From 2d315f76c97917ee97f3b8873cbbd8cc409837a3 Mon Sep 17 00:00:00 2001 From: Vincent Torri Date: Thu, 8 Oct 2009 21:16:26 +0000 Subject: [PATCH] fix eet_init() when called several times but is failing SVN revision: 42971 --- legacy/eet/src/lib/eet_lib.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/legacy/eet/src/lib/eet_lib.c b/legacy/eet/src/lib/eet_lib.c index 015dbf885e..76d70904be 100644 --- a/legacy/eet/src/lib/eet_lib.c +++ b/legacy/eet/src/lib/eet_lib.c @@ -740,7 +740,7 @@ eet_init(void) /* Disable warning messages about problems with the secure memory subsystem. This command should be run right after gcry_check_version. */ if (gcry_control(GCRYCTL_DISABLE_SECMEM_WARN)) - return 0; + return --eet_init_count; /* This command is used to allocate a pool of secure memory and thus enabling the use of secure memory. It also drops all extra privileges the process has (i.e. if it is run as setuid (root)). If the argument nbytes @@ -751,7 +751,7 @@ eet_init(void) WRN("BIG FAT WARNING: I AM UNABLE TO REQUEST SECMEM, Cryptographic operation are at risk !"); } if (gnutls_global_init()) - return 0; + return --eet_init_count; #endif #ifdef HAVE_OPENSSL ERR_load_crypto_strings(); @@ -782,7 +782,7 @@ eet_init(void) EVP_cleanup(); ERR_free_strings(); #endif - return 0; + return --eet_init_count; } EAPI int