Hi Simo,
Thanks again for the patches. I've applied most of them (see bellow) or
just fixed problems in other ways. The code is pushed to Gnome git and
I wonder if it would be possible to re-run the tools to make sure no
new issues are found? Thanks in advance!
* 0001-Check-returned-value.patch
Looks good, commited
* 0002-Fix-dead-code.patch
I don't believe the first part of the patch is correct: assert will
fire if condition is "false" which is what the original code does:
xmlSecAssert2("..." == NULL, 1)
Since string != NULL, it will fire (ugly, I know). What it actually
complains about is the return(-1) *after* that - assert always fires
and returns so second return is never reached. So to fix this one, I've
replaced assert with a real error.
The second part - Coverity is correct with the useVisa3DHack flag but
I feel much safer having the dead code that tries to free buffer instead
of not having it.
* 0003-Fix-potential-NULL-pointer-dereference.patch
Looks good, applied with a minor tweak.
* 0004-Fix-printf-format-warnings.patch
I hate printf() integer formats. Applied.
* 0005-Silence-warnings-about-unused-computed-values.patch
Don't think it matters much. Applied.
* 0006-Elimanate-assignments-that-are-never-used.patch
The keysdata.c patch is wrong - this is actually a good catch and ret
should be checked.
The pkikeys.c patch is also wrong - a check is needed.
The nss/x509vfy.c patch is badly wrong - it breaks the parser. I've set
the initial value instead.
The src/openssl/x509vfy.c is partially correct. The flag variable is
important and is actually used (I guess Clang got confused by all the
#if's in this file).
The parser.c patch is wrong too - again good catch and ret should be
checked.
Anyway, the errors were good - I just patched them in different ways.
* 0007-Fix-potential-NULL-dereference.patch
Looks good, applied with a minor tweak.
Aleksey
On 6/3/14, 2:21 PM, Simo Sorce wrote:
> Hello,
> we've run a bunch of checkers against the latest xmlsec code and I have
> a few patches you may want to consider for inclusion.
>
> Some are no brainers, others you may like or not.
> I would like to apply them downstream once they are accepted in master,
> let me know what you think.
>
> Simo.
>
>
>
> _______________________________________________
> xmlsec mailing list
> [email protected]
> http://www.aleksey.com/mailman/listinfo/xmlsec
>
_______________________________________________
xmlsec mailing list
[email protected]
http://www.aleksey.com/mailman/listinfo/xmlsec