2010
+++ src/crypto/external/bsd/netpgp/dist/src/lib/packet-parse.c	Sun Aug 15 16:10:56 2010
@@ -58,7 +58,7 @@
 
 #if defined(__NetBSD__)
 __COPYRIGHT("@(#) Copyright (c) 2009 The NetBSD Foundation, Inc. All rights reserved.");
-__RCSID("$NetBSD: packet-parse.c,v 1.39 2010/08/13 18:29:40 agc Exp $");
+__RCSID("$NetBSD: packet-parse.c,v 1.40 2010/08/15 16:10:56 agc Exp $");
 #endif
 
 #ifdef HAVE_OPENSSL_CAST_H
@@ -254,7 +254,7 @@
 		if (readinfo->alength + n > readinfo->asize) {
 			uint8_t	*temp;
 
-			readinfo->asize = (readinfo->asize * 2) + n;
+			readinfo->asize = (readinfo->asize * 2) + (unsigned)n;
 			temp = realloc(readinfo->accumulated, readinfo->asize);
 			if (temp == NULL) {
 				(void) fprintf(stderr,
@@ -271,11 +271,11 @@
 				n);
 	}
 	/* we track length anyway, because it is used for packet offsets */
-	readinfo->alength += n;
+	readinfo->alength += (unsigned)n;
 	/* and also the position */
-	readinfo->position += n;
+	readinfo->position += (unsigned)n;
 
-	return n;
+	return (int)n;
 }
 
 int 
@@ -415,9 +415,9 @@
 		OPS_ERROR(errors, OPS_E_R_READ_FAILED, "Read failed");
 		return 0;
 	}
-	region->last_read = r;
+	region->last_read = (unsigned)r;
 	do {
-		region->readc += r;
+		region->readc += (unsigned)r;
 		if (region->parent && region->length > region->parent->length) {
 			(void) fprintf(stderr,
 				"ops_limited_read: bad length\n");
@@ -1528,7 +1528,7 @@
 			(void) fprintf(stderr, "parse_one_sig_subpacket: bad alloc\n");
 			return 0;
 		}
-		if (!limread(pkt.u.ss_raw.raw, pkt.u.ss_raw.length,
+		if (!limread(pkt.u.ss_raw.raw, (unsigned)pkt.u.ss_raw.length,
 				&subregion, stream)) {
 			return 0;
 		}
@@ -1643,12 +1643,12 @@
 			return 0;
 		}
 		if (!limread_data(&pkt.u.ss_notation.name,
-				pkt.u.ss_notation.name.len,
+				(unsigned)pkt.u.ss_notation.name.len,
 				&subregion, stream)) {
 			return 0;
 		}
 		if (!limread_data(&pkt.u.ss_notation.value,
-			   pkt.u.ss_notation.value.len,
+			   (unsigned)pkt.u.ss_notation.value.len,
 			   &subregion, stream)) {
 			return 0;
 		}
@@ -2125,7 +2125,8 @@
 	pkt.u.one_pass_sig.key_alg = (__ops_pubkey_alg_t)c;
 
 	if (!limread(pkt.u.one_pass_sig.keyid,
-			  sizeof(pkt.u.one_pass_sig.keyid), region, stream)) {
+			  (unsigned)sizeof(pkt.u.one_pass_sig.keyid),
+			  region, stream)) {
 		return 0;
 	}
 
@@ -2163,7 +2164,7 @@
 	size_t          n;
 
 	for (n = 0; n < stream->hashc; ++n) {
-		stream->hashes[n].hash.add(&stream->hashes[n].hash, data, length);
+		stream->hashes[n].hash.add(&stream->hashes[n].hash, data, (unsigned)length);
 	}
 }
 
@@ -2365,8 +2366,8 @@
 	if (crypted) {
 		__ops_packet_t	seckey;
 		__ops_hash_t	hashes[(OPS_MAX_KEY_SIZE + OPS_MIN_HASH_SIZE - 1) / OPS_MIN_HASH_SIZE];
+		unsigned	passlen;
 		uint8_t   	key[OPS_MAX_KEY_SIZE + OPS_MAX_HASH_SIZE];
-		size_t          passlen;
 		char           *passphrase;
 		int             hashsize;
 		int             keysize;
@@ -2447,7 +2448,7 @@
 				/* FALLTHROUGH */
 			case OPS_S2KS_SIMPLE:
 				hashes[n].add(&hashes[n],
-					(uint8_t *) passphrase, passlen);
+					(uint8_t *)passphrase, (unsigned)passlen);
 				break;
 
