diff options
author | Jeremy Allison <jra@samba.org> | 2008-06-26 19:20:51 -0700 |
---|---|---|
committer | Karolin Seeger <kseeger@samba.org> | 2008-06-27 09:06:06 +0200 |
commit | f173d266912e7a597b5f2a83216673a27b17c042 (patch) | |
tree | eed322d4e60b7f06256e022f05dc48f7ea181a07 | |
parent | b9c6ea295d61205714b8453c2cbde89b6b8219c2 (diff) | |
download | samba-f173d266912e7a597b5f2a83216673a27b17c042.tar.gz |
Fix gcc warnings at -O3.
Jeremy.
(cherry picked from commit 096ff390a24ce971c9a207493dc1b5d9f88518b6)
-rw-r--r-- | source/auth/auth_util.c | 2 | ||||
-rw-r--r-- | source/libsmb/dsgetdcname.c | 3 | ||||
-rw-r--r-- | source/rpc_client/cli_pipe.c | 4 |
3 files changed, 5 insertions, 4 deletions
diff --git a/source/auth/auth_util.c b/source/auth/auth_util.c index 115a6e9ad20..202452602ca 100644 --- a/source/auth/auth_util.c +++ b/source/auth/auth_util.c @@ -568,7 +568,7 @@ NTSTATUS make_server_info_sam(auth_serversupplied_info **server_info, * a PDC. JRA. */ - winbind_off(); + (void)winbind_off(); DEBUG(10, ("make_server_info_sam: our machine account %s " "setting supplementary group list empty and " diff --git a/source/libsmb/dsgetdcname.c b/source/libsmb/dsgetdcname.c index 48e497b74c3..8d75593ddc8 100644 --- a/source/libsmb/dsgetdcname.c +++ b/source/libsmb/dsgetdcname.c @@ -920,7 +920,8 @@ static NTSTATUS make_dc_info_from_cldap_reply(TALLOC_CTX *mem_ctx, union nbt_cldap_netlogon *r, struct netr_DsRGetDCNameInfo **info) { - const char *dc_hostname, *dc_domain_name; + const char *dc_hostname = NULL; + const char *dc_domain_name = NULL; const char *dc_address = NULL; const char *dc_forest = NULL; uint32_t dc_address_type = 0; diff --git a/source/rpc_client/cli_pipe.c b/source/rpc_client/cli_pipe.c index 71422cd9adb..425eb26cb04 100644 --- a/source/rpc_client/cli_pipe.c +++ b/source/rpc_client/cli_pipe.c @@ -445,8 +445,8 @@ static NTSTATUS cli_pipe_validate_rpc_response(struct rpc_pipe_client *cli, RPC_ return NT_STATUS_INVALID_PARAMETER; } - if (prhdr->auth_len + RPC_HDR_AUTH_LEN < prhdr->auth_len || - prhdr->auth_len + RPC_HDR_AUTH_LEN < RPC_HDR_AUTH_LEN) { + if (prhdr->auth_len + (unsigned int)RPC_HDR_AUTH_LEN < prhdr->auth_len || + prhdr->auth_len + (unsigned int)RPC_HDR_AUTH_LEN < (unsigned int)RPC_HDR_AUTH_LEN) { /* Integer wrap attempt. */ return NT_STATUS_INVALID_PARAMETER; } |