ASR_BASE
Change-Id: Icf3719cc0afe3eeb3edc7fa80a2eb5199ca9dda1
diff --git a/external/subpack/net/krb5/patches/001-fix-uninitialized-warning-errors.patch b/external/subpack/net/krb5/patches/001-fix-uninitialized-warning-errors.patch
new file mode 100644
index 0000000..6d1e373
--- /dev/null
+++ b/external/subpack/net/krb5/patches/001-fix-uninitialized-warning-errors.patch
@@ -0,0 +1,55 @@
+--- a/src/kadmin/ktutil/ktutil_funcs.c
++++ b/src/kadmin/ktutil/ktutil_funcs.c
+@@ -65,7 +65,7 @@ krb5_error_code ktutil_delete(context, l
+ krb5_kt_list *list;
+ int idx;
+ {
+- krb5_kt_list lp, prev;
++ krb5_kt_list lp, prev = NULL;
+ int i;
+
+ for (lp = *list, i = 1; lp; prev = lp, lp = lp->next, i++) {
+--- a/src/lib/kadm5/str_conv.c
++++ b/src/lib/kadm5/str_conv.c
+@@ -133,7 +133,7 @@ raw_flagspec_to_mask(const char *s, int
+ {
+ int found = 0, invert = 0;
+ size_t i;
+- krb5_flags flag;
++ krb5_flags flag = 0;
+ unsigned long ul;
+
+ for (i = 0; !found && i < NFTBL; i++) {
+--- a/src/lib/krad/packet.c
++++ b/src/lib/krad/packet.c
+@@ -253,7 +253,7 @@ krad_packet_new_request(krb5_context ctx
+ {
+ krb5_error_code retval;
+ krad_packet *pkt;
+- uchar id;
++ uchar id = 0;
+ size_t attrset_len;
+
+ pkt = packet_new();
+--- a/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
++++ b/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
+@@ -3646,7 +3646,7 @@ pkinit_open_session(krb5_context context
+ {
+ CK_ULONG i, r;
+ unsigned char *cp;
+- size_t label_len;
++ size_t label_len = 0;
+ CK_ULONG count = 0;
+ CK_SLOT_ID_PTR slotlist;
+ CK_TOKEN_INFO tinfo;
+--- a/src/util/profile/prof_file.c
++++ b/src/util/profile/prof_file.c
+@@ -270,7 +270,7 @@ errcode_t profile_update_file_data_locke
+ unsigned long frac;
+ time_t now;
+ #endif
+- FILE *f;
++ FILE *f = NULL;
+ int isdir = 0;
+
+ if ((data->flags & PROFILE_FILE_NO_RELOAD) && data->root != NULL)