void OcspReceiver::parseResponse()
{
- int id, retCode, ocspStatus;
+ int id = 0, retCode = 0, ocspStatus = 0;
m_buffer.Deserialize(id, retCode, ocspStatus);
auto it = m_requests.find(id);
void StorageReceiver::parseResponse()
{
- int command, id;
+ int command = 0, id = 0;
m_buffer.Deserialize(command, id);
auto it = m_requests.find(id);
void StorageReceiver::parseGetCommand()
{
RawBuffer rawData;
- int dataType, retCode;
+ int dataType = 0, retCode = 0;
m_buffer.Deserialize(retCode, dataType, rawData);
// check error code
void StorageReceiver::parseGetListCommand()
{
- int dataType, retCode;
+ int dataType = 0, retCode = 0;
LabelNameVector labelNameVector;
m_buffer.Deserialize(retCode, dataType, labelNameVector);
void StorageReceiver::parseSaveCommand()
{
- int dataType, retCode;
+ int dataType = 0, retCode = 0;
m_buffer.Deserialize(retCode, dataType);
// check error code
void StorageReceiver::parseRemoveCommand()
{
- int dataType, retCode;
+ int dataType = 0, retCode = 0;
m_buffer.Deserialize(retCode, dataType);
// check error code
{
CertificateShPtrVector certificateChainVector;
RawBufferVector rawBufferVector;
- int retCode;
+ int retCode = 0;
m_buffer.Deserialize(retCode, rawBufferVector);
// check error code
void StorageReceiver::parseCreateSignatureCommand()
{
- int retCode;
+ int retCode = 0;
RawBuffer signature;
m_buffer.Deserialize(retCode, signature);
void StorageReceiver::parseAllowAccessCommand()
{
- int retCode;
+ int retCode = 0;
m_buffer.Deserialize(retCode);
// check error code
void StorageReceiver::parseDenyAccessCommand()
{
- int retCode;
+ int retCode = 0;
m_buffer.Deserialize(retCode);
// check error code
void StorageReceiver::parseRetCode(ObserverCb callback)
{
- int retCode;
+ int retCode = 0;
m_buffer.Deserialize(retCode);
// check error code
int ManagerImpl::getCertificate(const Alias &alias, const Password &password, CertificateShPtr &cert)
{
- DBDataType recvDataType;
+ DBDataType recvDataType = DBDataType::CERTIFICATE;
RawBuffer rawData;
int retCode = getBinaryData(
int ManagerImpl::getData(const Alias &alias, const Password &password, RawBuffer &rawData)
{
- DBDataType recvDataType;
+ DBDataType recvDataType = DBDataType::BINARY_DATA;
int retCode = getBinaryData(
alias,
if (result > 0) {
STACK_OF(X509) *chain = X509_STORE_CTX_get_chain(csc);
for (int i = 0; i < sk_X509_num(chain); ++i) {
- X509* cert = (X509*)sk_X509_value(chain, i);
- chainVector.push_back(CertificateImpl(cert));
+ X509* icert = (X509*)sk_X509_value(chain, i);
+ chainVector.push_back(CertificateImpl(icert));
}
}
if(verified == OPENSSL_SUCCESS) {
STACK_OF(X509) *chain = X509_STORE_CTX_get1_chain(ctx);
- X509 *cert;
- while((cert = sk_X509_pop(chain))) {
- certChain.insert(certChain.begin(),cert);
+ X509 *icert;
+ while((icert = sk_X509_pop(chain))) {
+ certChain.insert(certChain.begin(),icert);
}
}
auto &handler = m_userDataMap[cred.uid];
DBCrypto::Transaction transaction(&handler.database);
if (!handler.crypto.haveKey(cred.smackLabel)) {
- RawBuffer key;
+ RawBuffer got_key;
auto key_optional = handler.database.getKey(cred.smackLabel);
if(!key_optional) {
LogDebug("No Key in database found. Generating new one for label: "
<< cred.smackLabel);
- key = handler.keyProvider.generateDEK(cred.smackLabel);
- handler.database.saveKey(cred.smackLabel, key);
+ got_key = handler.keyProvider.generateDEK(cred.smackLabel);
+ handler.database.saveKey(cred.smackLabel, got_key);
} else {
LogDebug("Key from DB");
- key = *key_optional;
+ got_key = *key_optional;
}
- key = handler.keyProvider.getPureDEK(key);
- handler.crypto.pushKey(cred.smackLabel, key);
+ got_key = handler.keyProvider.getPureDEK(got_key);
+ handler.crypto.pushKey(cred.smackLabel, got_key);
}
// Do not encrypt data with password during cc_mode on
}
RawBuffer CKMService::processControl(MessageBuffer &buffer) {
- int command;
- uid_t user;
+ int command = 0;
+ uid_t user = 0;
ControlCommand cc;
Password newPass, oldPass;
Label smackLabel;
Name name;
Label ownerLabel;
Label accessorLabel;
- int accessorRights;
+ int accessorRights = 0;
buffer.Deserialize(user, ownerLabel, name, accessorLabel, accessorRights);
Credentials cred = { user, ownerLabel };
RawBuffer CKMService::processStorage(Credentials &cred, MessageBuffer &buffer)
{
- int command;
- int msgID;
- int tmpDataType;
+ int command = 0;
+ int msgID = 0;
+ int tmpDataType = 0;
Name name;
Label label;
std::string user;
case LogicCommand::CREATE_KEY_PAIR_DSA:
case LogicCommand::CREATE_KEY_PAIR_ECDSA:
{
- int additional_param;
+ int additional_param = 0;
Name privateKeyName;
Name publicKeyName;
PolicySerializable policyPrivateKey;
{
Password password; // password for private_key
RawBuffer message;
- int padding, hash;
+ int padding = 0, hash = 0;
buffer.Deserialize(name, label, password, message, hash, padding);
return m_logic->createSignature(
cred,
RawBuffer signature;
//HashAlgorithm hash;
//RSAPaddingAlgorithm padding;
- int padding, hash;
+ int padding = 0, hash = 0;
buffer.Deserialize(name,
label,
password,
}
case LogicCommand::ALLOW_ACCESS:
{
- int reqRights;
+ int reqRights = 0;
buffer.Deserialize(name, label, reqRights);
return m_logic->allowAccess(
cred,
auto &buffer = info.buffer;
- int commandId;
+ int commandId = 0;
RawBufferVector chainVector;
buffer.Deserialize(commandId, chainVector);