diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/CryptoManager.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/CryptoManager.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/CryptoManager.c 2011-08-10 16:21:30.609765000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/CryptoManager.c 2011-08-11 17:54:57.255176000 -0700
@@ -55,7 +55,7 @@
#include "pk11util.h"
-#if defined(AIX) || defined(HPUX) || defined(LINUX)
+#if defined(AIX) || defined(HPUX)
#include <signal.h>
#endif
@@ -90,11 +90,11 @@ const char * jss_sccsid() {
/********************************************************************/
/* JSS_VERSION from mozilla/security/jss/org/mozilla/jss/util/jssver.h */
-static const char* DLL_JSS_VERSION = "JSS_VERSION = " JSS_VERSION;
+static const char* VARIABLE_MAY_NOT_BE_USED DLL_JSS_VERSION = "JSS_VERSION = " JSS_VERSION;
/* NSS_VERSION from mozilla/security/nss/lib/nss/nss.h */
-static const char* DLL_NSS_VERSION = "NSS_VERSION = " NSS_VERSION;
+static const char* VARIABLE_MAY_NOT_BE_USED DLL_NSS_VERSION = "NSS_VERSION = " NSS_VERSION;
/* NSPR_version from mozilla/nsprpub/pr/include/prinit.h */
-static const char* DLL_NSPR_VERSION = "NSPR_VERSION = " PR_VERSION;
+static const char* VARIABLE_MAY_NOT_BE_USED DLL_NSPR_VERSION = "NSPR_VERSION = " PR_VERSION;
@@ -106,13 +106,13 @@ static char*
getPWFromCallback(PK11SlotInfo *slot, PRBool retry, void *arg);
/*************************************************************
- * AIX, HP, and Linux signal handling madness
+ * AIX and HP signal handling madness
*
* In order for the JVM, kernel, and NSPR to work together, we setup
* a signal handler for SIGCHLD that does nothing. This is only done
- * on AIX, HP, and Linux.
+ * on AIX and HP.
*************************************************************/
-#if defined(AIX) || defined(HPUX) || defined(LINUX)
+#if defined(AIX) || defined(HPUX)
static PRStatus
handleSigChild(JNIEnv *env) {
@@ -333,8 +333,6 @@ Java_org_mozilla_jss_CryptoManager_initi
jboolean initializeJavaOnly )
{
SECStatus rv = SECFailure;
- JavaVM *VMs[5];
- jint numVMs;
char *szConfigDir = NULL;
char *szCertPrefix = NULL;
char *szKeyPrefix = NULL;
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/PK11Finder.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/PK11Finder.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/PK11Finder.c 2011-08-10 16:21:30.849767000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/PK11Finder.c 2011-08-10 18:22:37.887077000 -0700
@@ -263,7 +263,7 @@ JNIEXPORT jobject JNICALL
Java_org_mozilla_jss_CryptoManager_findPrivKeyByCertNative
(JNIEnv *env, jobject this, jobject Cert)
{
- PRThread *pThread;
+ PRThread * VARIABLE_MAY_NOT_BE_USED pThread=NULL;
CERTCertificate *cert;
PK11SlotInfo *slot;
SECKEYPrivateKey *privKey=NULL;
@@ -458,7 +458,7 @@ JNIEXPORT jobjectArray JNICALL
Java_org_mozilla_jss_CryptoManager_buildCertificateChainNative
(JNIEnv *env, jobject this, jobject leafCert)
{
- PRThread *pThread;
+ PRThread * VARIABLE_MAY_NOT_BE_USED pThread=NULL;
CERTCertificate *leaf;
jobjectArray chainArray=NULL;
CERTCertDBHandle *certdb;
@@ -812,7 +812,7 @@ Java_org_mozilla_jss_CryptoManager_impor
SECItem *derCerts=NULL;
int certi= -1;
SECItem theDerCert;
- int numCerts;
+ int numCerts = 0;
jbyte *packageBytes=NULL;
jsize packageLen;
SECStatus status;
