summaryrefslogtreecommitdiffstats
path: root/src/plugins/preauth
diff options
context:
space:
mode:
authorEzra Peisach <epeisach@mit.edu>2011-09-26 00:37:20 +0000
committerEzra Peisach <epeisach@mit.edu>2011-09-26 00:37:20 +0000
commitf8bf279b3d342f547dd9036f0362df0eb3830a3b (patch)
tree091ff7b35ffe17f70e10618491435e0ba1f176f1 /src/plugins/preauth
parent2630f1f455535e4d5d977c35c5b57751f8d8f450 (diff)
downloadkrb5-f8bf279b3d342f547dd9036f0362df0eb3830a3b.tar.gz
krb5-f8bf279b3d342f547dd9036f0362df0eb3830a3b.tar.xz
krb5-f8bf279b3d342f547dd9036f0362df0eb3830a3b.zip
Remove variables set but not used
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@25233 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/plugins/preauth')
-rw-r--r--src/plugins/preauth/pkinit/pkinit_crypto_openssl.c2
-rw-r--r--src/plugins/preauth/pkinit/pkinit_matching.c4
-rw-r--r--src/plugins/preauth/pkinit/pkinit_srv.c3
3 files changed, 2 insertions, 7 deletions
diff --git a/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c b/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
index 6f39f36bc2..a1c4ca1023 100644
--- a/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
+++ b/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
@@ -5771,7 +5771,6 @@ pkcs7_dataDecode(krb5_context context,
EVP_CIPHER_CTX *evp_ctx=NULL;
X509_ALGOR *enc_alg=NULL;
STACK_OF(PKCS7_RECIP_INFO) *rsk=NULL;
- X509_ALGOR *xalg=NULL;
PKCS7_RECIP_INFO *ri=NULL;
X509 *cert = sk_X509_value(id_cryptoctx->my_certs,
id_cryptoctx->cert_index);
@@ -5786,7 +5785,6 @@ pkcs7_dataDecode(krb5_context context,
PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNSUPPORTED_CIPHER_TYPE);
goto cleanup;
}
- xalg=p7->d.enveloped->enc_data->algorithm;
if ((etmp=BIO_new(BIO_f_cipher())) == NULL) {
PKCS7err(PKCS7_F_PKCS7_DATADECODE,ERR_R_BIO_LIB);
diff --git a/src/plugins/preauth/pkinit/pkinit_matching.c b/src/plugins/preauth/pkinit/pkinit_matching.c
index c7e2a4fda4..a3bf3f4e21 100644
--- a/src/plugins/preauth/pkinit/pkinit_matching.c
+++ b/src/plugins/preauth/pkinit/pkinit_matching.c
@@ -378,7 +378,7 @@ parse_rule_set(krb5_context context,
rule_set **out_rs)
{
const char *rule;
- int remaining, totlen;
+ int remaining;
krb5_error_code ret, retval;
rule_component *rc = NULL, *trc;
rule_set *rs;
@@ -387,7 +387,7 @@ parse_rule_set(krb5_context context,
if (rule_in == NULL)
return EINVAL;
rule = rule_in;
- totlen = remaining = strlen(rule);
+ remaining = strlen(rule);
rs = calloc(1, sizeof(*rs));
if (rs == NULL) {
diff --git a/src/plugins/preauth/pkinit/pkinit_srv.c b/src/plugins/preauth/pkinit/pkinit_srv.c
index a74268ce82..c76359e7b6 100644
--- a/src/plugins/preauth/pkinit/pkinit_srv.c
+++ b/src/plugins/preauth/pkinit/pkinit_srv.c
@@ -308,7 +308,6 @@ pkinit_server_verify_padata(krb5_context context,
krb5_auth_pack_draft9 *auth_pack9 = NULL;
pkinit_kdc_context plgctx = NULL;
pkinit_kdc_req_context reqctx = NULL;
- krb5_preauthtype pa_type;
krb5_checksum cksum = {0, 0, 0, NULL};
krb5_data *der_req = NULL;
int valid_eku = 0, valid_san = 0;
@@ -351,7 +350,6 @@ pkinit_server_verify_padata(krb5_context context,
switch ((int)data->pa_type) {
case KRB5_PADATA_PK_AS_REQ:
pkiDebug("processing KRB5_PADATA_PK_AS_REQ\n");
- pa_type = (int)data->pa_type;
retval = k5int_decode_krb5_pa_pk_as_req(&k5data, &reqp);
if (retval) {
pkiDebug("decode_krb5_pa_pk_as_req failed\n");
@@ -372,7 +370,6 @@ pkinit_server_verify_padata(krb5_context context,
case KRB5_PADATA_PK_AS_REP_OLD:
case KRB5_PADATA_PK_AS_REQ_OLD:
pkiDebug("processing KRB5_PADATA_PK_AS_REQ_OLD\n");
- pa_type = KRB5_PADATA_PK_AS_REQ_OLD;
retval = k5int_decode_krb5_pa_pk_as_req_draft9(&k5data, &reqp9);
if (retval) {
pkiDebug("decode_krb5_pa_pk_as_req_draft9 failed\n");