1
0
mirror of https://github.com/libssh2/libssh2.git synced 2025-11-20 02:42:09 +03:00

checksrc: fix SIZEOFNOPAREN warnings

`s/sizeof ([a-z0-9._>*-]+)/sizeof(\1)/g`

Closes #962
This commit is contained in:
Viktor Szakats
2023-04-14 19:15:18 +00:00
parent 146a25a06d
commit 8b4387d0dc
5 changed files with 45 additions and 45 deletions

View File

@@ -80,7 +80,6 @@ coverage: init-coverage build-coverage gen-coverage
checksrc: checksrc:
perl ci/checksrc.pl -i4 -m79 \ perl ci/checksrc.pl -i4 -m79 \
-ASIZEOFNOPAREN \
-ASNPRINTF \ -ASNPRINTF \
-ACOPYRIGHT \ -ACOPYRIGHT \
-AFOPENMODE \ -AFOPENMODE \

View File

@@ -6,7 +6,6 @@ FILES="src/*.[ch] include/*.h example/*.c tests/*.[ch]"
WHITELIST="-Wsrc/libssh2_config.h" WHITELIST="-Wsrc/libssh2_config.h"
perl ./ci/checksrc.pl -i4 -m79 \ perl ./ci/checksrc.pl -i4 -m79 \
-ASIZEOFNOPAREN \
-ASNPRINTF \ -ASNPRINTF \
-ACOPYRIGHT \ -ACOPYRIGHT \
-AFOPENMODE \ -AFOPENMODE \

View File

@@ -115,10 +115,10 @@ agent_connect_unix(LIBSSH2_AGENT *agent)
"failed creating socket"); "failed creating socket");
s_un.sun_family = AF_UNIX; s_un.sun_family = AF_UNIX;
strncpy(s_un.sun_path, path, sizeof s_un.sun_path); strncpy(s_un.sun_path, path, sizeof(s_un.sun_path));
s_un.sun_path[sizeof(s_un.sun_path)-1] = 0; /* make sure there's a trailing s_un.sun_path[sizeof(s_un.sun_path)-1] = 0; /* make sure there's a trailing
zero */ zero */
if(connect(agent->fd, (struct sockaddr*)(&s_un), sizeof s_un) != 0) { if(connect(agent->fd, (struct sockaddr*)(&s_un), sizeof(s_un)) != 0) {
close(agent->fd); close(agent->fd);
return _libssh2_error(agent->session, LIBSSH2_ERROR_AGENT_PROTOCOL, return _libssh2_error(agent->session, LIBSSH2_ERROR_AGENT_PROTOCOL,
"failed connecting with agent"); "failed connecting with agent");
@@ -171,7 +171,7 @@ agent_transact_unix(LIBSSH2_AGENT *agent, agent_transaction_ctx_t transctx)
if(transctx->state == agent_NB_state_request_created) { if(transctx->state == agent_NB_state_request_created) {
_libssh2_htonu32(buf, (uint32_t)transctx->request_len); _libssh2_htonu32(buf, (uint32_t)transctx->request_len);
rc = (int)_send_all(agent->session->send, agent->fd, rc = (int)_send_all(agent->session->send, agent->fd,
buf, sizeof buf, 0, buf, sizeof(buf), 0,
&agent->session->abstract); &agent->session->abstract);
if(rc == -EAGAIN) if(rc == -EAGAIN)
return LIBSSH2_ERROR_EAGAIN; return LIBSSH2_ERROR_EAGAIN;
@@ -197,7 +197,7 @@ agent_transact_unix(LIBSSH2_AGENT *agent, agent_transaction_ctx_t transctx)
/* Receive the length of a response */ /* Receive the length of a response */
if(transctx->state == agent_NB_state_request_sent) { if(transctx->state == agent_NB_state_request_sent) {
rc = (int)_recv_all(agent->session->recv, agent->fd, rc = (int)_recv_all(agent->session->recv, agent->fd,
buf, sizeof buf, 0, buf, sizeof(buf), 0,
&agent->session->abstract); &agent->session->abstract);
if(rc < 0) { if(rc < 0) {
if(rc == -EAGAIN) if(rc == -EAGAIN)
@@ -594,7 +594,7 @@ agent_list_identities(LIBSSH2_AGENT *agent)
rc = LIBSSH2_ERROR_AGENT_PROTOCOL; rc = LIBSSH2_ERROR_AGENT_PROTOCOL;
goto error; goto error;
} }
identity = LIBSSH2_ALLOC(agent->session, sizeof *identity); identity = LIBSSH2_ALLOC(agent->session, sizeof(*identity));
if(!identity) { if(!identity) {
rc = LIBSSH2_ERROR_ALLOC; rc = LIBSSH2_ERROR_ALLOC;
goto error; goto error;
@@ -706,7 +706,7 @@ libssh2_agent_init(LIBSSH2_SESSION *session)
{ {
LIBSSH2_AGENT *agent; LIBSSH2_AGENT *agent;
agent = LIBSSH2_CALLOC(session, sizeof *agent); agent = LIBSSH2_CALLOC(session, sizeof(*agent));
if(!agent) { if(!agent) {
_libssh2_error(session, LIBSSH2_ERROR_ALLOC, _libssh2_error(session, LIBSSH2_ERROR_ALLOC,
"Unable to allocate space for agent connection"); "Unable to allocate space for agent connection");
@@ -756,7 +756,7 @@ libssh2_agent_connect(LIBSSH2_AGENT *agent)
LIBSSH2_API int LIBSSH2_API int
libssh2_agent_list_identities(LIBSSH2_AGENT *agent) libssh2_agent_list_identities(LIBSSH2_AGENT *agent)
{ {
memset(&agent->transctx, 0, sizeof agent->transctx); memset(&agent->transctx, 0, sizeof(agent->transctx));
/* Abandon the last fetched identities */ /* Abandon the last fetched identities */
agent_free_identities(agent); agent_free_identities(agent);
return agent_list_identities(agent); return agent_list_identities(agent);
@@ -815,7 +815,7 @@ libssh2_agent_userauth(LIBSSH2_AGENT *agent,
int rc; int rc;
if(agent->session->userauth_pblc_state == libssh2_NB_state_idle) { if(agent->session->userauth_pblc_state == libssh2_NB_state_idle) {
memset(&agent->transctx, 0, sizeof agent->transctx); memset(&agent->transctx, 0, sizeof(agent->transctx));
agent->identity = identity->node; agent->identity = identity->node;
} }

