More fixes for -Werror (GCC 4.6 catches more stuff)
This commit is contained in:
@@ -114,20 +114,21 @@ gss_overhead(void *app_data, int level, int len)
|
|||||||
static int
|
static int
|
||||||
gss_encode(void *app_data, void *from, int length, int level, void **to)
|
gss_encode(void *app_data, void *from, int length, int level, void **to)
|
||||||
{
|
{
|
||||||
OM_uint32 maj_stat, min_stat;
|
OM_uint32 min_stat;
|
||||||
gss_buffer_desc input, output;
|
gss_buffer_desc input, output;
|
||||||
int conf_state;
|
int conf_state;
|
||||||
struct gssapi_data *d = app_data;
|
struct gssapi_data *d = app_data;
|
||||||
|
|
||||||
input.length = length;
|
input.length = length;
|
||||||
input.value = from;
|
input.value = from;
|
||||||
maj_stat = gss_wrap (&min_stat,
|
/* XXX We should really display the major status... */
|
||||||
d->context_hdl,
|
(void) gss_wrap(&min_stat,
|
||||||
level == prot_private,
|
d->context_hdl,
|
||||||
GSS_C_QOP_DEFAULT,
|
level == prot_private,
|
||||||
&input,
|
GSS_C_QOP_DEFAULT,
|
||||||
&conf_state,
|
&input,
|
||||||
&output);
|
&conf_state,
|
||||||
|
&output);
|
||||||
*to = output.value;
|
*to = output.value;
|
||||||
return output.length;
|
return output.length;
|
||||||
}
|
}
|
||||||
|
@@ -427,7 +427,6 @@ HandleOP(AcceptContext)
|
|||||||
gss_ctx_id_t ctx;
|
gss_ctx_id_t ctx;
|
||||||
gss_cred_id_t deleg_cred = GSS_C_NO_CREDENTIAL;
|
gss_cred_id_t deleg_cred = GSS_C_NO_CREDENTIAL;
|
||||||
gss_buffer_desc input_token, output_token;
|
gss_buffer_desc input_token, output_token;
|
||||||
gss_buffer_t input_token_ptr = GSS_C_NO_BUFFER;
|
|
||||||
|
|
||||||
ret32(c, hContext);
|
ret32(c, hContext);
|
||||||
ret32(c, flags);
|
ret32(c, flags);
|
||||||
@@ -440,7 +439,6 @@ HandleOP(AcceptContext)
|
|||||||
if (in_token.length) {
|
if (in_token.length) {
|
||||||
input_token.length = in_token.length;
|
input_token.length = in_token.length;
|
||||||
input_token.value = in_token.data;
|
input_token.value = in_token.data;
|
||||||
input_token_ptr = &input_token;
|
|
||||||
} else {
|
} else {
|
||||||
input_token.length = 0;
|
input_token.length = 0;
|
||||||
input_token.value = NULL;
|
input_token.value = NULL;
|
||||||
|
@@ -605,7 +605,7 @@ kerberos5_is(Authenticator *ap, unsigned char *data, int cnt)
|
|||||||
if (ret2 != -1)
|
if (ret2 != -1)
|
||||||
errbuf2 = errbuf;
|
errbuf2 = errbuf;
|
||||||
Data(ap, KRB_FORWARD_REJECT, errbuf, -1);
|
Data(ap, KRB_FORWARD_REJECT, errbuf, -1);
|
||||||
log_message("Could not read forwarded credentials: %s", errbuf);
|
log_message("Could not read forwarded credentials: %s", errbuf2);
|
||||||
|
|
||||||
if (ret2 != -1)
|
if (ret2 != -1)
|
||||||
free (errbuf);
|
free (errbuf);
|
||||||
|
@@ -104,7 +104,6 @@ _gsskrb5_register_acceptor_identity(OM_uint32 *min_stat, const char *identity)
|
|||||||
void
|
void
|
||||||
_gsskrb5i_is_cfx(krb5_context context, gsskrb5_ctx ctx, int acceptor)
|
_gsskrb5i_is_cfx(krb5_context context, gsskrb5_ctx ctx, int acceptor)
|
||||||
{
|
{
|
||||||
krb5_error_code ret;
