printf("creating signature failed\n");
exit(1);
}
- };
+ }
printf("sign()/s: %8.1f ", rounds / end_timing(&timing));
public = private->get_public_key(private);
parse_token(triplet->kc, token, SIM_KC_LEN);
continue;
default:
- break;;
+ break;
}
break;
}
private_forecast_listener_t *this, ike_sa_t *ike_sa,
child_sa_t *old, child_sa_t *new)
{
- struct iptc_handle *ipth;;
+ struct iptc_handle *ipth;
host_t *lhost, *rhost;
lhost = ike_sa->get_my_host(ike_sa);
*(uint16_t*)(this->buf.ptr + this->buf.len) = htons(chunk.len);
memcpy(this->buf.ptr + this->buf.len + sizeof(uint16_t),
chunk.ptr, chunk.len);
- this->buf.len += chunk.len + sizeof(uint16_t);;
+ this->buf.len += chunk.len + sizeof(uint16_t);
break;
}
/** traffic_selector_t */
static job_requeue_t initiate_config(peer_cfg_t *peer_cfg)
{
enumerator_t *enumerator;
- child_cfg_t *child_cfg = NULL;;
+ child_cfg_t *child_cfg = NULL;
enumerator = peer_cfg->create_child_cfg_enumerator(peer_cfg);
enumerator->enumerate(enumerator, &child_cfg);
if (reader == NULL)
{
DBG1(DBG_CFG, "opening SMP XML reader failed");
- return JOB_REQUEUE_FAIR;;
+ return JOB_REQUEUE_FAIR;
}
/* read message type and id */
}
}
xmlFreeTextReader(reader);
- return JOB_REQUEUE_FAIR;;
+ return JOB_REQUEUE_FAIR;
}
/**
{
DBG1(DBG_CFG, "accepting SMP XML socket failed: %s", strerror(errno));
sleep(1);
- return JOB_REQUEUE_FAIR;;
+ return JOB_REQUEUE_FAIR;
}
fdp = malloc_thing(int);
}
memset(&msg, 0, sizeof(struct msghdr));
- msg.msg_name = dst->get_sockaddr(dst);;
+ msg.msg_name = dst->get_sockaddr(dst);
msg.msg_namelen = *dst->get_sockaddr_len(dst);
iov.iov_base = data.ptr;
iov.iov_len = data.len;
DBG2(DBG_NET, "sending packet: from %#H to %#H", src, dst);
memset(&msg, 0, sizeof(struct msghdr));
- msg.msg_name = dst->get_sockaddr(dst);;
+ msg.msg_name = dst->get_sockaddr(dst);
msg.msg_namelen = *dst->get_sockaddr_len(dst);
iov.iov_base = data.ptr;
iov.iov_len = data.len;
{
vici_type_t type, ttype;
char *name, *tname;
- chunk_t data, tdata;;
+ chunk_t data, tdata;
while (TRUE)
{
else
{
/* initial phase 2 IV = hash(last_phase1_block | mid) */
- uint32_t net;;
+ uint32_t net;
chunk_t data;
net = htonl(iv->mid);
static child_cfg_t* select_child_cfg(private_child_create_t *this)
{
peer_cfg_t *peer_cfg;
- child_cfg_t *child_cfg = NULL;;
+ child_cfg_t *child_cfg = NULL;
peer_cfg = this->ike_sa->get_peer_cfg(this->ike_sa);
if (peer_cfg && this->tsi && this->tsr)
verifier = host_create_from_string(expected, 0);
ck_assert_msg(host, "expected IP %+H != NULL", verifier);
ck_assert_msg(verifier->ip_equals(verifier, host), "expected IP %+H != "
- "%+H", verifier, host);;
+ "%+H", verifier, host);
verifier->destroy(verifier);
}
}
if (this->auth_fd != -1)
{
close(this->auth_fd);
- };
+ }
if (this->acct_fd != -1)
{
close(this->acct_fd);
}
case DB_TEXT:
{
- bind[i].buffer_type = MYSQL_TYPE_STRING;;
+ bind[i].buffer_type = MYSQL_TYPE_STRING;
bind[i].buffer = va_arg(*args, char*);
if (bind[i].buffer)
{
conn_t *conn;
/** value for INT, UINT, double */
union {
- void *p_void;;
+ void *p_void;
int *p_int;
u_int *p_uint;
double *p_double;
CK_MECHANISM_PTR mechanism;
CK_RSA_PKCS_PSS_PARAMS *rsa_pkcs_pss_params;
rsa_pss_params_t *rsa_pss_params;
- hash_algorithm_t hash_alg = HASH_UNKNOWN;;
+ hash_algorithm_t hash_alg = HASH_UNKNOWN;
int i;
for (i = 0; i < countof(mappings); i++)
array_insert(array, ARRAY_HEAD, &y[3]);
array_insert(array, ARRAY_TAIL, &y[4]);
- ck_assert_int_eq(array_count(array), 2);;
+ ck_assert_int_eq(array_count(array), 2);
/* 3, 4 */
/**
* Output FILE stream
*/
- FILE *stream;;
+ FILE *stream;
};
/* A-Z | 6 other chars | a-z */
if (final_rec != TNC_IMV_ACTION_RECOMMENDATION_ALLOW)
{
final_rec = entry->rec;
- };
+ }
break;
case TNC_IMV_ACTION_RECOMMENDATION_NO_ACCESS:
if (final_rec == TNC_IMV_ACTION_RECOMMENDATION_NO_RECOMMENDATION)
{
final_rec = entry->rec;
- };
+ }
break;
case TNC_IMV_ACTION_RECOMMENDATION_NO_RECOMMENDATION:
break;
reader->destroy(reader);
*offset = 0;
return FAILED;
- };
+ }
this->reason_string = chunk_clone(this->reason_string);
if (this->reason_string.len &&
reader->destroy(reader);
*offset = 4 + this->reason_string.len;
return FAILED;
- };
+ }
this->language_code = chunk_clone(this->language_code);
reader->destroy(reader);
{
DBG1(DBG_TNC, "insufficient data for remediation string");
goto end;
- };
+ }
*offset += 4;
pos = memchr(this->string.ptr, '\0', this->string.len);
{
DBG1(DBG_TNC, "insufficient data for remediation string lang code");
goto end;
- };
+ }
*offset += 1;
pos = memchr(this->lang_code.ptr, '\0', this->lang_code.len);
/* initialize the PCR Selection structure,*/
pcr_sel->count = 1;
pcr_sel->pcrSelections[0].hash = hash_alg_to_tpm_alg_id(alg);
-;
+
pcr_sel->pcrSelections[0].sizeofSelect = 3;
pcr_sel->pcrSelections[0].pcrSelect[0] = 0;
pcr_sel->pcrSelections[0].pcrSelect[1] = 0;
vici_req_t *req;
vici_res_t *res;
command_format_options_t format = COMMAND_FORMAT_NONE;
- char *arg, *ca_name = NULL;;
+ char *arg, *ca_name = NULL;
int ret = 0;
while (TRUE)