aboutsummaryrefslogtreecommitdiffstats
path: root/g10
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--g10/ChangeLog12
-rw-r--r--g10/call-agent.c1
-rw-r--r--g10/card-util.c4
-rw-r--r--g10/keyedit.c4
-rw-r--r--g10/keyring.c2
-rw-r--r--g10/parse-packet.c2
-rw-r--r--g10/passphrase.c2
-rw-r--r--g10/revoke.c2
8 files changed, 18 insertions, 11 deletions
diff --git a/g10/ChangeLog b/g10/ChangeLog
index e961921a1..fcf759041 100644
--- a/g10/ChangeLog
+++ b/g10/ChangeLog
@@ -1,3 +1,15 @@
+2009-06-24 Werner Koch <[email protected]>
+
+ * keyedit.c (menu_select_key): Renmove dead assign to I.
+ (menu_select_uid): Ditto.
+ * keyring.c (keyring_search): Remove dead assign to NAME.
+ * card-util.c (card_edit): Remove useless DID_CHECKPIN.
+ * call-agent.c (unhexify_fpr): Remove dead op on N.
+ * passphrase.c (passphrase_to_dek_ext): Do not deref a NULL PW.
+ * revoke.c (gen_revoke): Remove unused malloc of PK.
+ * parse-packet.c (mpi_read): Init NREAD.
+ Reported by Fabian Keil.
+
2009-06-17 Werner Koch <[email protected]>
* parse-packet.c (parse): Use a casted -1 instead of a 32 bit
diff --git a/g10/call-agent.c b/g10/call-agent.c
index cd58b90b3..0590514df 100644
--- a/g10/call-agent.c
+++ b/g10/call-agent.c
@@ -132,7 +132,6 @@ unhexify_fpr (const char *hexstr, unsigned char *fpr)
;
if (*s || (n != 40))
return 0; /* no fingerprint (invalid or wrong length). */
- n /= 2;
for (s=hexstr, n=0; *s; s += 2, n++)
fpr[n] = xtoi_2 (s);
return 1; /* okay */
diff --git a/g10/card-util.c b/g10/card-util.c
index 9295a1724..26349d653 100644
--- a/g10/card-util.c
+++ b/g10/card-util.c
@@ -1600,7 +1600,7 @@ card_edit (strlist_t commands)
int have_commands = !!commands;
int redisplay = 1;
char *answer = NULL;
- int did_checkpin = 0, allow_admin=0;
+ int allow_admin=0;
char serialnobuf[50];
@@ -1812,12 +1812,10 @@ card_edit (strlist_t commands)
case cmdPASSWD:
change_pin (0, allow_admin);
- did_checkpin = 0; /* Need to reset it of course. */
break;
case cmdUNBLOCK:
change_pin (1, allow_admin);
- did_checkpin = 0; /* Need to reset it of course. */
break;
case cmdQUIT:
diff --git a/g10/keyedit.c b/g10/keyedit.c
index b0d59f66a..69429b5ce 100644
--- a/g10/keyedit.c
+++ b/g10/keyedit.c
@@ -4458,7 +4458,7 @@ menu_select_uid( KBNODE keyblock, int idx )
}
}
else { /* reset all */
- for( i=0, node = keyblock; node; node = node->next ) {
+ for (node = keyblock; node; node = node->next) {
if( node->pkt->pkttype == PKT_USER_ID )
node->flag &= ~NODFLG_SELUID;
}
@@ -4543,7 +4543,7 @@ menu_select_key( KBNODE keyblock, int idx )
}
}
else { /* reset all */
- for( i=0, node = keyblock; node; node = node->next ) {
+ for ( node = keyblock; node; node = node->next ) {
if( node->pkt->pkttype == PKT_PUBLIC_SUBKEY
|| node->pkt->pkttype == PKT_SECRET_SUBKEY )
node->flag &= ~NODFLG_SELKEY;
diff --git a/g10/keyring.c b/g10/keyring.c
index 2c894312d..6b3c48987 100644
--- a/g10/keyring.c
+++ b/g10/keyring.c
@@ -997,7 +997,7 @@ keyring_search (KEYRING_HANDLE hd, KEYDB_SEARCH_DESC *desc,
hd->word_match.name = xstrdup (name);
hd->word_match.pattern = prepare_word_match (name);
}
- name = hd->word_match.pattern;
+ /* name = hd->word_match.pattern; */
}
init_packet(&pkt);
diff --git a/g10/parse-packet.c b/g10/parse-packet.c
index a86e54981..16ca7514f 100644
--- a/g10/parse-packet.c
+++ b/g10/parse-packet.c
@@ -112,7 +112,7 @@ mpi_read (iobuf_t inp, unsigned int *ret_nread, int secure)
int c, c1, c2, i;
unsigned int nbits, nbytes;
- size_t nread;
+ size_t nread = 0;
gcry_mpi_t a = NULL;
byte *buf = NULL;
byte *p;
diff --git a/g10/passphrase.c b/g10/passphrase.c
index 3742738e9..d34f5fa92 100644
--- a/g10/passphrase.c
+++ b/g10/passphrase.c
@@ -600,7 +600,7 @@ passphrase_to_dek_ext (u32 *keyid, int pubkey_algo,
get_last_passphrase(). */
dek = xmalloc_secure_clear ( sizeof *dek );
dek->algo = cipher_algo;
- if ( !*pw && (mode == 2 || mode == 4))
+ if ( (!pw || !*pw) && (mode == 2 || mode == 4))
dek->keylen = 0;
else
hash_passphrase (dek, pw, s2k);
diff --git a/g10/revoke.c b/g10/revoke.c
index cc66dfced..cce6d69f6 100644
--- a/g10/revoke.c
+++ b/g10/revoke.c
@@ -489,8 +489,6 @@ gen_revoke( const char *uname )
keyid_from_sk( sk, sk_keyid );
print_seckey_info (sk);
- pk = xmalloc_clear( sizeof *pk );
-
/* FIXME: We should get the public key direct from the secret one */
pub_keyblock=get_pubkeyblock(sk_keyid);