Fix some warnings triggered by gcc 4.6 -Wunused-but-set-variable
This commit is contained in:
parent
d30df6ff3d
commit
513701f41b
|
@ -6,7 +6,6 @@
|
||||||
*/
|
*/
|
||||||
int main(int argc, char *argv[])
|
int main(int argc, char *argv[])
|
||||||
{
|
{
|
||||||
int end = 0;
|
|
||||||
unsigned char byte;
|
unsigned char byte;
|
||||||
|
|
||||||
printf("X'");
|
printf("X'");
|
||||||
|
@ -14,7 +13,6 @@ int main(int argc, char *argv[])
|
||||||
{
|
{
|
||||||
if (fread(&byte, 1, 1, stdin) != 1)
|
if (fread(&byte, 1, 1, stdin) != 1)
|
||||||
{
|
{
|
||||||
end = 1;
|
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
printf("%02x", (unsigned int)byte);
|
printf("%02x", (unsigned int)byte);
|
||||||
|
|
|
@ -322,9 +322,7 @@ void libcharon_deinit()
|
||||||
*/
|
*/
|
||||||
bool libcharon_init()
|
bool libcharon_init()
|
||||||
{
|
{
|
||||||
private_daemon_t *this;
|
daemon_create();
|
||||||
|
|
||||||
this = daemon_create();
|
|
||||||
|
|
||||||
/* for uncritical pseudo random numbers */
|
/* for uncritical pseudo random numbers */
|
||||||
srandom(time(NULL) + getpid());
|
srandom(time(NULL) + getpid());
|
||||||
|
|
|
@ -106,7 +106,6 @@ METHOD(payload_t, verify, status_t,
|
||||||
status_t status = SUCCESS;
|
status_t status = SUCCESS;
|
||||||
enumerator_t *enumerator;
|
enumerator_t *enumerator;
|
||||||
proposal_substructure_t *substruct;
|
proposal_substructure_t *substruct;
|
||||||
bool first = TRUE;
|
|
||||||
|
|
||||||
/* check proposal numbering */
|
/* check proposal numbering */
|
||||||
enumerator = this->proposals->create_enumerator(this->proposals);
|
enumerator = this->proposals->create_enumerator(this->proposals);
|
||||||
|
@ -136,7 +135,6 @@ METHOD(payload_t, verify, status_t,
|
||||||
DBG1(DBG_ENC, "PROPOSAL_SUBSTRUCTURE verification failed");
|
DBG1(DBG_ENC, "PROPOSAL_SUBSTRUCTURE verification failed");
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
first = FALSE;
|
|
||||||
expected_number = current_number;
|
expected_number = current_number;
|
||||||
}
|
}
|
||||||
enumerator->destroy(enumerator);
|
enumerator->destroy(enumerator);
|
||||||
|
|
|
@ -814,7 +814,7 @@ static status_t process_peer_failure(private_eap_mschapv2_t *this,
|
||||||
eap_mschapv2_header_t *eap;
|
eap_mschapv2_header_t *eap;
|
||||||
chunk_t data;
|
chunk_t data;
|
||||||
char *message, *token, *msg = NULL;
|
char *message, *token, *msg = NULL;
|
||||||
int message_len, error = 0, retriable;
|
int message_len, error = 0;
|
||||||
chunk_t challenge = chunk_empty;
|
chunk_t challenge = chunk_empty;
|
||||||
|
|
||||||
data = in->get_data(in);
|
data = in->get_data(in);
|
||||||
|
@ -842,8 +842,7 @@ static status_t process_peer_failure(private_eap_mschapv2_t *this,
|
||||||
}
|
}
|
||||||
else if (strneq(token, "R=", 2))
|
else if (strneq(token, "R=", 2))
|
||||||
{
|
{
|
||||||
token += 2;
|
/* ignore retriable */
|
||||||
retriable = atoi(token);
