File tree Expand file tree Collapse file tree 2 files changed +7
-2
lines changed Expand file tree Collapse file tree 2 files changed +7
-2
lines changed Original file line number Diff line number Diff line change 46
46
* Fix an unsafe bounds check when restoring an SSL session from a ticket.
47
47
This could lead to a buffer overflow, but only in case ticket authentication
48
48
was broken. Reported and fix suggested by Guido Vranken in #659.
49
+ * Add explicit integer to enumeration type casts to example program
50
+ programs/pkey/gen_key which previously led to compilation failure
51
+ on some toolchains. Reported by phoenixmcallister. Fixes #2170.
49
52
50
53
= mbed TLS 2.14.0 branch released 2018-11-19
51
54
Original file line number Diff line number Diff line change @@ -322,7 +322,8 @@ int main( int argc, char *argv[] )
322
322
mbedtls_printf ( "\n . Generating the private key ..." );
323
323
fflush ( stdout );
324
324
325
- if ( ( ret = mbedtls_pk_setup ( & key , mbedtls_pk_info_from_type ( opt .type ) ) ) != 0 )
325
+ if ( ( ret = mbedtls_pk_setup ( & key ,
326
+ mbedtls_pk_info_from_type ( (mbedtls_pk_type_t ) opt .type ) ) ) != 0 )
326
327
{
327
328
mbedtls_printf ( " failed\n ! mbedtls_pk_setup returned -0x%04x" , - ret );
328
329
goto exit ;
@@ -344,7 +345,8 @@ int main( int argc, char *argv[] )
344
345
#if defined(MBEDTLS_ECP_C )
345
346
if ( opt .type == MBEDTLS_PK_ECKEY )
346
347
{
347
- ret = mbedtls_ecp_gen_key ( opt .ec_curve , mbedtls_pk_ec ( key ),
348
+ ret = mbedtls_ecp_gen_key ( (mbedtls_ecp_group_id ) opt .ec_curve ,
349
+ mbedtls_pk_ec ( key ),
348
350
mbedtls_ctr_drbg_random , & ctr_drbg );
349
351
if ( ret != 0 )
350
352
{
You can’t perform that action at this time.
0 commit comments