@@ -1486,7 +1486,7 @@ Java_org_mozilla_jss_CryptoManager_impor
CERTSignedCrl *crl = NULL;
SECItem *packageItem = NULL;
int status = SECFailure;
- char *url;
+ char *url = NULL;
char *errmsg = NULL;
/***************************************************
@@ -1651,7 +1651,7 @@ JNIEXPORT jint JNICALL
Java_org_mozilla_jss_CryptoManager_verifyCertificateNowCUNative(JNIEnv *env,
jobject self, jstring nickString, jboolean checkSig)
{
- SECStatus rv = SECFailure;
+ SECStatus VARIABLE_MAY_NOT_BE_USED rv = SECFailure;
SECCertificateUsage currUsage = 0x0000;
rv = verifyCertificateNow(env, self, nickString, checkSig, 0, &currUsage);
@@ -1736,7 +1736,6 @@ Java_org_mozilla_jss_CryptoManager_verif
SECStatus rv = SECFailure;
SECCertUsage certUsage;
SECItem *derCerts[2];
- SECStatus status;
CERTCertificate **certArray = NULL;
CERTCertDBHandle *certdb = CERT_GetDefaultCertDB();
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/SecretDecoderRing/KeyManager.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/SecretDecoderRing/KeyManager.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/SecretDecoderRing/KeyManager.c 2003-12-19 11:36:30.000000000 -0800
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/SecretDecoderRing/KeyManager.c 2011-08-10 16:58:52.527501000 -0700
@@ -358,7 +358,6 @@ Java_org_mozilla_jss_SecretDecoderRing_K
{
PK11SlotInfo *slot = NULL;
PK11SymKey *symk = NULL;
- SECStatus status;
/* get the slot */
if( JSS_PK11_getTokenSlotPtr(env, tokenObj, &slot) != PR_SUCCESS ) {
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/crypto/PQGParams.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/crypto/PQGParams.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/crypto/PQGParams.c 2004-04-25 08:02:21.000000000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/crypto/PQGParams.c 2011-08-11 09:40:34.001421000 -0700
@@ -371,7 +371,7 @@ Java_org_mozilla_jss_crypto_PQGParams_pa
/***********************************************************************
* Perform the verification.
*/
- if( PK11_PQG_VerifyParams(pParams, pVfy, &verifyResult) != PR_SUCCESS) {
+ if( PK11_PQG_VerifyParams(pParams, pVfy, &verifyResult) != SECSuccess) {
JSS_throw(env, OUT_OF_MEMORY_ERROR);
goto finish;
}
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Cert.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Cert.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Cert.c 2004-04-25 08:02:22.000000000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Cert.c 2011-08-10 18:30:07.942629000 -0700
@@ -62,7 +62,7 @@
JNIEXPORT jbyteArray JNICALL Java_org_mozilla_jss_pkcs11_PK11Cert_getEncoded
(JNIEnv *env, jobject this)
{
- PRThread *pThread;
+ PRThread * VARIABLE_MAY_NOT_BE_USED pThread;
CERTCertificate *cert;
SECItem *derCert;
jbyteArray derArray=NULL;
@@ -118,9 +118,9 @@ finish:
JNIEXPORT jint JNICALL Java_org_mozilla_jss_pkcs11_PK11Cert_getVersion
(JNIEnv *env, jobject this)
{
- PRThread *pThread;
+ PRThread * VARIABLE_MAY_NOT_BE_USED pThread;
CERTCertificate *cert;
- long lVersion;
+ long lVersion = 0;
pThread = PR_AttachThread(PR_SYSTEM_THREAD, 0, NULL);
PR_ASSERT(pThread != NULL);
@@ -165,7 +165,7 @@ Java_org_mozilla_jss_pkcs11_PK11Cert_get
{
CERTCertificate *cert;
SECKEYPublicKey *pubk=NULL;
- PRThread *pThread;
+ PRThread * VARIABLE_MAY_NOT_BE_USED pThread;
jobject pubKey=NULL;