View File

@@ -262,7 +262,7 @@ agent_transact_openssh(LIBSSH2_AGENT *agent, agent_transaction_ctx_t transctx)
/* Send the length of the request */ /* Send the length of the request */
if(transctx->state == agent_NB_state_request_created) { if(transctx->state == agent_NB_state_request_created) {
_libssh2_htonu32(buf, (uint32_t)transctx->request_len); _libssh2_htonu32(buf, (uint32_t)transctx->request_len);
rc = win32_openssh_send_all(agent, buf, sizeof buf, rc = win32_openssh_send_all(agent, buf, sizeof(buf),
&transctx->send_recv_total); &transctx->send_recv_total);
if(rc == LIBSSH2_ERROR_EAGAIN) if(rc == LIBSSH2_ERROR_EAGAIN)
return LIBSSH2_ERROR_EAGAIN; return LIBSSH2_ERROR_EAGAIN;
@@ -287,7 +287,7 @@ agent_transact_openssh(LIBSSH2_AGENT *agent, agent_transaction_ctx_t transctx)
/* Receive the length of the body */ /* Receive the length of the body */
if(transctx->state == agent_NB_state_request_sent) { if(transctx->state == agent_NB_state_request_sent) {
rc = win32_openssh_recv_all(agent, buf, sizeof buf, rc = win32_openssh_recv_all(agent, buf, sizeof(buf),
&transctx->send_recv_total); &transctx->send_recv_total);
if(rc == LIBSSH2_ERROR_EAGAIN) if(rc == LIBSSH2_ERROR_EAGAIN)
return LIBSSH2_ERROR_EAGAIN; return LIBSSH2_ERROR_EAGAIN;

View File

@@ -359,7 +359,7 @@ _libssh2_random(unsigned char *buf, size_t len)
{ {
Qus_EC_t errcode; Qus_EC_t errcode;
set_EC_length(errcode, sizeof errcode); set_EC_length(errcode, sizeof(errcode));
Qc3GenPRNs(buf, len, Qc3GenPRNs(buf, len,
Qc3PRN_TYPE_NORMAL, Qc3PRN_NO_PARITY, (char *) &errcode); Qc3PRN_TYPE_NORMAL, Qc3PRN_NO_PARITY, (char *) &errcode);
return errcode.Bytes_Available? -1: 0; return errcode.Bytes_Available? -1: 0;
@@ -370,7 +370,7 @@ _libssh2_bn_init(void)
{ {
_libssh2_bn *bignum; _libssh2_bn *bignum;
bignum = (_libssh2_bn *) malloc(sizeof *bignum); bignum = (_libssh2_bn *) malloc(sizeof(*bignum));
if(bignum) { if(bignum) {
bignum->bignum = NULL; bignum->bignum = NULL;
bignum->length = 0; bignum->length = 0;
@@ -476,7 +476,7 @@ int
_libssh2_bn_set_word(_libssh2_bn *bn, unsigned long val) _libssh2_bn_set_word(_libssh2_bn *bn, unsigned long val)
{ {
val = htonl(val); val = htonl(val);
return _libssh2_bn_from_bin(bn, sizeof val, (unsigned char *) &val); return _libssh2_bn_from_bin(bn, sizeof(val), (unsigned char *) &val);
} }
int int
@@ -593,7 +593,7 @@ asn1_new(unsigned int type, unsigned int length)
unsigned int i; unsigned int i;
unsigned char *buf; unsigned char *buf;
e = (asn1Element *) malloc(sizeof *e); e = (asn1Element *) malloc(sizeof(*e));
if(e) { if(e) {
if(length >= 0x80) if(length >= 0x80)
@@ -690,7 +690,7 @@ asn1containerv(unsigned int type, valiststr args)
unsigned char *bp; unsigned char *bp;
unsigned int length = 0; unsigned int length = 0;
memcpy((char *) &va, (char *) &args, sizeof args); memcpy((char *) &va, (char *) &args, sizeof(args));
while((p = va_arg(va.list, asn1Element *))) while((p = va_arg(va.list, asn1Element *)))
length += p->end - p->header; length += p->end - p->header;
va_end(va.list); va_end(va.list);
@@ -901,10 +901,10 @@ static _libssh2_os400qc3_crypto_ctx *
libssh2_init_crypto_ctx(_libssh2_os400qc3_crypto_ctx *ctx) libssh2_init_crypto_ctx(_libssh2_os400qc3_crypto_ctx *ctx)
{ {
if(!ctx) if(!ctx)
ctx = (_libssh2_os400qc3_crypto_ctx *) malloc(sizeof *ctx); ctx = (_libssh2_os400qc3_crypto_ctx *) malloc(sizeof(*ctx));
if(ctx) { if(ctx) {
memset((char *) ctx, 0, sizeof *ctx); memset((char *) ctx, 0, sizeof(*ctx));
ctx->hash.Final_Op_Flag = Qc3_Continue; ctx->hash.Final_Op_Flag = Qc3_Continue;
} }
@@ -915,7 +915,7 @@ static int
null_token(const char *token) null_token(const char *token)
{ {
return !memcmp(token, nulltoken.Key_Context_Token, return !memcmp(token, nulltoken.Key_Context_Token,
sizeof nulltoken.Key_Context_Token); sizeof(nulltoken.Key_Context_Token));
} }
void void
@@ -926,11 +926,13 @@ _libssh2_os400qc3_crypto_dtor(_libssh2_os400qc3_crypto_ctx *x)
if(!null_token(x->hash.Alg_Context_Token)) { if(!null_token(x->hash.Alg_Context_Token)) {
