@@ -701,7 +701,7 @@ void test_ecdsa_end_to_end() {
701
701
702
702
// Construct and verify corresponding public key.
703
703
CHECK (secp256k1_ec_seckey_verify (privkey ) == 1 );
704
- char pubkey [65 ]; int pubkeylen = 65 ;
704
+ unsigned char pubkey [65 ]; int pubkeylen = 65 ;
705
705
CHECK (secp256k1_ec_pubkey_create (pubkey , & pubkeylen , privkey , secp256k1_rand32 () % 2 ) == 1 );
706
706
CHECK (secp256k1_ec_pubkey_verify (pubkey , pubkeylen ));
707
707
@@ -720,7 +720,7 @@ void test_ecdsa_end_to_end() {
720
720
int ret2 = secp256k1_ec_pubkey_tweak_add (pubkey , pubkeylen , rnd );
721
721
CHECK (ret1 == ret2 );
722
722
if (ret1 == 0 ) return ;
723
- char pubkey2 [65 ]; int pubkeylen2 = 65 ;
723
+ unsigned char pubkey2 [65 ]; int pubkeylen2 = 65 ;
724
724
CHECK (secp256k1_ec_pubkey_create (pubkey2 , & pubkeylen2 , privkey , pubkeylen == 33 ) == 1 );
725
725
CHECK (memcmp (pubkey , pubkey2 , pubkeylen ) == 0 );
726
726
}
@@ -733,13 +733,13 @@ void test_ecdsa_end_to_end() {
733
733
int ret2 = secp256k1_ec_pubkey_tweak_mul (pubkey , pubkeylen , rnd );
734
734
CHECK (ret1 == ret2 );
735
735
if (ret1 == 0 ) return ;
736
- char pubkey2 [65 ]; int pubkeylen2 = 65 ;
736
+ unsigned char pubkey2 [65 ]; int pubkeylen2 = 65 ;
737
737
CHECK (secp256k1_ec_pubkey_create (pubkey2 , & pubkeylen2 , privkey , pubkeylen == 33 ) == 1 );
738
738
CHECK (memcmp (pubkey , pubkey2 , pubkeylen ) == 0 );
739
739
}
740
740
741
741
// Sign.
742
- unsigned char signature [72 ]; unsigned int signaturelen = 72 ;
742
+ unsigned char signature [72 ]; int signaturelen = 72 ;
743
743
while (1 ) {
744
744
unsigned char rnd [32 ];
745
745
secp256k1_rand256_test (rnd );
@@ -754,7 +754,7 @@ void test_ecdsa_end_to_end() {
754
754
CHECK (secp256k1_ecdsa_verify (message , 32 , signature , signaturelen , pubkey , pubkeylen ) != 1 );
755
755
756
756
// Compact sign.
757
- unsigned char csignature [64 ]; unsigned int recid = 0 ;
757
+ unsigned char csignature [64 ]; int recid = 0 ;
758
758
while (1 ) {
759
759
unsigned char rnd [32 ];
760
760
secp256k1_rand256_test (rnd );
@@ -763,7 +763,7 @@ void test_ecdsa_end_to_end() {
763
763
}
764
764
}
765
765
// Recover.
766
- unsigned char recpubkey [65 ]; unsigned recpubkeylen = 0 ;
766
+ unsigned char recpubkey [65 ]; int recpubkeylen = 0 ;
767
767
CHECK (secp256k1_ecdsa_recover_compact (message , 32 , csignature , recpubkey , & recpubkeylen , pubkeylen == 33 , recid ) == 1 );
768
768
CHECK (recpubkeylen == pubkeylen );
769
769
CHECK (memcmp (pubkey , recpubkey , pubkeylen ) == 0 );
@@ -809,7 +809,7 @@ void test_ecdsa_openssl() {
809
809
EC_KEY * ec_key = get_openssl_key (& key );
810
810
CHECK (ec_key );
811
811
unsigned char signature [80 ];
812
- int sigsize = 80 ;
812
+ unsigned int sigsize = 80 ;
813
813
CHECK (ECDSA_sign (0 , message , sizeof (message ), signature , & sigsize , ec_key ));
814
814
secp256k1_ecdsa_sig_t sig ;
815
815
CHECK (secp256k1_ecdsa_sig_parse (& sig , signature , sigsize ));
@@ -820,9 +820,9 @@ void test_ecdsa_openssl() {
820
820
CHECK (!secp256k1_ecdsa_sig_verify (& sig , & q , & msg_num ));
821
821
822
822
random_sign (& sig , & key , & msg , NULL );
823
- sigsize = 80 ;
824
- CHECK (secp256k1_ecdsa_sig_serialize (signature , & sigsize , & sig ));
825
- CHECK (ECDSA_verify (0 , message , sizeof (message ), signature , sigsize , ec_key ) == 1 );
823
+ int secp_sigsize = 80 ;
824
+ CHECK (secp256k1_ecdsa_sig_serialize (signature , & secp_sigsize , & sig ));
825
+ CHECK (ECDSA_verify (0 , message , sizeof (message ), signature , secp_sigsize , ec_key ) == 1 );
826
826
827
827
EC_KEY_free (ec_key );
828
828
}
@@ -885,7 +885,7 @@ int main(int argc, char **argv) {
885
885
run_ecdsa_openssl ();
886
886
#endif
887
887
888
- printf ("random run = %llu\n" , (unsigned long long )secp256k1_rand32 () + (unsigned long long )secp256k1_rand32 () << 32 );
888
+ printf ("random run = %llu\n" , (unsigned long long )secp256k1_rand32 () + (( unsigned long long )secp256k1_rand32 () << 32 ) );
889
889
890
890
// shutdown
891
891
secp256k1_stop ();
0 commit comments