diff options
| author | Greg Hudson <ghudson@mit.edu> | 2013-06-07 15:17:31 -0400 |
|---|---|---|
| committer | Greg Hudson <ghudson@mit.edu> | 2013-06-07 15:19:37 -0400 |
| commit | e51c089b745161dd6e1d64998e99d065fc22377e (patch) | |
| tree | 5e792dd53ed48f3c5d0a0aa78c0ce8e777f385a2 /src/plugins/kdb | |
| parent | 4f551a7ec126c52ee1f8fea4c3954015b70987bd (diff) | |
| download | krb5-e51c089b745161dd6e1d64998e99d065fc22377e.tar.gz krb5-e51c089b745161dd6e1d64998e99d065fc22377e.tar.xz krb5-e51c089b745161dd6e1d64998e99d065fc22377e.zip | |
Fix various warnings
Diffstat (limited to 'src/plugins/kdb')
| -rw-r--r-- | src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c | 3 | ||||
| -rw-r--r-- | src/plugins/kdb/ldap/libkdb_ldap/ldap_misc.c | 8 | ||||
| -rw-r--r-- | src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c | 8 | ||||
| -rw-r--r-- | src/plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c | 34 | ||||
| -rw-r--r-- | src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c | 20 | ||||
| -rw-r--r-- | src/plugins/kdb/ldap/libkdb_ldap/ldap_service_stash.c | 4 | ||||
| -rw-r--r-- | src/plugins/kdb/ldap/libkdb_ldap/princ_xdr.c | 2 |
7 files changed, 36 insertions, 43 deletions
diff --git a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c index 38e470ffbc..940281378b 100644 --- a/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c +++ b/src/plugins/kdb/ldap/ldap_util/kdb5_ldap_list.c @@ -156,7 +156,6 @@ list_modify_str_array(char ***destlist, const char **sourcelist, int mode) char **dlist = NULL, **tmplist = NULL; const char **slist = NULL; int dcount = 0, scount = 0, copycount = 0; - int found = 0; if ((destlist == NULL) || (*destlist == NULL) || (sourcelist == NULL)) return; @@ -192,10 +191,8 @@ list_modify_str_array(char ***destlist, const char **sourcelist, int mode) * from the destination list */ for (slist = sourcelist; *slist != NULL; slist++) { for (dlist = *destlist; *dlist != NULL; dlist++) { - found = 0; /* value not found */ /* DN is case insensitive string */ if (strcasecmp(*dlist, *slist) == 0) { - found = 1; free(*dlist); /* Advance the rest of the entries by one */ for (tmplist = dlist; *tmplist != NULL; tmplist++) { diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_misc.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_misc.c index 3fac3c7d3d..8776ab5139 100644 --- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_misc.c +++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_misc.c @@ -536,12 +536,10 @@ krb5_error_code is_principal_in_realm(krb5_ldap_context *ldap_context, krb5_const_principal searchfor) { - size_t defrealmlen=0; char *defrealm=NULL; #define FIND_MAX(a,b) ((a) > (b) ? (a) : (b)) - defrealmlen = strlen(ldap_context->lrparams->realm_name); defrealm = ldap_context->lrparams->realm_name; /* @@ -1646,6 +1644,7 @@ populate_krb5_db_entry(krb5_context context, krb5_ldap_context *ldap_context, { krb5_error_code st = 0; unsigned int mask = 0; + int val; krb5_boolean attr_present = FALSE; char **values = NULL, *policydn = NULL, *pwdpolicydn = NULL; char *polname = NULL, *tktpolname = NULL; @@ -1720,9 +1719,10 @@ populate_krb5_db_entry(krb5_context context, krb5_ldap_context *ldap_context, mask |= KDB_LAST_FAILED_ATTR; /* KRBLOGINFAILEDCOUNT */ - if (krb5_ldap_get_value(ld, ent, "krbLoginFailedCount", - &(entry->fail_auth_count)) == 