PR_ASSERT(env!=NULL && this!=NULL);
@@ -210,7 +210,7 @@ Java_org_mozilla_jss_pkcs11_CertProxy_re
(JNIEnv *env, jobject this)
{
CERTCertificate *cert;
- PRThread *pThread;
+ PRThread * VARIABLE_MAY_NOT_BE_USED pThread;
PR_ASSERT(env!=NULL && this!=NULL);
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Cipher.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Cipher.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Cipher.c 2004-04-25 08:02:22.000000000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Cipher.c 2011-08-10 16:42:43.822494000 -0700
@@ -73,7 +73,7 @@ Java_org_mozilla_jss_pkcs11_PK11Cipher_i
SECItem *iv=NULL;
PK11Context *context=NULL;
CK_ATTRIBUTE_TYPE op;
- jobject contextObj;
+ jobject contextObj = NULL;
PR_ASSERT(env!=NULL && clazz!=NULL && keyObj!=NULL && algObj!=NULL);
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11KeyGenerator.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11KeyGenerator.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11KeyGenerator.c 2005-11-14 14:15:06.000000000 -0800
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11KeyGenerator.c 2011-08-11 09:23:03.220470000 -0700
@@ -207,7 +207,7 @@ finish:
}
#endif
-static void
+static void FUNCTION_MAY_NOT_BE_USED
print_secitem(SECItem *item) {
int i;
int online;
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11KeyPairGenerator.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11KeyPairGenerator.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11KeyPairGenerator.c 2011-08-10 16:21:30.270767000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11KeyPairGenerator.c 2011-08-10 18:33:11.773445000 -0700
@@ -450,7 +450,7 @@ DumpItem(SECItem *item)
for (i=0; i < item->len; i++) {
printf(" %02x",data[i]);
}
- printf(" : 0x%08x %d\n", data, item->len);
+ printf(" : %8p %d\n", data, item->len);
}
/**********************************************************************
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11KeyWrapper.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11KeyWrapper.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11KeyWrapper.c 2006-02-22 17:21:42.000000000 -0800
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11KeyWrapper.c 2011-08-10 16:52:03.052910000 -0700
@@ -562,7 +562,7 @@ Java_org_mozilla_jss_pkcs11_PK11KeyWrapp
jint keyLen, jbyteArray ivBA, jint usageEnum)
{
PK11SymKey *symKey=NULL;
- CK_MECHANISM_TYPE wrappingMech, keyTypeMech;
+ CK_MECHANISM_TYPE wrappingMech=0, keyTypeMech=0;
SECItem *wrappedKey=NULL, *iv=NULL, *param=NULL;
jobject keyObj=NULL;
SECKEYPrivateKey *wrappingKey=NULL;
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11MessageDigest.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11MessageDigest.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11MessageDigest.c 2004-04-25 08:02:22.000000000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11MessageDigest.c 2011-08-10 16:52:54.951857000 -0700
@@ -88,7 +88,6 @@ Java_org_mozilla_jss_pkcs11_PK11MessageD
PK11Context *context = NULL;
CK_MECHANISM_TYPE mech;
SECItem param;
- PK11SlotInfo *slot=NULL;
jobject contextObj=NULL;
mech = JSS_getPK11MechFromAlg(env, algObj);
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Module.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Module.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Module.c 2007-02-23 09:40:21.000000000 -0800
