More fixes for -Werror (GCC 4.6 catches more stuff)
This commit is contained in:
@@ -114,20 +114,21 @@ gss_overhead(void *app_data, int level, int len)
|
||||
static int
|
||||
gss_encode(void *app_data, void *from, int length, int level, void **to)
|
||||
{
|
||||
OM_uint32 maj_stat, min_stat;
|
||||
OM_uint32 min_stat;
|
||||
gss_buffer_desc input, output;
|
||||
int conf_state;
|
||||
struct gssapi_data *d = app_data;
|
||||
|
||||
input.length = length;
|
||||
input.value = from;
|
||||
maj_stat = gss_wrap (&min_stat,
|
||||
d->context_hdl,
|
||||
level == prot_private,
|
||||
GSS_C_QOP_DEFAULT,
|
||||
&input,
|
||||
&conf_state,
|
||||
&output);
|
||||
/* XXX We should really display the major status... */
|
||||
(void) gss_wrap(&min_stat,
|
||||
d->context_hdl,
|
||||
level == prot_private,
|
||||
GSS_C_QOP_DEFAULT,
|
||||
&input,
|
||||
&conf_state,
|
||||
&output);
|
||||
*to = output.value;
|
||||
return output.length;
|
||||
}
|
||||
|
@@ -427,7 +427,6 @@ HandleOP(AcceptContext)
|
||||
gss_ctx_id_t ctx;
|
||||
gss_cred_id_t deleg_cred = GSS_C_NO_CREDENTIAL;
|
||||
gss_buffer_desc input_token, output_token;
|
||||
gss_buffer_t input_token_ptr = GSS_C_NO_BUFFER;
|
||||
|
||||
ret32(c, hContext);
|
||||
ret32(c, flags);
|
||||
@@ -440,7 +439,6 @@ HandleOP(AcceptContext)
|
||||
if (in_token.length) {
|
||||
input_token.length = in_token.length;
|
||||
input_token.value = in_token.data;
|
||||
input_token_ptr = &input_token;
|
||||
} else {
|
||||
input_token.length = 0;
|
||||
input_token.value = NULL;
|
||||
|
@@ -605,7 +605,7 @@ kerberos5_is(Authenticator *ap, unsigned char *data, int cnt)
|
||||
if (ret2 != -1)
|
||||
errbuf2 = errbuf;
|
||||
Data(ap, KRB_FORWARD_REJECT, errbuf, -1);
|
||||
log_message("Could not read forwarded credentials: %s", errbuf);
|
||||
log_message("Could not read forwarded credentials: %s", errbuf2);
|
||||
|
||||
if (ret2 != -1)
|
||||
free (errbuf);
|
||||
|
@@ -104,7 +104,6 @@ _gsskrb5_register_acceptor_identity(OM_uint32 *min_stat, const char *identity)
|
||||
void
|
||||
_gsskrb5i_is_cfx(krb5_context context, gsskrb5_ctx ctx, int acceptor)
|
||||
{
|
||||
krb5_error_code ret;
|
||||
krb5_keyblock *key;
|
||||
|
||||
if (acceptor) {
|
||||
@@ -144,7 +143,8 @@ _gsskrb5i_is_cfx(krb5_context context, gsskrb5_ctx ctx, int acceptor)
|
||||
}
|
||||
if (ctx->crypto)
|
||||
krb5_crypto_destroy(context, ctx->crypto);
|
||||
ret = krb5_crypto_init(context, key, 0, &ctx->crypto);
|
||||
/* XXX We really shouldn't ignore this; will come back to this */
|
||||
(void) krb5_crypto_init(context, key, 0, &ctx->crypto);
|
||||
}
|
||||
|
||||
|
||||
|
@@ -152,7 +152,6 @@ _gss_acquire_cred_ext(OM_uint32 *minor_status,
|
||||