Qc3DestroyAlgorithmContext(x->hash.Alg_Context_Token, Qc3DestroyAlgorithmContext(x->hash.Alg_Context_Token,
(char *) &ecnull); (char *) &ecnull);
memset(x->hash.Alg_Context_Token, 0, sizeof x->hash.Alg_Context_Token); memset(x->hash.Alg_Context_Token, 0,
sizeof(x->hash.Alg_Context_Token));
} }
if(!null_token(x->key.Key_Context_Token)) { if(!null_token(x->key.Key_Context_Token)) {
Qc3DestroyKeyContext(x->key.Key_Context_Token, (char *) &ecnull); Qc3DestroyKeyContext(x->key.Key_Context_Token, (char *) &ecnull);
memset(x->key.Key_Context_Token, 0, sizeof x->key.Key_Context_Token); memset(x->key.Key_Context_Token, 0,
sizeof(x->key.Key_Context_Token));
} }
if(x->kek) { if(x->kek) {
_libssh2_os400qc3_crypto_dtor(x->kek); _libssh2_os400qc3_crypto_dtor(x->kek);
@@ -954,10 +956,10 @@ libssh2_os400qc3_hash_init(Qc3_Format_ALGD0100_T *x, unsigned int algorithm)
if(!x) if(!x)
return 0; return 0;
memset((char *) x, 0, sizeof *x); memset((char *) x, 0, sizeof(*x));
x->Final_Op_Flag = Qc3_Continue; x->Final_Op_Flag = Qc3_Continue;
algd.Hash_Alg = algorithm; algd.Hash_Alg = algorithm;
set_EC_length(errcode, sizeof errcode); set_EC_length(errcode, sizeof(errcode));
Qc3CreateAlgorithmContext((char *) &algd, Qc3_Alg_Hash, Qc3CreateAlgorithmContext((char *) &algd, Qc3_Alg_Hash,
x->Alg_Context_Token, &errcode); x->Alg_Context_Token, &errcode);
return errcode.Bytes_Available? 0: 1; return errcode.Bytes_Available? 0: 1;
@@ -983,7 +985,7 @@ libssh2_os400qc3_hash_final(Qc3_Format_ALGD0100_T *ctx, unsigned char *out)
Qc3CalculateHash(&data, &zero, Qc3_Data, (char *) ctx, Qc3_Alg_Token, Qc3CalculateHash(&data, &zero, Qc3_Data, (char *) ctx, Qc3_Alg_Token,
anycsp, NULL, (char *) out, (char *) &ecnull); anycsp, NULL, (char *) out, (char *) &ecnull);
Qc3DestroyAlgorithmContext(ctx->Alg_Context_Token, (char *) &ecnull); Qc3DestroyAlgorithmContext(ctx->Alg_Context_Token, (char *) &ecnull);
memset(ctx->Alg_Context_Token, 0, sizeof ctx->Alg_Context_Token); memset(ctx->Alg_Context_Token, 0, sizeof(ctx->Alg_Context_Token));
} }
int int
@@ -1073,10 +1075,10 @@ _libssh2_cipher_init(_libssh2_cipher_ctx *h, _libssh2_cipher_type(algo),
algd.Reserved = 0; algd.Reserved = 0;
algd.MAC_Length = 0; algd.MAC_Length = 0;
algd.Effective_Key_Size = 0; algd.Effective_Key_Size = 0;
memset(algd.Init_Vector, 0, sizeof algd.Init_Vector); memset(algd.Init_Vector, 0, sizeof(algd.Init_Vector));
if(algo.mode != Qc3_ECB && algo.size) if(algo.mode != Qc3_ECB && algo.size)
memcpy(algd.Init_Vector, iv, algo.size); memcpy(algd.Init_Vector, iv, algo.size);
set_EC_length(errcode, sizeof errcode); set_EC_length(errcode, sizeof(errcode));
Qc3CreateAlgorithmContext((char *) &algd, algo.fmt, Qc3CreateAlgorithmContext((char *) &algd, algo.fmt,
