* conv_princ.c, get_creds.c, get_in_tkt.c, mk_rep.c, parse.c,
authorEzra Peisach <epeisach@mit.edu>
Thu, 29 Jun 2000 00:53:24 +0000 (00:53 +0000)
committerEzra Peisach <epeisach@mit.edu>
Thu, 29 Jun 2000 00:53:24 +0000 (00:53 +0000)
        send_tgs.c: Remove unused variable.

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12457 dc483132-0cff-0310-8789-dd5450dbe970

src/lib/krb5/krb/ChangeLog
src/lib/krb5/krb/conv_princ.c
src/lib/krb5/krb/get_creds.c
src/lib/krb5/krb/get_in_tkt.c
src/lib/krb5/krb/mk_rep.c
src/lib/krb5/krb/parse.c
src/lib/krb5/krb/send_tgs.c

index 80f24ebfba8a082641d279c6d82ff3e021a764fe..68ee72826546d5fbbd80125f39c35576c70ddea6 100644 (file)
@@ -1,3 +1,8 @@
+2000-06-28  Ezra Peisach  <epeisach@mit.edu>
+
+       * conv_princ.c, get_creds.c, get_in_tkt.c, mk_rep.c, parse.c,
+       send_tgs.c: Remove unused variable.
+
 2000-06-23  Miro Jurisic  <meeroh@mit.edu>
 
        * conv_princ.c (krb5_425_conv_principal): Fixed v4->v5 realm
index 36e2bbd0add27ea5d5e4c893c6ecb425dd55b1b8..b2df0c60e30e8e6557967dabbd54a790bf83eca4 100644 (file)
@@ -240,7 +240,7 @@ krb5_425_conv_principal(context, name, instance, realm, princ)
      char buf[256];            /* V4 instances are limited to 40 characters */
      krb5_error_code retval;
      char *domain, *cp;
-     char **full_name = 0, **cpp;
+     char **full_name = 0;
      const char *names[5];
      void*     iterator = NULL;
      char** v4realms = NULL;
index 6d764d3290bb32201fb36295d5398b8273075344..de8d29f6dbbbe8c60125bd99e75c372301acc06e 100644 (file)
@@ -181,10 +181,8 @@ krb5_get_credentials_val_renew_core(context, options, ccache,
     int which;
 {
     krb5_error_code retval;
-    krb5_creds mcreds;
     krb5_principal tmp;
     krb5_creds **tgts = 0;
-    krb5_flags fields;
 
     switch(which) {
     case INT_GC_VALIDATE:
index 298f1528f025f8a5fb6861d941a8c7a0f2fc29f6..5065c9a48111b89e87a836d1ac5ec4389798b103 100644 (file)
@@ -367,7 +367,6 @@ make_preauth_list(context, ptypes, nptypes, ret_list)
 {
     krb5_preauthtype *         ptypep;
     krb5_pa_data **            preauthp;
-    krb5_pa_data **            preauth_to_use;
     int                                i;
 
     if (nptypes < 0) {
@@ -629,7 +628,6 @@ krb5_libdefault_string(context, realm, option, ret_value)
     char **nameval = NULL;
     krb5_error_code retval;
     char realmstr[1024];
-    char **cpp;
 
     if (realm->length > sizeof(realmstr)-1)
        return(EINVAL);
index 6a0ffb743ca42bd1e32254d8284d8b36010d4ec3..a5d8b0c3b66c6734aa360e8f9e909a1d194eebd4 100644 (file)
@@ -46,14 +46,11 @@ krb5_mk_rep(context, auth_context, outbuf)
     krb5_data          FAR * outbuf;
 {
     krb5_error_code      retval;
-    krb5_enctype         enctype;
     krb5_ap_rep_enc_part  repl;
     krb5_ap_rep          reply;
     krb5_data          * scratch;
     krb5_data          * toutbuf;
 
-    enctype = auth_context->keyblock->enctype;
-
     /* Make the reply */
     if (((auth_context->auth_context_flags & KRB5_AUTH_CONTEXT_DO_SEQUENCE) ||
        (auth_context->auth_context_flags & KRB5_AUTH_CONTEXT_RET_SEQUENCE)) &&
index b628a0d0ea6fc323d771a14222e4bc31658c819a..85fa069eab6961a5a24cef19eaa65aec4d2841a1 100644 (file)
@@ -71,7 +71,7 @@ krb5_parse_name(context, name, nprincipal)
 {
        register const char     *cp;
        register char   *q;
-       register i,c,size;
+       register int    i,c,size;
        int             components = 0;
        const char      *parsed_realm = NULL;
        int             fcompsize[FCOMPNUM];
index 520c0e21171fdb0f9e292f4a17b41000a445fc24..49bc1c935c9c92bfa7348ac4cd0e93a48be19ee4 100644 (file)
@@ -150,7 +150,6 @@ krb5_send_tgs(context, kdcoptions, timestruct, ktypes, sname, addrs,
     krb5_timestamp time_now;
     krb5_pa_data **combined_padata;
     krb5_pa_data ap_req_padata;
-    size_t enclen;
 
     /* 
      * in_creds MUST be a valid credential NOT just a partially filled in