]> git.ipfire.org Git - thirdparty/ldns.git/commitdiff
Make splint happy
authorWillem Toorop <willem@NLnetLabs.nl>
Tue, 11 Sep 2012 08:39:50 +0000 (08:39 +0000)
committerWillem Toorop <willem@NLnetLabs.nl>
Tue, 11 Sep 2012 08:39:50 +0000 (08:39 +0000)
Makefile.in
dane.c
dnssec_verify.c
examples/ldns-dane.c
host2str.c
ldns/dane.h

index 7a0d2e1a8023617f2121f0c628b682445a7528b3..693d71fef8a27abd6aeea0959cfec06069374a59 100644 (file)
@@ -370,7 +370,8 @@ distclean: realclean
 
 ## No need for changes here
 
-lint: @LINT_DRILL@ @LINT_EXAMPLES@
+lint: lint-lib @LINT_DRILL@ @LINT_EXAMPLES@
+lint-lib:
        for i in $(srcdir)/*.c; do \
                $(LINT) $(LINTFLAGS) -I. -I$(srcdir) $(srcdir)/$$i ; \
                if test $$? -ne 0 ; then exit 1 ; fi ; \
diff --git a/dane.c b/dane.c
index a44be8a7fd00937be9e8799f78856d6b83a80778..54561e01c93c3e679d5adddfc5f4bba00f226d2f 100644 (file)
--- a/dane.c
+++ b/dane.c
@@ -27,8 +27,8 @@
 #endif
 
 ldns_status
-ldns_dane_create_tlsa_owner(ldns_rdf** tlsa_owner,
-               const ldns_rdf* name, int port, ldns_dane_transport transport)
+ldns_dane_create_tlsa_owner(ldns_rdf** tlsa_owner, const ldns_rdf* name,
+               uint16_t port, ldns_dane_transport transport)
 {
        char buf[LDNS_MAX_DOMAINLEN];
        size_t s;
@@ -37,20 +37,20 @@ ldns_dane_create_tlsa_owner(ldns_rdf** tlsa_owner,
        assert(name != NULL);
        assert(ldns_rdf_get_type(name) == LDNS_RDF_TYPE_DNAME);
 
-       s = snprintf(buf, LDNS_MAX_DOMAINLEN, "X_%d", port);
-       buf[0] = s - 1;
+       s = (size_t)snprintf(buf, LDNS_MAX_DOMAINLEN, "X_%d", (int)port);
+       buf[0] = (char)(s - 1);
 
        switch(transport) {
        case LDNS_DANE_TRANSPORT_TCP:
-               s += snprintf(&buf[s], LDNS_MAX_DOMAINLEN, "\004_tcp");
+               s += snprintf(buf + s, LDNS_MAX_DOMAINLEN - s, "\004_tcp");
                break;
        
        case LDNS_DANE_TRANSPORT_UDP:
-               s += snprintf(&buf[s], LDNS_MAX_DOMAINLEN, "\004_udp");
+               s += snprintf(buf + s, LDNS_MAX_DOMAINLEN - s, "\004_udp");
                break;
 
        case LDNS_DANE_TRANSPORT_SCTP:
-               s += snprintf(&buf[s], LDNS_MAX_DOMAINLEN, "\005_sctp");
+               s += snprintf(buf + s, LDNS_MAX_DOMAINLEN - s, "\005_sctp");
                break;
        
        default:
@@ -75,12 +75,12 @@ ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert,
                ldns_tlsa_matching_type matching_type)
 {
        unsigned char* buf = NULL;
-       int len;
+       size_t len;
 
        X509_PUBKEY* xpubkey;
        EVP_PKEY* epubkey;
 
-       uint8_t* digest;
+       unsigned char* digest;
 
        assert(rdf != NULL);
        assert(cert != NULL);
@@ -88,12 +88,14 @@ ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert,
        switch(selector) {
        case LDNS_TLSA_SELECTOR_FULL_CERTIFICATE:
 
-               len = i2d_X509(cert, &buf);
+               len = (size_t)i2d_X509(cert, &buf);
                break;
 
        case LDNS_TLSA_SELECTOR_SUBJECTPUBLICKEYINFO:
 
+#ifndef S_SPLINT_S
                xpubkey = X509_get_X509_PUBKEY(cert);
+#endif
                if (! xpubkey) {
                        return LDNS_STATUS_SSL_ERR;
                }
@@ -101,7 +103,7 @@ ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert,
                if (! epubkey) {
                        return LDNS_STATUS_SSL_ERR;
                }
-               len = i2d_PUBKEY(epubkey, &buf);
+               len = (size_t)i2d_PUBKEY(epubkey, &buf);
                break;
        
        default:
@@ -118,12 +120,12 @@ ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert,
        
        case LDNS_TLSA_MATCHING_TYPE_SHA256:
 
-               digest = LDNS_XMALLOC(uint8_t, SHA256_DIGEST_LENGTH);
+               digest = LDNS_XMALLOC(unsigned char, SHA256_DIGEST_LENGTH);
                if (digest == NULL) {
                        LDNS_FREE(buf);
                        return LDNS_STATUS_MEM_ERR;
                }
-               (void) ldns_sha256(buf, len, digest);
+               (void) ldns_sha256(buf, (unsigned int)len, digest);
                *rdf = ldns_rdf_new(LDNS_RDF_TYPE_HEX, SHA256_DIGEST_LENGTH,
                                digest);
                LDNS_FREE(buf);
@@ -133,12 +135,12 @@ ldns_dane_cert2rdf(ldns_rdf** rdf, X509* cert,
 
        case LDNS_TLSA_MATCHING_TYPE_SHA512:
 