|
|
||||||
krb5_keyblock *key;
|
krb5_keyblock *key;
|
||||||
|
|
||||||
if (acceptor) {
|
if (acceptor) {
|
||||||
@@ -144,7 +143,8 @@ _gsskrb5i_is_cfx(krb5_context context, gsskrb5_ctx ctx, int acceptor)
|
|||||||
}
|
}
|
||||||
if (ctx->crypto)
|
if (ctx->crypto)
|
||||||
krb5_crypto_destroy(context, ctx->crypto);
|
krb5_crypto_destroy(context, ctx->crypto);
|
||||||
ret = krb5_crypto_init(context, key, 0, &ctx->crypto);
|
/* XXX We really shouldn't ignore this; will come back to this */
|
||||||
|
(void) krb5_crypto_init(context, key, 0, &ctx->crypto);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@@ -152,7 +152,6 @@ _gss_acquire_cred_ext(OM_uint32 *minor_status,
|
|||||||
for (i = 0; i < mechs->count; i++) {
|
for (i = 0; i < mechs->count; i++) {
|
||||||
struct _gss_mechanism_name *mn = NULL;
|
struct _gss_mechanism_name *mn = NULL;
|
||||||
struct _gss_mechanism_cred *mc = NULL;
|
struct _gss_mechanism_cred *mc = NULL;
|
||||||
gss_name_t desired_mech_name = GSS_C_NO_NAME;
|
|
||||||
|
|
||||||
m = __gss_get_mechanism(&mechs->elements[i]);
|
m = __gss_get_mechanism(&mechs->elements[i]);
|
||||||
if (!m)
|
if (!m)
|
||||||
@@ -163,8 +162,6 @@ _gss_acquire_cred_ext(OM_uint32 *minor_status,
|
|||||||
&mechs->elements[i], &mn);
|
&mechs->elements[i], &mn);
|
||||||
if (major_status != GSS_S_COMPLETE)
|
if (major_status != GSS_S_COMPLETE)
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
desired_mech_name = mn->gmn_name;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
major_status = _gss_acquire_mech_cred(minor_status, m, mn,
|
major_status = _gss_acquire_mech_cred(minor_status, m, mn,
|
||||||
|
@@ -33,7 +33,7 @@ gss_delete_sec_context(OM_uint32 *minor_status,
|
|||||||
gss_ctx_id_t *context_handle,
|
gss_ctx_id_t *context_handle,
|
||||||
gss_buffer_t output_token)
|
gss_buffer_t output_token)
|
||||||
{
|
{
|
||||||
OM_uint32 major_status;
|
OM_uint32 major_status = GSS_S_COMPLETE;
|
||||||
struct _gss_context *ctx = (struct _gss_context *) *context_handle;
|
struct _gss_context *ctx = (struct _gss_context *) *context_handle;
|
||||||
|
|
||||||
if (output_token)
|
if (output_token)
|
||||||
@@ -53,5 +53,5 @@ gss_delete_sec_context(OM_uint32 *minor_status,
|
|||||||
*context_handle = GSS_C_NO_CONTEXT;
|
*context_handle = GSS_C_NO_CONTEXT;
|
||||||
}
|
}
|
||||||
|
|
||||||
return (GSS_S_COMPLETE);
|
return (major_status);
|
||||||
}
|
}
|
||||||
|
@@ -38,7 +38,7 @@
|
|||||||
char *
|
char *
|
||||||
gssapi_err(OM_uint32 maj_stat, OM_uint32 min_stat, gss_OID mech)
|
gssapi_err(OM_uint32 maj_stat, OM_uint32 min_stat, gss_OID mech)
|
||||||
{
|
{
|
||||||
OM_uint32 disp_min_stat, disp_maj_stat;
|
OM_uint32 disp_min_stat;
|
||||||
gss_buffer_desc maj_error_message;
|
gss_buffer_desc maj_error_message;
|
||||||
gss_buffer_desc min_error_message;
|
gss_buffer_desc min_error_message;
|
||||||
OM_uint32 msg_ctx = 0;
|
OM_uint32 msg_ctx = 0;
|
||||||
@@ -50,12 +50,10 @@ gssapi_err(OM_uint32 maj_stat, OM_uint32 min_stat, gss_OID mech)
|
|||||||
