diff options
Diffstat (limited to 'src/lib')
| -rw-r--r-- | src/lib/crypto/keyhash_provider/ChangeLog | 6 | ||||
| -rw-r--r-- | src/lib/crypto/keyhash_provider/k5_md4des.c | 3 | ||||
| -rw-r--r-- | src/lib/crypto/keyhash_provider/k5_md5des.c | 3 |
3 files changed, 8 insertions, 4 deletions
diff --git a/src/lib/crypto/keyhash_provider/ChangeLog b/src/lib/crypto/keyhash_provider/ChangeLog index 3463f822d..8a40911a2 100644 --- a/src/lib/crypto/keyhash_provider/ChangeLog +++ b/src/lib/crypto/keyhash_provider/ChangeLog @@ -1,3 +1,9 @@ +2001-05-31 Ezra Peisach <epeisach@mit.edu> + + * k5_md4des.c (k5_md4des_verify): Get rid of local variable that + is assigned to, without side effects, but never used. + * k5_md5des.c (k5_md5des_verify): Likewise. + 2001-03-09 Ken Raeburn <raeburn@mit.edu> * descbc.c, k5_md4des.c, k5_md5des.c, keyhash_provider.h, diff --git a/src/lib/crypto/keyhash_provider/k5_md4des.c b/src/lib/crypto/keyhash_provider/k5_md4des.c index 6d5b77f1a..8c622055f 100644 --- a/src/lib/crypto/keyhash_provider/k5_md4des.c +++ b/src/lib/crypto/keyhash_provider/k5_md4des.c @@ -114,7 +114,6 @@ k5_md4des_verify(const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, const krb5_data *hash, krb5_boolean *valid) { - krb5_error_code ret; krb5_MD4_CTX ctx; unsigned char plaintext[CONFLENGTH+RSA_MD4_CKSUM_LENGTH]; unsigned char xorkey[8]; @@ -146,7 +145,7 @@ k5_md4des_verify(const krb5_keyblock *key, const krb5_data *ivec, xorkey[i] ^= 0xf0; } - switch (ret = mit_des_key_sched(xorkey, schedule)) { + switch (mit_des_key_sched(xorkey, schedule)) { case -1: return(KRB5DES_BAD_KEYPAR); case -2: diff --git a/src/lib/crypto/keyhash_provider/k5_md5des.c b/src/lib/crypto/keyhash_provider/k5_md5des.c index c395a7011..35b98b4a0 100644 --- a/src/lib/crypto/keyhash_provider/k5_md5des.c +++ b/src/lib/crypto/keyhash_provider/k5_md5des.c @@ -114,7 +114,6 @@ k5_md5des_verify(const krb5_keyblock *key, const krb5_data *ivec, const krb5_data *input, const krb5_data *hash, krb5_boolean *valid) { - krb5_error_code ret; krb5_MD5_CTX ctx; unsigned char plaintext[CONFLENGTH+RSA_MD5_CKSUM_LENGTH]; unsigned char xorkey[8]; @@ -145,7 +144,7 @@ k5_md5des_verify(const krb5_keyblock *key, const krb5_data *ivec, xorkey[i] ^= 0xf0; } - switch (ret = mit_des_key_sched(xorkey, schedule)) { + switch (mit_des_key_sched(xorkey, schedule)) { case -1: return(KRB5DES_BAD_KEYPAR); case -2: |
