James Yonan noticed a couple of compiler warnings when compiling with
--enable-strict configured. This patch was sent directly to him
for review and got accepted.
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: James Yonan <james@openvpn.net>
... | ... |
@@ -967,7 +967,7 @@ verify_callback (int preverify_ok, X509_STORE_CTX * ctx) |
967 | 967 |
/* run --tls-verify script */ |
968 | 968 |
if (opt->verify_command) |
969 | 969 |
{ |
970 |
- const char *tmp_file; |
|
970 |
+ const char *tmp_file = NULL; |
|
971 | 971 |
struct gc_arena gc; |
972 | 972 |
int ret; |
973 | 973 |
|
... | ... |
@@ -976,7 +976,7 @@ verify_callback (int preverify_ok, X509_STORE_CTX * ctx) |
976 | 976 |
if (opt->verify_export_cert) |
977 | 977 |
{ |
978 | 978 |
gc = gc_new(); |
979 |
- if (tmp_file=get_peer_cert(ctx, opt->verify_export_cert,&gc)) |
|
979 |
+ if ((tmp_file=get_peer_cert(ctx, opt->verify_export_cert,&gc))) |
|
980 | 980 |
{ |
981 | 981 |
setenv_str(opt->es, "peer_cert", tmp_file); |
982 | 982 |
} |