diff options
author | Andreas Schneider <asn@cryptomilk.org> | 2018-09-26 10:52:49 +0200 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2018-10-19 22:01:28 +0200 |
commit | 922012f04c798c87104a6aba665407e5b780a0d2 (patch) | |
tree | 96c7784034e210186d8da027925310892d4ec2f0 | |
parent | 312ca3b758e73efab99add85068f710f032f3e2b (diff) | |
download | libssh-922012f04c798c87104a6aba665407e5b780a0d2.tar.gz libssh-922012f04c798c87104a6aba665407e5b780a0d2.tar.xz libssh-922012f04c798c87104a6aba665407e5b780a0d2.zip |
wrapper: Fix size type in crypt_set_algorithms2()
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
-rw-r--r-- | src/wrapper.c | 4 |
1 files changed, 1 insertions, 3 deletions
diff --git a/src/wrapper.c b/src/wrapper.c index 369b51f7..d6baaf4b 100644 --- a/src/wrapper.c +++ b/src/wrapper.c @@ -227,7 +227,7 @@ void crypto_free(struct ssh_crypto_struct *crypto) static int crypt_set_algorithms2(ssh_session session) { const char *wanted; - int i = 0; + size_t i = 0; struct ssh_cipher_struct *ssh_ciphertab = ssh_get_ciphertab(); struct ssh_hmac_struct *ssh_hmactab = ssh_get_hmactab(); int cmp; @@ -275,7 +275,6 @@ static int crypt_set_algorithms2(ssh_session session) ssh_set_error_oom(session); return SSH_ERROR; } - i = 0; if (session->next_crypto->out_cipher->aead_encrypt != NULL){ /* this cipher has integrated MAC */ @@ -367,7 +366,6 @@ static int crypt_set_algorithms2(ssh_session session) SSH_LOG(SSH_LOG_PACKET, "Set HMAC input algorithm to %s", wanted); session->next_crypto->in_hmac = ssh_hmactab[i].hmac_type; - i = 0; /* compression */ cmp = strcmp(session->next_crypto->kex_methods[SSH_COMP_C_S], |