-               digest = LDNS_XMALLOC(uint8_t, SHA512_DIGEST_LENGTH);
+               digest = LDNS_XMALLOC(unsigned char, SHA512_DIGEST_LENGTH);
                if (digest == NULL) {
                        LDNS_FREE(buf);
                        return LDNS_STATUS_MEM_ERR;
                }
-               (void) ldns_sha512(buf, len, digest);
+               (void) ldns_sha512(buf, (unsigned int)len, digest);
                *rdf = ldns_rdf_new(LDNS_RDF_TYPE_HEX, SHA512_DIGEST_LENGTH,
                                digest);
                LDNS_FREE(buf);
@@ -468,7 +470,7 @@ ldns_dane_create_tlsa_rr(ldns_rr** tlsa,
 
        s = ldns_dane_cert2rdf(&rdf, cert, selector, matching_type);
        if (s == LDNS_STATUS_OK) {
-               ldns_rr_set_rdf(*tlsa, rdf, 3);
+               (void) ldns_rr_set_rdf(*tlsa, rdf, 3);
                return LDNS_STATUS_OK;
        }
        ldns_rr_free(*tlsa);
@@ -537,7 +539,7 @@ ldns_dane_match_any_cert_with_data(STACK_OF(X509)* chain,
        size_t n, i;
        X509* cert;
 
-       n = sk_X509_num(chain);
+       n = (size_t)sk_X509_num(chain);
        for (i = 0; i < n; i++) {
                cert = sk_X509_pop(chain);
                if (! cert) {
index 1af7f1829889043d6c21db24afa555f17da88deb..66af22e7879a1d3a1bd3f433b247b7f132170670 100644 (file)
@@ -286,10 +286,10 @@ ldns_dnssec_build_data_chain(ldns_resolver *res,
 
        bool other_rrset = false;
 
-       assert(pkt != NULL);
-       
        ldns_dnssec_data_chain *new_chain = ldns_dnssec_data_chain_new();
 
+       assert(pkt != NULL);
+
        if (!ldns_dnssec_pkt_has_rrsigs(pkt)) {
                /* hmm. no dnssec data in the packet. go up to try and deny
                 * DS? */
index 622c2020e02a8b996d3b6739a9eb8465066c6216..334df86167f902f0ae1830afb2db2e8540f89066 100644 (file)
@@ -204,7 +204,7 @@ get_ssl_cert_chain(X509** cert, STACK_OF(X509)** extra_certs, SSL* ssl,
                s = LDNS_STATUS_NETWORK_ERR;
                goto error;
        }
-       if (connect(sock, (struct sockaddr*)a, a_len) == -1) {
+       if (connect(sock, (struct sockaddr*)a, (socklen_t)a_len) == -1) {
                s = LDNS_STATUS_NETWORK_ERR;
                goto error;
        }
@@ -215,7 +215,7 @@ get_ssl_cert_chain(X509** cert, STACK_OF(X509)** extra_certs, SSL* ssl,
                goto error;
        }
        SSL_set_connect_state(ssl);
-       SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
+       (void) SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
        if (! SSL_set_fd(ssl, sock)) {
                close(sock);
                s = LDNS_STATUS_SSL_ERR;
@@ -685,7 +685,7 @@ main(int argc, char **argv)
 
        char*         name_str;
        ldns_rdf*     name;
-       int           port;
+       uint16_t      port;
 
        ldns_resolver* res            = NULL;
        ldns_rdf*      tlsa_owner     = NULL;
@@ -838,7 +838,7 @@ main(int argc, char **argv)
        s = ldns_str2rdf_dname(&name, name_str);
        LDNS_ERR(s, "could not ldns_str2rdf_dname");
 
-       port = usage_within_range(argv[1], 65535, "port");
+       port = (uint16_t) usage_within_range(argv[1], 65535, "port");
 
        s = ldns_dane_create_tlsa_owner(&tlsa_owner, name, port, transport);
        LDNS_ERR(s, "could not create TLSA owner name");
@@ -959,7 +959,9 @@ main(int argc, char **argv)
                if (! cert) {
                        ssl_err("could not SSL_get_certificate");
                }
+#ifndef S_SPLINT_S
                extra_certs = ctx->extra_certs;
+#endif
 
                switch (mode) {
                case CREATE: dane_create(tlsas, tlsa_owner, certificate_usage,
index 45e647b7edb82c852e7fa63553ce516585ceec45..b31cd05a279c44662e97687b63f557e464ec3c8c 100644 (file)
@@ -1666,6 +1666,7 @@ ldns_key2buffer_str(ldns_buffer *output, const ldns_key *k)
        uint16_t i;
 #  endif
        /* not used when ssl is not defined */
+       /*@unused@*/
        ldns_rdf *b64_bignum = NULL;
 
        RSA *rsa;
index 13c8951dce7aab08298ebf015fd47bdff70283c8..de191a837dfedb413b219810b066bf3f9fee3669 100644 (file)
@@ -92,7 +92,8 @@ typedef enum ldns_enum_dane_transport ldns_dane_transport;
  * \return LDNS_STATUS_OK on success or an error code otherwise.
  */
 ldns_status ldns_dane_create_tlsa_owner(ldns_rdf** tlsa_owner,
-               const ldns_rdf* name, int port, ldns_dane_transport transport);
+               const ldns_rdf* name, uint16_t port,
+               ldns_dane_transport transport);
 
 
 #if LDNS_BUILD_CONFIG_HAVE_SSL