r19179 fixed some compiler warnings by introducing temporary local variables
matching types in function prototypes. The temporary variable was not
initialized before being passed to the function, so it was working last week,
but is failing this week (likely due to a change in the endianess of the test
box).
anyhoo, this patch initializes the temporary variable. The code is in the new
support for (D)TLS, so it's not compiled in by default.
commit 817fa47bb0b112ac07f9359aefc4f2694d730f0c
Author: Robert Story <rst...@freesnmp.com>
Date: Tue Aug 24 13:50:45 2010 -0400
fix more code broken by 'compiler warning fix' in r19179
diff --git a/net-snmp/snmplib/cert_util.c b/net-snmp/snmplib/cert_util.c
index ab99e4d..7e1fcd3 100644
--- a/net-snmp/snmplib/cert_util.c
+++ b/net-snmp/snmplib/cert_util.c
@@ -1873,6 +1873,7 @@ netsnmp_tls_fingerprint_parse(const u_char *binary_fp, int fp_len,
netsnmp_require_ptr_LRV( hash_type_ptr, SNMPERR_GENERR );
netsnmp_require_ptr_LRV( fp_str_ptr, SNMPERR_GENERR );
+ netsnmp_require_ptr_LRV( fp_str_len, SNMPERR_GENERR );
/*
* output string is binary fp length (minus 1 for initial hash type
@@ -1896,6 +1897,7 @@ netsnmp_tls_fingerprint_parse(const u_char *binary_fp, int fp_len,
/*
* netsnmp_binary_to_hex allocate space for string, if needed
*/
+ fp_str_size = *fp_str_len;
*hash_type_ptr = binary_fp[0];
netsnmp_binary_to_hex((u_char**)fp_str_ptr, &fp_str_size,
realloc, &binary_fp[1], fp_len - 1);
------------------------------------------------------------------------------
Sell apps to millions through the Intel(R) Atom(Tm) Developer Program
Be part of this innovative community and reach millions of netbook users
worldwide. Take advantage of special opportunities to increase revenue and
speed time-to-market. Join now, and jumpstart your future.
http://p.sf.net/sfu/intel-atom-d2d
_______________________________________________
Net-snmp-coders mailing list
Net-snmp-coders@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders