aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGuy Harris <guy@alum.mit.edu>2019-01-06 16:16:42 -0800
committerGuy Harris <guy@alum.mit.edu>2019-01-06 16:16:42 -0800
commit1b087c4b2b10c08aac75b31db96459e77d78aa4f (patch)
treea0a70dfbd00d0893913ac05188ebcb79784a91fc
parent2ee6c591dc1c59f38c8f924c81250f8df4764735 (diff)
Fix a narrowing warning.
-rw-r--r--sslutils.c4
-rw-r--r--sslutils.h4
2 files changed, 4 insertions, 4 deletions
diff --git a/sslutils.c b/sslutils.c
index c6fb80c5..cde19137 100644
--- a/sslutils.c
+++ b/sslutils.c
@@ -168,7 +168,7 @@ SSL *ssl_promotion(int is_server, SOCKET s, char *errbuf, size_t errbuflen)
// Same return value as sock_send:
// 0 on OK, -1 on error but closed connection (-2).
-int ssl_send(SSL *ssl, char const *buffer, size_t size, char *errbuf, size_t errbuflen)
+int ssl_send(SSL *ssl, char const *buffer, int size, char *errbuf, size_t errbuflen)
{
int status = SSL_write(ssl, buffer, size);
if (status > 0)
@@ -196,7 +196,7 @@ int ssl_send(SSL *ssl, char const *buffer, size_t size, char *errbuf, size_t err
}
// Returns the number of bytes read, or -1 on syserror, or -2 on SSL error.
-int ssl_recv(SSL *ssl, char *buffer, size_t size, char *errbuf, size_t errbuflen)
+int ssl_recv(SSL *ssl, char *buffer, int size, char *errbuf, size_t errbuflen)
{
int status = SSL_read(ssl, buffer, size);
if (status <= 0)
diff --git a/sslutils.h b/sslutils.h
index 41a243e3..8e0c32e0 100644
--- a/sslutils.h
+++ b/sslutils.h
@@ -57,8 +57,8 @@ extern char ssl_rootfile[PATH_MAX];
void init_ssl_or_die(int is_server, int enable_compression);
SSL *ssl_promotion(int is_server, SOCKET s, char *errbuf, size_t errbuflen);
SSL *ssl_promotion_rw(int is_server, SOCKET in, SOCKET out, char *errbuf, size_t errbuflen);
-int ssl_send(SSL *, char const *buffer, size_t size, char *errbuf, size_t errbuflen);
-int ssl_recv(SSL *, char *buffer, size_t size, char *errbuf, size_t errbuflen);
+int ssl_send(SSL *, char const *buffer, int size, char *errbuf, size_t errbuflen);
+int ssl_recv(SSL *, char *buffer, int size, char *errbuf, size_t errbuflen);
#else // HAVE_OPENSSL