return 0;
if(!pubkeys_havepriv[keyid])
return 0;
- if(qd0_blind_id_sign_with_private_id_sign(pubkeys[keyid], true, false, data, datasize, signed_data, &signed_size))
+ if(qd0_blind_id_sign_with_private_id_sign(pubkeys[keyid], true, false, (char *)data, datasize, (char *)signed_data, &signed_size))
return signed_size;
return 0;
}
if(stringbuffer->strings[i])
ltotal += strlen(stringbuffer->strings[i]);
}
- handle->postdata = Z_Malloc(ltotal);
+ handle->postdata = (unsigned char *)Z_Malloc(ltotal);
handle->postlen = ltotal;
ltotal = 0;
for(i = 0;i < stringbuffer->num_strings;i++)
}
else
{
- handle->postdata = Z_Malloc(l);
+ handle->postdata = (unsigned char *)Z_Malloc(l);
handle->postlen = l;
memcpy(handle->postdata, postseparator, l);
}
if(postkeyid >= 0)
{
- unsigned char *signed_data = Z_Malloc(handle->postlen + 8192);
+ unsigned char *signed_data = (unsigned char *)Z_Malloc(handle->postlen + 8192);
size_t signed_size = Crypto_SignData(handle->postdata, handle->postlen, postkeyid, signed_data, handle->postlen + 8192);
if(!signed_size)
{