172c9065c1e6d94aabd25f63b238f17b9a51bffc
braney
  Tue Jul 12 08:49:47 2016 -0700
fix some compiler warnings in htslib

diff --git src/htslib/sam.c src/htslib/sam.c
index 09ced51..0508aca 100644
--- src/htslib/sam.c
+++ src/htslib/sam.c
@@ -103,31 +103,31 @@
     h->target_len = (uint32_t*)malloc(sizeof(uint32_t) * h->n_targets);
     h->target_name = (char**)malloc(sizeof(char*) * h->n_targets);
     for (k = kh_begin(d); k != kh_end(d); ++k) {
         if (!kh_exist(d, k)) continue;
         h->target_name[kh_val(d, k)>>32] = (char*)kh_key(d, k);
         h->target_len[kh_val(d, k)>>32]  = kh_val(d, k)<<32>>32;
         kh_val(d, k) >>= 32;
     }
     return h;
 }
 
 bam_hdr_t *bam_hdr_read(BGZF *fp)
 {
     bam_hdr_t *h;
     char buf[4];
-    int magic_len, has_EOF;
+    int magic_len; // has_EOF;
     int32_t i, name_len, num_names = 0;
     size_t bufsize;
     ssize_t bytes;
 #ifndef UCSC_CRAM
     // check EOF
     has_EOF = bgzf_check_EOF(fp);
     if (has_EOF < 0) {
         perror("[W::bam_hdr_read] bgzf_check_EOF");
     } else if (has_EOF == 0 && hts_verbose >= 2)
         fprintf(stderr, "[W::%s] EOF marker is absent. The input is probably truncated.\n", __func__);
 #endif
     // read "BAM1"
     magic_len = bgzf_read(fp, buf, 4);
     if (magic_len != 4 || strncmp(buf, "BAM\1", 4)) {
         if (hts_verbose >= 1) fprintf(stderr, "[E::%s] invalid BAM binary header\n", __func__);