|
|
||||||
}
|
}
|
||||||
else if (strneq(token, "C=", 2))
|
else if (strneq(token, "C=", 2))
|
||||||
{
|
{
|
||||||
|
@ -860,9 +859,7 @@ static status_t process_peer_failure(private_eap_mschapv2_t *this,
|
||||||
}
|
}
|
||||||
else if (strneq(token, "V=", 2))
|
else if (strneq(token, "V=", 2))
|
||||||
{
|
{
|
||||||
int version;
|
/* ignore version */
|
||||||
token += 2;
|
|
||||||
version = atoi(token);
|
|
||||||
}
|
}
|
||||||
else if (strneq(token, "M=", 2))
|
else if (strneq(token, "M=", 2))
|
||||||
{
|
{
|
||||||
|
|
|
@ -82,12 +82,11 @@ static void signal_ipv4_config(NMVPNPlugin *plugin,
|
||||||
{
|
{
|
||||||
GValue *val;
|
GValue *val;
|
||||||
GHashTable *config;
|
GHashTable *config;
|
||||||
host_t *me, *other;
|
host_t *me;
|
||||||
nm_handler_t *handler;
|
nm_handler_t *handler;
|
||||||
|
|
||||||
config = g_hash_table_new(g_str_hash, g_str_equal);
|
config = g_hash_table_new(g_str_hash, g_str_equal);
|
||||||
me = ike_sa->get_my_host(ike_sa);
|
me = ike_sa->get_my_host(ike_sa);
|
||||||
other = ike_sa->get_other_host(ike_sa);
|
|
||||||
handler = NM_STRONGSWAN_PLUGIN_GET_PRIVATE(plugin)->handler;
|
handler = NM_STRONGSWAN_PLUGIN_GET_PRIVATE(plugin)->handler;
|
||||||
|
|
||||||
/* NM requires a tundev, but netkey does not use one. Passing an invalid
|
/* NM requires a tundev, but netkey does not use one. Passing an invalid
|
||||||
|
|
|
@ -435,7 +435,6 @@ static int open_send_socket(private_socket_raw_socket_t *this,
|
||||||
int on = TRUE;
|
int on = TRUE;
|
||||||
int type = UDP_ENCAP_ESPINUDP;
|
int type = UDP_ENCAP_ESPINUDP;
|
||||||
struct sockaddr_storage addr;
|
struct sockaddr_storage addr;
|
||||||
u_int sol;
|
|
||||||
int skt;
|
int skt;
|
||||||
|
|
||||||
memset(&addr, 0, sizeof(addr));
|
memset(&addr, 0, sizeof(addr));
|
||||||
|
@ -448,7 +447,6 @@ static int open_send_socket(private_socket_raw_socket_t *this,
|
||||||
sin->sin_family = AF_INET;
|
sin->sin_family = AF_INET;
|
||||||
sin->sin_addr.s_addr = INADDR_ANY;
|
sin->sin_addr.s_addr = INADDR_ANY;
|
||||||
sin->sin_port = htons(port);
|
sin->sin_port = htons(port);
|
||||||
sol = SOL_IP;
|
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
case AF_INET6:
|
case AF_INET6:
|
||||||
|
@ -457,7 +455,6 @@ static int open_send_socket(private_socket_raw_socket_t *this,
|
||||||
sin6->sin6_family = AF_INET6;
|
sin6->sin6_family = AF_INET6;
|
||||||
memcpy(&sin6->sin6_addr, &in6addr_any, sizeof(in6addr_any));
|
memcpy(&sin6->sin6_addr, &in6addr_any, sizeof(in6addr_any));
|
||||||
sin6->sin6_port = htons(port);
|
sin6->sin6_port = htons(port);
|
||||||
sol = SOL_IPV6;
|
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
default:
|
default:
|
||||||
|
@ -514,18 +511,16 @@ static int open_recv_socket(private_socket_raw_socket_t *this, int family)
|
||||||
{
|
{
|
||||||
int skt;
|
int skt;
|
||||||
int on = TRUE;
|
int on = TRUE;
|
||||||
u_int proto_offset, ip_len, sol, udp_header, ike_header;
|
u_int ip_len, sol, udp_header, ike_header;
|
||||||
|
|
||||||
/* precalculate constants depending on address family */
|
/* precalculate constants depending on address family */
|
||||||
switch (family)
|
switch (family)
|
||||||
{
|
{
|
||||||
case AF_INET:
|
case AF_INET:
|
||||||
proto_offset = IP_PROTO_OFFSET;
|
|
||||||
ip_len = IP_LEN;
|
ip_len = IP_LEN;
|
||||||
sol = SOL_IP;
|
sol = SOL_IP;
|
||||||
break;
|
break;
|
||||||
case AF_INET6:
|
case AF_INET6:
|
||||||
proto_offset = IP6_PROTO_OFFSET;
|
|
||||||
ip_len = 0; /* IPv6 raw sockets contain no IP header */
|
ip_len = 0; /* IPv6 raw sockets contain no IP header */
|
||||||
sol = SOL_IPV6;
|
sol = SOL_IPV6;
|
||||||
break;
|
break;
|
||||||
|
|
|
@ -90,7 +90,7 @@ void af_alg_prf_probe(char *plugin)
|
||||||
/**
|
/**
|
||||||
* Get the kernel algorithm string and block size for our identifier
|
* Get the kernel algorithm string and block size for our identifier
|
||||||
*/
|
*/
|
||||||
static size_t lookup_alg(integrity_algorithm_t algo, char **name, bool *xcbc)
|
static size_t lookup_alg(pseudo_random_function_t algo, char **name, bool *xcbc)
|
||||||
{
|
{
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
|
|
|
@ -161,7 +161,7 @@ static int open_connection(char *path)
|
||||||
*/
|
*/
|
||||||
static bool read_key(private_agent_private_key_t *this, public_key_t *pubkey)
|
static bool read_key(private_agent_private_key_t *this, public_key_t *pubkey)
|
||||||
{
|
{
|
||||||
int len, count;
|
int len;
|
||||||
char buf[2048];
|
char buf[2048];
|
||||||
chunk_t blob, key, type, n;
|
chunk_t blob, key, type, n;
|
||||||
|
|
||||||
|
@ -184,7 +184,7 @@ static bool read_key(private_agent_private_key_t *this, public_key_t *pubkey)
|
||||||
DBG1(DBG_LIB, "received invalid ssh-agent identity response");
|
DBG1(DBG_LIB, "received invalid ssh-agent identity response");
|
||||||
return FALSE;
|
return FALSE;
|
||||||
}
|
}
|
||||||
count = read_uint32(&blob);
|
read_uint32(&blob);
|
||||||
|
|
||||||
while (blob.len)
|
while (blob.len)
|
||||||
{
|
{
|
||||||
|
|
|
@ -504,7 +504,7 @@ gcrypt_rsa_private_key_t *gcrypt_rsa_private_key_load(key_type_t type,
|
||||||
va_list args)
|
va_list args)
|
||||||
{
|
{
|
||||||
private_gcrypt_rsa_private_key_t *this;
|
private_gcrypt_rsa_private_key_t *this;
|
||||||
chunk_t n, e, d, p, q, exp, u;
|
chunk_t n, e, d, p, q, u;
|
||||||
gcry_error_t err;
|
gcry_error_t err;
|
||||||
|
|
||||||
n = e = d = p = q = u = chunk_empty;
|
n = e = d = p = q = u = chunk_empty;
|
||||||
|
@ -531,7 +531,7 @@ gcrypt_rsa_private_key_t *gcrypt_rsa_private_key_load(key_type_t type,
|
||||||
case BUILD_RSA_EXP1:
|
case BUILD_RSA_EXP1:
|
||||||
case BUILD_RSA_EXP2:
|
case BUILD_RSA_EXP2:
|
||||||
/* not required for gcrypt */
|
/* not required for gcrypt */
|
||||||
exp = va_arg(args, chunk_t);
|
va_arg(args, chunk_t);
|
||||||
continue;
