mirror of
https://github.com/asterisk/asterisk.git
synced 2025-09-29 18:19:30 +00:00
clang compiler warnings: Fix autological comparisons
This fixes autological comparison warnings in the following: * chan_skinny: letohl may return a signed or unsigned value, depending on the macro chosen * func_curl: Provide a specific cast to CURLoption to prevent mismatch * cel: Fix enum comparisons where the enum can never be negative * enum: Fix comparison of return result of dn_expand, which returns a signed int value * event: Fix enum comparisons where the enum can never be negative * indications: tone_data.freq1 and freq2 are unsigned, and hence can never be negative * presencestate: Use the actual enum value for INVALID state * security_events: Fix enum comparisons where the enum can never be negative * udptl: Don't bother to check if the return value from encode_length is less than 0, as it returns an unsigned int * translate: Since the parameters are unsigned int, don't bother checking to see if they are negative. The cast to unsigned int would already blow past the matrix bounds. * res_pjsip_exten_state: Use a temporary value to cache the return of ast_hint_presence_state * res_stasis_playback: Fix enum comparisons where the enum can never be negative * res_stasis_recording: Add an enum value for the case where the recording operation is in error; fix enum comparisons * resource_bridges: Use enum value as opposed to -1 * resource_channels: Use enum value as opposed to -1 Review: https://reviewboard.asterisk.org/r/4533 ASTERISK-24917 Reported by: dkdegroot patches: rb4533.patch submitted by dkdegroot (License 6600) ........ Merged revisions 434469 from http://svn.asterisk.org/svn/asterisk/branches/11 ........ Merged revisions 434470 from http://svn.asterisk.org/svn/asterisk/branches/13 git-svn-id: https://origsvn.digium.com/svn/asterisk/trunk@434471 65c4cc65-6c06-0410-ace0-fbb531ad65f3
This commit is contained in:
@@ -1515,6 +1515,9 @@ static int __ast_play_and_record(struct ast_channel *chan, const char *playfile,
|
||||
case AST_RECORD_IF_EXISTS_APPEND:
|
||||
ioflags |= O_APPEND;
|
||||
break;
|
||||
case AST_RECORD_IF_EXISTS_ERROR:
|
||||
ast_assert(0);
|
||||
break;
|
||||
}
|
||||
|
||||
if (silencethreshold < 0) {
|
||||
|
16
main/cel.c
16
main/cel.c
@@ -284,7 +284,7 @@ static struct aco_type *general_options[] = ACO_TYPES(&general_option);
|
||||
* \brief Map of ast_cel_event_type to strings
|
||||
*/
|
||||
static const char * const cel_event_types[CEL_MAX_EVENT_IDS] = {
|
||||
[0] = "ALL",
|
||||
[AST_CEL_ALL] = "ALL",
|
||||
[AST_CEL_CHANNEL_START] = "CHAN_START",
|
||||
[AST_CEL_CHANNEL_END] = "CHAN_END",
|
||||
[AST_CEL_ANSWER] = "ANSWER",
|
||||
@@ -524,16 +524,13 @@ enum ast_cel_event_type ast_cel_str_to_event_type(const char *name)
|
||||
unsigned int i;
|
||||
|
||||
for (i = 0; i < ARRAY_LEN(cel_event_types); i++) {
|
||||
if (!cel_event_types[i]) {
|
||||
continue;
|
||||
}
|
||||
|
||||
if (!strcasecmp(name, cel_event_types[i])) {
|
||||
if (cel_event_types[i] && !strcasecmp(name, cel_event_types[i])) {
|
||||
return i;
|
||||
}
|
||||
}
|
||||
|
||||
return -1;
|
||||
ast_log(LOG_ERROR, "Unknown event name '%s'\n", name);
|
||||
return AST_CEL_INVALID_VALUE;
|
||||
}
|
||||
|
||||
static int ast_cel_track_event(enum ast_cel_event_type et)
|
||||
@@ -563,11 +560,10 @@ static int events_handler(const struct aco_option *opt, struct ast_variable *var
|
||||
|
||||
event_type = ast_cel_str_to_event_type(cur_event);
|
||||
|
||||
if (event_type == 0) {
|
||||
if (event_type == AST_CEL_ALL) {
|
||||
/* All events */
|
||||
cfg->events = (int64_t) -1;
|
||||
} else if (event_type == -1) {
|
||||
ast_log(LOG_ERROR, "Unknown event name '%s'\n", cur_event);
|
||||
} else if (event_type == AST_CEL_INVALID_VALUE) {
|
||||
return -1;
|
||||
} else {
|
||||
cfg->events |= ((int64_t) 1 << event_type);