h->hash.Alg_Context_Token, &errcode); h->hash.Alg_Context_Token, &errcode);
if(errcode.Bytes_Available) if(errcode.Bytes_Available)
@@ -1103,7 +1105,7 @@ _libssh2_cipher_crypt(_libssh2_cipher_ctx *ctx,
(void) algo; (void) algo;
set_EC_length(errcode, sizeof errcode); set_EC_length(errcode, sizeof(errcode));
if(encrypt) if(encrypt)
Qc3EncryptData((char *) block, &blksize, Qc3_Data, Qc3EncryptData((char *) block, &blksize, Qc3_Data,
ctx->hash.Alg_Context_Token, Qc3_Alg_Token, ctx->hash.Alg_Context_Token, Qc3_Alg_Token,
@@ -1196,7 +1198,7 @@ _libssh2_rsa_new(libssh2_rsa_ctx **rsa,
if(!ret) { if(!ret) {
Qus_EC_t errcode; Qus_EC_t errcode;
set_EC_length(errcode, sizeof errcode); set_EC_length(errcode, sizeof(errcode));
i = structkey->end - structkey->header; i = structkey->end - structkey->header;
Qc3CreateKeyContext(structkey->header, &i, berstring, &keytype, Qc3CreateKeyContext(structkey->header, &i, berstring, &keytype,
qc3clear, NULL, NULL, ctx->key.Key_Context_Token, qc3clear, NULL, NULL, ctx->key.Key_Context_Token,
@@ -1233,7 +1235,7 @@ _libssh2_rsa_new(libssh2_rsa_ctx **rsa,
void void
_libssh2_os400qc3_dh_init(_libssh2_dh_ctx *dhctx) _libssh2_os400qc3_dh_init(_libssh2_dh_ctx *dhctx)
{ {
memset((char *) dhctx, 0, sizeof *dhctx); memset((char *) dhctx, 0, sizeof(*dhctx));
} }
int int
@@ -1275,7 +1277,7 @@ _libssh2_os400qc3_dh_key_pair(_libssh2_dh_ctx *dhctx, _libssh2_bn *public,
pkcs3len = pkcs3->end - pkcs3->header; pkcs3len = pkcs3->end - pkcs3->header;
pubkeysize = (_libssh2_bn_bits(p) + 7) >> 3; pubkeysize = (_libssh2_bn_bits(p) + 7) >> 3;
pubkey = alloca(pubkeysize); pubkey = alloca(pubkeysize);
set_EC_length(errcode, sizeof errcode); set_EC_length(errcode, sizeof(errcode));
Qc3GenDHKeyPair((char *) pkcs3->header, &pkcs3len, anycsp, NULL, Qc3GenDHKeyPair((char *) pkcs3->header, &pkcs3len, anycsp, NULL,
dhctx->token, pubkey, &pubkeysize, &pubkeylen, &errcode); dhctx->token, pubkey, &pubkeysize, &pubkeylen, &errcode);
asn1delete(pkcs3); asn1delete(pkcs3);
@@ -1300,7 +1302,7 @@ _libssh2_os400qc3_dh_secret(_libssh2_dh_ctx *dhctx, _libssh2_bn *secret,
_libssh2_bn_to_bin(f, pubkey); _libssh2_bn_to_bin(f, pubkey);
secretbufsize = (_libssh2_bn_bits(p) + 7) >> 3; secretbufsize = (_libssh2_bn_bits(p) + 7) >> 3;
secretbuf = alloca(pubkeysize); secretbuf = alloca(pubkeysize);
set_EC_length(errcode, sizeof errcode); set_EC_length(errcode, sizeof(errcode));
Qc3CalculateDHSecretKey(dhctx->token, pubkey, &pubkeysize, Qc3CalculateDHSecretKey(dhctx->token, pubkey, &pubkeysize,
secretbuf, &secretbufsize, &secretbuflen, secretbuf, &secretbufsize, &secretbuflen,
&errcode); &errcode);
@@ -1315,7 +1317,7 @@ _libssh2_os400qc3_dh_dtor(_libssh2_dh_ctx *dhctx)
{ {
if(!null_token(dhctx->token)) { if(!null_token(dhctx->token)) {
