Warning fixes from Christos Zoulas
- shadowed variables - signed/unsigned confusion - const lossage - incomplete structure initializations - unused code
This commit is contained in:
@@ -171,7 +171,7 @@ hdb_remove_aliases(krb5_context context, HDB *db, krb5_data *key)
|
||||
krb5_error_code code;
|
||||
hdb_entry oldentry;
|
||||
krb5_data value;
|
||||
int i;
|
||||
size_t i;
|
||||
|
||||
code = db->hdb__get(context, db, *key, &value);
|
||||
if (code == HDB_ERR_NOENTRY)
|
||||
@@ -211,7 +211,7 @@ hdb_add_aliases(krb5_context context, HDB *db,
|
||||
const HDB_Ext_Aliases *aliases;
|
||||
krb5_error_code code;
|
||||
krb5_data key, value;
|
||||
int i;
|
||||
size_t i;
|
||||
|
||||
code = hdb_entry_get_aliases(&entry->entry, &aliases);
|
||||
if (code || aliases == NULL)
|
||||
@@ -240,7 +240,8 @@ static krb5_error_code
|
||||
hdb_check_aliases(krb5_context context, HDB *db, hdb_entry_ex *entry)
|
||||
{
|
||||
const HDB_Ext_Aliases *aliases;
|
||||
int code, i;
|
||||
int code;
|
||||
size_t i;
|
||||
|
||||
/* check if new aliases already is used */
|
||||
|
||||
|
@@ -37,7 +37,7 @@
|
||||
krb5_error_code
|
||||
hdb_entry_check_mandatory(krb5_context context, const hdb_entry *ent)
|
||||
{
|
||||
int i;
|
||||
size_t i;
|
||||
|
||||
if (ent->extensions == NULL)
|
||||
return 0;
|
||||
@@ -63,13 +63,13 @@ hdb_entry_check_mandatory(krb5_context context, const hdb_entry *ent)
|
||||
HDB_extension *
|
||||
hdb_find_extension(const hdb_entry *entry, int type)
|
||||
{
|
||||
int i;
|
||||
size_t i;
|
||||
|
||||
if (entry->extensions == NULL)
|
||||
return NULL;
|
||||
|
||||
for (i = 0; i < entry->extensions->len; i++)
|
||||
if (entry->extensions->val[i].data.element == type)
|
||||
if (entry->extensions->val[i].data.element == (unsigned)type)
|
||||
return &entry->extensions->val[i];
|
||||
return NULL;
|
||||
}
|
||||
@@ -112,7 +112,7 @@ hdb_replace_extension(krb5_context context,
|
||||
Der_type replace_type, list_type;
|
||||
unsigned int replace_tag, list_tag;
|
||||
size_t size;
|
||||
int i;
|
||||
size_t i;
|
||||
|
||||
ret = der_get_tag(ext->data.u.asn1_ellipsis.data,
|
||||
ext->data.u.asn1_ellipsis.length,
|
||||
@@ -180,13 +180,13 @@ hdb_clear_extension(krb5_context context,
|
||||
hdb_entry *entry,
|
||||
int type)
|
||||
{
|
||||
int i;
|
||||
size_t i;
|
||||
|
||||
if (entry->extensions == NULL)
|
||||
return 0;
|
||||
|
||||
for (i = 0; i < entry->extensions->len; i++) {
|
||||
if (entry->extensions->val[i].data.element == type) {
|
||||
if (entry->extensions->val[i].data.element == (unsigned)type) {
|
||||
free_HDB_extension(&entry->extensions->val[i]);
|
||||
memmove(&entry->extensions->val[i],
|
||||
&entry->extensions->val[i + 1],
|
||||
@@ -286,7 +286,7 @@ hdb_entry_get_password(krb5_context context, HDB *db,
|
||||
|
||||
ext = hdb_find_extension(entry, choice_HDB_extension_data_password);
