Fix some warnings triggered by gcc 4.6 -Wunused-but-set-variable

This commit is contained in:
Martin Willi 2011-05-19 14:24:26 +02:00
parent d30df6ff3d
commit 513701f41b
12 changed files with 19 additions and 33 deletions

View File

@ -6,7 +6,6 @@
*/ */
int main(int argc, char *argv[]) int main(int argc, char *argv[])
{ {
int end = 0;
unsigned char byte; unsigned char byte;
printf("X'"); printf("X'");
@ -14,7 +13,6 @@ int main(int argc, char *argv[])
{ {
if (fread(&byte, 1, 1, stdin) != 1) if (fread(&byte, 1, 1, stdin) != 1)
{ {
end = 1;
break; break;
} }
printf("%02x", (unsigned int)byte); printf("%02x", (unsigned int)byte);

View File

@ -322,9 +322,7 @@ void libcharon_deinit()
*/ */
bool libcharon_init() bool libcharon_init()
{ {
private_daemon_t *this; daemon_create();
this = daemon_create();
/* for uncritical pseudo random numbers */ /* for uncritical pseudo random numbers */
srandom(time(NULL) + getpid()); srandom(time(NULL) + getpid());

View File

@ -106,7 +106,6 @@ METHOD(payload_t, verify, status_t,
status_t status = SUCCESS; status_t status = SUCCESS;
enumerator_t *enumerator; enumerator_t *enumerator;
proposal_substructure_t *substruct; proposal_substructure_t *substruct;
bool first = TRUE;
/* check proposal numbering */ /* check proposal numbering */
enumerator = this->proposals->create_enumerator(this->proposals); enumerator = this->proposals->create_enumerator(this->proposals);
@ -136,7 +135,6 @@ METHOD(payload_t, verify, status_t,
DBG1(DBG_ENC, "PROPOSAL_SUBSTRUCTURE verification failed"); DBG1(DBG_ENC, "PROPOSAL_SUBSTRUCTURE verification failed");
break; break;
} }
first = FALSE;
expected_number = current_number; expected_number = current_number;
} }
enumerator->destroy(enumerator); enumerator->destroy(enumerator);

View File

@ -814,7 +814,7 @@ static status_t process_peer_failure(private_eap_mschapv2_t *this,
eap_mschapv2_header_t *eap; eap_mschapv2_header_t *eap;
chunk_t data; chunk_t data;
char *message, *token, *msg = NULL; char *message, *token, *msg = NULL;
int message_len, error = 0, retriable; int message_len, error = 0;
chunk_t challenge = chunk_empty; chunk_t challenge = chunk_empty;
data = in->get_data(in); data = in->get_data(in);
@ -842,8 +842,7 @@ static status_t process_peer_failure(private_eap_mschapv2_t *this,
} }
else if (strneq(token, "R=", 2)) else if (strneq(token, "R=", 2))
{ {
token += 2; /* ignore retriable */
retriable = atoi(token);
} }
else if (strneq(token, "C=", 2)) else if (strneq(token, "C=", 2))
{ {
@ -860,9 +859,7 @@ static status_t process_peer_failure(private_eap_mschapv2_t *this,
} }
else if (strneq(token, "V=", 2)) else if (strneq(token, "V=", 2))
{ {
int version; /* ignore version */
token += 2;
version = atoi(token);
} }
else if (strneq(token, "M=", 2)) else if (strneq(token, "M=", 2))
{ {

View File

@ -82,12 +82,11 @@ static void signal_ipv4_config(NMVPNPlugin *plugin,
{ {
GValue *val; GValue *val;
GHashTable *config; GHashTable *config;
host_t *me, *other; host_t *me;
nm_handler_t *handler; nm_handler_t *handler;
config = g_hash_table_new(g_str_hash, g_str_equal); config = g_hash_table_new(g_str_hash, g_str_equal);
me = ike_sa->get_my_host(ike_sa); me = ike_sa->get_my_host(ike_sa);
other = ike_sa->get_other_host(ike_sa);
handler = NM_STRONGSWAN_PLUGIN_GET_PRIVATE(plugin)->handler; handler = NM_STRONGSWAN_PLUGIN_GET_PRIVATE(plugin)->handler;
/* NM requires a tundev, but netkey does not use one. Passing an invalid /* NM requires a tundev, but netkey does not use one. Passing an invalid

