mirror of
https://github.com/moparisthebest/curl
synced 2024-12-23 08:38:49 -05:00
vtls: fix narrowing conversion warnings
Curl_timeleft returns `timediff_t`, which is 64 bits wide also on
32-bit systems since commit b1616dad8f
.
Closes https://github.com/curl/curl/pull/4398
This commit is contained in:
parent
96a3ab7bc8
commit
527461285f
@ -5,7 +5,7 @@
|
||||
* | (__| |_| | _ <| |___
|
||||
* \___|\___/|_| \_\_____|
|
||||
*
|
||||
* Copyright (C) 1998 - 2018, Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
* Copyright (C) 1998 - 2019, Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
*
|
||||
* This software is licensed as described in the file COPYING, which
|
||||
* you should have received as part of this distribution. The terms
|
||||
@ -1157,7 +1157,7 @@ static CURLcode gskit_connect_common(struct connectdata *conn, int sockindex,
|
||||
{
|
||||
struct Curl_easy *data = conn->data;
|
||||
struct ssl_connect_data *connssl = &conn->ssl[sockindex];
|
||||
long timeout_ms;
|
||||
timediff_t timeout_ms;
|
||||
CURLcode result = CURLE_OK;
|
||||
|
||||
*done = connssl->state == ssl_connection_complete;
|
||||
|
@ -288,7 +288,7 @@ static CURLcode handshake(struct connectdata *conn,
|
||||
curl_socket_t sockfd = conn->sock[sockindex];
|
||||
|
||||
for(;;) {
|
||||
time_t timeout_ms;
|
||||
timediff_t timeout_ms;
|
||||
int rc;
|
||||
|
||||
/* check allowed time left */
|
||||
@ -311,7 +311,7 @@ static CURLcode handshake(struct connectdata *conn,
|
||||
|
||||
what = Curl_socket_check(readfd, CURL_SOCKET_BAD, writefd,
|
||||
nonblocking?0:
|
||||
timeout_ms?timeout_ms:1000);
|
||||
timeout_ms?(time_t)timeout_ms:1000);
|
||||
if(what < 0) {
|
||||
/* fatal error */
|
||||
failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO);
|
||||
|
@ -884,7 +884,7 @@ mbed_connect_common(struct connectdata *conn,
|
||||
struct Curl_easy *data = conn->data;
|
||||
struct ssl_connect_data *connssl = &conn->ssl[sockindex];
|
||||
curl_socket_t sockfd = conn->sock[sockindex];
|
||||
long timeout_ms;
|
||||
timediff_t timeout_ms;
|
||||
int what;
|
||||
|
||||
/* check if the connection has already been established */
|
||||
@ -930,7 +930,7 @@ mbed_connect_common(struct connectdata *conn,
|
||||
connssl->connecting_state?sockfd:CURL_SOCKET_BAD;
|
||||
|
||||
what = Curl_socket_check(readfd, CURL_SOCKET_BAD, writefd,
|
||||
nonblocking ? 0 : timeout_ms);
|
||||
nonblocking ? 0 : (time_t)timeout_ms);
|
||||
if(what < 0) {
|
||||
/* fatal error */
|
||||
failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO);
|
||||
|
@ -6,7 +6,7 @@
|
||||
* \___|\___/|_| \_\_____|
|
||||
*
|
||||
* Copyright (C) 2017 - 2018, Yiming Jing, <jingyiming@baidu.com>
|
||||
* Copyright (C) 1998 - 2018, Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
* Copyright (C) 1998 - 2019, Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
*
|
||||
* This software is licensed as described in the file COPYING, which
|
||||
* you should have received as part of this distribution. The terms
|
||||
@ -494,7 +494,7 @@ mesalink_connect_common(struct connectdata *conn, int sockindex,
|
||||
struct Curl_easy *data = conn->data;
|
||||
struct ssl_connect_data *connssl = &conn->ssl[sockindex];
|
||||
curl_socket_t sockfd = conn->sock[sockindex];
|
||||
time_t timeout_ms;
|
||||
timediff_t timeout_ms;
|
||||
int what;
|
||||
|
||||
/* check if the connection has already been established */
|
||||
@ -543,7 +543,8 @@ mesalink_connect_common(struct connectdata *conn, int sockindex,
|
||||
: CURL_SOCKET_BAD;
|
||||
|
||||
what = Curl_socket_check(
|
||||
readfd, CURL_SOCKET_BAD, writefd, nonblocking ? 0 : timeout_ms);
|
||||
readfd, CURL_SOCKET_BAD, writefd,
|
||||
nonblocking ? 0 : (time_t)timeout_ms);
|
||||
if(what < 0) {
|
||||
/* fatal error */
|
||||
failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO);
|
||||
|
@ -2127,7 +2127,7 @@ static CURLcode nss_do_connect(struct connectdata *conn, int sockindex)
