| Index: crypto/symmetric_key_win.cc
|
| diff --git a/crypto/symmetric_key_win.cc b/crypto/symmetric_key_win.cc
|
| index e2dc9b4ae2d9256414eb1a3d632aed3889b96085..efc7fe4b8269b78ca46d1ab6b1795fc8157e7b3f 100644
|
| --- a/crypto/symmetric_key_win.cc
|
| +++ b/crypto/symmetric_key_win.cc
|
| @@ -51,7 +51,7 @@ bool ImportRawKey(HCRYPTPROV provider,
|
| ALG_ID alg,
|
| const void* key_data, size_t key_size,
|
| ScopedHCRYPTKEY* key) {
|
| - DCHECK_GT(key_size, 0);
|
| + DCHECK_GT(key_size, 0u);
|
|
|
| DWORD actual_size =
|
| static_cast<DWORD>(sizeof(PlaintextBlobHeader) + key_size);
|
| @@ -314,7 +314,7 @@ SymmetricKey::~SymmetricKey() {
|
| // static
|
| SymmetricKey* SymmetricKey::GenerateRandomKey(Algorithm algorithm,
|
| size_t key_size_in_bits) {
|
| - DCHECK_GE(key_size_in_bits, 8);
|
| + DCHECK_GE(key_size_in_bits, 8u);
|
|
|
| ScopedHCRYPTPROV provider;
|
| ScopedHCRYPTKEY key;
|
| @@ -412,7 +412,7 @@ SymmetricKey* SymmetricKey::DeriveKeyFromPassword(Algorithm algorithm,
|
|
|
| // 1. If dkLen > (2^32 - 1) * hLen, output "derived key too long" and stop.
|
| size_t dkLen = key_size_in_bits / 8;
|
| - DCHECK_GT(dkLen, 0);
|
| + DCHECK_GT(dkLen, 0u);
|
|
|
| if ((dkLen / hLen) > 0xFFFFFFFF) {
|
| DLOG(ERROR) << "Derived key too long.";
|
| @@ -423,7 +423,7 @@ SymmetricKey* SymmetricKey::DeriveKeyFromPassword(Algorithm algorithm,
|
| // rounding up, and let r be the number of octets in the last
|
| // block:
|
| size_t L = (dkLen + hLen - 1) / hLen;
|
| - DCHECK_GT(L, 0);
|
| + DCHECK_GT(L, 0u);
|
|
|
| size_t total_generated_size = L * hLen;
|
| std::vector<BYTE> generated_key(total_generated_size);
|
|
|