Task #39703 - jss-5.6.0-1.20250225182755609117.pr1035.7.g9120a83f/scan-results.err
back to task #39703download
Error: CPPCHECK_WARNING (CWE-401): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/PK11Finder.c:1969: error[memleak]: Memory leak: derCert # 1967| # 1968| if (cert == NULL) { # 1969|-> return NULL; # 1970| } # 1971| Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/PK11Finder.c: scope_hint: In function ‘Java_org_mozilla_jss_CryptoManager_importDERCertNative’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/PK11Finder.c:1976:19: warning[-Wanalyzer-possible-null-dereference]: dereference of possibly-NULL ‘derCert’ cc1: note: unrecognized command-line option ‘-Wno-unknown-warning-option’ may have been intended to silence earlier diagnostics # 1974| } # 1975| # 1976|-> derCert->type = siDERCertBuffer; # 1977| if (!JSS_RefByteArray(env, cert, (signed char **)&derCert->data, &derCertLen)) { # 1978| return NULL; Error: CPPCHECK_WARNING (CWE-401): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/PK11Finder.c:1978: error[memleak]: Memory leak: derCert # 1976| derCert->type = siDERCertBuffer; # 1977| if (!JSS_RefByteArray(env, cert, (signed char **)&derCert->data, &derCertLen)) { # 1978|-> return NULL; # 1979| } # 1980| Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/JSSOAEPParameterSpec.c:105: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: oaep_params # 103| # 104| oaep_params = calloc(1, sizeof(CK_RSA_PKCS_OAEP_PARAMS)); # 105|-> oaep_params->hashAlg = hashAlg; # 106| oaep_params->mgf = mgf; # 107| oaep_params->source = source; Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/JSSOAEPParameterSpec.c: scope_hint: In function ‘Java_org_mozilla_jss_crypto_JSSOAEPParameterSpec_acquireNativeResources’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/JSSOAEPParameterSpec.c:105:26: warning[-Wanalyzer-possible-null-dereference]: dereference of possibly-NULL ‘oaep_params’ cc1: note: unrecognized command-line option ‘-Wno-unknown-warning-option’ may have been intended to silence earlier diagnostics # 103| # 104| oaep_params = calloc(1, sizeof(CK_RSA_PKCS_OAEP_PARAMS)); # 105|-> oaep_params->hashAlg = hashAlg; # 106| oaep_params->mgf = mgf; # 107| oaep_params->source = source; Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/JSSOAEPParameterSpec.c:106: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: oaep_params # 104| oaep_params = calloc(1, sizeof(CK_RSA_PKCS_OAEP_PARAMS)); # 105| oaep_params->hashAlg = hashAlg; # 106|-> oaep_params->mgf = mgf; # 107| oaep_params->source = source; # 108| oaep_params->pSourceData = pSourceData; Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/JSSOAEPParameterSpec.c:107: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: oaep_params # 105| oaep_params->hashAlg = hashAlg; # 106| oaep_params->mgf = mgf; # 107|-> oaep_params->source = source; # 108| oaep_params->pSourceData = pSourceData; # 109| oaep_params->ulSourceDataLen = ulSourceDataLen; Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/JSSOAEPParameterSpec.c:108: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: oaep_params # 106| oaep_params->mgf = mgf; # 107| oaep_params->source = source; # 108|-> oaep_params->pSourceData = pSourceData; # 109| oaep_params->ulSourceDataLen = ulSourceDataLen; # 110| Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/JSSOAEPParameterSpec.c:109: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: oaep_params # 107| oaep_params->source = source; # 108| oaep_params->pSourceData = pSourceData; # 109|-> oaep_params->ulSourceDataLen = ulSourceDataLen; # 110| # 111| params_obj = JSS_PR_wrapStaticVoidPointer(env, (void **)&oaep_params); Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c: scope_hint: In function ‘kbkdf_WrapDataParam’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:85:17: warning[-Wanalyzer-possible-null-dereference]: dereference of possibly-NULL ‘param’ # 83| } # 84| # 85|-> param->type = (CK_PRF_DATA_TYPE)((*env)->GetLongField(env, this, field_id)); # 86| param->pValue = ptr; # 87| param->ulValueLen = ptr_length; Error: GCC_ANALYZER_WARNING (CWE-688): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:101:5: warning[-Wanalyzer-possible-null-argument]: use of possibly-NULL ‘param’ where non-null expected <built-in>: note: argument 1 of ‘__builtin_memset’ must be non-null # 99| # 100| failure: # 101|-> memset(param, 0, param_length); # 102| free(param); # 103| Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c: scope_hint: In function ‘Java_org_mozilla_jss_crypto_KBKDFDerivedKey_acquireNativeResourcesInternal’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:515:23: warning[-Wanalyzer-possible-null-dereference]: dereference of possibly-NULL ‘attrs’ # 513| } # 514| # 515|-> attrs[offset] = *attr; # 516| } # 517| Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c: scope_hint: In function ‘kbkdf_GetDataParameters’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:701:32: warning[-Wanalyzer-possible-null-dereference]: dereference of possibly-NULL ‘data_params’ # 699| PR_ASSERT(this_param_size == sizeof(CK_PRF_DATA_PARAM)); # 700| # 701|-> (*data_params)[offset] = *this_param; # 702| } # 703| Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c: scope_hint: In function ‘kbkdf_GetAdditionalDerivedKeys’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:749:36: warning[-Wanalyzer-possible-null-dereference]: dereference of possibly-NULL ‘additional_keys’ # 747| PR_ASSERT(this_key_size == sizeof(CK_DERIVED_KEY)); # 748| # 749|-> (*additional_keys)[offset] = *this_key; # 750| } # 751| Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:819: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: kdf_params # 817| kdf_params = calloc(1, sizeof(CK_SP800_108_KDF_PARAMS)); # 818| # 819|-> kdf_params->prfType = prf_type; # 820| kdf_params->ulNumberOfDataParams = num_data_params; # 821| kdf_params->pDataParams = data_params; Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c: scope_hint: In function ‘Java_org_mozilla_jss_crypto_KBKDFCounterParams_acquireNativeResourcesInternal’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:819:25: warning[-Wanalyzer-possible-null-dereference]: dereference of possibly-NULL ‘kdf_params’ # 817| kdf_params = calloc(1, sizeof(CK_SP800_108_KDF_PARAMS)); # 818| # 819|-> kdf_params->prfType = prf_type; # 820| kdf_params->ulNumberOfDataParams = num_data_params; # 821| kdf_params->pDataParams = data_params; Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:820: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: kdf_params # 818| # 819| kdf_params->prfType = prf_type; # 820|-> kdf_params->ulNumberOfDataParams = num_data_params; # 821| kdf_params->pDataParams = data_params; # 822| kdf_params->ulAdditionalDerivedKeys = num_additional_keys; Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:821: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: kdf_params # 819| kdf_params->prfType = prf_type; # 820| kdf_params->ulNumberOfDataParams = num_data_params; # 821|-> kdf_params->pDataParams = data_params; # 822| kdf_params->ulAdditionalDerivedKeys = num_additional_keys; # 823| kdf_params->pAdditionalDerivedKeys = additional_keys; Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:822: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: kdf_params # 820| kdf_params->ulNumberOfDataParams = num_data_params; # 821| kdf_params->pDataParams = data_params; # 822|-> kdf_params->ulAdditionalDerivedKeys = num_additional_keys; # 823| kdf_params->pAdditionalDerivedKeys = additional_keys; # 824| Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:823: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: kdf_params # 821| kdf_params->pDataParams = data_params; # 822| kdf_params->ulAdditionalDerivedKeys = num_additional_keys; # 823|-> kdf_params->pAdditionalDerivedKeys = additional_keys; # 824| # 825| /* Place it back into this NativeEnclosure. */ Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:934: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: kdf_params # 932| kdf_params = calloc(1, sizeof(CK_SP800_108_FEEDBACK_KDF_PARAMS)); # 933| # 934|-> kdf_params->prfType = prf_type; # 935| kdf_params->ulNumberOfDataParams = num_data_params; # 