diff options
| author | Ken Raeburn <raeburn@mit.edu> | 2002-07-01 20:45:39 +0000 |
|---|---|---|
| committer | Ken Raeburn <raeburn@mit.edu> | 2002-07-01 20:45:39 +0000 |
| commit | 37cbaddce230cea7893771fb3ec9f5bab1a79335 (patch) | |
| tree | 4b741308c20a6a81f9718d8ca135c01b609cf291 /src | |
| parent | ae936420d840abe8436200199a799f15276c8927 (diff) | |
| download | krb5-37cbaddce230cea7893771fb3ec9f5bab1a79335.tar.gz krb5-37cbaddce230cea7893771fb3ec9f5bab1a79335.tar.xz krb5-37cbaddce230cea7893771fb3ec9f5bab1a79335.zip | |
fix some compiler warnings
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@14591 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src')
| -rw-r--r-- | src/lib/gssapi/krb5/ChangeLog | 9 | ||||
| -rw-r--r-- | src/lib/gssapi/krb5/accept_sec_context.c | 18 | ||||
| -rw-r--r-- | src/lib/gssapi/krb5/k5unseal.c | 5 |
3 files changed, 21 insertions, 11 deletions
diff --git a/src/lib/gssapi/krb5/ChangeLog b/src/lib/gssapi/krb5/ChangeLog index 96e3ad6cc3..a7982c6347 100644 --- a/src/lib/gssapi/krb5/ChangeLog +++ b/src/lib/gssapi/krb5/ChangeLog @@ -1,3 +1,12 @@ +2002-07-01 Ken Raeburn <raeburn@mit.edu> + + * accept_sec_context.c (rd_and_store_for_creds): Extra parens + around assignments to quiet gcc. + (krb5_gss_accept_sec_context): Fix some type mismatches between + OM_uint32 and krb5_error_code. + * k5unseal.c (kg_unseal_v1): Move a variable declaration and + assignment to fix gcc "possibly uninitialized" warning. + 2002-03-03 Sam Hartman <hartmans@mit.edu> * accept_sec_context.c (rd_and_store_for_creds): Patch from Steven diff --git a/src/lib/gssapi/krb5/accept_sec_context.c b/src/lib/gssapi/krb5/accept_sec_context.c index 08f90e8e17..d65c053799 100644 --- a/src/lib/gssapi/krb5/accept_sec_context.c +++ b/src/lib/gssapi/krb5/accept_sec_context.c @@ -93,7 +93,7 @@ rd_and_store_for_creds(context, auth_context, inbuf, out_cred) krb5_auth_context new_auth_ctx = NULL; krb5_int32 flags_org; - if (retval = krb5_auth_con_getflags(context, auth_context, &flags_org)) + if ((retval = krb5_auth_con_getflags(context, auth_context, &flags_org))) return retval; krb5_auth_con_setflags(context, auth_context, KRB5_AUTH_CONTEXT_DO_SEQUENCE); @@ -120,10 +120,10 @@ rd_and_store_for_creds(context, auth_context, inbuf, out_cred) * containing the KRB_CRED message does get encrypted.) */ if (krb5_rd_cred(context, auth_context, inbuf, &creds, NULL)) { - if (retval = krb5_auth_con_init(context, &new_auth_ctx)) + if ((retval = krb5_auth_con_init(context, &new_auth_ctx))) goto cleanup; krb5_auth_con_setflags(context, new_auth_ctx, 0); - if (retval = krb5_rd_cred(context, new_auth_ctx, inbuf, &creds, NULL)) + if ((retval = krb5_rd_cred(context, new_auth_ctx, inbuf, &creds, NULL))) goto cleanup; } @@ -277,19 +277,23 @@ krb5_gss_accept_sec_context(minor_status, context_handle, /* handle default cred handle */ if (verifier_cred_handle == GSS_C_NO_CREDENTIAL) { - major_status = krb5_gss_acquire_cred(&code, GSS_C_NO_NAME, + major_status = krb5_gss_acquire_cred(minor_status, GSS_C_NO_NAME, GSS_C_INDEFINITE, GSS_C_NO_OID_SET, GSS_C_ACCEPT, &cred_handle, NULL, NULL); - if (major_status != GSS_S_COMPLETE) + if (major_status != GSS_S_COMPLETE) { + code = *minor_status; goto fail; + } } else { cred_handle = verifier_cred_handle; } - major_status = krb5_gss_validate_cred(&code, verifier_cred_handle); - if (GSS_ERROR(major_status)) + major_status = krb5_gss_validate_cred(minor_status, verifier_cred_handle); + if (GSS_ERROR(major_status)) { + code = *minor_status; goto fail; + } cred = (krb5_gss_cred_id_t) cred_handle; diff --git a/src/lib/gssapi/krb5/k5unseal.c b/src/lib/gssapi/krb5/k5unseal.c index ebc8a760fe..4052153791 100644 --- a/src/lib/gssapi/krb5/k5unseal.c +++ b/src/lib/gssapi/krb5/k5unseal.c @@ -70,7 +70,6 @@ kg_unseal_v1(context, minor_status, ctx, ptr, bodysize, message_buffer, int toktype; { krb5_error_code code; - int tmsglen; int conflen = 0; int signalg; int sealalg; @@ -154,9 +153,6 @@ kg_unseal_v1(context, minor_status, ctx, ptr, bodysize, message_buffer, return GSS_S_DEFECTIVE_TOKEN; } - if (toktype == KG_TOK_SEAL_MSG) - tmsglen = bodysize-(14+cksum_len); - /* get the token parameters */ if ((code = kg_get_seq_num(context, ctx->seq, ptr+14, ptr+6, &direction, @@ -168,6 +164,7 @@ kg_unseal_v1(context, minor_status, ctx, ptr, bodysize, message_buffer, /* decode the message, if SEAL */ if (toktype == KG_TOK_SEAL_MSG) { + int tmsglen = bodysize-(14+cksum_len); if (sealalg != 0xffff) { if ((plain = (unsigned char *) xmalloc(tmsglen)) == NULL) { *minor_status = ENOMEM; |
