diff --git a/base/pcap-snoop.c.in b/base/pcap-snoop.c.in index 909003a..e3af580 100644 --- a/base/pcap-snoop.c.in +++ b/base/pcap-snoop.c.in @@ -165,7 +165,8 @@ void pcap_cb(u_char *ptr, const struct pcap_pkthdr *hdr, const u_char *data) { n_handler *n; int len; struct ether_header *e_hdr = (struct ether_header *)data; - int type, cleaned_conn; + int type = ETHERTYPE_IP; + int cleaned_conn; n = (n_handler *)ptr; if(hdr->caplen != hdr->len) diff --git a/ssl/ssl.enums.c b/ssl/ssl.enums.c index 1370aa8..ba7f083 100644 --- a/ssl/ssl.enums.c +++ b/ssl/ssl.enums.c @@ -125,7 +125,7 @@ static int decode_ContentType_application_data(ssl_obj *ssl, if(NET_print_flags & NET_PRINT_JSON) { json_object_object_add(jobj, "msg_data", - json_object_new_string_len(d.data, d.len)); + json_object_new_string_len((char *) d.data, d.len)); } else P_(P_AD) { print_data(ssl, &d); } else { diff --git a/ssl/ssldecode.c b/ssl/ssldecode.c index ee5e702..d9e44f4 100644 --- a/ssl/ssldecode.c +++ b/ssl/ssldecode.c @@ -1081,7 +1081,7 @@ static int hkdf_expand_label(ssl_obj *ssl, Data *context, uint16_t length, UCHAR **out) { - int r; + int r = -1; size_t outlen = length; EVP_PKEY_CTX *pctx; @@ -1299,7 +1299,8 @@ static int read_hex_string(char *str, UCHAR *buf, int n) { return 0; } static int ssl_read_key_log_file(ssl_obj *ssl, ssl_decoder *d) { - int r, _status, n, i; + int r = -1; + int _status, n, i; size_t l = 0; char *line, *d_client_random, *label, *client_random, *secret; if(ssl->version == TLSV13_VERSION &&