diff options
author | Werner Koch <[email protected]> | 2016-10-24 11:12:05 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2016-10-24 11:12:05 +0000 |
commit | 9d6146d6f9870fbfcec15cdc4becaf094d5a90e0 (patch) | |
tree | dc8a2eda5978e6e955497b302491bca7b71dcc78 | |
parent | agent: Minor cleanup for recent change in findkey.c (diff) | |
download | gnupg-9d6146d6f9870fbfcec15cdc4becaf094d5a90e0.tar.gz gnupg-9d6146d6f9870fbfcec15cdc4becaf094d5a90e0.zip |
gpg: Replace two sprintf calls.
* g10/keygen.c (print_status_key_created): Use snprintf for now.
(ask_expire_interval): Replace xmalloc and sprintf by xasprintf.
--
Future updates: Replace code like
r = xcalloc (1, sizeof *r + 20 );
r->key = pKEYLENGTH;
sprintf( r->u.value, "%u", info.key_attr[0].nbits);
by something like
r = new_r_with_value ("%u", info.key_attr[0].nbits);
r->key = pKEYLENGTH;
Signed-off-by: Werner Koch <[email protected]>
-rw-r--r-- | g10/keygen.c | 11 |
1 files changed, 3 insertions, 8 deletions
diff --git a/g10/keygen.c b/g10/keygen.c index ed529c750..d98b70b94 100644 --- a/g10/keygen.c +++ b/g10/keygen.c @@ -180,8 +180,9 @@ print_status_key_created (int letter, PKT_public_key *pk, const char *handle) *p++ = ' '; fingerprint_from_pk (pk, array, &n); s = array; + /* Fixme: Use bin2hex */ for (i=0; i < n ; i++, s++, p += 2) - sprintf (p, "%02X", *s); + snprintf (p, 3, "%02X", *s); } } if (*handle) @@ -2428,13 +2429,7 @@ ask_expire_interval(int object,const char *def_expire) { char *prompt; -#define PROMPTSTRING _("Signature is valid for? (%s) ") - /* This will actually end up larger than necessary because - of the 2 bytes for '%s' */ - prompt=xmalloc(strlen(PROMPTSTRING)+strlen(def_expire)+1); - sprintf(prompt,PROMPTSTRING,def_expire); -#undef PROMPTSTRING - + prompt = xasprintf (_("Signature is valid for? (%s) "), def_expire); answer = cpr_get("siggen.valid",prompt); xfree(prompt); |