0) + if (krb5_ldap_get_value(ld, ent, "krbLoginFailedCount", &val) == 0) { + entry->fail_auth_count = val; mask |= KDB_FAIL_AUTH_COUNT_ATTR; + } /* KRBMAXTICKETLIFE */ if (krb5_ldap_get_value(ld, ent, "krbmaxticketlife", &(entry->max_life)) == 0) diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c index 527873c1f2..bcdc1dc473 100644 --- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c +++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c @@ -555,7 +555,8 @@ krb5_ldap_put_principal(krb5_context context, krb5_db_entry *entry, goto cleanup; if (entry->mask & KADM5_LOAD) { - int tree = 0, ntrees = 0, numlentries = 0; + unsigned int tree = 0, ntrees = 0; + int numlentries = 0; char **subtreelist = NULL, *filter = NULL; /* A load operation is special, will do a mix-in (add krbprinc @@ -695,7 +696,8 @@ krb5_ldap_put_principal(krb5_context context, krb5_db_entry *entry, */ if (xargs.dn_from_kbd == TRUE) { /* make sure the DN falls in the subtree */ - int tre=0, dnlen=0, subtreelen=0, ntrees=0; + unsigned int tre=0, ntrees=0; + int dnlen=0, subtreelen=0; char **subtreelist=NULL; char *dn=NULL; krb5_boolean outofsubtree=TRUE; @@ -1293,7 +1295,7 @@ krb5_read_tkt_policy(krb5_context context, krb5_ldap_context *ldap_context, krb5_db_entry *entries, char *policy) { krb5_error_code st=0; - unsigned int mask=0, omask=0; + int mask=0, omask=0; int tkt_mask=(KDB_MAX_LIFE_ATTR | KDB_MAX_RLIFE_ATTR | KDB_TKT_FLAGS_ATTR); krb5_ldap_policy_params *tktpoldnparam=NULL; diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c index 2169aaae1e..4d7d6739e5 100644 --- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c +++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c @@ -232,6 +232,15 @@ cleanup: return(st); } +static void +get_ui4(LDAP *ld, LDAPMessage *ent, char *name, krb5_ui_4 *out) +{ + int val; + + krb5_ldap_get_value(ld, ent, name, &val); + *out = val; +} + static krb5_error_code populate_policy(krb5_context context, LDAP *ld, @@ -245,19 +254,18 @@ populate_policy(krb5_context context, CHECK_NULL(pol_entry->name); pol_entry->version = 1; - krb5_ldap_get_value(ld, ent, "krbmaxpwdlife", &(pol_entry->pw_max_life)); - krb5_ldap_get_value(ld, ent, "krbminpwdlife", &(pol_entry->pw_min_life)); - krb5_ldap_get_value(ld, ent, "krbpwdmindiffchars", &(pol_entry->pw_min_classes)); - krb5_ldap_get_value(ld, ent, "krbpwdminlength", &(pol_entry->pw_min_length)); - krb5_ldap_get_value(ld, ent, "krbpwdhistorylength", &(pol_entry->pw_history_num)); - - krb5_ldap_get_value(ld, ent, "krbpwdmaxfailure", &(pol_entry->pw_max_fail)); - krb5_ldap_get_value(ld, ent, "krbpwdfailurecountinterval", &(pol_entry->pw_failcnt_interval)); - krb5_ldap_get_value(ld, ent, "krbpwdlockoutduration", &(pol_entry->pw_lockout_duration)); - krb5_ldap_get_value(ld, ent, "krbpwdattributes", &(pol_entry->attributes)); - krb5_ldap_get_value(ld, ent, "krbpwdmaxlife", &(pol_entry->max_life)); - krb5_ldap_get_value(ld, ent, "krbpwdmaxrenewablelife", - &(pol_entry->max_renewable_life)); + get_ui4(ld, ent, "krbmaxpwdlife", &pol_entry->pw_max_life); + get_ui4(ld, ent, "krbminpwdlife", &pol_entry->pw_min_life); + get_ui4(ld, ent, "krbpwdmindiffchars", &pol_entry->pw_min_classes); + get_ui4(ld, ent, "krbpwdminlength", &pol_entry->pw_min_length); + get_ui4(ld, ent, "krbpwdhistorylength", &pol_entry->pw_history_num); + get_ui4(ld, ent, "krbpwdmaxfailure", &pol_entry->pw_max_fail); + get_ui4(ld, ent, "krbpwdfailurecountinterval", + &pol_entry->pw_failcnt_interval); + get_ui4(ld, ent, "krbpwdlockoutduration", &pol_entry->pw_lockout_duration); + get_ui4(ld, ent, "krbpwdattributes", &pol_entry->attributes); + get_ui4(ld, ent, "krbpwdmaxlife", &pol_entry->max_life); + get_ui4(ld, ent, "krbpwdmaxrenewablelife", &pol_entry->max_renewable_life); st = krb5_ldap_get_string(ld, ent, "krbpwdallowedkeysalts", &(pol_entry->allowed_keysalts), NULL); diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c index e5c1f598f8..032be6f971 100644 --- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c +++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c @@ -209,7 +209,8 @@ krb5_ldap_delete_realm (krb5_context context, char *lrealm) char **values=NULL, **subtrees=NULL, **policy=NULL; LDAPMessage **result_arr=NULL, *result = NULL, *ent = NULL; krb5_principal principal; - int l=0, ntree=0, i=0, j=0, mask=0; + unsigned int l=0, ntree=0; + int i=0, j=0, mask=0; kdb5_dal_handle *dal_handle = NULL; krb5_ldap_context *ldap_context = NULL; krb5_ldap_server_handle *ldap_server_handle = NULL; @@ -342,7 +343,7 @@ krb5_ldap_modify_realm(krb5_context context, krb5_ldap_realm_params *rparams, krb5_error_code st=0; char **strval=NULL, *strvalprc[5]={NULL}; LDAPMod **mods = NULL; - int oldmask=0, objectmask=0,k=0; + int objectmask=0,k=0; kdb5_dal_handle *dal_handle=NULL; krb5_ldap_context *ldap_context=NULL; krb5_ldap_server_handle *ldap_server_handle=NULL; @@ -371,21 +372,6 @@ krb5_ldap_modify_realm(krb5_context context, krb5_ldap_realm_params *rparams, /* get ldap handle */ GET_HANDLE (); - /* get the oldmask obtained from the krb5_ldap_read_realm_params */ - { - void *voidptr=NULL; - - if ((st=decode_tl_data(rparams->tl_data, KDB_TL_MASK, &voidptr)) == 0) { - oldmask = *((int *) voidptr); - free (voidptr); - } else { - st = EINVAL; - krb5_set_error_message(context, st, _("tl_data not available")); - return st; - } - } - - /* SUBTREE ATTRIBUTE */ if (mask & LDAP_REALM_SUBTREE) { if ( rparams->subtree!=NULL) { diff --git a/src/plugins/kdb/ldap/libkdb_ldap/ldap_service_stash.c b/src/plugins/kdb/ldap/libkdb_ldap/ldap_service_stash.c index f412290ae7..32e2af0050 100644 --- a/src/plugins/kdb/ldap/libkdb_ldap/ldap_service_stash.c +++ b/src/plugins/kdb/ldap/libkdb_ldap/ldap_service_stash.c @@ -84,7 +84,6 @@ krb5_ldap_readpassword(krb5_context context, krb5_ldap_context *ldap_context, int entryfound=0; krb5_error_code st=0; char line[RECORDLEN]="0", *start=NULL, *file=NULL; - char errbuf[1024]; FILE *fptr=NULL; *password = NULL; @@ -166,7 +165,8 @@ rp_exit: int tohex(krb5_data in, krb5_data *ret) { - int i=0, err = 0; + unsigned int i=0; + int err = 0; ret->length = 0; ret->data = NULL; diff --git a/src/plugins/kdb/ldap/libkdb_ldap/princ_xdr.c b/src/plugins/kdb/ldap/libkdb_ldap/princ_xdr.c index 760bfd31ab..5ae8672c48 100644 --- a/src/plugins/kdb/ldap/libkdb_ldap/princ_xdr.c +++ b/src/plugins/kdb/ldap/libkdb_ldap/princ_xdr.c @@ -187,7 +187,7 @@ krb5_lookup_tl_kadm_data(krb5_tl_data *tl_data, osa_princ_ent_rec *princ_entry) XDR xdrs; - xdrmem_create(&xdrs, tl_data->tl_data_contents, + xdrmem_create(&xdrs, (caddr_t)tl_data->tl_data_contents, tl_data->tl_data_length, XDR_DECODE); if (! ldap_xdr_osa_princ_ent_rec(&xdrs, princ_entry)) { xdr_destroy(&xdrs); |
