From 471df2a63e277e4c52ecdcb8d6257e51f3796c0e Mon Sep 17 00:00:00 2001 From: Enrik Berkhan Date: Tue, 27 Oct 2020 20:26:46 +0100 Subject: [PATCH] salty: cast pointer arguments to avoid warnings. This is a kind of promise that the underlying buffers have the correct size. We know what we are doing. Hopefully ;-) --- fido2/crypto.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/fido2/crypto.c b/fido2/crypto.c index 9dee0d1..34c2671 100644 --- a/fido2/crypto.c +++ b/fido2/crypto.c @@ -370,7 +370,7 @@ void crypto_ed25519_derive_public_key(uint8_t * data, int len, uint8_t * x) uint8_t seed[salty_SECRETKEY_SEED_LENGTH]; generate_private_key(data, len, NULL, 0, seed); - salty_public_key(seed, x); + salty_public_key(&seed, (uint8_t (*)[salty_PUBLICKEY_SERIALIZED_LENGTH])x); #else @@ -430,7 +430,8 @@ void crypto_ed25519_sign(uint8_t * data1, int len1, uint8_t * data2, int len2, u #if defined(STM32L432xx) // TODO: check that correct load_key() had been called? - salty_sign(_signing_key, data, len, sig); + salty_sign((uint8_t (*)[salty_SECRETKEY_SEED_LENGTH])_signing_key, data, len, + (uint8_t (*)[salty_SIGNATURE_SERIALIZED_LENGTH])sig); #else