Qc3DestroyAlgorithmContext(dhctx->token, (char *) &ecnull); Qc3DestroyAlgorithmContext(dhctx->token, (char *) &ecnull);
memset((char *) dhctx, 0, sizeof *dhctx); memset((char *) dhctx, 0, sizeof(*dhctx));
} }
} }
@@ -1348,7 +1350,7 @@ asn1getword(asn1Element *e, unsigned long *v)
return -1; return -1;
for(cp = e->beg; cp < e->end && !*cp; cp++) for(cp = e->beg; cp < e->end && !*cp; cp++)
; ;
if(e->end - cp > sizeof a) if(e->end - cp > sizeof(a))
return -1; return -1;
for(a = 0; cp < e->end; cp++) for(a = 0; cp < e->end; cp++)
a = (a << 8) | *cp; a = (a << 8) | *cp;
@@ -1436,7 +1438,7 @@ pbkdf2(LIBSSH2_SESSION *session, char **dk, const unsigned char *passphrase,
for(i = 1; i <= l; i++) { for(i = 1; i <= l; i++) {
ni = htonl(i); ni = htonl(i);
libssh2_os400qc3_hmac_update(&hctx, pkcs5->salt, pkcs5->saltlen); libssh2_os400qc3_hmac_update(&hctx, pkcs5->salt, pkcs5->saltlen);
libssh2_os400qc3_hmac_update(&hctx, (char *) &ni, sizeof ni); libssh2_os400qc3_hmac_update(&hctx, (char *) &ni, sizeof(ni));
libssh2_os400qc3_hmac_final(&hctx, mac); libssh2_os400qc3_hmac_final(&hctx, mac);
memcpy(buf, mac, pkcs5->hashlen); memcpy(buf, mac, pkcs5->hashlen);
for(j = 1; j < pkcs5->itercount; j++) { for(j = 1; j < pkcs5->itercount; j++) {
@@ -1719,7 +1721,7 @@ pkcs8kek(LIBSSH2_SESSION *session, _libssh2_os400qc3_crypto_ctx **ctx,
/* PKCS#5: parse the PBES AlgorithmIdentifier and recursively get all /* PKCS#5: parse the PBES AlgorithmIdentifier and recursively get all
encryption parameters. */ encryption parameters. */
memset((char *) &pkcs5, 0, sizeof pkcs5); memset((char *) &pkcs5, 0, sizeof(pkcs5));
if(parse_pkcs5_algorithm(session, &pkcs5, &pkcs5alg, pbestable)) if(parse_pkcs5_algorithm(session, &pkcs5, &pkcs5alg, pbestable))
return -1; return -1;
@@ -1728,7 +1730,7 @@ pkcs8kek(LIBSSH2_SESSION *session, _libssh2_os400qc3_crypto_ctx **ctx,
return -1; return -1;
/* Prepare the algorithm descriptor. */ /* Prepare the algorithm descriptor. */
memset((char *) &algd, 0, sizeof algd); memset((char *) &algd, 0, sizeof(algd));
algd.Block_Cipher_Alg = pkcs5.cipher; algd.Block_Cipher_Alg = pkcs5.cipher;
algd.Block_Length = pkcs5.blocksize; algd.Block_Length = pkcs5.blocksize;
algd.Mode = pkcs5.mode; algd.Mode = pkcs5.mode;
@@ -1744,7 +1746,7 @@ pkcs8kek(LIBSSH2_SESSION *session, _libssh2_os400qc3_crypto_ctx **ctx,
return -1; return -1;
} }
libssh2_init_crypto_ctx(*ctx); libssh2_init_crypto_ctx(*ctx);
set_EC_length(errcode, sizeof errcode); set_EC_length(errcode, sizeof(errcode));
Qc3CreateKeyContext(dk, &pkcs5.dklen, binstring, &algd.Block_Cipher_Alg, Qc3CreateKeyContext(dk, &pkcs5.dklen, binstring, &algd.Block_Cipher_Alg,
qc3clear, NULL, NULL, (*ctx)->key.Key_Context_Token, qc3clear, NULL, NULL, (*ctx)->key.Key_Context_Token,