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Module.c 2011-08-10 16:53:28.788823000 -0700
@@ -254,7 +254,7 @@ Java_org_mozilla_jss_pkcs11_ModuleProxy_
{
SECMODModule *module;
- if (JSS_getPtrFromProxy(env, this, &module) != PR_SUCCESS) {
+ if (JSS_getPtrFromProxy(env, this, (void **)&module) != PR_SUCCESS) {
ASSERT_OUTOFMEM(env);
goto finish;
}
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11PrivKey.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11PrivKey.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11PrivKey.c 2006-04-24 18:26:42.000000000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11PrivKey.c 2011-08-10 18:34:20.954376000 -0700
@@ -174,7 +174,7 @@ JNIEXPORT jobject JNICALL
Java_org_mozilla_jss_pkcs11_PK11PrivKey_getKeyType
(JNIEnv *env, jobject this)
{
- PRThread *pThread;
+ PRThread * VARIABLE_MAY_NOT_BE_USED pThread;
SECKEYPrivateKey *privk;
KeyType keyType;
char* keyTypeFieldName;
@@ -259,7 +259,7 @@ Java_org_mozilla_jss_pkcs11_PrivateKeyPr
(JNIEnv *env, jobject this)
{
SECKEYPrivateKey *privk;
- PRThread *pThread;
+ PRThread * VARIABLE_MAY_NOT_BE_USED pThread;
PR_ASSERT(env!=NULL && this!=NULL);
@@ -358,7 +358,6 @@ Java_org_mozilla_jss_pkcs11_PK11PrivKey_
(JNIEnv *env, jobject this)
{
SECKEYPrivateKey *key = NULL;
- PK11SlotInfo *slot = NULL;
SECItem *idItem = NULL;
jbyteArray byteArray = NULL;
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11PubKey.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11PubKey.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11PubKey.c 2006-02-22 17:21:42.000000000 -0800
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11PubKey.c 2011-08-10 18:35:04.390333000 -0700
@@ -62,7 +62,7 @@ JNIEXPORT void JNICALL Java_org_mozilla_
(JNIEnv *env, jobject this)
{
SECKEYPublicKey *pubk;
- PRThread *pThread;
+ PRThread * VARIABLE_MAY_NOT_BE_USED pThread;
PR_ASSERT(env!=NULL && this!=NULL);
@@ -179,7 +179,7 @@ JNIEXPORT void JNICALL
Java_org_mozilla_jss_pkcs11_PK11PubKey_verifyKeyIsOnToken
(JNIEnv *env, jobject this, jobject token)
{
- PRThread *pThread;
+ PRThread * VARIABLE_MAY_NOT_BE_USED pThread;
SECKEYPublicKey *key = NULL;
PK11SlotInfo *slot = NULL;
PK11SlotInfo *keySlot = NULL;
@@ -231,7 +231,7 @@ JNIEXPORT jobject JNICALL
Java_org_mozilla_jss_pkcs11_PK11PubKey_getKeyType
(JNIEnv *env, jobject this)
{
- PRThread *pThread;
+ PRThread * VARIABLE_MAY_NOT_BE_USED pThread;
SECKEYPublicKey *pubk;
KeyType keyType;
char* keyTypeFieldName;
@@ -454,7 +454,7 @@ get_public_key_info
{
SECKEYPublicKey *pubk;
jbyteArray byteArray=NULL;
- SECItem *item;
+ SECItem *item=NULL;
PR_ASSERT(env!=NULL && this!=NULL);
@@ -526,7 +526,6 @@ pubkFromRaw(JNIEnv *env, CK_KEY_TYPE typ
{
jobject pubkObj=NULL;
SECKEYPublicKey *pubk=NULL;
- SECStatus rv;
SECItem *pubkDER=NULL;
/* validate args */
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11SecureRandom.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11SecureRandom.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11SecureRandom.c 2005-01-28 11:16:11.000000000 -0800
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11SecureRandom.c 2011-08-10 18:36:05.252271000 -0700
@@ -112,7 +112,7 @@ Java_org_mozilla_jss_pkcs11_PK11SecureRa
* "C" data members
*/
- PRThread* pThread = NULL;
