@@ -243,7 +243,7 @@
* if key usage is not enabled, or the values do not match.
*/
result_t x509_verify_cert_ku(openvpn_x509_cert_t *x509, const unsigned *const expected_ku,
- int expected_len);
+ size_t expected_len);
/*
* Verify X.509 extended key usage extension field.
@@ -483,7 +483,7 @@
}
result_t
-x509_verify_cert_ku(mbedtls_x509_crt *cert, const unsigned *const expected_ku, int expected_len)
+x509_verify_cert_ku(mbedtls_x509_crt *cert, const unsigned int *const expected_ku, size_t expected_len)
{
msg(D_HANDSHAKE, "Validating certificate key usage");
@@ -674,13 +674,8 @@
return FAILURE;
}
-#if defined(__GNUC__) || defined(__clang__)
-#pragma GCC diagnostic push
-#pragma GCC diagnostic ignored "-Wconversion"
-#endif
-
result_t
-x509_verify_cert_ku(X509 *x509, const unsigned *const expected_ku, int expected_len)
+x509_verify_cert_ku(X509 *x509, const unsigned int *const expected_ku, size_t expected_len)
{
ASN1_BIT_STRING *ku = X509_get_ext_d2i(x509, NID_key_usage, NULL, NULL);
@@ -697,8 +692,8 @@
return SUCCESS;
}
- unsigned nku = 0;
- for (size_t i = 0; i < 8; i++)
+ unsigned int nku = 0;
+ for (int i = 0; i < 8; i++)
{
if (ASN1_BIT_STRING_get_bit(ku, i))
{
@@ -738,10 +733,6 @@
return fFound;
}
-#if defined(__GNUC__) || defined(__clang__)
-#pragma GCC diagnostic pop
-#endif
-
result_t
x509_verify_cert_eku(X509 *x509, const char *const expected_oid)
{