fr_sbuff_marker(&m_s, in);
- fr_sbuff_out(&err, &num, in);
+ (void) fr_sbuff_out(&err, &num, in);
if (err != FR_SBUFF_PARSE_OK) {
invalid_ref:
fr_strerror_printf("Invalid regex reference. Must be in range 0-%u", REQUEST_MAX_REGEX);
* Free our temporary array of terminals
*/
if (tokens != &expansions) talloc_free(tokens);
-
+
return 0;
}
if (do_length) {
if (parent->flags.subtype == FLAG_LENGTH_UINT8) {
- fr_dbuff_in(&hdr, (uint8_t) (fr_dbuff_used(&work_dbuff) - 1));
+ (void) fr_dbuff_in(&hdr, (uint8_t) (fr_dbuff_used(&work_dbuff) - 1));
} else {
- fr_dbuff_in(&hdr, (uint16_t) (fr_dbuff_used(&work_dbuff) - 2));
+ (void) fr_dbuff_in(&hdr, (uint16_t) (fr_dbuff_used(&work_dbuff) - 2));
}
}
if (*p != '=') {
next:
- fr_sbuff_in_char(&sbuff, *p++);
+ (void) fr_sbuff_in_char(&sbuff, *p++);
continue;
}
!(c2 = memchr(hextab, tolower(*(p + 2)), 16))) goto next;
c3 = ((c1 - hextab) << 4) + (c2 - hextab);
- fr_sbuff_in_char(&sbuff, c3);
+ (void) fr_sbuff_in_char(&sbuff, c3);
p += 3;
}
/*
* Copy the password over, and fill the remainder with random data.
*/
- fr_dbuff_out_memcpy(tpasswd + 3, in, inlen);
+ (void) fr_dbuff_out_memcpy(tpasswd + 3, in, inlen);
for (i = 3 + inlen; i < sizeof(tpasswd); i++) {
tpasswd[i] = fr_fast_rand(&packet_ctx->rand_ctx);
* Only 24bit integers are allowed here
*/
fr_dbuff_set(&src, &value_start);
- fr_dbuff_out(&msb, &src);
+ (void) fr_dbuff_out(&msb, &src);
if (msb != 0) {
fr_strerror_const("Integer overflow for tagged uint32 attribute");
return PAIR_ENCODE_SKIPPED;