aboutsummaryrefslogtreecommitdiffstats
path: root/epan/secrets.c
diff options
context:
space:
mode:
authorJoão Valverde <j@v6e.pt>2021-12-16 18:06:18 +0000
committerWireshark GitLab Utility <gerald+gitlab-utility@wireshark.org>2021-12-19 19:29:53 +0000
commitc5a19582e4e18605e8528cd999221444f7ece318 (patch)
treed4206130200f56796a10eb2178ba8cefda1e7087 /epan/secrets.c
parent737d1dc125cc82851dee26004f9dc7922ed27c03 (diff)
epan: Convert to use stdio.h from GLib
Replace: g_snprintf() -> snprintf() g_vsnprintf() -> vsnprintf() g_strdup_printf() -> ws_strdup_printf() g_strdup_vprintf() -> ws_strdup_vprintf() This is more portable, user-friendly and faster on platforms where GLib does not like the native I/O. Adjust the format string to use macros from intypes.h.
Diffstat (limited to 'epan/secrets.c')
-rw-r--r--epan/secrets.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/epan/secrets.c b/epan/secrets.c
index 117ceda264..f028a21d67 100644
--- a/epan/secrets.c
+++ b/epan/secrets.c
@@ -261,7 +261,7 @@ pkcs11_load_keys_from_token(const char *token_uri, const char *pin, char **err)
ret = gnutls_pkcs11_obj_list_import_url4(&list, &nlist, token_uri,
GNUTLS_PKCS11_OBJ_FLAG_PRIVKEY|GNUTLS_PKCS11_OBJ_FLAG_LOGIN);
if (ret < 0) {
- *err = g_strdup_printf("Failed to iterate through objects for %s: %s", token_uri, gnutls_strerror(ret));
+ *err = ws_strdup_printf("Failed to iterate through objects for %s: %s", token_uri, gnutls_strerror(ret));
goto cleanup;
}
@@ -443,7 +443,7 @@ load_rsa_keyfile(const char *filename, const char *password, gboolean save_key,
FILE *fp = ws_fopen(filename, "rb");
if (!fp) {
- *err = g_strdup_printf("Error loading RSA key file %s: %s", filename, g_strerror(errno));
+ *err = ws_strdup_printf("Error loading RSA key file %s: %s", filename, g_strerror(errno));
return;
}
@@ -455,7 +455,7 @@ load_rsa_keyfile(const char *filename, const char *password, gboolean save_key,
}
fclose(fp);
if (!x509_priv_key) {
- *err = g_strdup_printf("Error loading RSA key file %s: %s", filename, errmsg);
+ *err = ws_strdup_printf("Error loading RSA key file %s: %s", filename, errmsg);
g_free(errmsg);
return;
}
@@ -464,12 +464,12 @@ load_rsa_keyfile(const char *filename, const char *password, gboolean save_key,
ret = gnutls_privkey_import_x509(privkey, x509_priv_key,
GNUTLS_PRIVKEY_IMPORT_AUTO_RELEASE|GNUTLS_PRIVKEY_IMPORT_COPY);
if (ret < 0) {
- *err = g_strdup_printf("Error importing private key %s: %s", filename, gnutls_strerror(ret));
+ *err = ws_strdup_printf("Error importing private key %s: %s", filename, gnutls_strerror(ret));
goto end;
}
ret = gnutls_x509_privkey_get_key_id(x509_priv_key, GNUTLS_KEYID_USE_SHA1, key_id.key_id, &size);
if (ret < 0 || size != sizeof(key_id)) {
- *err = g_strdup_printf("Error calculating Key ID for %s: %s", filename, gnutls_strerror(ret));
+ *err = ws_strdup_printf("Error calculating Key ID for %s: %s", filename, gnutls_strerror(ret));
goto end;
}