Fix a few missing-decl, signed/unsigned warnings
authorKen Raeburn <raeburn@mit.edu>
Mon, 6 Oct 2008 20:04:12 +0000 (20:04 +0000)
committerKen Raeburn <raeburn@mit.edu>
Mon, 6 Oct 2008 20:04:12 +0000 (20:04 +0000)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@20828 dc483132-0cff-0310-8789-dd5450dbe970

src/plugins/kdb/ldap/libkdb_ldap/kdb_ldap.c
src/plugins/kdb/ldap/libkdb_ldap/kdb_ldap.h
src/plugins/kdb/ldap/libkdb_ldap/kdb_ldap_conn.c
src/plugins/kdb/ldap/libkdb_ldap/ldap_misc.h
src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
src/plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c
src/plugins/kdb/ldap/libkdb_ldap/ldap_realm.c

index d7f63d0a8c9a1c734e4237a9b92a60f7715b59da..06eeee47cc4d297824cf4f151a5d2c3e6995da5b 100644 (file)
 #include <kdb5.h>
 #include <kadm5/admin.h>
 
+#if defined(NEED_ISBLANK_PROTO) && !defined(isblank)
+extern int isblank();
+#endif
+
 krb5_error_code
 krb5_ldap_get_db_opt(char *input, char **opt, char **val)
 {
index 918c6bcf32d5e61e0d88534276fdc769be855c23..74bf4b17e91d3c34f4dec4ea342300bc218b33ae 100644 (file)
@@ -285,6 +285,10 @@ krb5_ldap_read_startup_information(krb5_context );
 int
 has_sasl_external_mech(krb5_context, char *);
 
+krb5_error_code
+krb5_ldap_free_server_context_params(krb5_ldap_context *ldap_context);
+
+
 /* DAL functions */
 
 
index 08311e89ba67f61ec472a4b03c457dc9894ef67c..fdc5d10c771738116097bf94a3bbbcc0a93a24c3 100644 (file)
@@ -212,7 +212,7 @@ krb5_ldap_db_init(krb5_context context, krb5_ldap_context *ldap_context)
        server_info = ldap_context->server_info_list[cnt];
 
        if (server_info->server_status == NOTSET) {
-           int conns=0;
+           unsigned int conns=0;
 
            /*
             * Check if the server has to perform certificate-based authentication
index 5fc969f46d55ed20d070f14f324b2b92d8744ef7..7177af601437a9b129d1459fc072690634dabc08 100644 (file)
@@ -150,4 +150,6 @@ populate_krb5_db_entry(krb5_context context,
     krb5_const_principal princ,
     krb5_db_entry *entry);
 
+int kldap_ensure_initialized (void);
+
 #endif
index 7819ddd95d445178c679a3fae910211eab003952..6e7ba33f14109ab8b3c6c8501c71bfae6fe18b9e 100644 (file)
@@ -319,7 +319,6 @@ cleanup:
 }
 
 krb5int_access accessor;
-extern int kldap_ensure_initialized (void);
 
 static krb5_error_code
 asn1_encode_sequence_of_keys (krb5_key_data *key_data, krb5_int16 n_key_data,
index 6f8b3efd89ba6e7441e139fd4e75d8a1b5841faf..94d461b29fbce49ecb84d58589d0323232685d7e 100644 (file)
@@ -179,7 +179,7 @@ cleanup:
     return(st);
 }
 
-krb5_error_code
+static krb5_error_code
 populate_policy(krb5_context context,
     LDAP *ld,
     LDAPMessage *ent,
@@ -209,7 +209,7 @@ cleanup:
     return st;
 }
 
-krb5_error_code
+static krb5_error_code
 krb5_ldap_get_password_policy_from_dn (krb5_context context,
     char *pol_name,
     char *pol_dn,
index 3ab49dbc1d7d1695941fb5b36c9b5bf71ce62fb1..fd410e2b1cead5b67ffa104ad45233aa6b30ab51 100644 (file)
@@ -203,7 +203,7 @@ krb5_ldap_list_realm(context, realms)
        goto cleanup;
     }
 
-    *realms = calloc(count+1, sizeof (char *));
+    *realms = calloc((unsigned int) count+1, sizeof (char *));
     CHECK_NULL(*realms);
 
     for (ent = ldap_first_entry(ld, result), count = 0; ent != NULL;
@@ -297,7 +297,8 @@ krb5_ldap_delete_realm (context, lrealm)
        if ((st=krb5_get_subtree_info(&lcontext, &subtrees, &ntree)) != 0)
            goto cleanup;
 
-        result_arr = (LDAPMessage **)  calloc(ntree+1, sizeof(LDAPMessage *));
+        result_arr = (LDAPMessage **)  calloc((unsigned int)ntree+1,
+                                             sizeof(LDAPMessage *));
         if (result_arr == NULL) {
             st = ENOMEM;
             goto cleanup;