diff options
Diffstat (limited to 'pki/base/util/src/netscape/security')
8 files changed, 9 insertions, 18 deletions
diff --git a/pki/base/util/src/netscape/security/acl/OwnerImpl.java b/pki/base/util/src/netscape/security/acl/OwnerImpl.java index 2e96cfaaa..3f47a1dd8 100644 --- a/pki/base/util/src/netscape/security/acl/OwnerImpl.java +++ b/pki/base/util/src/netscape/security/acl/OwnerImpl.java @@ -85,7 +85,7 @@ public class OwnerImpl implements Owner { // // check if there is atleast 2 members left. // - Object o = e.nextElement(); + e.nextElement(); // consume next element if (e.hasMoreElements()) return ownerGroup.removeMember(owner); else diff --git a/pki/base/util/src/netscape/security/pkcs/PKCS10.java b/pki/base/util/src/netscape/security/pkcs/PKCS10.java index b8c0aedc4..cb0e6edf4 100644 --- a/pki/base/util/src/netscape/security/pkcs/PKCS10.java +++ b/pki/base/util/src/netscape/security/pkcs/PKCS10.java @@ -141,10 +141,9 @@ public class PKCS10 { // // Inner sequence: version, name, key, attributes // - BigInt serial; - DerValue val; + @SuppressWarnings("unused") + BigInt serial = seq[0].data.getInteger(); // consume serial - serial = seq[0].data.getInteger(); /* if (serial.toInt () != 0) throw new IllegalArgumentException ("not PKCS #10 v1"); @@ -156,8 +155,6 @@ public class PKCS10 { subjectPublicKeyInfo = X509Key.parse(new DerValue(val1)); PublicKey publicKey = X509Key.parsePublicKey(new DerValue(val1)); - String keystr = subjectPublicKeyInfo.toString(); - // Cope with a somewhat common illegal PKCS #10 format if (seq[0].data.available() != 0) attributeSet = new PKCS10Attributes(seq[0].data); diff --git a/pki/base/util/src/netscape/security/pkcs/PKCS8Key.java b/pki/base/util/src/netscape/security/pkcs/PKCS8Key.java index 6fc89610a..7c5f64582 100644 --- a/pki/base/util/src/netscape/security/pkcs/PKCS8Key.java +++ b/pki/base/util/src/netscape/security/pkcs/PKCS8Key.java @@ -31,7 +31,6 @@ import java.security.Provider; import java.security.Security; import java.security.spec.InvalidKeySpecException; import java.security.spec.PKCS8EncodedKeySpec; -import java.util.Properties; import netscape.security.util.BigInt; import netscape.security.util.DerOutputStream; @@ -171,8 +170,6 @@ public class PKCS8Key implements PrivateKey { */ String classname = ""; try { - Properties props; - String keytype; Provider sunProvider; sunProvider = Security.getProvider("SUN"); diff --git a/pki/base/util/src/netscape/security/provider/SHA.java b/pki/base/util/src/netscape/security/provider/SHA.java index 5aed99264..42a6b8b90 100644 --- a/pki/base/util/src/netscape/security/provider/SHA.java +++ b/pki/base/util/src/netscape/security/provider/SHA.java @@ -112,7 +112,6 @@ public class SHA extends MessageDigestSpi implements Cloneable { */ public void engineUpdate(byte b[], int off, int len) { int word; - int offset; if ((off < 0) || (len < 0) || (off + len > b.length)) throw new ArrayIndexOutOfBoundsException(); @@ -179,7 +178,7 @@ public class SHA extends MessageDigestSpi implements Cloneable { byte hashvalue[] = new byte[SHA_LENGTH]; try { - int outLen = engineDigest(hashvalue, 0, hashvalue.length); + engineDigest(hashvalue, 0, hashvalue.length); } catch (DigestException e) { throw new InternalError(""); } diff --git a/pki/base/util/src/netscape/security/x509/IssuingDistributionPointExtension.java b/pki/base/util/src/netscape/security/x509/IssuingDistributionPointExtension.java index fc7e837ce..d5f5100bf 100644 --- a/pki/base/util/src/netscape/security/x509/IssuingDistributionPointExtension.java +++ b/pki/base/util/src/netscape/security/x509/IssuingDistributionPointExtension.java @@ -196,7 +196,9 @@ public class IssuingDistributionPointExtension extends Extension try { BitArray reasons = opt.getUnalignedBitString(); issuingDistributionPoint.setOnlySomeReasons(reasons); - byte[] a = reasons.toByteArray(); + + @SuppressWarnings("unused") + byte[] a = reasons.toByteArray(); // check for errors } catch (IOException e) { throw new IOException("Invalid encoding of IssuingDistributionPoint " + e); } diff --git a/pki/base/util/src/netscape/security/x509/LdapV3DNStrConverter.java b/pki/base/util/src/netscape/security/x509/LdapV3DNStrConverter.java index 52ff67017..1245cc6bd 100644 --- a/pki/base/util/src/netscape/security/x509/LdapV3DNStrConverter.java +++ b/pki/base/util/src/netscape/security/x509/LdapV3DNStrConverter.java @@ -108,8 +108,6 @@ public class LdapV3DNStrConverter extends LdapDNStrConverter { throws IOException { StringReader dn_reader = new StringReader(dn); PushbackReader in = new PushbackReader(dn_reader, 5); - Vector<RDN> rdnVector = new Vector<RDN>(); - RDN[] names; return parseDN(in, encodingOrder); } diff --git a/pki/base/util/src/netscape/security/x509/X509CertImpl.java b/pki/base/util/src/netscape/security/x509/X509CertImpl.java index d2d77cb3a..9c62b36a6 100755 --- a/pki/base/util/src/netscape/security/x509/X509CertImpl.java +++ b/pki/base/util/src/netscape/security/x509/X509CertImpl.java @@ -1195,7 +1195,8 @@ public class X509CertImpl extends X509Certificate */ protected Object readResolve() throws java.io.ObjectStreamException { try { - CertificateFactory cf = CertificateFactory.getInstance(type1); + @SuppressWarnings("unused") + CertificateFactory cf = CertificateFactory.getInstance(type1); // check for errors return new X509CertImpl(data1); /* diff --git a/pki/base/util/src/netscape/security/x509/X509Key.java b/pki/base/util/src/netscape/security/x509/X509Key.java index 546ce363e..a8253c0d8 100644 --- a/pki/base/util/src/netscape/security/x509/X509Key.java +++ b/pki/base/util/src/netscape/security/x509/X509Key.java @@ -30,7 +30,6 @@ import java.security.PublicKey; import java.security.Security; import java.security.spec.InvalidKeySpecException; import java.security.spec.X509EncodedKeySpec; -import java.util.Properties; import netscape.security.util.DerOutputStream; import netscape.security.util.DerValue; @@ -185,8 +184,6 @@ public class X509Key implements PublicKey { */ String classname = ""; try { - Properties props; - String keytype; Provider sunProvider; sunProvider = Security.getProvider("SUN"); |