 			case OPS_S2KS_ITERATED_AND_SALTED:
@@ -2668,7 +2669,7 @@
 		return 0;
 	}
 	if (!limread(pkt.u.pk_sesskey.key_id,
-			  sizeof(pkt.u.pk_sesskey.key_id), region, stream)) {
+			  (unsigned)sizeof(pkt.u.pk_sesskey.key_id), region, stream)) {
 		return 0;
 	}
 	if (__ops_get_debug_level(__FILE__)) {
@@ -2718,8 +2719,8 @@
 			&pkt);
 		return 1;
 	}
-	n = __ops_decrypt_decode_mpi(unencoded_m_buf, sizeof(unencoded_m_buf),
-			enc_m, secret);
+	n = __ops_decrypt_decode_mpi(unencoded_m_buf,
+			(unsigned)sizeof(unencoded_m_buf), enc_m, secret);
 	if (n < 1) {
 		ERRP(&stream->cbinfo, pkt, "decrypted message too short");
 		return 0;
@@ -2797,11 +2798,9 @@
 
 	decrypt = __ops_get_decrypt(stream);
 	if (decrypt) {
-		uint8_t   buf[OPS_MAX_BLOCK_SIZE + 2] = "";
-		size_t          b = decrypt->blocksize;
-		/* __ops_packet_t pkt; */
-		__ops_region_t    encregion;
-
+		__ops_region_t	encregion;
+		unsigned	b = decrypt->blocksize;
+		uint8_t		buf[OPS_MAX_BLOCK_SIZE + 2] = "";
 
 		__ops_reader_push_decrypt(stream, decrypt, region);
 
@@ -3057,7 +3056,7 @@
 
 	case OPS_PTAG_CT_PUBLIC_KEY:
 	case OPS_PTAG_CT_PUBLIC_SUBKEY:
-		ret = parse_pubkey(pkt.u.ptag.type, &region, stream);
+		ret = parse_pubkey((__ops_content_enum)pkt.u.ptag.type, &region, stream);
 		break;
 
 	case OPS_PTAG_CT_TRUST:

Index: src/crypto/external/bsd/netpgp/dist/src/lib/signature.c
diff -u src/crypto/external/bsd/netpgp/dist/src/lib/signature.c:1.30 src/crypto/external/bsd/netpgp/dist/src/lib/signature.c:1.31
--- src/crypto/external/bsd/netpgp/dist/src/lib/signature.c:1.30	Sun Aug 15 07:52:27 2010
+++ src/crypto/external/bsd/netpgp/dist/src/lib/signature.c	Sun Aug 15 16:10:56 2010
@@ -57,7 +57,7 @@
 
 #if defined(__NetBSD__)
 __COPYRIGHT("@(#) Copyright (c) 2009 The NetBSD Foundation, Inc. All rights reserved.");
-__RCSID("$NetBSD: signature.c,v 1.30 2010/08/15 07:52:27 agc Exp $");
+__RCSID("$NetBSD: signature.c,v 1.31 2010/08/15 16:10:56 agc Exp $");
 #endif
 
 #include <sys/types.h>
@@ -834,13 +834,13 @@
 unsigned 
 __ops_add_time(__ops_create_sig_t *sig, int64_t when, const char *type)
 {
-	unsigned	tag;
+	__ops_content_enum	tag;
 
 	tag = (strcmp(type, "birth") == 0) ?
 		OPS_PTAG_SS_CREATION_TIME : OPS_PTAG_SS_EXPIRATION_TIME;
 	/* just do 32-bit timestamps for just now - it's in the protocol */
 	return __ops_write_ss_header(sig->output, 5, tag) &&
-		__ops_write_scalar(sig->output, (int32_t)when, sizeof(int32_t));
+		__ops_write_scalar(sig->output, (uint32_t)when, sizeof(uint32_t));
 }
 
 /**
@@ -1144,7 +1144,7 @@
 		/* - creation time */
 		/* - key id */
 		ret = __ops_writer_push_clearsigned(output, sig) &&
-			__ops_write(output, input, insize) &&
+			__ops_write(output, input, (unsigned)insize) &&
 			__ops_writer_use_armored_sig(output) &&
 			__ops_add_time(sig, from, "birth") &&
 			__ops_add_time(sig, (int64_t)duration, "expiration");
@@ -1165,7 +1165,7 @@
 
 		/* hash memory */
 		hash = __ops_sig_get_hash(sig);
-		hash->add(hash, input, insize);
+		hash->add(hash, input, (unsigned)insize);
 