+ PRThread* VARIABLE_MAY_NOT_BE_USED pThread = NULL;
SECStatus status = PR_FALSE;
PK11SlotInfo* slot = NULL;
@@ -262,7 +262,7 @@ Java_org_mozilla_jss_pkcs11_PK11SecureRa
* "C" data members
*/
- PRThread* pThread = NULL;
+ PRThread* VARIABLE_MAY_NOT_BE_USED pThread = NULL;
SECStatus status = PR_FALSE;
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Store.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Store.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Store.c 2006-04-03 16:09:49.000000000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Store.c 2011-08-10 18:38:12.365145000 -0700
@@ -319,7 +319,7 @@ Java_org_mozilla_jss_pkcs11_PK11Store_de
(JNIEnv *env, jobject this, jobject certObject)
{
CERTCertificate *cert;
- SECStatus status;
+ SECStatus VARIABLE_MAY_NOT_BE_USED status;
PR_ASSERT(env!=NULL && this!=NULL);
if(certObject == NULL) {
@@ -349,7 +349,7 @@ Java_org_mozilla_jss_pkcs11_PK11Store_de
(JNIEnv *env, jobject this, jobject certObject)
{
CERTCertificate *cert;
- SECStatus status;
+ SECStatus VARIABLE_MAY_NOT_BE_USED status;
PR_ASSERT(env!=NULL && this!=NULL);
if(certObject == NULL) {
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11SymKey.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11SymKey.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11SymKey.c 2004-04-25 08:02:22.000000000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11SymKey.c 2011-08-11 09:42:52.967282000 -0700
@@ -233,7 +233,7 @@ Java_org_mozilla_jss_pkcs11_PK11SymKey_g
jfieldID typeField=NULL;
jobject typeObject=NULL;
- if( JSS_PK11_getSymKeyPtr(env, this, &key) != SECSuccess ) {
+ if( JSS_PK11_getSymKeyPtr(env, this, &key) != PR_SUCCESS ) {
ASSERT_OUTOFMEM(env);
goto finish;
}
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Token.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Token.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Token.c 2007-11-09 16:37:57.000000000 -0800
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/pkcs11/PK11Token.c 2011-08-10 18:38:52.421104000 -0700
@@ -961,9 +961,9 @@ JNIEXPORT jstring JNICALL Java_org_mozil
jstring keyType, jbyteArray P, jbyteArray Q, jbyteArray G)
{
PK11SlotInfo *slot;
- const char* c_subject;
+ const char* c_subject=NULL;
jboolean isCopy;
- unsigned char *b64request;
+ unsigned char *b64request=NULL;
SECItem p, q, g;
PQGParams *dsaParams=NULL;
const char* c_keyType;
@@ -1080,7 +1080,7 @@ GenerateCertRequest(JNIEnv *env,
SECStatus rv;
PRArenaPool *arena;
SECItem result_der, result;
- SECItem *blob;
+ SECItem * VARIABLE_MAY_NOT_BE_USED blob;
CK_MECHANISM_TYPE signMech;
CK_MECHANISM_TYPE keygenMech;
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/provider/java/security/JSSKeyStoreSpi.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/provider/java/security/JSSKeyStoreSpi.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/provider/java/security/JSSKeyStoreSpi.c 2003-09-24 15:20:05.000000000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/provider/java/security/JSSKeyStoreSpi.c 2011-08-10 16:57:42.991570000 -0700
@@ -89,7 +89,6 @@ traverseTokenObjects
SECKEYPublicKeyList* pubkList = NULL;
PK11SymKey *symKey = NULL;
CERTCertList *certList = NULL;
- SECStatus secstat;
/*
* Get all private keys
@@ -508,7 +507,6 @@ lookupCertByNickname(JNIEnv *env, jobjec
{
PK11SlotInfo *slot;
