summaryrefslogtreecommitdiff
path: root/src/usr.bin/openssl/s_time.c
diff options
context:
space:
mode:
authordoug <>2014-09-01 20:54:37 +0000
committerdoug <>2014-09-01 20:54:37 +0000
commita7ac30e7ed8aea1757edfca3d7d31bbca2d3e006 (patch)
tree97288f64885dc93f5729da15f1f84bf81947bf85 /src/usr.bin/openssl/s_time.c
parent3a73303a1e6380909be747996eb639ebc395fab6 (diff)
downloadopenbsd-a7ac30e7ed8aea1757edfca3d7d31bbca2d3e006.tar.gz
openbsd-a7ac30e7ed8aea1757edfca3d7d31bbca2d3e006.tar.bz2
openbsd-a7ac30e7ed8aea1757edfca3d7d31bbca2d3e006.zip
Enable -Wshadow in openssl(1) and fix a few shadow warnings.
ok jsing@
Diffstat (limited to 'src/usr.bin/openssl/s_time.c')
-rw-r--r--src/usr.bin/openssl/s_time.c16
1 files changed, 7 insertions, 9 deletions
diff --git a/src/usr.bin/openssl/s_time.c b/src/usr.bin/openssl/s_time.c
index f8c104b7d7..7279883c87 100644
--- a/src/usr.bin/openssl/s_time.c
+++ b/src/usr.bin/openssl/s_time.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: s_time.c,v 1.1 2014/08/26 17:47:25 jsing Exp $ */ 1/* $OpenBSD: s_time.c,v 1.2 2014/09/01 20:54:37 doug Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -213,8 +213,6 @@ parseArgs(int argc, char **argv)
213 else if (strcmp(*argv, "-new") == 0) 213 else if (strcmp(*argv, "-new") == 0)
214 perform = 1; 214 perform = 1;
215 else if (strcmp(*argv, "-verify") == 0) { 215 else if (strcmp(*argv, "-verify") == 0) {
216 const char *errstr;
217
218 tm_verify = SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE; 216 tm_verify = SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE;
219 if (--argc < 1) 217 if (--argc < 1)
220 goto bad; 218 goto bad;
@@ -375,9 +373,9 @@ s_time_main(int argc, char **argv)
375 goto end; 373 goto end;
376 374
377 if (s_www_path != NULL) { 375 if (s_www_path != NULL) {
378 int ret = snprintf(buf, sizeof buf, 376 int retval = snprintf(buf, sizeof buf,
379 "GET %s HTTP/1.0\r\n\r\n", s_www_path); 377 "GET %s HTTP/1.0\r\n\r\n", s_www_path);
380 if (ret == -1 || ret >= sizeof buf) { 378 if ((size_t)retval >= sizeof buf) {
381 fprintf(stderr, "URL too long\n"); 379 fprintf(stderr, "URL too long\n");
382 goto end; 380 goto end;
383 } 381 }
@@ -435,9 +433,9 @@ next:
435 goto end; 433 goto end;
436 } 434 }
437 if (s_www_path != NULL) { 435 if (s_www_path != NULL) {
438 int ret = snprintf(buf, sizeof buf, 436 int retval = snprintf(buf, sizeof buf,
439 "GET %s HTTP/1.0\r\n\r\n", s_www_path); 437 "GET %s HTTP/1.0\r\n\r\n", s_www_path);
440 if (ret == -1 || ret >= sizeof buf) { 438 if ((size_t)retval >= sizeof buf) {
441 fprintf(stderr, "URL too long\n"); 439 fprintf(stderr, "URL too long\n");
442 goto end; 440 goto end;
443 } 441 }
@@ -468,9 +466,9 @@ next:
468 goto end; 466 goto end;
469 467
470 if (s_www_path) { 468 if (s_www_path) {
471 int ret = snprintf(buf, sizeof buf, 469 int retval = snprintf(buf, sizeof buf,
472 "GET %s HTTP/1.0\r\n\r\n", s_www_path); 470 "GET %s HTTP/1.0\r\n\r\n", s_www_path);
473 if (ret == -1 || ret >= sizeof buf) { 471 if ((size_t)retval >= sizeof buf) {
474 fprintf(stderr, "URL too long\n"); 472 fprintf(stderr, "URL too long\n");
475 goto end; 473 goto end;
476 } 474 }