 		/* output file contents as Literal Data packet */
 		if (__ops_get_debug_level(__FILE__)) {

Index: src/crypto/external/bsd/netpgp/dist/src/lib/validate.c
diff -u src/crypto/external/bsd/netpgp/dist/src/lib/validate.c:1.37 src/crypto/external/bsd/netpgp/dist/src/lib/validate.c:1.38
--- src/crypto/external/bsd/netpgp/dist/src/lib/validate.c:1.37	Sun Aug 15 07:52:27 2010
+++ src/crypto/external/bsd/netpgp/dist/src/lib/validate.c	Sun Aug 15 16:10:56 2010
@@ -54,7 +54,7 @@
 
 #if defined(__NetBSD__)
 __COPYRIGHT("@(#) Copyright (c) 2009 The NetBSD Foundation, Inc. All rights reserved.");
-__RCSID("$NetBSD: validate.c,v 1.37 2010/08/15 07:52:27 agc Exp $");
+__RCSID("$NetBSD: validate.c,v 1.38 2010/08/15 16:10:56 agc Exp $");
 #endif
 
 #include <sys/types.h>
@@ -519,7 +519,7 @@
 					sizeof(content->sig));
 			}
 			valid = check_binary_sig(__ops_mem_data(data->mem),
-					__ops_mem_len(data->mem),
+					(const unsigned)__ops_mem_len(data->mem),
 					&content->sig,
 					__ops_get_pubkey(signer));
 			break;
@@ -881,10 +881,10 @@
 			char		*cp;
 			int		 i;
 
-			len = __ops_mem_len(validation.mem);
+			len = (unsigned)__ops_mem_len(validation.mem);
 			cp = __ops_mem_data(validation.mem);
 			for (i = 0 ; i < (int)len ; i += cc) {
-				cc = write(outfd, &cp[i], len - i);
+				cc = write(outfd, &cp[i], (unsigned)(len - i));
 				if (cc < 0) {
 					(void) fprintf(io->errs,
 						"netpgp: short write\n");

Index: src/crypto/external/bsd/netpgp/dist/src/lib/writer.c
diff -u src/crypto/external/bsd/netpgp/dist/src/lib/writer.c:1.26 src/crypto/external/bsd/netpgp/dist/src/lib/writer.c:1.27
--- src/crypto/external/bsd/netpgp/dist/src/lib/writer.c:1.26	Sun Aug 15 07:52:27 2010
+++ src/crypto/external/bsd/netpgp/dist/src/lib/writer.c	Sun Aug 15 16:10:56 2010
@@ -58,7 +58,7 @@
 
 #if defined(__NetBSD__)
 __COPYRIGHT("@(#) Copyright (c) 2009 The NetBSD Foundation, Inc. All rights reserved.");
-__RCSID("$NetBSD: writer.c,v 1.26 2010/08/15 07:52:27 agc Exp $");
+__RCSID("$NetBSD: writer.c,v 1.27 2010/08/15 16:10:56 agc Exp $");
 #endif
 
 #include <sys/types.h>
@@ -464,7 +464,7 @@
 		if (src[n] == ' ' || src[n] == '\t') {
 			__ops_memory_add(dash->trailing, &src[n], 1);
 		} else {
-			if ((l = __ops_mem_len(dash->trailing)) != 0) {
+			if ((l = (unsigned)__ops_mem_len(dash->trailing)) != 0) {
 				if (!dash->seen_nl && !dash->seen_cr) {
 					__ops_sig_add_data(dash->sig,
 					__ops_mem_data(dash->trailing), l);
@@ -1532,8 +1532,8 @@
 	/* \todo add date */
 	/* \todo do we need to check text data for <cr><lf> line endings ? */
 
-	size_t          sz_towrite;
-	size_t          sz_pd;
+	unsigned	sz_towrite;
+	size_t		sz_pd;
 
 	sz_towrite = 1 + 1 + 4 + len;
 	sz_pd = (size_t)__ops_partial_data_len(sz_towrite);
@@ -1608,7 +1608,7 @@
 			"stream_write_se_ip_first: bad alloc\n");
 		return 0;
 	}
-	sz_pd = (size_t)__ops_partial_data_len(sz_towrite);
+	sz_pd = (size_t)__ops_partial_data_len((unsigned)sz_towrite);
 	if (sz_pd < 512) {
 		free(preamble);
 		(void) fprintf(stderr,

Reply via email to