Eliminate some unused variable warnings
authorGreg Hudson <ghudson@mit.edu>
Mon, 20 Dec 2010 17:48:06 +0000 (17:48 +0000)
committerGreg Hudson <ghudson@mit.edu>
Mon, 20 Dec 2010 17:48:06 +0000 (17:48 +0000)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@24583 dc483132-0cff-0310-8789-dd5450dbe970

src/lib/crypto/krb/dk/checksum_hmac.c
src/lib/gssapi/krb5/gssapi_krb5.c
src/lib/gssapi/krb5/set_allowable_enctypes.c
src/plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c

index 5f333af57832f5aea7295903b7a011f255ecf1c4..686af8d081d0538447bf604e68e3a30ebce7345b 100644 (file)
@@ -38,7 +38,6 @@ krb5int_dk_checksum(const struct krb5_cksumtypes *ctp,
                     const krb5_crypto_iov *data, size_t num_data,
                     krb5_data *output)
 {
-    const struct krb5_keytypes *ktp;
     const struct krb5_enc_provider *enc = ctp->enc;
     krb5_error_code ret;
     unsigned char constantdata[K5CLENGTH];
index 50d4e36dda5e699c231e937f3b0a144eddb7db6e..cc2f8fca065c17f3ec1f5ae0016661d420451e3e 100644 (file)
@@ -451,6 +451,7 @@ krb5_gss_inquire_cred_by_oid(OM_uint32 *minor_status,
 
 /*
  * gss_set_sec_context_option() methods
+ * (Disabled until we have something to populate the array.)
  */
 #if 0
 static struct {
@@ -466,7 +467,9 @@ krb5_gss_set_sec_context_option (OM_uint32 *minor_status,
                                  const gss_OID desired_object,
                                  const gss_buffer_t value)
 {
+#if 0
     size_t i;
+#endif
 
     if (minor_status == NULL)
         return GSS_S_CALL_INACCESSIBLE_WRITE;
index 0daf8b1356929fcaffbce4939dc7a74812e822be..fe88d1b856a186698215d3e56935137b5b179893 100644 (file)
@@ -70,7 +70,6 @@ gss_krb5int_set_allowable_enctypes(OM_uint32 *minor_status,
     OM_uint32 major_status;
     krb5_gss_cred_id_t cred;
     krb5_error_code kerr = 0;
-    OM_uint32 temp_status;
     struct krb5_gss_set_allowable_enctypes_req *req;
 
     /* Assume a failure */
index 0d76453839e28c1765d52bcc539bf600ce1b9b79..ad60b00e85d686f4b4b5bb2661aeb01f593b2de5 100644 (file)
@@ -198,7 +198,6 @@ populate_policy(krb5_context context,
                 osa_policy_ent_t pol_entry)
 {
     int st = 0;
-    char *pol_dn;
 
     pol_entry->name = strdup(pol_name);
     CHECK_NULL(pol_entry->name);