|
||||
|
||||
|
||||
/* check timeout situation */
|
||||
const time_t time_left = Curl_timeleft(data, NULL, TRUE);
|
||||
const timediff_t time_left = Curl_timeleft(data, NULL, TRUE);
|
||||
if(time_left < 0) {
|
||||
failf(data, "timed out before SSL handshake");
|
||||
result = CURLE_OPERATION_TIMEDOUT;
|
||||
|
@ -3654,7 +3654,7 @@ static CURLcode ossl_connect_common(struct connectdata *conn,
|
||||
struct Curl_easy *data = conn->data;
|
||||
struct ssl_connect_data *connssl = &conn->ssl[sockindex];
|
||||
curl_socket_t sockfd = conn->sock[sockindex];
|
||||
time_t timeout_ms;
|
||||
timediff_t timeout_ms;
|
||||
int what;
|
||||
|
||||
/* check if the connection has already been established */
|
||||
@ -3701,7 +3701,7 @@ static CURLcode ossl_connect_common(struct connectdata *conn,
|
||||
connssl->connecting_state?sockfd:CURL_SOCKET_BAD;
|
||||
|
||||
what = Curl_socket_check(readfd, CURL_SOCKET_BAD, writefd,
|
||||
nonblocking?0:timeout_ms);
|
||||
nonblocking?0:(time_t)timeout_ms);
|
||||
if(what < 0) {
|
||||
/* fatal error */
|
||||
failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO);
|
||||
|
@ -734,7 +734,7 @@ polarssl_connect_common(struct connectdata *conn,
|
||||
struct Curl_easy *data = conn->data;
|
||||
struct ssl_connect_data *connssl = &conn->ssl[sockindex];
|
||||
curl_socket_t sockfd = conn->sock[sockindex];
|
||||
long timeout_ms;
|
||||
timediff_t timeout_ms;
|
||||
int what;
|
||||
|
||||
/* check if the connection has already been established */
|
||||
@ -781,7 +781,7 @@ polarssl_connect_common(struct connectdata *conn,
|
||||
connssl->connecting_state?sockfd:CURL_SOCKET_BAD;
|
||||
|
||||
what = Curl_socket_check(readfd, CURL_SOCKET_BAD, writefd,
|
||||
nonblocking?0:timeout_ms);
|
||||
nonblocking?0:(time_t)timeout_ms);
|
||||
if(what < 0) {
|
||||
/* fatal error */
|
||||
failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO);
|
||||
|
@ -1347,7 +1347,7 @@ schannel_connect_common(struct connectdata *conn, int sockindex,
|
||||
struct Curl_easy *data = conn->data;
|
||||
struct ssl_connect_data *connssl = &conn->ssl[sockindex];
|
||||
curl_socket_t sockfd = conn->sock[sockindex];
|
||||
time_t timeout_ms;
|
||||
timediff_t timeout_ms;
|
||||
int what;
|
||||
|
||||
/* check if the connection has already been established */
|
||||
@ -1394,7 +1394,7 @@ schannel_connect_common(struct connectdata *conn, int sockindex,
|
||||
connssl->connecting_state ? sockfd : CURL_SOCKET_BAD;
|
||||
|
||||
what = Curl_socket_check(readfd, CURL_SOCKET_BAD, writefd,
|
||||
nonblocking ? 0 : timeout_ms);
|
||||
nonblocking ? 0 : (time_t)timeout_ms);
|
||||
if(what < 0) {
|
||||
/* fatal error */
|
||||
failf(data, "select/poll on SSL/TLS socket, errno: %d", SOCKERRNO);
|
||||
@ -1544,7 +1544,7 @@ schannel_send(struct connectdata *conn, int sockindex,
|
||||
/* send entire message or fail */
|
||||
while(len > (size_t)written) {
|
||||
ssize_t this_write;
|
||||
time_t timeleft;
|
||||
timediff_t timeleft;
|
||||
int what;
|
||||
|
||||
this_write = 0;
|
||||
|
@ -2805,7 +2805,7 @@ sectransp_connect_common(struct connectdata *conn,
|
||||
struct Curl_easy *data = conn->data;
|
||||
struct ssl_connect_data *connssl = &conn->ssl[sockindex];
|
||||
curl_socket_t sockfd = conn->sock[sockindex];
|
||||
long timeout_ms;
|
||||
timediff_t timeout_ms;
|
||||
int what;
|
||||
|
||||
/* check if the connection has already been established */
|
||||
@ -2852,7 +2852,7 @@ sectransp_connect_common(struct connectdata *conn,
|
||||
connssl->connecting_state?sockfd:CURL_SOCKET_BAD;
|
||||
|
||||
what = Curl_socket_check(readfd, CURL_SOCKET_BAD, writefd,
|
||||
nonblocking?0:timeout_ms);
|
||||
nonblocking?0:(time_t)timeout_ms);
|
||||
if(what < 0) {
|
||||
/* fatal error */
|
||||
failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO);
|
||||
|
Loading…
Reference in New Issue
Block a user