172c9065c1e6d94aabd25f63b238f17b9a51bffc braney Tue Jul 12 08:49:47 2016 -0700 fix some compiler warnings in htslib diff --git src/htslib/sam.c src/htslib/sam.c index 09ced51..0508aca 100644 --- src/htslib/sam.c +++ src/htslib/sam.c @@ -103,31 +103,31 @@ h->target_len = (uint32_t*)malloc(sizeof(uint32_t) * h->n_targets); h->target_name = (char**)malloc(sizeof(char*) * h->n_targets); for (k = kh_begin(d); k != kh_end(d); ++k) { if (!kh_exist(d, k)) continue; h->target_name[kh_val(d, k)>>32] = (char*)kh_key(d, k); h->target_len[kh_val(d, k)>>32] = kh_val(d, k)<<32>>32; kh_val(d, k) >>= 32; } return h; } bam_hdr_t *bam_hdr_read(BGZF *fp) { bam_hdr_t *h; char buf[4]; - int magic_len, has_EOF; + int magic_len; // has_EOF; int32_t i, name_len, num_names = 0; size_t bufsize; ssize_t bytes; #ifndef UCSC_CRAM // check EOF has_EOF = bgzf_check_EOF(fp); if (has_EOF < 0) { perror("[W::bam_hdr_read] bgzf_check_EOF"); } else if (has_EOF == 0 && hts_verbose >= 2) fprintf(stderr, "[W::%s] EOF marker is absent. The input is probably truncated.\n", __func__); #endif // read "BAM1" magic_len = bgzf_read(fp, buf, 4); if (magic_len != 4 || strncmp(buf, "BAM\1", 4)) { if (hts_verbose >= 1) fprintf(stderr, "[E::%s] invalid BAM binary header\n", __func__);