EngineGetCertificateCBInfo cbinfo = {NULL,NULL};
- jbyteArray derCertBA = NULL;
PRStatus status = PR_FAILURE;
if( alias == NULL ) goto finish;
@@ -813,7 +811,6 @@ Java_org_mozilla_jss_provider_java_secur
PK11SlotInfo *slot;
EngineGetCertificateCBInfo cbinfo = {NULL,NULL};
jboolean retVal = JNI_FALSE;
- SECKEYPrivateKey *privk = NULL;
if( alias == NULL ) goto finish;
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/SSLSocket.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/SSLSocket.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/SSLSocket.c 2011-08-10 16:21:30.395765000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/SSLSocket.c 2011-08-10 17:05:15.363117000 -0700
@@ -397,7 +397,7 @@ Java_org_mozilla_jss_ssl_SSLSocket_getSo
{
PRSocketOptionData sockOptions;
JSSL_SocketData *sock = NULL;
- jint retval;
+ jint retval=-1;
PRStatus status;
if( JSSL_getSockData(env, self, &sock) != PR_SUCCESS ) {
@@ -874,7 +874,7 @@ JNIEXPORT jint JNICALL
Java_org_mozilla_jss_ssl_SSLSocket_socketAvailable(
JNIEnv *env, jobject self)
{
- jint available;
+ jint available=0;
JSSL_SocketData *sock = NULL;
if( JSSL_getSockData(env, self, &sock) != PR_SUCCESS ) {
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/common.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/common.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/common.c 2011-08-10 16:21:30.434766000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/common.c 2011-08-11 09:44:12.310202000 -0700
@@ -64,7 +64,7 @@ JSSL_throwSSLSocketException(JNIEnv *env
jmethodID excepCons;
jobject excepObj;
jstring msgString;
- jint result;
+ jint VARIABLE_MAY_NOT_BE_USED result;
/*
* get the error code and error string
@@ -149,8 +149,8 @@ Java_org_mozilla_jss_ssl_SocketBase_sock
jbyteArray sdArray = NULL;
JSSL_SocketData *sockdata = NULL;
SECStatus status;
- PRFileDesc *newFD;
- PRFileDesc *tmpFD;
+ PRFileDesc *newFD = NULL;
+ PRFileDesc *tmpFD = NULL;
PRFilePrivate *priv = NULL;
int socketFamily = 0;
@@ -627,7 +627,7 @@ Java_org_mozilla_jss_ssl_SocketBase_getS
SECStatus status = SECSuccess;
PRBool bOption = PR_FALSE;
- if( JSSL_getSockData(env, self, &sock) != SECSuccess ) {
+ if( JSSL_getSockData(env, self, &sock) != PR_SUCCESS ) {
goto finish;
}
@@ -649,7 +649,7 @@ JSSL_getSockAddr
(JNIEnv *env, jobject self, PRNetAddr *addr, LocalOrPeer localOrPeer)
{
JSSL_SocketData *sock = NULL;
- PRStatus status;
+ PRStatus status=PR_FAILURE;
/* get my fd */
if( JSSL_getSockData(env, self, &sock) != PR_SUCCESS ) {
@@ -893,7 +893,7 @@ JSS_SSL_processExceptions(JNIEnv *env, P
finish:
if( currentExcep != NULL && (*env)->ExceptionOccurred(env) == NULL) {
- int ret = (*env)->Throw(env, currentExcep);
+ int VARIABLE_MAY_NOT_BE_USED ret = (*env)->Throw(env, currentExcep);
PR_ASSERT(ret == 0);
}
}
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/javasock.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/javasock.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/javasock.c 2011-08-10 16:21:30.446765000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/ssl/javasock.c 2011-08-10 17:03:48.769206000 -0700
@@ -92,7 +92,7 @@ writebuf(JNIEnv *env, PRFileDesc *fd, jo
jmethodID getOutputStream, writeMethod;
jclass sockClass, osClass;
jobject outputStream;
- jint arrayLen;
+ jint arrayLen=-1;
PRInt32 retval;
/*