View File

@ -435,7 +435,6 @@ static int open_send_socket(private_socket_raw_socket_t *this,
int on = TRUE; int on = TRUE;
int type = UDP_ENCAP_ESPINUDP; int type = UDP_ENCAP_ESPINUDP;
struct sockaddr_storage addr; struct sockaddr_storage addr;
u_int sol;
int skt; int skt;
memset(&addr, 0, sizeof(addr)); memset(&addr, 0, sizeof(addr));
@ -448,7 +447,6 @@ static int open_send_socket(private_socket_raw_socket_t *this,
sin->sin_family = AF_INET; sin->sin_family = AF_INET;
sin->sin_addr.s_addr = INADDR_ANY; sin->sin_addr.s_addr = INADDR_ANY;
sin->sin_port = htons(port); sin->sin_port = htons(port);
sol = SOL_IP;
break; break;
} }
case AF_INET6: case AF_INET6:
@ -457,7 +455,6 @@ static int open_send_socket(private_socket_raw_socket_t *this,
sin6->sin6_family = AF_INET6; sin6->sin6_family = AF_INET6;
memcpy(&sin6->sin6_addr, &in6addr_any, sizeof(in6addr_any)); memcpy(&sin6->sin6_addr, &in6addr_any, sizeof(in6addr_any));
sin6->sin6_port = htons(port); sin6->sin6_port = htons(port);
sol = SOL_IPV6;
break; break;
} }
default: default:
@ -514,18 +511,16 @@ static int open_recv_socket(private_socket_raw_socket_t *this, int family)
{ {
int skt; int skt;
int on = TRUE; int on = TRUE;
u_int proto_offset, ip_len, sol, udp_header, ike_header; u_int ip_len, sol, udp_header, ike_header;
/* precalculate constants depending on address family */ /* precalculate constants depending on address family */
switch (family) switch (family)
{ {
case AF_INET: case AF_INET:
proto_offset = IP_PROTO_OFFSET;
ip_len = IP_LEN; ip_len = IP_LEN;
sol = SOL_IP; sol = SOL_IP;
break; break;
case AF_INET6: case AF_INET6:
proto_offset = IP6_PROTO_OFFSET;
ip_len = 0; /* IPv6 raw sockets contain no IP header */ ip_len = 0; /* IPv6 raw sockets contain no IP header */
sol = SOL_IPV6; sol = SOL_IPV6;
break; break;

View File

@ -90,7 +90,7 @@ void af_alg_prf_probe(char *plugin)
/** /**
* Get the kernel algorithm string and block size for our identifier * Get the kernel algorithm string and block size for our identifier
*/ */
static size_t lookup_alg(integrity_algorithm_t algo, char **name, bool *xcbc) static size_t lookup_alg(pseudo_random_function_t algo, char **name, bool *xcbc)
{ {
int i; int i;

View File

@ -161,7 +161,7 @@ static int open_connection(char *path)
*/ */
static bool read_key(private_agent_private_key_t *this, public_key_t *pubkey) static bool read_key(private_agent_private_key_t *this, public_key_t *pubkey)
{ {
int len, count; int len;
char buf[2048]; char buf[2048];
chunk_t blob, key, type, n; chunk_t blob, key, type, n;
@ -184,7 +184,7 @@ static bool read_key(private_agent_private_key_t *this, public_key_t *pubkey)
DBG1(DBG_LIB, "received invalid ssh-agent identity response"); DBG1(DBG_LIB, "received invalid ssh-agent identity response");
return FALSE; return FALSE;
} }
count = read_uint32(&blob); read_uint32(&blob);
while (blob.len) while (blob.len)
{ {

