summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAndy Fiddaman <omnios@citrus-it.co.uk>2018-10-11 11:01:00 +0000
committerDan McDonald <danmcd@joyent.com>2018-10-11 15:39:39 -0400
commit3f8dd771c0f9c6553982e4dbcc5c221b5dcf2489 (patch)
tree77c7a9ffb6e8cb811c6b39490562088c6007cd7e
parentfdfb62c8fbf6e03ca943243b626360bede206f18 (diff)
downloadillumos-joyent-3f8dd771c0f9c6553982e4dbcc5c221b5dcf2489.tar.gz
9887 pkinit_crypto_openssl.c: warnings from newer gcc
Reviewed by: Yuri Pankov <yuri.pankov@nexenta.com> Reviewed by: Toomas Soome <tsoome@me.com> Reviewed by: Jason King <jason.king@joyent.com> Approved by: Dan McDonald <danmcd@joyent.com>
-rw-r--r--usr/src/lib/krb5/plugins/preauth/pkinit/pkinit_crypto_openssl.c23
1 files changed, 11 insertions, 12 deletions
diff --git a/usr/src/lib/krb5/plugins/preauth/pkinit/pkinit_crypto_openssl.c b/usr/src/lib/krb5/plugins/preauth/pkinit/pkinit_crypto_openssl.c
index 3ae2f2a362..1dc79baa0a 100644
--- a/usr/src/lib/krb5/plugins/preauth/pkinit/pkinit_crypto_openssl.c
+++ b/usr/src/lib/krb5/plugins/preauth/pkinit/pkinit_crypto_openssl.c
@@ -1765,7 +1765,7 @@ cleanup:
free(enc_data);
if (encerts != NULL)
sk_X509_free(encerts);
-
+
return retval;
}
@@ -1911,7 +1911,7 @@ cms_envelopeddata_verify(krb5_context context,
if (!retval)
pkiDebug("PKCS7 Verification Success\n");
- else {
+ else {
pkiDebug("PKCS7 Verification Failure\n");
goto cleanup;
}
@@ -2842,7 +2842,7 @@ pkinit_create_sequence_of_principal_identifiers(
if (retval) {
pkiDebug("create_krb5_trustedCertifiers failed\n");
goto cleanup;
- }
+ }
break;
case TD_INVALID_CERTIFICATES:
retval = create_krb5_invalidCertificates(context, plg_cryptoctx,
@@ -2850,7 +2850,7 @@ pkinit_create_sequence_of_principal_identifiers(
if (retval) {
pkiDebug("create_krb5_invalidCertificates failed\n");
goto cleanup;
- }
+ }
break;
default:
retval = -1;
@@ -3862,7 +3862,7 @@ pkinit_choose_tokens(krb5_context context,
} else {
char *cp = reply.data;
/* reply better be digits */
- while (*cp != NULL) {
+ while (*cp != '\0') {
if (!isdigit(*cp++))
return (EINVAL);
}
@@ -4106,7 +4106,7 @@ pkinit_open_session(krb5_context context,
CK_SLOT_ID_PTR slotlist = NULL, tmpslotlist = NULL;
CK_TOKEN_INFO tinfo;
krb5_boolean tokenmatch = FALSE;
- CK_SESSION_HANDLE tmpsession = NULL;
+ CK_SESSION_HANDLE tmpsession = CK_INVALID_HANDLE;
struct _token_choices token_choices;
int choice = 0;
@@ -4610,7 +4610,7 @@ pkinit_find_private_key(pkinit_identity_crypto_context id_cryptoctx,
cert = sk_X509_value(id_cryptoctx->my_certs, 0);
priv = X509_get_pubkey(cert);
if (priv == NULL) {
- pkiDebug("Failed to extract pub key from cert\n");
+ pkiDebug("Failed to extract pub key from cert\n");
return KRB5KDC_ERR_PREAUTH_FAILED;
}
@@ -5915,7 +5915,7 @@ crypto_cert_select(krb5_context context,
if (cd->idctx->my_certs != NULL) {
sk_X509_pop_free(cd->idctx->my_certs, X509_free);
}
- cd->idctx->my_certs = sk_X509_new_null();
+ cd->idctx->my_certs = sk_X509_new_null();
sk_X509_push(cd->idctx->my_certs, cd->cred->cert);
cd->idctx->creds[cd->index]->cert = NULL; /* Don't free it twice */
cd->idctx->cert_index = 0;
@@ -5969,7 +5969,7 @@ crypto_cert_select_default(krb5_context context,
if (id_cryptoctx->my_certs != NULL) {
sk_X509_pop_free(id_cryptoctx->my_certs, X509_free);
}
- id_cryptoctx->my_certs = sk_X509_new_null();
+ id_cryptoctx->my_certs = sk_X509_new_null();
sk_X509_push(id_cryptoctx->my_certs, id_cryptoctx->creds[0]->cert);
id_cryptoctx->creds[0]->cert = NULL; /* Don't free it twice */
id_cryptoctx->cert_index = 0;
@@ -6311,7 +6311,7 @@ if (longhorn == 0) { /* XXX Longhorn doesn't like this */
if ((p = krb5_cas[i]->subjectKeyIdentifier.data =
(unsigned char *)malloc((size_t) len)) == NULL)
goto cleanup;
- i2d_ASN1_OCTET_STRING(ikeyid, &p);
+ i2d_ASN1_OCTET_STRING(ikeyid, &p);
krb5_cas[i]->subjectKeyIdentifier.length = len;
}
if (ikeyid != NULL)
@@ -6626,7 +6626,7 @@ pkinit_process_td_trusted_certifiers(
pkiDebug("#%d cert = %s is trusted by kdc\n", i, buf);
else
pkiDebug("#%d cert = %s is invalid\n", i, buf);
- sk_X509_NAME_push(sk_xn, xn);
+ sk_X509_NAME_push(sk_xn, xn);
}
if (krb5_trusted_certifiers[i]->issuerAndSerialNumber.data != NULL) {
@@ -6736,7 +6736,6 @@ pkcs7_dataDecode(krb5_context context,
PKCS7_R_NO_RECIPIENT_MATCHES_CERTIFICATE);
goto cleanup;
}
-
}
/* If we haven't got a certificate try each ri in turn */