for (i = 0; i < mechs->count; i++) {
|
||||
struct _gss_mechanism_name *mn = NULL;
|
||||
struct _gss_mechanism_cred *mc = NULL;
|
||||
gss_name_t desired_mech_name = GSS_C_NO_NAME;
|
||||
|
||||
m = __gss_get_mechanism(&mechs->elements[i]);
|
||||
if (!m)
|
||||
@@ -163,8 +162,6 @@ _gss_acquire_cred_ext(OM_uint32 *minor_status,
|
||||
&mechs->elements[i], &mn);
|
||||
if (major_status != GSS_S_COMPLETE)
|
||||
continue;
|
||||
|
||||
desired_mech_name = mn->gmn_name;
|
||||
}
|
||||
|
||||
major_status = _gss_acquire_mech_cred(minor_status, m, mn,
|
||||
|
@@ -33,7 +33,7 @@ gss_delete_sec_context(OM_uint32 *minor_status,
|
||||
gss_ctx_id_t *context_handle,
|
||||
gss_buffer_t output_token)
|
||||
{
|
||||
OM_uint32 major_status;
|
||||
OM_uint32 major_status = GSS_S_COMPLETE;
|
||||
struct _gss_context *ctx = (struct _gss_context *) *context_handle;
|
||||
|
||||
if (output_token)
|
||||
@@ -53,5 +53,5 @@ gss_delete_sec_context(OM_uint32 *minor_status,
|
||||
*context_handle = GSS_C_NO_CONTEXT;
|
||||
}
|
||||
|
||||
return (GSS_S_COMPLETE);
|
||||
return (major_status);
|
||||
}
|
||||
|
@@ -38,7 +38,7 @@
|
||||
char *
|
||||
gssapi_err(OM_uint32 maj_stat, OM_uint32 min_stat, gss_OID mech)
|
||||
{
|
||||
OM_uint32 disp_min_stat, disp_maj_stat;
|
||||
OM_uint32 disp_min_stat;
|
||||
gss_buffer_desc maj_error_message;
|
||||
gss_buffer_desc min_error_message;
|
||||
OM_uint32 msg_ctx = 0;
|
||||
@@ -50,12 +50,10 @@ gssapi_err(OM_uint32 maj_stat, OM_uint32 min_stat, gss_OID mech)
|
||||
min_error_message.length = 0;
|
||||
min_error_message.value = NULL;
|
||||
|
||||
disp_maj_stat = gss_display_status(&disp_min_stat, maj_stat,
|
||||
GSS_C_GSS_CODE,
|
||||
mech, &msg_ctx, &maj_error_message);
|
||||
disp_maj_stat = gss_display_status(&disp_min_stat, min_stat,
|
||||
GSS_C_MECH_CODE,
|
||||
mech, &msg_ctx, &min_error_message);
|
||||
(void) gss_display_status(&disp_min_stat, maj_stat, GSS_C_GSS_CODE,
|
||||
mech, &msg_ctx, &maj_error_message);
|
||||
(void) gss_display_status(&disp_min_stat, min_stat, GSS_C_MECH_CODE,
|
||||
mech, &msg_ctx, &min_error_message);
|
||||
if (asprintf(&ret, "gss-code: %lu %.*s -- mech-code: %lu %.*s",
|
||||
(unsigned long)maj_stat,
|
||||
(int)maj_error_message.length,
|
||||
|
@@ -770,10 +770,9 @@ main(int argc, char **argv)
|
||||
slave *slaves = NULL;
|
||||
uint32_t current_version = 0, old_version = 0;
|
||||
krb5_keytab keytab;
|
||||
int optidx;
|
||||
char **files;
|
||||
|
||||
optidx = krb5_program_setup(&context, argc, argv, args, num_args, NULL);
|
||||
(void) krb5_program_setup(&context, argc, argv, args, num_args, NULL);
|
||||
|
||||
if(help_flag)
|
||||
krb5_std_usage(0, args, num_args);
|
||||
|
