]> git.ipfire.org Git - thirdparty/krb5.git/commitdiff
Remove more dead code 922/head
authorRobbie Harwood <rharwood@redhat.com>
Thu, 9 May 2019 18:07:24 +0000 (14:07 -0400)
committerGreg Hudson <ghudson@mit.edu>
Fri, 10 May 2019 14:43:16 +0000 (10:43 -0400)
src/clients/klist/klist.c
src/kadmin/dbutil/kdb5_mkey.c
src/kadmin/server/ipropd_svc.c
src/lib/gssapi/krb5/gssapi_krb5.c
src/lib/gssapi/krb5/k5sealv3.c
src/lib/gssapi/krb5/k5sealv3iov.c
src/lib/kdb/kdb_convert.c
src/plugins/kdb/ldap/ldap_util/kdb5_ldap_services.c
src/plugins/kdb/ldap/libkdb_ldap/ldap_create.c
src/plugins/preauth/pkinit/pkinit_srv.c
src/tests/hammer/kdc5_hammer.c

index 8c307151a982e2be055aea932539c14d0cba7567..4261ac96c18413d261747468ea6a66e8af3c0cf8 100644 (file)
@@ -720,11 +720,6 @@ show_credential(krb5_creds *cred)
         extra_field += 2;
     }
 
-    if (extra_field > 3) {
-        fputs("\n", stdout);
-        extra_field = 0;
-    }
-
     if (show_flags) {
         flags = flags_string(cred);
         if (flags && *flags) {
index 19796c202f1d1fe3df490019adb4020f7067c51a..aceb0a9b8063d7d8ee1a738471c9637f4d0f77a2 100644 (file)
@@ -1240,7 +1240,6 @@ kdb5_purge_mkeys(int argc, char *argv[])
                             if (actkvno_entry == actkvno_list) {
                                 /* remove from head */
                                 actkvno_list = actkvno_entry->next;
-                                prev_actkvno_entry = actkvno_list;
                             } else if (actkvno_entry->next == NULL) {
                                 /* remove from tail */
                                 prev_actkvno_entry->next = NULL;
@@ -1263,7 +1262,6 @@ kdb5_purge_mkeys(int argc, char *argv[])
                         if (mkey_aux_entry->mkey_kvno == args.kvnos[j].kvno) {
                             if (mkey_aux_entry == mkey_aux_list) {
                                 mkey_aux_list = mkey_aux_entry->next;
-                                prev_mkey_aux_entry = mkey_aux_list;
                             } else if (mkey_aux_entry->next == NULL) {
                                 prev_mkey_aux_entry->next = NULL;
                             } else {
index dc9984c2c781484991f7219ad05bfaff15cb0af3..56e9b90b203b9dc9b3a7287b4b70f2572f79d5a1 100644 (file)
@@ -263,8 +263,6 @@ ipropx_resync(uint32_t vers, struct svc_req *rqstp)
     int pret, fret;
     FILE *p;
     kadm5_server_handle_t handle = global_server_handle;
-    OM_uint32 min_stat;
-    gss_name_t name = NULL;
     char *client_name = NULL, *service_name = NULL;
     char *whoami = "iprop_full_resync_1";
 
@@ -440,8 +438,6 @@ out:
        debprret(whoami, ret.ret, 0);
     free(client_name);
     free(service_name);
-    if (name)
-       gss_release_name(&min_stat, &name);
     free(ubuf);
     return (&ret);
 }
index 79b83e0c6b6550607157ca16914b7af8e8094880..f09cda007c6b2c7101168e822a0f720dfbf3a841 100644 (file)
@@ -780,7 +780,7 @@ krb5_gss_localname(OM_uint32 *minor,
     localname->value = gssalloc_strdup(lname);
     localname->length = strlen(lname);
 
