diff options
author | relyea%netscape.com <devnull@localhost> | 2001-12-07 01:36:25 +0000 |
---|---|---|
committer | relyea%netscape.com <devnull@localhost> | 2001-12-07 01:36:25 +0000 |
commit | a29c06105eb45d5519fadb2ce261d3498450ae81 (patch) | |
tree | 3b4864f1ced4a534816a724f66be6608bcba54bc /security/nss/lib/softoken/keydb.c | |
parent | 19724b6760c3175a98f2d1807562d708848a59d5 (diff) | |
download | nss-hg-a29c06105eb45d5519fadb2ce261d3498450ae81.tar.gz |
Clean up compilier warnings on Solaris and Linux, most particularly:
1) Implicit declaration of function.
2) Possibly unitialized variables.
These warnings have indicated some real problems in the code, so many changes
are not just to silence the warnings, but to fix the problems. Others were
inocuous, but the warnings were silenced to reduce the noise.
Diffstat (limited to 'security/nss/lib/softoken/keydb.c')
-rw-r--r-- | security/nss/lib/softoken/keydb.c | 105 |
1 files changed, 54 insertions, 51 deletions
diff --git a/security/nss/lib/softoken/keydb.c b/security/nss/lib/softoken/keydb.c index 059115741..ada5a58c8 100644 --- a/security/nss/lib/softoken/keydb.c +++ b/security/nss/lib/softoken/keydb.c @@ -719,6 +719,55 @@ done: } #endif +static PRBool +seckey_HasAServerKey(DB *db) +{ + DBT key; + DBT data; + int ret; + PRBool found = PR_FALSE; + + ret = (* db->seq)(db, &key, &data, R_FIRST); + if ( ret ) { + return PR_FALSE; + } + + do { + /* skip version record */ + if ( data.size > 1 ) { + /* skip salt */ + if ( key.size == ( sizeof(SALT_STRING) - 1 ) ) { + if ( PORT_Memcmp(key.data, SALT_STRING, key.size) == 0 ) { + continue; + } + } + /* skip pw check entry */ + if ( key.size == KEYDB_PW_CHECK_LEN ) { + if ( PORT_Memcmp(key.data, KEYDB_PW_CHECK_STRING, + KEYDB_PW_CHECK_LEN) == 0 ) { + continue; + } + } + + /* keys stored by nickname will have 0 as the last byte of the + * db key. Other keys must be stored by modulus. We will not + * update those because they are left over from a keygen that + * never resulted in a cert. + */ + if ( ((unsigned char *)key.data)[key.size-1] != 0 ) { + continue; + } + + if (PORT_Strcmp(key.data,"Server-Key") == 0) { + found = PR_TRUE; + break; + } + + } + } while ( (* db->seq)(db, &key, &data, R_NEXT) == 0 ); + + return found; +} /* * currently updates key database from v2 to v3 */ @@ -1048,7 +1097,9 @@ newdb: } +#ifdef NSS_USE_KEY4_DB skip_v2_db: +#endif /* we are using the old salt if we updated from an old db */ if ( ! updated ) { rv = makeGlobalSalt(handle); @@ -1064,7 +1115,9 @@ skip_v2_db: } } +#ifdef NSS_USE_KEY4_DB done: +#endif handle->global_salt = GetKeyDBGlobalSalt(handle); if ( dbname ) PORT_Free( dbname ); @@ -1493,7 +1546,7 @@ seckey_encrypt_private_key( SECStatus rv = SECFailure; PLArenaPool *temparena = NULL, *permarena = NULL; SECItem *der_item = NULL; - NSSPKCS5PBEParameter *param; + NSSPKCS5PBEParameter *param = NULL; SECItem *dummy = NULL, *dest = NULL; SECAlgorithmID *algid; @@ -2146,56 +2199,6 @@ loser: return(rv); } -static PRBool -seckey_HasAServerKey(DB *db) -{ - DBT key; - DBT data; - int ret; - PRBool found = PR_FALSE; - - ret = (* db->seq)(db, &key, &data, R_FIRST); - if ( ret ) { - return PR_FALSE; - } - - do { - /* skip version record */ - if ( data.size > 1 ) { - /* skip salt */ - if ( key.size == ( sizeof(SALT_STRING) - 1 ) ) { - if ( PORT_Memcmp(key.data, SALT_STRING, key.size) == 0 ) { - continue; - } - } - /* skip pw check entry */ - if ( key.size == KEYDB_PW_CHECK_LEN ) { - if ( PORT_Memcmp(key.data, KEYDB_PW_CHECK_STRING, - KEYDB_PW_CHECK_LEN) == 0 ) { - continue; - } - } - - /* keys stored by nickname will have 0 as the last byte of the - * db key. Other keys must be stored by modulus. We will not - * update those because they are left over from a keygen that - * never resulted in a cert. - */ - if ( ((unsigned char *)key.data)[key.size-1] != 0 ) { - continue; - } - - if (PORT_Strcmp(key.data,"Server-Key") == 0) { - found = PR_TRUE; - break; - } - - } - } while ( (* db->seq)(db, &key, &data, R_NEXT) == 0 ); - - return found; -} - static SECStatus seckey_CheckKeyDB1Password(NSSLOWKEYDBHandle *handle, SECItem *pwitem) { |