@@ -191,13 +191,11 @@ receive_loop (krb5_context context,
|
||||
*/
|
||||
do {
|
||||
int32_t len, timestamp, tmp;
|
||||
enum kadm_ops op;
|
||||
|
||||
if(krb5_ret_int32 (sp, &vers) != 0)
|
||||
return;
|
||||
krb5_ret_int32 (sp, ×tamp);
|
||||
krb5_ret_int32 (sp, &tmp);
|
||||
op = tmp;
|
||||
krb5_ret_int32 (sp, &len);
|
||||
if ((uint32_t)vers <= server_context->log_context.version)
|
||||
krb5_storage_seek(sp, len + 8, SEEK_CUR);
|
||||
|
@@ -86,6 +86,12 @@ _warnerr(krb5_context context, int do_errtext,
|
||||
ret = _warnerr(context, ETEXT, CODE, LEVEL, fmt, ap); \
|
||||
va_end(ap);
|
||||
|
||||
#define FUNC_NORET(ETEXT, CODE, LEVEL) \
|
||||
va_list ap; \
|
||||
va_start(ap, fmt); \
|
||||
(void) _warnerr(context, ETEXT, CODE, LEVEL, fmt, ap); \
|
||||
va_end(ap);
|
||||
|
||||
#undef __attribute__
|
||||
#define __attribute__(X)
|
||||
|
||||
@@ -202,7 +208,7 @@ krb5_err(krb5_context context, int eval, krb5_error_code code,
|
||||
const char *fmt, ...)
|
||||
__attribute__ ((noreturn, format (printf, 4, 5)))
|
||||
{
|
||||
FUNC(1, code, 0);
|
||||
FUNC_NORET(1, code, 0);
|
||||
exit(eval);
|
||||
UNREACHABLE(return 0);
|
||||
}
|
||||
@@ -241,7 +247,7 @@ KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
||||
krb5_errx(krb5_context context, int eval, const char *fmt, ...)
|
||||
__attribute__ ((noreturn, format (printf, 3, 4)))
|
||||
{
|
||||
FUNC(0, 0, 0);
|
||||
FUNC_NORET(0, 0, 0);
|
||||
exit(eval);
|
||||
UNREACHABLE(return 0);
|
||||
}
|
||||
@@ -283,7 +289,7 @@ KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
||||
krb5_abort(krb5_context context, krb5_error_code code, const char *fmt, ...)
|
||||
__attribute__ ((noreturn, format (printf, 3, 4)))
|
||||
{
|
||||
FUNC(1, code, 0);
|
||||
FUNC_NORET(1, code, 0);
|
||||
abort();
|
||||
UNREACHABLE(return 0);
|
||||
}
|
||||
@@ -311,7 +317,7 @@ KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
||||
krb5_abortx(krb5_context context, const char *fmt, ...)
|
||||
__attribute__ ((noreturn, format (printf, 2, 3)))
|
||||
{
|
||||
FUNC(0, 0, 0);
|
||||
FUNC_NORET(0, 0, 0);
|
||||
abort();
|
||||
UNREACHABLE(return 0);
|
||||
}
|
||||
|
@@ -14,7 +14,7 @@ error_code RAND, "Random generator failed"
|
||||
error_code AUTH, "NTLM authentication failed"
|
||||
error_code TIME_SKEW, "Client time skewed to server"
|
||||
error_code OEM, "Client set OEM string"
|
||||
error_code MISSING_NAME_SEPARATOR, "missing @ or \\ in name"
|
||||
error_code MISSING_NAME_SEPARATOR, "missing @ or \\\\ in name"
|
||||
error_code MISSING_BUFFER, "missing expected buffer"
|
||||
error_code INVALID_APOP, "Invalid APOP response"
|
||||
error_code INVALID_CRAM_MD5, "Invalid CRAM-MD5 response"
|
||||
|
Reference in New Issue
Block a user