|
continue;
|
||||||
case BUILD_RSA_COEFF:
|
case BUILD_RSA_COEFF:
|
||||||
u = va_arg(args, chunk_t);
|
u = va_arg(args, chunk_t);
|
||||||
|
|
|
@ -67,7 +67,6 @@ METHOD(options_t, from, bool,
|
||||||
int newargc;
|
int newargc;
|
||||||
int next; /* place for next argument */
|
int next; /* place for next argument */
|
||||||
char **newargv;
|
char **newargv;
|
||||||
size_t bytes;
|
|
||||||
chunk_t src, line, token;
|
chunk_t src, line, token;
|
||||||
bool good = TRUE;
|
bool good = TRUE;
|
||||||
int linepos = 0;
|
int linepos = 0;
|
||||||
|
@ -99,7 +98,14 @@ METHOD(options_t, from, bool,
|
||||||
src.ptr = this->buffers[this->nuses] = malloc(src.len + 1);
|
src.ptr = this->buffers[this->nuses] = malloc(src.len + 1);
|
||||||
|
|
||||||
/* read the whole file into a chunk */
|
/* read the whole file into a chunk */
|
||||||
bytes = fread(src.ptr, 1, src.len, fd);
|
if (fread(src.ptr, 1, src.len, fd) != src.len)
|
||||||
|
{
|
||||||
|
DBG1(DBG_LIB, "optionsfrom: unable to read file '%s': %s",
|
||||||
|
filename, strerror(errno));
|
||||||
|
free(src.ptr);
|
||||||
|
fclose(fd);
|
||||||
|
return FALSE;
|
||||||
|
}
|
||||||
fclose(fd);
|
fclose(fd);
|
||||||
|
|
||||||
if (this->room)
|
if (this->room)
|
||||||
|
|
|
@ -333,7 +333,6 @@ int main(int argc, char **argv)
|
||||||
char *file_out_pkcs7 = DEFAULT_FILENAME_PKCS7;
|
char *file_out_pkcs7 = DEFAULT_FILENAME_PKCS7;
|
||||||
char *file_out_cert_self = DEFAULT_FILENAME_CERT_SELF;
|
char *file_out_cert_self = DEFAULT_FILENAME_CERT_SELF;
|
||||||
char *file_out_cert = DEFAULT_FILENAME_CERT;
|
char *file_out_cert = DEFAULT_FILENAME_CERT;
|
||||||
char *file_out_prefix_cacert = DEFAULT_FILENAME_PREFIX_CACERT;
|
|
||||||
|
|
||||||
/* by default user certificate is requested */
|
/* by default user certificate is requested */
|
||||||
bool request_ca_certificate = FALSE;
|
bool request_ca_certificate = FALSE;
|
||||||
|
@ -540,8 +539,6 @@ int main(int argc, char **argv)
|
||||||
else if (strcaseeq("cacert", optarg))
|
else if (strcaseeq("cacert", optarg))
|
||||||
{
|
{
|
||||||
request_ca_certificate = TRUE;
|
request_ca_certificate = TRUE;
|
||||||
if (filename)
|
|
||||||
file_out_prefix_cacert = filename;
|
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
|
|
|
@ -233,7 +233,6 @@ int main (int argc, char **argv)
|
||||||
|
|
||||||
struct stat stb;
|
struct stat stb;
|
||||||
|
|
||||||
char *err = NULL;
|
|
||||||
int i;
|
int i;
|
||||||
int id = 1;
|
int id = 1;
|
||||||
struct timeval tv;
|
struct timeval tv;
|
||||||
|
@ -495,7 +494,6 @@ int main (int argc, char **argv)
|
||||||
*/
|
*/
|
||||||
if (_action_ & FLAG_ACTION_UPDATE)
|
if (_action_ & FLAG_ACTION_UPDATE)
|
||||||
{
|
{
|
||||||
err = NULL;
|
|
||||||
DBG(DBG_CONTROL,
|
DBG(DBG_CONTROL,
|
||||||
DBG_log("Reloading config...")
|
DBG_log("Reloading config...")
|
||||||
);
|
);
|
||||||
|
|
Loading…
Reference in New Issue