diff options
author | Matthias Andree <matthias.andree@gmx.de> | 2010-10-09 10:21:45 +0200 |
---|---|---|
committer | Matthias Andree <matthias.andree@gmx.de> | 2010-10-09 10:21:45 +0200 |
commit | 1a3c2992e222e5b7dead37aa86b8e9de962365e8 (patch) | |
tree | 348818532da646d5b6757a141ec36c7c3b8f616c | |
parent | e1d211de0928eec84230d73e5705b592ab86bca9 (diff) | |
download | fetchmail-1a3c2992e222e5b7dead37aa86b8e9de962365e8.tar.gz fetchmail-1a3c2992e222e5b7dead37aa86b8e9de962365e8.tar.bz2 fetchmail-1a3c2992e222e5b7dead37aa86b8e9de962365e8.zip |
Fix Intel C++ var shadowing warnings.
-rw-r--r-- | socket.c | 10 |
1 files changed, 5 insertions, 5 deletions
@@ -687,20 +687,20 @@ static int SSL_verify_callback( int ok_return, X509_STORE_CTX *ctx, int strict ) for (j = 0, r = sk_GENERAL_NAME_num(gens); j < r; ++j) { const GENERAL_NAME *gn = sk_GENERAL_NAME_value(gens, j); if (gn->type == GEN_DNS) { - char *p1 = (char *)gn->d.ia5->data; - char *p2 = _ssl_server_cname; + char *pp1 = (char *)gn->d.ia5->data; + char *pp2 = _ssl_server_cname; if (outlevel >= O_VERBOSE) { - report(stdout, GT_("Subject Alternative Name: %s\n"), (tt = sdump(p1, (size_t)gn->d.ia5->length))); + report(stdout, GT_("Subject Alternative Name: %s\n"), (tt = sdump(pp1, (size_t)gn->d.ia5->length))); xfree(tt); } /* Name contains embedded NUL characters, so we complain. This * is likely a certificate spoofing attack. */ - if ((size_t)gn->d.ia5->length != strlen(p1)) { + if ((size_t)gn->d.ia5->length != strlen(pp1)) { report(stderr, GT_("Bad certificate: Subject Alternative Name contains NUL, aborting!\n")); sk_GENERAL_NAME_free(gens); return 0; } - if (name_match(p1, p2)) { + if (name_match(pp1, pp2)) { matched = 1; } } |