min_error_message.length = 0;
|
min_error_message.length = 0;
|
||||||
min_error_message.value = NULL;
|
min_error_message.value = NULL;
|
||||||
|
|
||||||
disp_maj_stat = gss_display_status(&disp_min_stat, maj_stat,
|
(void) gss_display_status(&disp_min_stat, maj_stat, GSS_C_GSS_CODE,
|
||||||
GSS_C_GSS_CODE,
|
mech, &msg_ctx, &maj_error_message);
|
||||||
mech, &msg_ctx, &maj_error_message);
|
(void) gss_display_status(&disp_min_stat, min_stat, GSS_C_MECH_CODE,
|
||||||
disp_maj_stat = gss_display_status(&disp_min_stat, min_stat,
|
mech, &msg_ctx, &min_error_message);
|
||||||
GSS_C_MECH_CODE,
|
|
||||||
mech, &msg_ctx, &min_error_message);
|
|
||||||
if (asprintf(&ret, "gss-code: %lu %.*s -- mech-code: %lu %.*s",
|
if (asprintf(&ret, "gss-code: %lu %.*s -- mech-code: %lu %.*s",
|
||||||
(unsigned long)maj_stat,
|
(unsigned long)maj_stat,
|
||||||
(int)maj_error_message.length,
|
(int)maj_error_message.length,
|
||||||
|
@@ -770,10 +770,9 @@ main(int argc, char **argv)
|
|||||||
slave *slaves = NULL;
|
slave *slaves = NULL;
|
||||||
uint32_t current_version = 0, old_version = 0;
|
uint32_t current_version = 0, old_version = 0;
|
||||||
krb5_keytab keytab;
|
krb5_keytab keytab;
|
||||||
int optidx;
|
|
||||||
char **files;
|
char **files;
|
||||||
|
|
||||||
optidx = krb5_program_setup(&context, argc, argv, args, num_args, NULL);
|
(void) krb5_program_setup(&context, argc, argv, args, num_args, NULL);
|
||||||
|
|
||||||
if(help_flag)
|
if(help_flag)
|
||||||
krb5_std_usage(0, args, num_args);
|
krb5_std_usage(0, args, num_args);
|
||||||
|
@@ -191,13 +191,11 @@ receive_loop (krb5_context context,
|
|||||||
*/
|
*/
|
||||||
do {
|
do {
|
||||||
int32_t len, timestamp, tmp;
|
int32_t len, timestamp, tmp;
|
||||||
enum kadm_ops op;
|
|
||||||
|
|
||||||
if(krb5_ret_int32 (sp, &vers) != 0)
|
if(krb5_ret_int32 (sp, &vers) != 0)
|
||||||
return;
|
return;
|
||||||
krb5_ret_int32 (sp, ×tamp);
|
krb5_ret_int32 (sp, ×tamp);
|
||||||
krb5_ret_int32 (sp, &tmp);
|
krb5_ret_int32 (sp, &tmp);
|
||||||
op = tmp;
|
|
||||||
krb5_ret_int32 (sp, &len);
|
krb5_ret_int32 (sp, &len);
|
||||||
if ((uint32_t)vers <= server_context->log_context.version)
|
if ((uint32_t)vers <= server_context->log_context.version)
|
||||||
krb5_storage_seek(sp, len + 8, SEEK_CUR);
|
krb5_storage_seek(sp, len + 8, SEEK_CUR);
|
||||||
|
@@ -86,6 +86,12 @@ _warnerr(krb5_context context, int do_errtext,
|
|||||||
ret = _warnerr(context, ETEXT, CODE, LEVEL, fmt, ap); \
|
ret = _warnerr(context, ETEXT, CODE, LEVEL, fmt, ap); \
|
||||||
va_end(ap);
|
va_end(ap);
|
||||||
|
|
||||||
|
#define FUNC_NORET(ETEXT, CODE, LEVEL) \
|
||||||
|
va_list ap; \
|
||||||
|
va_start(ap, fmt); \
|
||||||
|
(void) _warnerr(context, ETEXT, CODE, LEVEL, fmt, ap); \
|
||||||
|
va_end(ap);
|
||||||
|
|
||||||
#undef __attribute__
|
#undef __attribute__
|
||||||
#define __attribute__(X)
|
#define __attribute__(X)
|
||||||
|
|
||||||
@@ -202,7 +208,7 @@ krb5_err(krb5_context context, int eval, krb5_error_code code,
|
|||||||
const char *fmt, ...)
