projects
/
BearSSL
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Some more extra casts to avoid alignment warnings with Clang and -Wcast-align on...
[BearSSL]
/
src
/
x509
/
x509_minimal.t0
diff --git
a/src/x509/x509_minimal.t0
b/src/x509/x509_minimal.t0
index
bce37ad
..
a46076e
100644
(file)
--- a/
src/x509/x509_minimal.t0
+++ b/
src/x509/x509_minimal.t0
@@
-198,7
+198,7
@@
xm_start_chain(const br_x509_class **ctx, const char *server_name)
br_x509_minimal_context *cc;
size_t u;
br_x509_minimal_context *cc;
size_t u;
- cc = (br_x509_minimal_context *)ctx;
+ cc = (br_x509_minimal_context *)
(void *)
ctx;
for (u = 0; u < cc->num_name_elts; u ++) {
cc->name_elts[u].status = 0;
cc->name_elts[u].buf[0] = 0;
for (u = 0; u < cc->num_name_elts; u ++) {
cc->name_elts[u].status = 0;
cc->name_elts[u].buf[0] = 0;
@@
-221,7
+221,7
@@
xm_start_cert(const br_x509_class **ctx, uint32_t length)
{
br_x509_minimal_context *cc;
{
br_x509_minimal_context *cc;
- cc = (br_x509_minimal_context *)ctx;
+ cc = (br_x509_minimal_context *)
(void *)
ctx;
if (cc->err != 0) {
return;
}
if (cc->err != 0) {
return;
}
@@
-237,7
+237,7
@@
xm_append(const br_x509_class **ctx, const unsigned char *buf, size_t len)
{
br_x509_minimal_context *cc;
{
br_x509_minimal_context *cc;
- cc = (br_x509_minimal_context *)ctx;
+ cc = (br_x509_minimal_context *)
(void *)
ctx;
if (cc->err != 0) {
return;
}
if (cc->err != 0) {
return;
}
@@
-251,7
+251,7
@@
xm_end_cert(const br_x509_class **ctx)
{
br_x509_minimal_context *cc;
{
br_x509_minimal_context *cc;
- cc = (br_x509_minimal_context *)ctx;
+ cc = (br_x509_minimal_context *)
(void *)
ctx;
if (cc->err == 0 && cc->cert_length != 0) {
cc->err = BR_ERR_X509_TRUNCATED;
}
if (cc->err == 0 && cc->cert_length != 0) {
cc->err = BR_ERR_X509_TRUNCATED;
}
@@
-263,7
+263,7
@@
xm_end_chain(const br_x509_class **ctx)
{
br_x509_minimal_context *cc;
{
br_x509_minimal_context *cc;
- cc = (br_x509_minimal_context *)ctx;
+ cc = (br_x509_minimal_context *)
(void *)
ctx;
if (cc->err == 0) {
if (cc->num_certs == 0) {
cc->err = BR_ERR_X509_EMPTY_CHAIN;
if (cc->err == 0) {
if (cc->num_certs == 0) {
cc->err = BR_ERR_X509_EMPTY_CHAIN;
@@
-281,14
+281,14
@@
xm_get_pkey(const br_x509_class *const *ctx, unsigned *usages)
{
br_x509_minimal_context *cc;
{
br_x509_minimal_context *cc;
- cc = (br_x509_minimal_context *)ctx;
+ cc = (br_x509_minimal_context *)
(void *)
ctx;
if (cc->err == BR_ERR_X509_OK
|| cc->err == BR_ERR_X509_NOT_TRUSTED)
{
if (usages != NULL) {
*usages = cc->key_usages;
}
if (cc->err == BR_ERR_X509_OK
|| cc->err == BR_ERR_X509_NOT_TRUSTED)
{
if (usages != NULL) {
*usages = cc->key_usages;
}
- return &((br_x509_minimal_context *)ctx)->pkey;
+ return &((br_x509_minimal_context *)
(void *)
ctx)->pkey;
} else {
return NULL;
}
} else {
return NULL;
}