auth/kerberos: clang: Fix same instances of 'Value stored is never read'
authorNoel Power <noel.power@suse.com>
Thu, 4 Jul 2019 11:54:18 +0000 (11:54 +0000)
committerNoel Power <npower@samba.org>
Mon, 8 Jul 2019 11:04:15 +0000 (11:04 +0000)
Fixes:

auth/kerberos/gssapi_pac.c:136:3: warning: Value stored to 'gss_maj' is never read <--[clang]
                gss_maj = gss_release_buffer(&gss_min, &pac_buffer);
                ^         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
auth/kerberos/gssapi_pac.c:137:3: warning: Value stored to 'gss_maj' is never read <--[clang]
                gss_maj = gss_release_buffer(&gss_min, &pac_display_buffer);
                ^         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
auth/kerberos/gssapi_pac.c:265:4: warning: Value stored to 'gss_maj' is never read <--[clang]
                        gss_maj = gss_release_buffer_set(&gss_min, &set);
                        ^         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
auth/kerberos/gssapi_pac.c:273:4: warning: Value stored to 'gss_maj' is never read <--[clang]
                        gss_maj = gss_release_buffer_set(&gss_min, &set);
                        ^         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
auth/kerberos/gssapi_pac.c:279:4: warning: Value stored to 'gss_maj' is never read <--[clang]
                        gss_maj = gss_release_buffer_set(&gss_min, &set);
                        ^         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
auth/kerberos/gssapi_pac.c:285:5: warning: Value stored to 'gss_maj' is never read <--[clang]
                                gss_maj = gss_release_buffer_set(&gss_min, &set);
                                ^         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
auth/kerberos/gssapi_pac.c:291:2: warning: Value stored to 'gss_maj' is never read <--[clang]
        gss_maj = gss_release_buffer_set(&gss_min, &set);
        ^         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
7 warnings generated.

Signed-off-by: Noel Power <noel.power@suse.com>
Reviewed-by: Gary Lockyer <gary@catalyst.net.nz>
Autobuild-User(master): Noel Power <npower@samba.org>
Autobuild-Date(master): Mon Jul  8 11:04:15 UTC 2019 on sn-devel-184

auth/kerberos/gssapi_pac.c

index e4dad18738bfa3f95a09ffe8aa27c720a0ff2d3a..12043992308075b10bb99df7862e4f1f211480ed 100644 (file)
@@ -133,8 +133,8 @@ NTSTATUS gssapi_obtain_pac_blob(TALLOC_CTX *mem_ctx,
                        status = NT_STATUS_OK;
                }
 
-               gss_maj = gss_release_buffer(&gss_min, &pac_buffer);
-               gss_maj = gss_release_buffer(&gss_min, &pac_display_buffer);
+               gss_release_buffer(&gss_min, &pac_buffer);
+               gss_release_buffer(&gss_min, &pac_display_buffer);
                return status;
        } else {
                DEBUG(0, ("obtaining PAC via GSSAPI failed: authenticated: %s, complete: %s, more: %s\n",
@@ -262,7 +262,7 @@ NTSTATUS gssapi_get_session_key(TALLOC_CTX *mem_ctx,
                                krb5_free_keyblock(NULL /* should be krb5_context */, subkey);
                        }
 #endif
-                       gss_maj = gss_release_buffer_set(&gss_min, &set);
+                       gss_release_buffer_set(&gss_min, &set);
        
                        return NT_STATUS_OK;
 
@@ -270,25 +270,25 @@ NTSTATUS gssapi_get_session_key(TALLOC_CTX *mem_ctx,
                                  gse_sesskeytype_oid.elements,
                                  gse_sesskeytype_oid.length) != 0) {
                        /* Perhaps a non-krb5 session key */
-                       gss_maj = gss_release_buffer_set(&gss_min, &set);
+                       gss_release_buffer_set(&gss_min, &set);
                        return NT_STATUS_OK;
                }
                p = (const uint8_t *)set->elements[1].value + gse_sesskeytype_oid.length;
                diflen = set->elements[1].length - gse_sesskeytype_oid.length;
                if (diflen <= 0) {
-                       gss_maj = gss_release_buffer_set(&gss_min, &set);
+                       gss_release_buffer_set(&gss_min, &set);
                        return NT_STATUS_INVALID_PARAMETER;
                }
                for (i = 0; i < diflen; i++) {
                        *keytype = (*keytype << 7) | (p[i] & 0x7f);
                        if (i + 1 != diflen && (p[i] & 0x80) == 0) {
-                               gss_maj = gss_release_buffer_set(&gss_min, &set);
+                               gss_release_buffer_set(&gss_min, &set);
                                return NT_STATUS_INVALID_PARAMETER;
                        }
                }
        }
 
-       gss_maj = gss_release_buffer_set(&gss_min, &set);
+       gss_release_buffer_set(&gss_min, &set);
        return NT_STATUS_OK;
 }