@@ -177,7 +177,6 @@ static srtp_err_status_t srtp_stream_dealloc(
177177 const srtp_stream_ctx_t * stream_template )
178178{
179179 srtp_err_status_t status ;
180- unsigned int i = 0 ;
181180 srtp_session_keys_t * session_keys = NULL ;
182181 srtp_session_keys_t * template_session_keys = NULL ;
183182
@@ -187,7 +186,7 @@ static srtp_err_status_t srtp_stream_dealloc(
187186 * anything else
188187 */
189188 if (stream -> session_keys ) {
190- for (i = 0 ; i < stream -> num_master_keys ; i ++ ) {
189+ for (size_t i = 0 ; i < stream -> num_master_keys ; i ++ ) {
191190 session_keys = & stream -> session_keys [i ];
192191
193192 if (stream_template &&
@@ -377,7 +376,7 @@ static srtp_err_status_t srtp_stream_alloc(srtp_stream_ctx_t **str_ptr,
377376{
378377 srtp_stream_ctx_t * str ;
379378 srtp_err_status_t stat ;
380- unsigned int i = 0 ;
379+ size_t i = 0 ;
381380 srtp_session_keys_t * session_keys = NULL ;
382381
383382 stat = srtp_valid_policy (p );
@@ -544,7 +543,6 @@ static srtp_err_status_t srtp_stream_clone(
544543{
545544 srtp_err_status_t status ;
546545 srtp_stream_ctx_t * str ;
547- unsigned int i = 0 ;
548546 srtp_session_keys_t * session_keys = NULL ;
549547 const srtp_session_keys_t * template_session_keys = NULL ;
550548
@@ -566,7 +564,7 @@ static srtp_err_status_t srtp_stream_clone(
566564 return srtp_err_status_alloc_fail ;
567565 }
568566
569- for (i = 0 ; i < stream_template -> num_master_keys ; i ++ ) {
567+ for (size_t i = 0 ; i < stream_template -> num_master_keys ; i ++ ) {
570568 session_keys = & str -> session_keys [i ];
571569 template_session_keys = & stream_template -> session_keys [i ];
572570
@@ -914,13 +912,11 @@ size_t srtp_inject_mki(uint8_t *mki_tag_location,
914912 return mki_size ;
915913}
916914
917- srtp_err_status_t srtp_stream_init_all_master_keys (
918- srtp_stream_ctx_t * srtp ,
919- unsigned char * key ,
920- srtp_master_key_t * * keys ,
921- const unsigned int max_master_keys )
915+ srtp_err_status_t srtp_stream_init_all_master_keys (srtp_stream_ctx_t * srtp ,
916+ unsigned char * key ,
917+ srtp_master_key_t * * keys ,
918+ const size_t max_master_keys )
922919{
923- unsigned int i = 0 ;
924920 srtp_err_status_t status = srtp_err_status_ok ;
925921 srtp_master_key_t single_master_key ;
926922
@@ -933,8 +929,8 @@ srtp_err_status_t srtp_stream_init_all_master_keys(
933929 } else {
934930 srtp -> num_master_keys = max_master_keys ;
935931
936- for (i = 0 ; i < srtp -> num_master_keys && i < SRTP_MAX_NUM_MASTER_KEYS ;
937- i ++ ) {
932+ for (size_t i = 0 ;
933+ i < srtp -> num_master_keys && i < SRTP_MAX_NUM_MASTER_KEYS ; i ++ ) {
938934 status = srtp_stream_init_keys (srtp , keys [i ], i );
939935
940936 if (status ) {
@@ -948,7 +944,7 @@ srtp_err_status_t srtp_stream_init_all_master_keys(
948944
949945srtp_err_status_t srtp_stream_init_keys (srtp_stream_ctx_t * srtp ,
950946 srtp_master_key_t * master_key ,
951- const unsigned int current_mki_index )
947+ const size_t current_mki_index )
952948{
953949 srtp_err_status_t stat ;
954950 srtp_kdf_t kdf ;
@@ -1637,7 +1633,6 @@ srtp_session_keys_t *srtp_get_session_keys(srtp_stream_ctx_t *stream,
16371633 size_t base_mki_start_location = pkt_octet_len ;
16381634 size_t mki_start_location = 0 ;
16391635 size_t tag_len = 0 ;
1640- unsigned int i = 0 ;
16411636
16421637 // Determine the authentication tag size
16431638 if (stream -> session_keys [0 ].rtp_cipher -> algorithm == SRTP_AES_GCM_128 ||
@@ -1654,7 +1649,7 @@ srtp_session_keys_t *srtp_get_session_keys(srtp_stream_ctx_t *stream,
16541649
16551650 base_mki_start_location -= tag_len ;
16561651
1657- for (i = 0 ; i < stream -> num_master_keys ; i ++ ) {
1652+ for (size_t i = 0 ; i < stream -> num_master_keys ; i ++ ) {
16581653 if (stream -> session_keys [i ].mki_size != 0 &&
16591654 stream -> session_keys [i ].mki_size <= base_mki_start_location ) {
16601655 * mki_size = stream -> session_keys [i ].mki_size ;
0 commit comments