-    return (code == 0) ? GSS_S_COMPLETE : GSS_S_FAILURE;
+    return GSS_S_COMPLETE;
 }
 
 
index 25d9f27118253cbe23ad2c95857eeaa6fcd468e6..3b4f8cb837b5616dcb5b590c1d6d7c88ea6d6f70 100644 (file)
@@ -145,9 +145,8 @@ gss_krb5int_make_seal_token_v3 (krb5_context context,
         /* TOK_ID */
         store_16_be(KG2_TOK_WRAP_MSG, outbuf);
         /* flags */
-        outbuf[2] = (acceptor_flag
-                     | (conf_req_flag ? FLAG_WRAP_CONFIDENTIAL : 0)
-                     | (ctx->have_acceptor_subkey ? FLAG_ACCEPTOR_SUBKEY : 0));
+        outbuf[2] = (acceptor_flag | FLAG_WRAP_CONFIDENTIAL |
+                     (ctx->have_acceptor_subkey ? FLAG_ACCEPTOR_SUBKEY : 0));
         /* filler */
         outbuf[3] = 0xff;
         /* EC */
index a73edb6a4ffd37f5be39e75db2550b200de21fdc..333ee124ddf32d74aa7a052043a2ff1861de4f69 100644 (file)
@@ -144,9 +144,8 @@ gss_krb5int_make_seal_token_v3_iov(krb5_context context,
         /* TOK_ID */
         store_16_be(KG2_TOK_WRAP_MSG, outbuf);
         /* flags */
-        outbuf[2] = (acceptor_flag
-                     | (conf_req_flag ? FLAG_WRAP_CONFIDENTIAL : 0)
-                     | (ctx->have_acceptor_subkey ? FLAG_ACCEPTOR_SUBKEY : 0));
+        outbuf[2] = (acceptor_flag | FLAG_WRAP_CONFIDENTIAL |
+                     (ctx->have_acceptor_subkey ? FLAG_ACCEPTOR_SUBKEY : 0));
         /* filler */
         outbuf[3] = 0xFF;
         /* EC */
index 76140732f97176a1d7661100860e00cd51b5b3aa..e1bf1919ff76f139d39da898e1ff62824512cff9 100644 (file)
@@ -305,8 +305,6 @@ ulog_conv_2logentry(krb5_context context, krb5_db_entry *entry,
     krb5_error_code ret;
     kdbe_attr_type_t *attr_types;
     int kadm_data_yes;
-    /* always exclude non-replicated attributes, for now */
-    krb5_boolean exclude_nra = TRUE;
 
     nattrs = tmpint = 0;
     final = -1;
@@ -356,7 +354,8 @@ ulog_conv_2logentry(krb5_context context, krb5_db_entry *entry,
             nattrs++;
         }
     } else {
-        find_changed_attrs(curr, entry, exclude_nra, attr_types, &nattrs);
+        /* Always exclude non-replicated attributes for now. */
+        find_changed_attrs(curr, entry, TRUE, attr_types, &nattrs);
         krb5_db_free_principal(context, curr);
     }
 
@@ -402,31 +401,6 @@ ulog_conv_2logentry(krb5_context context, krb5_db_entry *entry,
             }
             break;
 
-        case AT_LAST_SUCCESS:
-            if (!exclude_nra && entry->last_success >= 0) {
-                ULOG_ENTRY_TYPE(update, ++final).av_type = AT_LAST_SUCCESS;
-                ULOG_ENTRY(update, final).av_last_success =
-                    (uint32_t)entry->last_success;
-            }
-            break;
-
-        case AT_LAST_FAILED:
-            if (!exclude_nra && entry->last_failed >= 0) {
-                ULOG_ENTRY_TYPE(update, ++final).av_type = AT_LAST_FAILED;
-                ULOG_ENTRY(update, final).av_last_failed =
-                    (uint32_t)entry->last_failed;
-            }
-            break;
-
-        case AT_FAIL_AUTH_COUNT:
-            if (!exclude_nra) {
-                ULOG_ENTRY_TYPE(update, ++final).av_type =
-                    AT_FAIL_AUTH_COUNT;
-                ULOG_ENTRY(update, final).av_fail_auth_count =
-                    (uint32_t)entry->fail_auth_count;
-            }
-            break;
-
         case AT_PRINC:
             if (entry->princ->length > 0) {
                 ULOG_ENTRY_TYPE(update, ++final).av_type = AT_PRINC;
@@ -552,10 +526,8 @@ ulog_conv_2logentry(krb5_context context, krb5_db_entry *entry,
 /* END CSTYLED */
 