|
||||
if (ext) {
|
||||
heim_utf8_string str;
|
||||
heim_utf8_string xstr;
|
||||
heim_octet_string pw;
|
||||
|
||||
if (db->hdb_master_key_set && ext->data.u.password.mkvno) {
|
||||
@@ -314,13 +314,13 @@ hdb_entry_get_password(krb5_context context, HDB *db,
|
||||
return ret;
|
||||
}
|
||||
|
||||
str = pw.data;
|
||||
if (str[pw.length - 1] != '\0') {
|
||||
xstr = pw.data;
|
||||
if (xstr[pw.length - 1] != '\0') {
|
||||
krb5_set_error_message(context, EINVAL, "malformed password");
|
||||
return EINVAL;
|
||||
}
|
||||
|
||||
*p = strdup(str);
|
||||
*p = strdup(xstr);
|
||||
|
||||
der_free_octet_string(&pw);
|
||||
if (*p == NULL) {
|
||||
|
@@ -144,7 +144,7 @@ fix_salt(krb5_context context, hdb_entry *ent, int key_num)
|
||||
case KRB5_KDB_SALTTYPE_NOREALM:
|
||||
{
|
||||
size_t len;
|
||||
int i;
|
||||
size_t i;
|
||||
char *p;
|
||||
|
||||
len = 0;
|
||||
|
@@ -168,7 +168,7 @@ hdb_unlock(int fd)
|
||||
void
|
||||
hdb_free_entry(krb5_context context, hdb_entry_ex *ent)
|
||||
{
|
||||
int i;
|
||||
size_t i;
|
||||
|
||||
if (ent->free_entry)
|
||||
(*ent->free_entry)(context, ent);
|
||||
@@ -217,7 +217,7 @@ hdb_check_db_format(krb5_context context, HDB *db)
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
tag.data = HDB_DB_FORMAT_ENTRY;
|
||||
tag.data = (void *)(intptr_t)HDB_DB_FORMAT_ENTRY;
|
||||
tag.length = strlen(tag.data);
|
||||
ret = (*db->hdb__get)(context, db, tag, &version);
|
||||
ret2 = db->hdb_unlock(context, db);
|
||||
@@ -250,7 +250,7 @@ hdb_init_db(krb5_context context, HDB *db)
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
tag.data = HDB_DB_FORMAT_ENTRY;
|
||||
tag.data = (void *)(intptr_t)HDB_DB_FORMAT_ENTRY;
|
||||
tag.length = strlen(tag.data);
|
||||
snprintf(ver, sizeof(ver), "%u", HDB_DB_FORMAT);
|
||||
version.data = ver;
|
||||
|
@@ -256,8 +256,8 @@ hdb_generate_key_set(krb5_context context, krb5_principal principal,
|
||||
char **ktypes, **kp;
|
||||
krb5_error_code ret;
|
||||
Key *k, *key_set;
|
||||
int i, j;
|
||||
char *default_keytypes[] = {
|
||||
size_t i, j;
|
||||
static const char *default_keytypes[] = {
|
||||
"aes256-cts-hmac-sha1-96:pw-salt",
|
||||
"des3-cbc-sha1:pw-salt",
|
||||
"arcfour-hmac-md5:pw-salt",
|
||||
@@ -267,7 +267,7 @@ hdb_generate_key_set(krb5_context context, krb5_principal principal,
|
||||
ktypes = krb5_config_get_strings(context, NULL, "kadmin",
|
||||
"default_keys", NULL);
|
||||
if (ktypes == NULL)
|
||||
ktypes = default_keytypes;
|
||||
ktypes = (char **)(intptr_t)default_keytypes;
|
||||
|
||||
*ret_key_set = key_set = NULL;
|
||||
*nkeyset = 0;
|
||||
@@ -337,7 +337,7 @@ hdb_generate_key_set(krb5_context context, krb5_principal principal,
|
||||
*ret_key_set = key_set;
|
||||
|
||||
out:
|
||||
if (ktypes != default_keytypes)
|
||||
if (ktypes != (char **)(intptr_t)default_keytypes)