|
||||
|
@@ -257,7 +257,7 @@ struct ebl_context {
|
||||
static int ebl_callback(void *context, unsigned char *answer, int len, unsigned char *fullanswer)
|
||||
{
|
||||
struct ebl_context *c = context;
|
||||
unsigned int i;
|
||||
int i;
|
||||
|
||||
c->pos = 0; /* default to empty */
|
||||
c->separator[0] = 0;
|
||||
|
@@ -199,7 +199,7 @@ const char *ast_event_get_type_name(const struct ast_event *event)
|
||||
|
||||
type = ast_event_get_type(event);
|
||||
|
||||
if (type < 0 || type >= ARRAY_LEN(event_names)) {
|
||||
if (type >= ARRAY_LEN(event_names)) {
|
||||
ast_log(LOG_ERROR, "Invalid event type - '%u'\n", type);
|
||||
return "";
|
||||
}
|
||||
|
@@ -359,14 +359,13 @@ int ast_playtones_start(struct ast_channel *chan, int vol, const char *playlst,
|
||||
|
||||
if (tone_data.midinote) {
|
||||
/* midi notes must be between 0 and 127 */
|
||||
|
||||
if (tone_data.freq1 >= 0 && tone_data.freq1 <= 127) {
|
||||
if (tone_data.freq1 <= 127) {
|
||||
tone_data.freq1 = midi_tohz[tone_data.freq1];
|
||||
} else {
|
||||
tone_data.freq1 = 0;
|
||||
}
|
||||
|
||||
if (tone_data.freq2 >= 0 && tone_data.freq2 <= 127) {
|
||||
if (tone_data.freq2 <= 127) {
|
||||
tone_data.freq2 = midi_tohz[tone_data.freq2];
|
||||
} else {
|
||||
tone_data.freq2 = 0;
|
||||
|
@@ -323,7 +323,7 @@ static void do_presence_state_change(const char *provider)
|
||||
|
||||
state = ast_presence_state_helper(provider, &subtype, &message, 0);
|
||||
|
||||
if (state < 0) {
|
||||
if (state == AST_PRESENCE_INVALID) {
|
||||
return;
|
||||
}
|
||||
|
||||
|
@@ -886,7 +886,7 @@ const char *ast_security_event_severity_get_name(
|
||||
|
||||
static int check_event_type(const enum ast_security_event_type event_type)
|
||||
{
|
||||
if (event_type < 0 || event_type >= AST_SECURITY_EVENT_NUM_TYPES) {
|
||||
if (event_type >= AST_SECURITY_EVENT_NUM_TYPES) {
|
||||
ast_log(LOG_ERROR, "Invalid security event type %u\n", event_type);
|
||||
return -1;
|
||||
}
|
||||
@@ -1172,7 +1172,7 @@ return_error:
|
||||
|
||||
int ast_security_event_report(const struct ast_security_event_common *sec)
|
||||
{
|
||||
if (sec->event_type < 0 || sec->event_type >= AST_SECURITY_EVENT_NUM_TYPES) {
|
||||
if (sec->event_type >= AST_SECURITY_EVENT_NUM_TYPES) {
|
||||
ast_log(LOG_ERROR, "Invalid security event type\n");
|
||||
return -1;
|
||||
}
|
||||
|
@@ -362,8 +362,7 @@ static int encode_open_type(const struct ast_udptl *udptl, uint8_t *buf, unsigne
|
||||
}
|
||||
/* Encode the open type */
|
||||
for (octet_idx = 0; ; num_octets -= enclen, octet_idx += enclen) {
|
||||
if ((enclen = encode_length(buf, len, num_octets)) < 0)
|
||||
return -1;
|
||||
enclen = encode_length(buf, len, num_octets);
|
||||
if (enclen + *len > buflen) {
|
||||
ast_log(LOG_ERROR, "UDPTL (%s): Buffer overflow detected (%u + %u > %u)\n",
|
||||
LOG_TAG(udptl), enclen, *len, buflen);
|
||||
@@ -646,8 +645,7 @@ static int udptl_build_packet(struct ast_udptl *s, uint8_t *buf, unsigned int bu
|
||||
buf[len++] = 0x00;
|
||||
/* The number of entries will always be zero, so it is pointless allowing
|
||||
for the fragmented case here. */
|
||||
if (encode_length(buf, &len, 0) < 0)
|
||||
return -1;
|
||||
encode_length(buf, &len, 0);
|
||||
break;
|
||||
case UDPTL_ERROR_CORRECTION_REDUNDANCY:
|
||||
/* Encode the error recovery type */
|
||||
@@ -658,8 +656,7 @@ static int udptl_build_packet(struct ast_udptl *s, uint8_t *buf, unsigned int bu
|
||||
entries = s->tx_seq_no;
|
||||
/* The number of entries will always be small, so it is pointless allowing
|
||||
for the fragmented case here. */
|
||||
if (encode_length(buf, &len, entries) < 0)
|
||||
return -1;
|
||||
encode_length(buf, &len, entries);
|
||||
/* Encode the elements */
|
||||
for (i = 0; i < entries; i++) {
|
||||
j = (entry - i - 1) & UDPTL_BUF_MASK;
|
||||
|
Reference in New Issue
Block a user