summaryrefslogtreecommitdiff
path: root/asn1/spnego/packet-spnego-template.c
diff options
context:
space:
mode:
authorAlexis La Goutte <alexis.lagoutte@gmail.com>2012-01-09 16:32:53 +0000
committerAlexis La Goutte <alexis.lagoutte@gmail.com>2012-01-09 16:32:53 +0000
commit09e95bda3f916d36c5f9193791d79f46498af45a (patch)
tree7de69fcf82f1ada59b24d9b195c148dbc598a06b /asn1/spnego/packet-spnego-template.c
parent458de08ce9bca80bdbb812ae0c8dbdbba6d7c682 (diff)
downloadwireshark-09e95bda3f916d36c5f9193791d79f46498af45a.tar.gz
Fix some Dead Store (Dead assignement/Dead increment) Warning found by Clang
Try to compile with cmake in Ubuntu 11.10 svn path=/trunk/; revision=40410
Diffstat (limited to 'asn1/spnego/packet-spnego-template.c')
-rw-r--r--asn1/spnego/packet-spnego-template.c10
1 files changed, 2 insertions, 8 deletions
diff --git a/asn1/spnego/packet-spnego-template.c b/asn1/spnego/packet-spnego-template.c
index 8773ec30b3..a0c5ceafa6 100644
--- a/asn1/spnego/packet-spnego-template.c
+++ b/asn1/spnego/packet-spnego-template.c
@@ -179,7 +179,6 @@ dissect_spnego_krb5(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
int offset = 0;
guint16 token_id;
const char *oid;
- gssapi_oid_value *value;
tvbuff_t *krb5_tvb;
gint8 class;
gboolean pc, ind = 0;
@@ -241,8 +240,6 @@ dissect_spnego_krb5(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
/* Next, the OID */
offset=dissect_ber_object_identifier_str(FALSE, &asn1_ctx, subtree, tvb, offset, hf_spnego_krb5_oid, &oid);
- value = gssapi_lookup_oid_str(oid);
-
token_id = tvb_get_letohs(tvb, offset);
proto_tree_add_uint(subtree, hf_spnego_krb5_tok_id, tvb, offset, 2,
token_id);
@@ -257,7 +254,7 @@ dissect_spnego_krb5(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
* No token ID - just dissect as a Kerberos message and
* return.
*/
- offset = dissect_kerberos_main(tvb, pinfo, subtree, FALSE, NULL);
+ dissect_kerberos_main(tvb, pinfo, subtree, FALSE, NULL);
return;
default:
@@ -454,7 +451,6 @@ decrypt_arcfour(packet_info *pinfo,
{
guint8 Klocaldata[16];
int ret;
- gint32 seq_number;
size_t datalen;
guint8 k6_data[16];
guint32 SND_SEQ[2];
@@ -496,7 +492,6 @@ decrypt_arcfour(packet_info *pinfo,
memset(k6_data, 0, sizeof(k6_data));
}
- seq_number=g_ntohl(SND_SEQ[0]);
if (SND_SEQ[1] != 0xFFFFFFFF && SND_SEQ[1] != 0x00000000) {
return -6;
@@ -697,7 +692,6 @@ decrypt_gssapi_krb_cfx_wrap(proto_tree *tree _U_,
int keytype,
unsigned int usage)
{
- int res;
guint8 *rotated;
guint8 *output;
int datalen;
@@ -721,7 +715,7 @@ decrypt_gssapi_krb_cfx_wrap(proto_tree *tree _U_,
rrc += ec;
}
- res = rrc_rotate(rotated, datalen, rrc, TRUE);
+ rrc_rotate(rotated, datalen, rrc, TRUE);
next_tvb=tvb_new_child_real_data(encrypted_tvb, rotated,
datalen, datalen);