| From 0543f1d02ee733d34ee109d00e7d0efd432bb37b Mon Sep 17 00:00:00 2001 |
| From: Lee Duncan <lduncan@suse.com> |
| Date: Tue, 28 Jan 2020 11:49:55 -0800 |
| Subject: [PATCH] Fix compiler issue when not in security mode |
| |
| --- |
| client.c | 20 +++++++++++++------- |
| db-policy.c | 12 +++++++++--- |
| include/libisns/util.h | 1 + |
| isnsadm.c | 2 +- |
| security.c | 14 ++++++++------ |
| socket.c | 5 +++-- |
| 6 files changed, 35 insertions(+), 19 deletions(-) |
| |
| --- a/client.c |
| +++ b/client.c |
| @@ -122,22 +122,17 @@ isns_client_get_local_address(const isns |
| /* |
| * Create a security context |
| */ |
| +#ifdef WITH_SECURITY |
| static isns_security_t * |
| __create_security_context(const char *name, const char *auth_key, |
| const char *server_key) |
| { |
| -#ifdef WITH_SECURITY |
| isns_security_t *ctx; |
| isns_principal_t *princ; |
| -#endif /* WITH_SECURITY */ |
| |
| if (!isns_config.ic_security) |
| return NULL; |
| |
| -#ifndef WITH_SECURITY |
| - isns_error("Cannot create security context: security disabled at build time\n"); |
| - return NULL; |
| -#else /* WITH_SECURITY */ |
| ctx = isns_create_dsa_context(); |
| if (ctx == NULL) |
| isns_fatal("Unable to create security context\n"); |
| @@ -174,8 +169,19 @@ __create_security_context(const char *na |
| } |
| |
| return ctx; |
| -#endif /* WITH_SECURITY */ |
| } |
| +#else /* WITH_SECURITY */ |
| +static isns_security_t * |
| +__create_security_context(__attribute__((unused))const char *name, |
| + __attribute__((unused))const char *auth_key, |
| + __attribute__((unused))const char *server_key) |
| +{ |
| + if (!isns_config.ic_security) |
| + return NULL; |
| + isns_error("Cannot create security context: security disabled at build time\n"); |
| + return NULL; |
| +} |
| +#endif /* WITH_SECURITY */ |
| |
| /* |
| * Create the default security context |
| --- a/db-policy.c |
| +++ b/db-policy.c |
| @@ -52,11 +52,11 @@ __isns_db_keystore_lookup(isns_db_keysto |
| /* |
| * Load a DSA key from the DB store |
| */ |
| +#ifdef WITH_SECURITY |
| static EVP_PKEY * |
| __isns_db_keystore_find(isns_keystore_t *store_base, |
| const char *name, size_t namelen) |
| { |
| -#ifdef WITH_SECURITY |
| isns_db_keystore_t *store = (isns_db_keystore_t *) store_base; |
| isns_object_t *obj; |
| const void *key_data; |
| @@ -71,10 +71,16 @@ __isns_db_keystore_find(isns_keystore_t |
| return NULL; |
| |
| return isns_dsa_decode_public(key_data, key_size); |
| -#else |
| +} |
| +#else /* WITH_SECURITY */ |
| +static EVP_PKEY * |
| +__isns_db_keystore_find(__attribute__((unused))isns_keystore_t *store_base, |
| + __attribute__((unused))const char *name, |
| + __attribute__((unused))size_t namelen) |
| +{ |
| return NULL; |
| -#endif |
| } |
| +#endif /* WITH_SECURITY */ |
| |
| /* |
| * Retrieve policy from database |
| --- a/include/libisns/util.h |
| +++ b/include/libisns/util.h |
| @@ -14,6 +14,7 @@ |
| #include <string.h> // for strdup |
| #include <signal.h> |
| #include <libisns/types.h> |
| +#include <stdlib.h> |
| |
| #define array_num_elements(a) (sizeof(a) / sizeof((a)[0])) |
| |
| --- a/isnsadm.c |
| +++ b/isnsadm.c |
| @@ -1162,7 +1162,7 @@ generate_key_callback(void) |
| } |
| |
| isns_attr_t * |
| -load_key_callback(const char *pathname) |
| +load_key_callback(__attribute__((unused))const char *pathname) |
| { |
| isns_fatal("Authentication disabled in this build\n"); |
| return NULL; |
| --- a/security.c |
| +++ b/security.c |
| @@ -408,32 +408,34 @@ isns_security_init(void) |
| } |
| |
| isns_keystore_t * |
| -isns_create_keystore(const char *spec) |
| +isns_create_keystore(__attribute__((unused))const char *spec) |
| { |
| isns_no_security(); |
| return NULL; |
| } |
| |
| void |
| -isns_security_set_keystore(isns_security_t *ctx, |
| - isns_keystore_t *ks) |
| +isns_security_set_keystore(__attribute__((unused))isns_security_t *ctx, |
| + __attribute__((unused))isns_keystore_t *ks) |
| { |
| isns_no_security(); |
| } |
| |
| void |
| -isns_principal_free(isns_principal_t *peer) |
| +isns_principal_free(__attribute__((unused))isns_principal_t *peer) |
| { |
| } |
| |
| isns_principal_t * |
| -isns_get_principal(isns_security_t *ctx, const char *spi, size_t spi_len) |
| +isns_get_principal(__attribute__((unused))isns_security_t *ctx, |
| + __attribute__((unused))const char *spi, |
| + __attribute__((unused))size_t spi_len) |
| { |
| return NULL; |
| } |
| |
| const char * |
| -isns_principal_name(const isns_principal_t *princ) |
| +isns_principal_name(__attribute__((unused))const isns_principal_t *princ) |
| { |
| return NULL; |
| } |
| --- a/socket.c |
| +++ b/socket.c |
| @@ -322,8 +322,9 @@ failed: |
| } |
| #else /* WITH_SECURITY */ |
| static int |
| -isns_pdu_authenticate(isns_security_t *sec, |
| - struct isns_partial_msg *msg, buf_t *bp) |
| +isns_pdu_authenticate(__attribute__((unused))isns_security_t *sec, |
| + __attribute__((unused))struct isns_partial_msg *msg, |
| + __attribute__((unused))buf_t *bp) |
| { |
| return 0; |
| } |