ASR_BASE

Change-Id: Icf3719cc0afe3eeb3edc7fa80a2eb5199ca9dda1
diff --git a/external/subpack/net/krb5/patches/001-fix-uninitialized-warning-errors.patch b/external/subpack/net/krb5/patches/001-fix-uninitialized-warning-errors.patch
new file mode 100644
index 0000000..6d1e373
--- /dev/null
+++ b/external/subpack/net/krb5/patches/001-fix-uninitialized-warning-errors.patch
@@ -0,0 +1,55 @@
+--- a/src/kadmin/ktutil/ktutil_funcs.c
++++ b/src/kadmin/ktutil/ktutil_funcs.c
+@@ -65,7 +65,7 @@ krb5_error_code ktutil_delete(context, l
+     krb5_kt_list *list;
+     int idx;
+ {
+-    krb5_kt_list lp, prev;
++    krb5_kt_list lp, prev = NULL;
+     int i;
+ 
+     for (lp = *list, i = 1; lp; prev = lp, lp = lp->next, i++) {
+--- a/src/lib/kadm5/str_conv.c
++++ b/src/lib/kadm5/str_conv.c
+@@ -133,7 +133,7 @@ raw_flagspec_to_mask(const char *s, int
+ {
+     int found = 0, invert = 0;
+     size_t i;
+-    krb5_flags flag;
++    krb5_flags flag = 0;
+     unsigned long ul;
+ 
+     for (i = 0; !found && i < NFTBL; i++) {
+--- a/src/lib/krad/packet.c
++++ b/src/lib/krad/packet.c
+@@ -253,7 +253,7 @@ krad_packet_new_request(krb5_context ctx
+ {
+     krb5_error_code retval;
+     krad_packet *pkt;
+-    uchar id;
++    uchar id = 0;
+     size_t attrset_len;
+ 
+     pkt = packet_new();
+--- a/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
++++ b/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
+@@ -3646,7 +3646,7 @@ pkinit_open_session(krb5_context context
+ {
+     CK_ULONG i, r;
+     unsigned char *cp;
+-    size_t label_len;
++    size_t label_len = 0;
+     CK_ULONG count = 0;
+     CK_SLOT_ID_PTR slotlist;
+     CK_TOKEN_INFO tinfo;
+--- a/src/util/profile/prof_file.c
++++ b/src/util/profile/prof_file.c
+@@ -270,7 +270,7 @@ errcode_t profile_update_file_data_locke
+     unsigned long frac;
+     time_t now;
+ #endif
+-    FILE *f;
++    FILE *f = NULL;
+     int isdir = 0;
+ 
+     if ((data->flags & PROFILE_FILE_NO_RELOAD) && data->root != NULL)