|
||||
krb5_config_free_strings(ktypes);
|
||||
|
||||
if (ret) {
|
||||
@@ -364,7 +364,7 @@ hdb_generate_key_set_password(krb5_context context,
|
||||
Key **keys, size_t *num_keys)
|
||||
{
|
||||
krb5_error_code ret;
|
||||
int i;
|
||||
size_t i;
|
||||
|
||||
ret = hdb_generate_key_set(context, principal,
|
||||
keys, num_keys, 0);
|
||||
|
@@ -184,7 +184,7 @@ hdb_get_entry(krb5_context context,
|
||||
const char *mkey = d->mkey;
|
||||
char *fdbname = NULL, *fmkey = NULL;
|
||||
HDB *db;
|
||||
int i;
|
||||
size_t i;
|
||||
|
||||
memset(&ent, 0, sizeof(ent));
|
||||
|
||||
@@ -222,7 +222,7 @@ hdb_get_entry(krb5_context context,
|
||||
}else if(ret)
|
||||
goto out;
|
||||
|
||||
if(kvno && ent.entry.kvno != kvno) {
|
||||
if(kvno && (krb5_kvno)ent.entry.kvno != kvno) {
|
||||
hdb_free_entry(context, &ent);
|
||||
ret = KRB5_KT_NOTFOUND;
|
||||
goto out;
|
||||
@@ -382,7 +382,7 @@ hdb_next_entry(krb5_context context,
|
||||
* next entry
|
||||
*/
|
||||
|
||||
if (c->key_idx == c->hdb_entry.entry.keys.len) {
|
||||
if ((size_t)c->key_idx == c->hdb_entry.entry.keys.len) {
|
||||
hdb_free_entry(context, &c->hdb_entry);
|
||||
c->next = TRUE;
|
||||
c->key_idx = 0;
|
||||
|
@@ -372,7 +372,7 @@ _hdb_find_master_key(uint32_t *mkvno, hdb_master_key mkey)
|
||||
if(mkvno == NULL) {
|
||||
if(ret == NULL || mkey->keytab.vno > ret->keytab.vno)
|
||||
ret = mkey;
|
||||
} else if(mkey->keytab.vno == *mkvno)
|
||||
} else if((uint32_t)mkey->keytab.vno == *mkvno)
|
||||
return mkey;
|
||||
mkey = mkey->next;
|
||||
}
|
||||
@@ -459,7 +459,7 @@ hdb_unseal_key_mkey(krb5_context context, Key *k, hdb_master_key mkey)
|
||||
krb5_error_code
|
||||
hdb_unseal_keys_mkey(krb5_context context, hdb_entry *ent, hdb_master_key mkey)
|
||||
{
|
||||
int i;
|
||||
size_t i;
|
||||
|
||||
for(i = 0; i < ent->keys.len; i++){
|
||||
krb5_error_code ret;
|
||||
@@ -526,7 +526,7 @@ hdb_seal_key_mkey(krb5_context context, Key *k, hdb_master_key mkey)
|
||||
krb5_error_code
|
||||
hdb_seal_keys_mkey(krb5_context context, hdb_entry *ent, hdb_master_key mkey)
|
||||
{
|
||||
int i;
|
||||
size_t i;
|
||||
for(i = 0; i < ent->keys.len; i++){
|
||||
krb5_error_code ret;
|
||||
|
||||
|
@@ -78,7 +78,8 @@ append_string(krb5_context context, krb5_storage *sp, const char *fmt, ...)
|
||||
static krb5_error_code
|
||||
append_hex(krb5_context context, krb5_storage *sp, krb5_data *data)
|
||||
{
|
||||
int i, printable = 1;
|
||||
int printable = 1;
|
||||
size_t i;
|
||||
char *p;
|
||||
|
||||
p = data->data;
|
||||
@@ -126,7 +127,7 @@ static krb5_error_code
|
||||
entry2string_int (krb5_context context, krb5_storage *sp, hdb_entry *ent)
|
||||
{
|
||||
char *p;
|
||||
int i;
|
||||
size_t i;
|
||||
krb5_error_code ret;
|
||||
|
||||
/* --- principal */
|
||||
|
Reference in New Issue
Block a user