         case AT_LEN:
-            if (entry->len >= 0) {
-                ULOG_ENTRY_TYPE(update, ++final).av_type = AT_LEN;
-                ULOG_ENTRY(update, final).av_len = (int16_t)entry->len;
-            }
+            ULOG_ENTRY_TYPE(update, ++final).av_type = AT_LEN;
+            ULOG_ENTRY(update, final).av_len = (int16_t)entry->len;
             break;
 
         default:
index 1ed72afe9731a1add8ec9718edcd4ad8b01dbfa3..b92cb58c704bbc4d99468b16897f113b3a90fe40 100644 (file)
@@ -135,10 +135,6 @@ kdb5_ldap_stash_service_password(int argc, char **argv)
             print_usage = TRUE;
             goto cleanup;
         }
-        if (file_name == NULL) {
-            com_err(me, ENOMEM, _("while setting service object password"));
-            goto cleanup;
-        }
     } else { /* argc == 2 */
         service_object = strdup (argv[1]);
         if (service_object == NULL) {
index 1e6fffee5a3aad6b4af849f55f798f11fea71e81..5b57c799a72e2881c3701e6d107a6276605149a5 100644 (file)
@@ -56,7 +56,6 @@ krb5_ldap_create(krb5_context context, char *conf_section, char **db_args)
     krb5_ldap_realm_params *rparams = NULL;
     krb5_ldap_context *ldap_context=NULL;
     krb5_boolean realm_obj_created = FALSE;
-    krb5_boolean krbcontainer_obj_created = FALSE;
     int mask = 0;
 
     /* Clear the global error string */
@@ -121,15 +120,6 @@ krb5_ldap_create(krb5_context context, char *conf_section, char **db_args)
         goto cleanup;
 
 cleanup:
-    /* If the krbcontainer/realm creation is not complete, do the roll-back here */
-    if ((krbcontainer_obj_created) && (!realm_obj_created)) {
-        int rc;
-        rc = krb5_ldap_delete_krbcontainer(context,
-                                           ldap_context->container_dn);
-        k5_setmsg(context, rc, _("could not complete roll-back, error "
-                                 "deleting Kerberos Container"));
-    }
-
     if (rparams)
         krb5_ldap_free_realm_params(rparams);
 
index 27e6ef4d28c3d2aba9d54d62858877bbac2ffcfc..6aa646cc675dc44d1bbf6113b13e6c61975aa53f 100644 (file)
@@ -258,15 +258,7 @@ verify_client_san(krb5_context context,
     }
     pkiDebug("%s: no upn san match found\n", __FUNCTION__);
 
-    /* We found no match */
-    if (princs != NULL || upns != NULL) {
-        *valid_san = 0;
-        /* XXX ??? If there was one or more name in the cert, but
-         * none matched the client name, then return mismatch? */
-        retval = KRB5KDC_ERR_CLIENT_NAME_MISMATCH;
-    }
     retval = 0;
-
 out:
     if (princs != NULL) {
         for (i = 0; princs[i] != NULL; i++)
index 086c21d1ce3eed66100357b21e6d448a3c5af515..8220fd97bd08d1772024dd171450ad451a02e2b5 100644 (file)
@@ -439,7 +439,6 @@ int get_tgt (context, p_client_str, p_client, ccache)
     krb5_principal *p_client;
     krb5_ccache ccache;
 {
-    char *cache_name = NULL;           /* -f option */
     long lifetime = KRB5_DEFAULT_LIFE; /* -l option */
     krb5_error_code code;
     krb5_creds my_creds;
@@ -464,8 +463,7 @@ int get_tgt (context, p_client_str, p_client, ccache)
 
     code = krb5_cc_initialize (context, ccache, *p_client);
     if (code != 0) {
-       com_err (prog, code, "when initializing cache %s",
-                cache_name?cache_name:"");
+       com_err (prog, code, "when initializing cache");
        return(-1);
     }