@@ -353,7 +353,7 @@ do_setkey (RIJNDAEL_context *ctx, const byte *key, const unsigned keylen)
353
353
else
354
354
{
355
355
#define W (ctx->keyschenc)
356
- for (i = 0 ; i < keylen ; i ++ )
356
+ for (i = 0 ; i < ( int ) keylen ; i ++ )
357
357
{
358
358
k [i >> 2 ][i & 3 ] = key [i ];
359
359
}
@@ -1857,7 +1857,7 @@ selftest_fips_128_38a (int requested_mode)
1857
1857
gcry_assert (sizeof tv [0 ].data [0 ].input == sizeof scratch );
1858
1858
gcry_assert (sizeof tv [0 ].data [0 ].output == sizeof scratch );
1859
1859
1860
- for (tvi = 0 ; tvi < DIM (tv ); tvi ++ )
1860
+ for (tvi = 0 ; tvi < ( int )( DIM (tv ) ); tvi ++ )
1861
1861
if (tv [tvi ].mode == requested_mode )
1862
1862
break ;
1863
1863
if (tvi == DIM (tv ))
@@ -1879,7 +1879,7 @@ selftest_fips_128_38a (int requested_mode)
1879
1879
err = _gcry_cipher_setiv (hddec , tv [tvi ].iv , sizeof tv [tvi ].iv );
1880
1880
if (err )
1881
1881
Fail ("set IV" );
1882
- for (idx = 0 ; idx < DIM (tv [tvi ].data ); idx ++ )
1882
+ for (idx = 0 ; idx < ( int )( DIM (tv [tvi ].data ) ); idx ++ )
1883
1883
{
1884
1884
err = _gcry_cipher_encrypt (hdenc , scratch , sizeof scratch ,
1885
1885
tv [tvi ].data [idx ].input ,
@@ -2027,17 +2027,17 @@ static gcry_cipher_oid_spec_t rijndael_oids[] =
2027
2027
{ "2.16.840.1.101.3.4.1.2" , GCRY_CIPHER_MODE_CBC },
2028
2028
{ "2.16.840.1.101.3.4.1.3" , GCRY_CIPHER_MODE_OFB },
2029
2029
{ "2.16.840.1.101.3.4.1.4" , GCRY_CIPHER_MODE_CFB },
2030
- { NULL }
2030
+ { NULL , 0 }
2031
2031
};
2032
2032
2033
2033
gcry_cipher_spec_t _gcry_cipher_spec_aes =
2034
2034
{
2035
2035
"AES" , rijndael_names , rijndael_oids , 16 , 128 , sizeof (RIJNDAEL_context ),
2036
- rijndael_setkey , rijndael_encrypt , rijndael_decrypt
2036
+ rijndael_setkey , rijndael_encrypt , rijndael_decrypt , 0 , 0 , NULL , NULL
2037
2037
};
2038
2038
cipher_extra_spec_t _gcry_cipher_extraspec_aes =
2039
2039
{
2040
- run_selftests
2040
+ run_selftests , NULL
2041
2041
};
2042
2042
2043
2043
static const char * rijndael192_names [] =
0 commit comments