From 7345c51c68dfd90a704ccbb0e5b1e736af80f146 Mon Sep 17 00:00:00 2001 From: Thierry Bordaz Date: Mon, 17 May 2021 16:10:22 +0200 Subject: [PATCH] Issue 4725 - Fix compiler warnings --- ldap/servers/slapd/proto-slap.h | 2 +- ldap/servers/slapd/pw.c | 9 ++++----- ldap/servers/slapd/pw_retry.c | 2 -- 3 files changed, 5 insertions(+), 8 deletions(-) diff --git a/ldap/servers/slapd/proto-slap.h b/ldap/servers/slapd/proto-slap.h index 6ff178127..2768d5a1d 100644 --- a/ldap/servers/slapd/proto-slap.h +++ b/ldap/servers/slapd/proto-slap.h @@ -1012,7 +1012,7 @@ int add_shadow_ext_password_attrs(Slapi_PBlock *pb, Slapi_Entry **e); * pw_retry.c */ int update_pw_retry(Slapi_PBlock *pb); -int update_trp_pw_usecount(Slapi_PBlock *pb, Slapi_Entry *e, int32_t use_count); +int update_tpr_pw_usecount(Slapi_PBlock *pb, Slapi_Entry *e, int32_t use_count); void pw_apply_mods(const Slapi_DN *sdn, Slapi_Mods *mods); void pw_set_componentID(struct slapi_componentid *cid); struct slapi_componentid *pw_get_componentID(void); diff --git a/ldap/servers/slapd/pw.c b/ldap/servers/slapd/pw.c index d98422513..2a167c8f1 100644 --- a/ldap/servers/slapd/pw.c +++ b/ldap/servers/slapd/pw.c @@ -2622,7 +2622,6 @@ int slapi_check_tpr_limits(Slapi_PBlock *pb, Slapi_Entry *bind_target_entry, int send_result) { passwdPolicy *pwpolicy = NULL; char *dn = NULL; - int tpr_maxuse; char *value; time_t cur_time; char *cur_time_str = NULL; @@ -2638,7 +2637,7 @@ slapi_check_tpr_limits(Slapi_PBlock *pb, Slapi_Entry *bind_target_entry, int sen return 0; } - if (slapi_entry_attr_hasvalue(bind_target_entry, "pwdTPRReset", "TRUE") == NULL) { + if (!slapi_entry_attr_hasvalue(bind_target_entry, "pwdTPRReset", "TRUE")) { /* the password was not reset by an admin while a TRP pwp was set, just returned */ return 0; } @@ -2646,7 +2645,7 @@ slapi_check_tpr_limits(Slapi_PBlock *pb, Slapi_Entry *bind_target_entry, int sen /* Check entry TPR max use */ if (pwpolicy->pw_tpr_maxuse >= 0) { uint use_count; - value = slapi_entry_attr_get_ref(bind_target_entry, "pwdTPRUseCount"); + value = (char *) slapi_entry_attr_get_ref(bind_target_entry, "pwdTPRUseCount"); if (value) { /* max Use is enforced */ use_count = strtoull(value, 0, 0); @@ -2681,7 +2680,7 @@ slapi_check_tpr_limits(Slapi_PBlock *pb, Slapi_Entry *bind_target_entry, int sen /* Check entry TPR expiration at a specific time */ if (pwpolicy->pw_tpr_delay_expire_at >= 0) { - value = slapi_entry_attr_get_ref(bind_target_entry, "pwdTPRExpireAt"); + value = (char *) slapi_entry_attr_get_ref(bind_target_entry, "pwdTPRExpireAt"); if (value) { /* max Use is enforced */ if (difftime(parse_genTime(cur_time_str), parse_genTime(value)) >= 0) { @@ -2709,7 +2708,7 @@ slapi_check_tpr_limits(Slapi_PBlock *pb, Slapi_Entry *bind_target_entry, int sen /* Check entry TPR valid after a specific time */ if (pwpolicy->pw_tpr_delay_valid_from >= 0) { - value = slapi_entry_attr_get_ref(bind_target_entry, "pwdTPRValidFrom"); + value = (char *) slapi_entry_attr_get_ref(bind_target_entry, "pwdTPRValidFrom"); if (value) { /* validity after a specific time is enforced */ if (difftime(parse_genTime(value), parse_genTime(cur_time_str)) >= 0) { diff --git a/ldap/servers/slapd/pw_retry.c b/ldap/servers/slapd/pw_retry.c index 5d13eb636..af54aa19d 100644 --- a/ldap/servers/slapd/pw_retry.c +++ b/ldap/servers/slapd/pw_retry.c @@ -163,8 +163,6 @@ set_retry_cnt_and_time(Slapi_PBlock *pb, int count, time_t cur_time) int set_tpr_usecount_mods(Slapi_PBlock *pb, Slapi_Mods *smods, int count) { - char *timestr; - time_t unlock_time; char retry_cnt[16] = {0}; /* 1-65535 */ const char *dn = NULL; Slapi_DN *sdn = NULL; -- 2.31.1