@@ -62,11 +62,6 @@ void dco_check_key_ctx(const struct key_ctx_bi *key);
6262
6363typedef int (* ovpn_nl_cb )(struct nl_msg * msg , void * arg );
6464
65- #if defined(__GNUC__ ) || defined(__clang__ )
66- #pragma GCC diagnostic push
67- #pragma GCC diagnostic ignored "-Wconversion"
68- #endif
69-
7065/**
7166 * @brief resolves the netlink ID for ovpn-dco
7267 *
@@ -110,7 +105,7 @@ resolve_ovpn_netlink_id(msglvl_t msglevel)
110105}
111106
112107static struct nl_msg *
113- ovpn_dco_nlmsg_create (dco_context_t * dco , int cmd )
108+ ovpn_dco_nlmsg_create (dco_context_t * dco , uint8_t cmd )
114109{
115110 struct nl_msg * nl_msg = nlmsg_alloc ();
116111 if (!nl_msg )
@@ -346,7 +341,7 @@ ovpn_nl_cb_error(struct sockaddr_nl(*nla) __attribute__((unused)), struct nlmsge
346341
347342 if (!(nlh -> nlmsg_flags & NLM_F_CAPPED ))
348343 {
349- ack_len += err -> msg .nlmsg_len - sizeof (* nlh );
344+ ack_len += err -> msg .nlmsg_len - ( int ) sizeof (* nlh );
350345 }
351346
352347 if (len <= ack_len )
@@ -360,8 +355,8 @@ ovpn_nl_cb_error(struct sockaddr_nl(*nla) __attribute__((unused)), struct nlmsge
360355 nla_parse (tb_msg , OVPN_NLMSGERR_ATTR_MAX , attrs , len , NULL );
361356 if (tb_msg [NLMSGERR_ATTR_MSG ])
362357 {
363- len = strnlen ((char * )nla_data (tb_msg [NLMSGERR_ATTR_MSG ]),
364- nla_len (tb_msg [NLMSGERR_ATTR_MSG ]));
358+ len = ( int ) strnlen ((char * )nla_data (tb_msg [NLMSGERR_ATTR_MSG ]),
359+ nla_len (tb_msg [NLMSGERR_ATTR_MSG ]));
365360 msg (M_WARN , "kernel error: %*s" , len , (char * )nla_data (tb_msg [NLMSGERR_ATTR_MSG ]));
366361 }
367362
@@ -606,7 +601,7 @@ dco_new_key(dco_context_t *dco, unsigned int peerid, int keyid, dco_key_slot_t s
606601 msg (D_DCO_DEBUG , "%s: slot %d, key-id %d, peer-id %d, cipher %s" , __func__ , slot , keyid , peerid ,
607602 ciphername );
608603
609- const size_t key_len = cipher_kt_key_size (ciphername );
604+ const int key_len = cipher_kt_key_size (ciphername );
610605 const int nonce_tail_len = 8 ;
611606
612607 struct nl_msg * nl_msg = ovpn_dco_nlmsg_create (dco , OVPN_CMD_KEY_NEW );
@@ -1303,8 +1298,4 @@ dco_get_supported_ciphers(void)
13031298 return "AES-128-GCM:AES-256-GCM:AES-192-GCM:CHACHA20-POLY1305" ;
13041299}
13051300
1306- #if defined(__GNUC__ ) || defined(__clang__ )
1307- #pragma GCC diagnostic pop
1308- #endif
1309-
13101301#endif /* defined(ENABLE_DCO) && defined(TARGET_LINUX) */
0 commit comments