Strict splitting of http_ntlm.[ch] may trigger 8 compiler warnings when
building with some compilers and strict compiler warnings enabled, depending
on other specific configuration options some could get triggered or not.
Seven are related with 'unused function parameters' and another one with
'var may be used before its value is set'.
size_t size;
unsigned char *buffer;
+#if defined(CURL_DISABLE_VERBOSE_STRINGS) || defined(USE_WINDOWS_SSPI)
+ (void)data;
+#endif
+
size = Curl_base64_decode(header, &buffer);
if(!buffer)
return CURLE_OUT_OF_MEMORY;
size_t hostoff = 0;
size_t domoff = hostoff + hostlen; /* This is 0: remember that host and
domain are empty */
+ (void)userp;
+ (void)passwdp;
+ (void)ntlm;
+
#if USE_NTLM2SESSION
#define NTLM2FLAG NTLMFLAG_NEGOTIATE_NTLM2_KEY
#else
ULONG attrs;
TimeStamp tsDummy; /* For Windows 9x compatibility of SSPI calls */
+ (void)passwdp;
+ (void)userp;
+ (void)data;
+
type_2_desc.ulVersion = type_3_desc.ulVersion = SECBUFFER_VERSION;
type_2_desc.cBuffers = type_3_desc.cBuffers = 1;
type_2_desc.pBuffers = &type_2;
CURLcode Curl_output_ntlm(struct connectdata *conn,
bool proxy)
{
- size_t size;
+ size_t size = 0;
char *base64 = NULL;
unsigned char ntlmbuf[NTLM_BUFSIZE];
CURLcode res;