(char *) &errcode); (char *) &errcode);
@@ -1791,7 +1793,7 @@ rsapkcs8privkey(LIBSSH2_SESSION *session,
return -1; return -1;
} }
set_EC_length(errcode, sizeof errcode); set_EC_length(errcode, sizeof(errcode));
pkilen = pki.end - pki.beg; pkilen = pki.end - pki.beg;
Qc3CreateKeyContext((unsigned char *) pki.beg, &pkilen, berstring, Qc3CreateKeyContext((unsigned char *) pki.beg, &pkilen, berstring,
rsaprivate, &keyform, kek, kea, rsaprivate, &keyform, kek, kea,
@@ -1883,7 +1885,7 @@ rsapkcs8pubkey(LIBSSH2_SESSION *session,
return -1; return -1;
} }
set_EC_length(errcode, sizeof errcode); set_EC_length(errcode, sizeof(errcode));
pkilen = pki.end - pki.beg; pkilen = pki.end - pki.beg;
Qc3ExtractPublicKey(pki.beg, &pkilen, berstring, &keyform, Qc3ExtractPublicKey(pki.beg, &pkilen, berstring, &keyform,
kek, kea, buf, (int *) &datalen, &len, &errcode); kek, kea, buf, (int *) &datalen, &len, &errcode);
@@ -2341,7 +2343,7 @@ _libssh2_rsa_sha2_verify(libssh2_rsa_ctx *rsa, size_t hash_len,
int slen = (int)sig_len; int slen = (int)sig_len;
int mlen = (int)m_len; int mlen = (int)m_len;
memset(&algd, 0, sizeof algd); memset(&algd, 0, sizeof(algd));
algd.Public_Key_Alg = Qc3_RSA; algd.Public_Key_Alg = Qc3_RSA;
algd.PKA_Block_Format = Qc3_PKCS1_01; algd.PKA_Block_Format = Qc3_PKCS1_01;
switch(hash_len) { switch(hash_len) {
@@ -2358,7 +2360,7 @@ _libssh2_rsa_sha2_verify(libssh2_rsa_ctx *rsa, size_t hash_len,
return -1; return -1;
} }
set_EC_length(errcode, sizeof errcode); set_EC_length(errcode, sizeof(errcode));
Qc3VerifySignature((char *) sig, &slen, (char *) m, &mlen, Qc3_Data, Qc3VerifySignature((char *) sig, &slen, (char *) m, &mlen, Qc3_Data,
(char *) &algd, Qc3_Alg_Public_Key, (char *) &algd, Qc3_Alg_Public_Key,
(char *) &rsa->key, Qc3_Key_Token, anycsp, (char *) &rsa->key, Qc3_Key_Token, anycsp,
@@ -2389,13 +2391,13 @@ _libssh2_os400qc3_rsa_signv(LIBSSH2_SESSION *session,
int siglen; int siglen;
unsigned char *sig; unsigned char *sig;
char sigbuf[8192]; char sigbuf[8192];
int sigbufsize = sizeof sigbuf; int sigbufsize = sizeof(sigbuf);
algd.Public_Key_Alg = Qc3_RSA; algd.Public_Key_Alg = Qc3_RSA;
algd.PKA_Block_Format = Qc3_PKCS1_01; algd.PKA_Block_Format = Qc3_PKCS1_01;
memset(algd.Reserved, 0, sizeof algd.Reserved); memset(algd.Reserved, 0, sizeof(algd.Reserved));
algd.Signing_Hash_Alg = algo; algd.Signing_Hash_Alg = algo;
set_EC_length(errcode, sizeof errcode); set_EC_length(errcode, sizeof(errcode));
Qc3CalculateSignature((char *) vector, &veccount, Qc3_Array, Qc3CalculateSignature((char *) vector, &veccount, Qc3_Array,
(char *) &algd, Qc3_Alg_Public_Key, (char *) &algd, Qc3_Alg_Public_Key,
(char *) &ctx->key, Qc3_Key_Token, (char *) &ctx->key, Qc3_Key_Token,