View File

@ -504,7 +504,7 @@ gcrypt_rsa_private_key_t *gcrypt_rsa_private_key_load(key_type_t type,
va_list args) va_list args)
{ {
private_gcrypt_rsa_private_key_t *this; private_gcrypt_rsa_private_key_t *this;
chunk_t n, e, d, p, q, exp, u; chunk_t n, e, d, p, q, u;
gcry_error_t err; gcry_error_t err;
n = e = d = p = q = u = chunk_empty; n = e = d = p = q = u = chunk_empty;
@ -531,7 +531,7 @@ gcrypt_rsa_private_key_t *gcrypt_rsa_private_key_load(key_type_t type,
case BUILD_RSA_EXP1: case BUILD_RSA_EXP1:
case BUILD_RSA_EXP2: case BUILD_RSA_EXP2:
/* not required for gcrypt */ /* not required for gcrypt */
exp = va_arg(args, chunk_t); va_arg(args, chunk_t);
continue; continue;
case BUILD_RSA_COEFF: case BUILD_RSA_COEFF:
u = va_arg(args, chunk_t); u = va_arg(args, chunk_t);

View File

@ -67,7 +67,6 @@ METHOD(options_t, from, bool,
int newargc; int newargc;
int next; /* place for next argument */ int next; /* place for next argument */
char **newargv; char **newargv;
size_t bytes;
chunk_t src, line, token; chunk_t src, line, token;
bool good = TRUE; bool good = TRUE;
int linepos = 0; int linepos = 0;
@ -99,7 +98,14 @@ METHOD(options_t, from, bool,
src.ptr = this->buffers[this->nuses] = malloc(src.len + 1); src.ptr = this->buffers[this->nuses] = malloc(src.len + 1);
/* read the whole file into a chunk */ /* read the whole file into a chunk */
bytes = fread(src.ptr, 1, src.len, fd); if (fread(src.ptr, 1, src.len, fd) != src.len)
{
DBG1(DBG_LIB, "optionsfrom: unable to read file '%s': %s",
filename, strerror(errno));
free(src.ptr);
fclose(fd);
return FALSE;
}
fclose(fd); fclose(fd);
if (this->room) if (this->room)

View File

@ -333,7 +333,6 @@ int main(int argc, char **argv)
char *file_out_pkcs7 = DEFAULT_FILENAME_PKCS7; char *file_out_pkcs7 = DEFAULT_FILENAME_PKCS7;
char *file_out_cert_self = DEFAULT_FILENAME_CERT_SELF; char *file_out_cert_self = DEFAULT_FILENAME_CERT_SELF;
char *file_out_cert = DEFAULT_FILENAME_CERT; char *file_out_cert = DEFAULT_FILENAME_CERT;
char *file_out_prefix_cacert = DEFAULT_FILENAME_PREFIX_CACERT;
/* by default user certificate is requested */ /* by default user certificate is requested */
bool request_ca_certificate = FALSE; bool request_ca_certificate = FALSE;
@ -540,8 +539,6 @@ int main(int argc, char **argv)
else if (strcaseeq("cacert", optarg)) else if (strcaseeq("cacert", optarg))
{ {
request_ca_certificate = TRUE; request_ca_certificate = TRUE;
if (filename)
file_out_prefix_cacert = filename;
} }
else else
{ {

View File

@ -233,7 +233,6 @@ int main (int argc, char **argv)
struct stat stb; struct stat stb;
char *err = NULL;
int i; int i;
int id = 1; int id = 1;
struct timeval tv; struct timeval tv;
@ -495,7 +494,6 @@ int main (int argc, char **argv)
*/ */
if (_action_ & FLAG_ACTION_UPDATE) if (_action_ & FLAG_ACTION_UPDATE)
{ {
err = NULL;
DBG(DBG_CONTROL, DBG(DBG_CONTROL,
DBG_log("Reloading config...") DBG_log("Reloading config...")
); );