Changes in trunk/src/sh_err_log.c [22:20]
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/sh_err_log.c
r22 r20 604 604 char sigkey_old[KEY_LEN+1]; 605 605 char sigkey_new[KEY_LEN+1]; 606 char crypt o[KEY_LEN+1];606 char crypt[KEY_LEN+1]; 607 607 struct lfstc * next; 608 608 } open_logfile; … … 613 613 614 614 #ifdef SH_WITH_SERVER 615 int set_flag_sep_log (c onst char * str)615 int set_flag_sep_log (char * str) 616 616 { 617 617 return sh_util_flagval(str, &flag_sep_log); … … 642 642 char * sigkey_new; 643 643 char * sigkey_old; 644 char * crypt o;644 char * crypt; 645 645 646 646 SL_ENTER(_("sh_log_file")); … … 734 734 memset(current->sigkey_old, (int)'\0', KEY_LEN+1); 735 735 memset(current->sigkey_new, (int)'\0', KEY_LEN+1); 736 memset(current->crypt o,(int)'\0', KEY_LEN+1);736 memset(current->crypt, (int)'\0', KEY_LEN+1); 737 737 current->next = logfile_list; 738 738 logfile_list = current; … … 841 841 sigkey_old = current->sigkey_old; 842 842 sigkey_new = current->sigkey_new; 843 crypt o = current->crypto;843 crypt = current->crypt; 844 844 } 845 845 else … … 847 847 sigkey_old = skey->sigkey_old; 848 848 sigkey_new = skey->sigkey_new; 849 crypt o = skey->crypt; /* flawfinder: ignore */849 crypt = skey->crypt; 850 850 } 851 851 … … 869 869 /* Copy it to 'crypt' for encryption. 870 870 */ 871 (void) sl_strlcpy(crypt o, sigkey_new, KEY_LEN+1);871 (void) sl_strlcpy(crypt, sigkey_new, KEY_LEN+1); 872 872 873 873 /* Use message and compiled-in key to encrypt. 874 874 */ 875 875 BREAKEXIT(sh_util_encode); 876 sh_util_encode(crypt o, log_msg.msg, 0, 'B');876 sh_util_encode(crypt, log_msg.msg, 0, 'B'); 877 877 878 878 /* Send out the key. … … 900 900 901 901 sh_error_handle ((-1), FIL__, __LINE__, 0, MSG_START_KEY_MAIL, 902 sh.prg_name, crypt o,903 crypt o, log_msg.timestamp);902 sh.prg_name, crypt, 903 crypt, log_msg.timestamp); 904 904 905 905 /* send to other allowed channels … … 913 913 914 914 sh_error_handle ((-1), FIL__, __LINE__, 0, MSG_START_KEY, 915 sh.prg_name, crypt o);915 sh.prg_name, crypt); 916 916 917 917 /* Cleanup. … … 926 926 927 927 928 memset (crypt o, (int) '\0', KEY_LEN);928 memset (crypt, (int) '\0', KEY_LEN); 929 929 sh.flag.log_start = S_FALSE; 930 930 current->log_start = S_FALSE; … … 949 949 (void) sl_strlcpy (sigkey_old, sigkey_new, KEY_LEN+1); 950 950 951 /*@- usedef@*/951 /*@-bufferoverflowhigh -usedef@*/ 952 952 #ifdef SH_USE_XML 953 953 if (log_msg.timestamp[0] != '\0') 954 s l_snprintf(log_msg.sig, sizeof(log_msg.sig),954 sprintf(log_msg.sig, /* known to fit */ 955 955 #ifdef FIX_XML 956 957 #else 958 959 #endif 960 956 _("\n<sig>%s%s</sig></log>\n"), /* <sig> FIX XML */ 957 #else 958 _("\nsig>%s%s</sig></log>\n"), /* <sig> FIX XML */ 959 #endif 960 log_msg.signature, log_msg.timestamp); 961 961 else 962 s l_snprintf(log_msg.sig, sizeof(log_msg.sig),962 sprintf(log_msg.sig, /* known to fit */ 963 963 #ifdef FIX_XML 964 965 #else 966 967 #endif 968 969 /*@+ usedef@*/964 _("\n<sig>%s</sig></log>\n"), /* <sig> FIX XML */ 965 #else 966 _("\nsig>%s</sig></log>\n"), /* <sig> FIX XML */ 967 #endif 968 log_msg.signature); 969 /*@+bufferoverflowhigh +usedef@*/ 970 970 971 971 #ifdef SH_STEALTH
Note:
See TracChangeset
for help on using the changeset viewer.