@@ -211,7 +211,7 @@ jsock_write(PRFileDesc *fd, const PRIOVe
jobject sockObj;
JNIEnv *env;
jbyteArray outbufArray;
- PRInt32 retval;
+ PRInt32 retval=-1;
if( GET_ENV(fd->secret->javaVM, env) ) goto finish;
@@ -500,7 +500,7 @@ static PRInt32
jsock_recv(PRFileDesc *fd, void *buf, PRInt32 amount,
PRIntn flags, PRIntervalTime timeout)
{
- PRInt32 retval;
+ PRInt32 retval=-1;
JNIEnv *env;
jobject sockObj;
jbyteArray byteArray;
@@ -637,7 +637,7 @@ getIntProperty(JNIEnv *env, jobject sock
{
jclass sockClass;
jmethodID method;
- jint retval;
+ jint retval=0;
sockClass = (*env)->GetObjectClass(env, sock);
if( sockClass == NULL ) goto finish;
@@ -1001,12 +1001,6 @@ static const PRIOMethods jsockMethods =
(PRReservedFN) invalidInt
};
-static const PRIOMethods*
-getJsockMethods()
-{
- return &jsockMethods;
-}
-
static void
jsockDestructor(PRFileDesc *fd)
{
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/util/jssutil.c alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/util/jssutil.c
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/util/jssutil.c 2004-04-25 08:02:29.000000000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/util/jssutil.c 2011-08-10 18:24:58.470937000 -0700
@@ -115,7 +115,7 @@ void
JSS_throwMsg(JNIEnv *env, char *throwableClassName, char *message) {
jclass throwableClass;
- jint result;
+ jint VARIABLE_MAY_NOT_BE_USED result;
/* validate arguments */
PR_ASSERT(env!=NULL && throwableClassName!=NULL && message!=NULL);
@@ -156,7 +156,7 @@ JSS_throw(JNIEnv *env, char *throwableCl
jclass throwableClass;
jobject throwable;
jmethodID constructor;
- jint result;
+ jint VARIABLE_MAY_NOT_BE_USED result;
PR_ASSERT( (*env)->ExceptionOccurred(env) == NULL );
@@ -222,7 +222,9 @@ JSS_throw(JNIEnv *env, char *throwableCl
PRStatus
JSS_getPtrFromProxy(JNIEnv *env, jobject nativeProxy, void **ptr)
{
+#ifdef DEBUG
jclass nativeProxyClass;
+#endif
jclass proxyClass;
jfieldID byteArrayField;
jbyteArray byteArray;
@@ -745,7 +747,7 @@ JSS_trace(JNIEnv *env, jint level, char
void
JSS_assertOutOfMem(JNIEnv *env)
{
- jclass memErrClass;
+ jclass VARIABLE_MAY_NOT_BE_USED memErrClass;
jthrowable excep;
PR_ASSERT(env != NULL);
@@ -804,7 +806,7 @@ JSS_SECItemToByteArray(JNIEnv *env, SECI
goto finish;
}
- (*env)->SetByteArrayRegion(env, array, 0, item->len, item->data);
+ (*env)->SetByteArrayRegion(env, array, 0, item->len, (jbyte*)item->data);
finish:
return array;
diff -rupN patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/util/jssutil.h alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/util/jssutil.h
--- patched-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/util/jssutil.h 2004-04-25 08:02:29.000000000 -0700
+++ alt-jss-4.2.6/mozilla/security/jss/org/mozilla/jss/util/jssutil.h 2011-08-11 18:12:56.926098000 -0700
@@ -36,6 +36,19 @@
#ifndef JSS_NATIVE_UTIL_H
#define JSS_NATIVE_UTIL_H
+/* The following #defines are used to suppress undesired compiler warnings
+ * that have been deemed inappropriate.
+ *
+ * IMPORTANT: These are ONLY used on an "as-needed" basis!
+ */
+#ifdef __GNUC__
+#define FUNCTION_MAY_NOT_BE_USED __attribute__ ((unused))
+#define VARIABLE_MAY_NOT_BE_USED __attribute__ ((unused))
+#else
+#define FUNCTION_MAY_NOT_BE_USED
+#define VARIABLE_MAY_NOT_BE_USED
+#endif
+
/* Need to include these first.
* #include <nspr.h>
* #include <jni.h>