|
const char *fmt, ...)
|
||||||
__attribute__ ((noreturn, format (printf, 4, 5)))
|
__attribute__ ((noreturn, format (printf, 4, 5)))
|
||||||
{
|
{
|
||||||
FUNC(1, code, 0);
|
FUNC_NORET(1, code, 0);
|
||||||
exit(eval);
|
exit(eval);
|
||||||
UNREACHABLE(return 0);
|
UNREACHABLE(return 0);
|
||||||
}
|
}
|
||||||
@@ -241,7 +247,7 @@ KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
|||||||
krb5_errx(krb5_context context, int eval, const char *fmt, ...)
|
krb5_errx(krb5_context context, int eval, const char *fmt, ...)
|
||||||
__attribute__ ((noreturn, format (printf, 3, 4)))
|
__attribute__ ((noreturn, format (printf, 3, 4)))
|
||||||
{
|
{
|
||||||
FUNC(0, 0, 0);
|
FUNC_NORET(0, 0, 0);
|
||||||
exit(eval);
|
exit(eval);
|
||||||
UNREACHABLE(return 0);
|
UNREACHABLE(return 0);
|
||||||
}
|
}
|
||||||
@@ -283,7 +289,7 @@ KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
|||||||
krb5_abort(krb5_context context, krb5_error_code code, const char *fmt, ...)
|
krb5_abort(krb5_context context, krb5_error_code code, const char *fmt, ...)
|
||||||
__attribute__ ((noreturn, format (printf, 3, 4)))
|
__attribute__ ((noreturn, format (printf, 3, 4)))
|
||||||
{
|
{
|
||||||
FUNC(1, code, 0);
|
FUNC_NORET(1, code, 0);
|
||||||
abort();
|
abort();
|
||||||
UNREACHABLE(return 0);
|
UNREACHABLE(return 0);
|
||||||
}
|
}
|
||||||
@@ -311,7 +317,7 @@ KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
|||||||
krb5_abortx(krb5_context context, const char *fmt, ...)
|
krb5_abortx(krb5_context context, const char *fmt, ...)
|
||||||
__attribute__ ((noreturn, format (printf, 2, 3)))
|
__attribute__ ((noreturn, format (printf, 2, 3)))
|
||||||
{
|
{
|
||||||
FUNC(0, 0, 0);
|
FUNC_NORET(0, 0, 0);
|
||||||
abort();
|
abort();
|
||||||
UNREACHABLE(return 0);
|
UNREACHABLE(return 0);
|
||||||
}
|
}
|
||||||
|
@@ -14,7 +14,7 @@ error_code RAND, "Random generator failed"
|
|||||||
error_code AUTH, "NTLM authentication failed"
|
error_code AUTH, "NTLM authentication failed"
|
||||||
error_code TIME_SKEW, "Client time skewed to server"
|
error_code TIME_SKEW, "Client time skewed to server"
|
||||||
error_code OEM, "Client set OEM string"
|
error_code OEM, "Client set OEM string"
|
||||||
error_code MISSING_NAME_SEPARATOR, "missing @ or \\ in name"
|
error_code MISSING_NAME_SEPARATOR, "missing @ or \\\\ in name"
|
||||||
error_code MISSING_BUFFER, "missing expected buffer"
|
error_code MISSING_BUFFER, "missing expected buffer"
|
||||||
error_code INVALID_APOP, "Invalid APOP response"
|
error_code INVALID_APOP, "Invalid APOP response"
|
||||||
error_code INVALID_CRAM_MD5, "Invalid CRAM-MD5 response"
|
error_code INVALID_CRAM_MD5, "Invalid CRAM-MD5 response"
|
||||||
|
Reference in New Issue
Block a user