Clean up warnings of unused variables that have crept into the source tree..
authorEzra Peisach <epeisach@mit.edu>
Sun, 20 Sep 2009 22:23:52 +0000 (22:23 +0000)
committerEzra Peisach <epeisach@mit.edu>
Sun, 20 Sep 2009 22:23:52 +0000 (22:23 +0000)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@22779 dc483132-0cff-0310-8789-dd5450dbe970

src/lib/crypto/krb/keyhash_provider/k5_md5des.c
src/lib/gssapi/krb5/gssapi_krb5.c
src/lib/krb5/krb/fast.c
src/lib/krb5/krb/kfree.c

index e9752e1196fec625ce1fc15ea5b974951a113fef..24d6317060c23e23291994d1dabbeb3cd6a60c05 100644 (file)
@@ -85,7 +85,6 @@ k5_md5des_verify(const krb5_keyblock *key, krb5_keyusage usage, const krb5_data
     krb5_error_code ret;
     krb5_MD5_CTX ctx;
     unsigned char plaintext[CONFLENGTH+RSA_MD5_CKSUM_LENGTH];
-    unsigned char *ivptr = NULL, *outptr = NULL;
     int compathash = 0;
     struct krb5_enc_provider *enc = &krb5int_enc_des;
     krb5_data output, iv;
index 519abb860e01363fd540796838bd4f6b7bac77d4..3c1c6b8cb251152aa0d5772dd20ee6e8a5255ffc 100644 (file)
@@ -403,7 +403,9 @@ krb5_gss_inquire_cred_by_oid(OM_uint32 *minor_status,
 {
     OM_uint32 major_status = GSS_S_FAILURE;
     krb5_gss_cred_id_t cred;
+#if 0
     size_t i;
+#endif
 
     if (minor_status == NULL)
         return GSS_S_CALL_INACCESSIBLE_WRITE;
index ef57e6d832f4128099e090079b9bc3d15aa8a8ce..381173d5c802d8e244c0b7e6e71a2007bf471469 100644 (file)
@@ -484,7 +484,6 @@ krb5_error_code krb5int_fast_reply_key(krb5_context context,
 krb5_error_code
 krb5int_fast_make_state( krb5_context context, struct krb5int_fast_request_state **state)
 {
-    krb5_error_code retval = 0;
     struct krb5int_fast_request_state *local_state ;
     local_state = malloc(sizeof *local_state);
     if (local_state == NULL)
index 8cef95431a734cb93ca234aa6c84dcb37d134c0d..9f5c702e862163eee556e9dbe47eb00cfddf2b96 100644 (file)
@@ -450,8 +450,6 @@ void KRB5_CALLCONV
 krb5_free_passwd_phrase_element(krb5_context context,
                                passwd_phrase_element *val)
 {
-    register passwd_phrase_element **temp;
-
     if (val == NULL)
        return;
     krb5_free_data(context, val->passwd);