Print this page
5218 posix definition of NULL
correct unistd.h and iso/stddef_iso.h
update gate source affected

*** 659,673 **** if (set_object_policy(hKeySRK, TSS_SECRET_MODE_SHA1, NULL, sizeof (well_known), well_known)) return (ERR_FAIL); ! ret = Tspi_TPM_TakeOwnership(hTPM, hKeySRK, NULL); if (ret == TPM_E_NO_ENDORSEMENT) { if (createek(hContext, hTPM)) return (ERR_FAIL); ! ret = Tspi_TPM_TakeOwnership(hTPM, hKeySRK, NULL); } if (ret) { print_error(ret, gettext("Take ownership")); return (ERR_FAIL); } --- 659,673 ---- if (set_object_policy(hKeySRK, TSS_SECRET_MODE_SHA1, NULL, sizeof (well_known), well_known)) return (ERR_FAIL); ! ret = Tspi_TPM_TakeOwnership(hTPM, hKeySRK, (TSS_HKEY)NULL); if (ret == TPM_E_NO_ENDORSEMENT) { if (createek(hContext, hTPM)) return (ERR_FAIL); ! ret = Tspi_TPM_TakeOwnership(hTPM, hKeySRK, (TSS_HKEY)NULL); } if (ret) { print_error(ret, gettext("Take ownership")); return (ERR_FAIL); }
*** 699,709 **** } if (set_policy_options(hNewPolicy, TSS_SECRET_MODE_POPUP, gettext("= New TPM owner passphrase ="), 0, NULL)) return (ERR_FAIL); ! ret = Tspi_ChangeAuth(hTPM, NULL, hNewPolicy); if (ret && ret != TSP_ERROR(TSS_E_POLICY_NO_SECRET)) { print_error(ret, gettext("Change authorization")); return (ERR_FAIL); } --- 699,709 ---- } if (set_policy_options(hNewPolicy, TSS_SECRET_MODE_POPUP, gettext("= New TPM owner passphrase ="), 0, NULL)) return (ERR_FAIL); ! ret = Tspi_ChangeAuth(hTPM, (TSS_HOBJECT)NULL, hNewPolicy); if (ret && ret != TSP_ERROR(TSS_E_POLICY_NO_SECRET)) { print_error(ret, gettext("Change authorization")); return (ERR_FAIL); }