Remove variables set but not used
authorEzra Peisach <epeisach@mit.edu>
Mon, 26 Sep 2011 00:37:20 +0000 (00:37 +0000)
committerEzra Peisach <epeisach@mit.edu>
Mon, 26 Sep 2011 00:37:20 +0000 (00:37 +0000)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@25233 dc483132-0cff-0310-8789-dd5450dbe970

src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
src/plugins/preauth/pkinit/pkinit_matching.c
src/plugins/preauth/pkinit/pkinit_srv.c

index 6f39f36bc241b75ff4c1377c8939e9cba68055ff..a1c4ca1023f4414ba90b1fb14f0b0f6c7f159923 100644 (file)
@@ -5771,7 +5771,6 @@ pkcs7_dataDecode(krb5_context context,
     EVP_CIPHER_CTX *evp_ctx=NULL;
     X509_ALGOR *enc_alg=NULL;
     STACK_OF(PKCS7_RECIP_INFO) *rsk=NULL;
-    X509_ALGOR *xalg=NULL;
     PKCS7_RECIP_INFO *ri=NULL;
     X509 *cert = sk_X509_value(id_cryptoctx->my_certs,
                                id_cryptoctx->cert_index);
@@ -5786,7 +5785,6 @@ pkcs7_dataDecode(krb5_context context,
         PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNSUPPORTED_CIPHER_TYPE);
         goto cleanup;
     }
-    xalg=p7->d.enveloped->enc_data->algorithm;
 
     if ((etmp=BIO_new(BIO_f_cipher())) == NULL) {
         PKCS7err(PKCS7_F_PKCS7_DATADECODE,ERR_R_BIO_LIB);
index c7e2a4fda4f65b4d3c4b534a30580e1b1f796ae7..a3bf3f4e21aafdf3f8de8431a4a1d70259f627e3 100644 (file)
@@ -378,7 +378,7 @@ parse_rule_set(krb5_context context,
                rule_set **out_rs)
 {
     const char *rule;
-    int remaining, totlen;
+    int remaining;
     krb5_error_code ret, retval;
     rule_component *rc = NULL, *trc;
     rule_set *rs;
@@ -387,7 +387,7 @@ parse_rule_set(krb5_context context,
     if (rule_in == NULL)
         return EINVAL;
     rule = rule_in;
-    totlen = remaining = strlen(rule);
+    remaining = strlen(rule);
 
     rs = calloc(1, sizeof(*rs));
     if (rs == NULL) {
index a74268ce821740e7180f444d320edd194b7d1da9..c76359e7b64d4adcd713b89a27591b4866213ab9 100644 (file)
@@ -308,7 +308,6 @@ pkinit_server_verify_padata(krb5_context context,
     krb5_auth_pack_draft9 *auth_pack9 = NULL;
     pkinit_kdc_context plgctx = NULL;
     pkinit_kdc_req_context reqctx = NULL;
-    krb5_preauthtype pa_type;
     krb5_checksum cksum = {0, 0, 0, NULL};
     krb5_data *der_req = NULL;
     int valid_eku = 0, valid_san = 0;
@@ -351,7 +350,6 @@ pkinit_server_verify_padata(krb5_context context,
     switch ((int)data->pa_type) {
     case KRB5_PADATA_PK_AS_REQ:
         pkiDebug("processing KRB5_PADATA_PK_AS_REQ\n");
-        pa_type = (int)data->pa_type;
         retval = k5int_decode_krb5_pa_pk_as_req(&k5data, &reqp);
         if (retval) {
             pkiDebug("decode_krb5_pa_pk_as_req failed\n");
@@ -372,7 +370,6 @@ pkinit_server_verify_padata(krb5_context context,
     case KRB5_PADATA_PK_AS_REP_OLD:
     case KRB5_PADATA_PK_AS_REQ_OLD:
         pkiDebug("processing KRB5_PADATA_PK_AS_REQ_OLD\n");
-        pa_type = KRB5_PADATA_PK_AS_REQ_OLD;
         retval = k5int_decode_krb5_pa_pk_as_req_draft9(&k5data, &reqp9);
         if (retval) {
             pkiDebug("decode_krb5_pa_pk_as_req_draft9 failed\n");