936| kdf_params->pDataParams = data_params; Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c: scope_hint: In function ‘Java_org_mozilla_jss_crypto_KBKDFFeedbackParams_acquireNativeResourcesInternal’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:934:25: warning[-Wanalyzer-possible-null-dereference]: dereference of possibly-NULL ‘kdf_params’ cc1: note: unrecognized command-line option ‘-Wno-unknown-warning-option’ may have been intended to silence earlier diagnostics # 932| kdf_params = calloc(1, sizeof(CK_SP800_108_FEEDBACK_KDF_PARAMS)); # 933| # 934|-> kdf_params->prfType = prf_type; # 935| kdf_params->ulNumberOfDataParams = num_data_params; # 936| kdf_params->pDataParams = data_params; Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:935: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: kdf_params # 933| # 934| kdf_params->prfType = prf_type; # 935|-> kdf_params->ulNumberOfDataParams = num_data_params; # 936| kdf_params->pDataParams = data_params; # 937| kdf_params->ulAdditionalDerivedKeys = num_additional_keys; Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:936: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: kdf_params # 934| kdf_params->prfType = prf_type; # 935| kdf_params->ulNumberOfDataParams = num_data_params; # 936|-> kdf_params->pDataParams = data_params; # 937| kdf_params->ulAdditionalDerivedKeys = num_additional_keys; # 938| kdf_params->pAdditionalDerivedKeys = additional_keys; Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:937: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: kdf_params # 935| kdf_params->ulNumberOfDataParams = num_data_params; # 936| kdf_params->pDataParams = data_params; # 937|-> kdf_params->ulAdditionalDerivedKeys = num_additional_keys; # 938| kdf_params->pAdditionalDerivedKeys = additional_keys; # 939| kdf_params->ulIVLen = initial_value_length; Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:938: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: kdf_params # 936| kdf_params->pDataParams = data_params; # 937| kdf_params->ulAdditionalDerivedKeys = num_additional_keys; # 938|-> kdf_params->pAdditionalDerivedKeys = additional_keys; # 939| kdf_params->ulIVLen = initial_value_length; # 940| kdf_params->pIV = initial_value; Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:939: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: kdf_params # 937| kdf_params->ulAdditionalDerivedKeys = num_additional_keys; # 938| kdf_params->pAdditionalDerivedKeys = additional_keys; # 939|-> kdf_params->ulIVLen = initial_value_length; # 940| kdf_params->pIV = initial_value; # 941| Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/crypto/KBKDF.c:940: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: kdf_params # 938| kdf_params->pAdditionalDerivedKeys = additional_keys; # 939| kdf_params->ulIVLen = initial_value_length; # 940|-> kdf_params->pIV = initial_value; # 941| # 942| /* Place it back into this NativeEnclosure. */ Error: CPPCHECK_WARNING (CWE-682): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/nss/PR.c:177: error[nullPointerArithmeticOutOfMemory]: If memory allocation fail: pointer addition with NULL pointer. # 175| * read than expected, when it could read much more. */ # 176| while (read_amount < amount) { # 177|-> this_read = PR_Read(real_fd, buffer + read_amount, amount - read_amount); # 178| if (this_read <= 0) { # 179| if (PR_GetError() == 0) { Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/PK11Cert.c: scope_hint: In function ‘JSS_PK11_findCertAndSlotFromNickname’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/PK11Cert.c:307:16: warning[-Wanalyzer-null-dereference]: dereference of NULL ‘colon’ /usr/include/nss3/seccomon.h:27: included_from: Included from here. jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/PK11Cert.c:9: included_from: Included from here. jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/PK11Cert.c:304:9: note: in expansion of macro ‘PORT_Strchr’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/PK11Cert.c:304:9: note: in expansion of macro ‘PORT_Strchr’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/PK11Cert.c:306:23: note: in expansion of macro ‘PORT_Strchr’ # 305| char* tokenname = PORT_Strdup(nickname); # 306| char* colon = PORT_Strchr(tokenname, ':'); # 307|-> *colon = '\0'; # 308| *ppSlot = findSlotByTokenNameAndCert(tokenname, cert); # 309| PORT_Free(tokenname); Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/PK11Cert.c: scope_hint: In function ‘JSS_PK11_findCertsAndSlotFromNickname’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/PK11Cert.c:347:16: warning[-Wanalyzer-null-dereference]: dereference of NULL ‘colon’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/PK11Cert.c:343:9: note: in expansion of macro ‘PORT_Strchr’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/PK11Cert.c:343:9: note: in expansion of macro ‘PORT_Strchr’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/PK11Cert.c:345:23: note: in expansion of macro ‘PORT_Strchr’ cc1: note: unrecognized command-line option ‘-Wno-unknown-warning-option’ may have been intended to silence earlier diagnostics # 345| char* colon = PORT_Strchr(tokenname, ':'); # 346| CERTCertListNode *head = CERT_LIST_HEAD(certList); # 347|-> *colon = '\0'; # 348| *ppSlot = findSlotByTokenNameAndCert(tokenname, head->cert); # 349| PORT_Free(tokenname); Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/attrs/CKAttribute.c: scope_hint: In function ‘JSS_PK11_WrapAttribute’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/attrs/CKAttribute.c:36:16: warning[-Wanalyzer-possible-null-dereference]: dereference of possibly-NULL ‘attr’ # 34| } # 35| # 36|-> attr->type = (CK_ULONG)((*env)->GetLongField(env, this, field_id)); # 37| attr->pValue = ptr; # 38| attr->ulValueLen = ptr_length; Error: GCC_ANALYZER_WARNING (CWE-401): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/attrs/CKAttribute.c: scope_hint: In function ‘Java_org_mozilla_jss_pkcs11_attrs_CKAKeyType_acquireNativeResources’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/attrs/CKAttribute.c:49:12: warning[-Wanalyzer-malloc-leak]: leak of ‘ptr’ # 47| } # 48| # 49|-> return PR_SUCCESS; # 50| # 51| failure: Error: GCC_ANALYZER_WARNING (CWE-688): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/attrs/CKAttribute.c: scope_hint: In function ‘JSS_PK11_WrapAttribute’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/attrs/CKAttribute.c:52:5: warning[-Wanalyzer-possible-null-argument]: use of possibly-NULL ‘attr’ where non-null expected <built-in>: note: argument 1 of ‘__builtin_memset’ must be non-null # 50| # 51| failure: # 52|-> memset(attr, 0, sizeof(CK_ATTRIBUTE)); # 53| free(attr); # 54| return PR_FAILURE; Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/attrs/CKAttribute.c: scope_hint: In function ‘Java_org_mozilla_jss_pkcs11_attrs_CKAClass_acquireNativeResources’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/attrs/CKAttribute.c:104:10: warning[-Wanalyzer-possible-null-dereference]: dereference of possibly-NULL ‘ptr’ # 102| } # 103| # 104|-> *ptr = (CK_ULONG)((*env)->GetLongField(env, this, field_id)); # 105| # 106| if (JSS_PK11_WrapAttribute(env, this, (void *)ptr, sizeof(*ptr)) == PR_FAILURE) { Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/attrs/CKAttribute.c: scope_hint: In function ‘Java_org_mozilla_jss_pkcs11_attrs_CKAKeyType_acquireNativeResources’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/attrs/CKAttribute.c:162:10: warning[-Wanalyzer-possible-null-dereference]: dereference of possibly-NULL ‘ptr’ # 160| } # 161| # 162|-> *ptr = (CK_ULONG)((*env)->GetLongField(env, this, field_id)); # 163| # 164| JSS_PK11_WrapAttribute(env, this, (void *)ptr, sizeof(*ptr)); Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/attrs/CKAttribute.c: scope_hint: In function ‘Java_org_mozilla_jss_pkcs11_attrs_CKAValueLen_acquireNativeResources’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/pkcs11/attrs/CKAttribute.c:241:10: warning[-Wanalyzer-possible-null-dereference]: dereference of possibly-NULL ‘ptr’ cc1: note: unrecognized command-line option ‘-Wno-unknown-warning-option’ may have been intended to silence earlier diagnostics # 239| } # 240| # 241|-> *ptr = (CK_ULONG)((*env)->GetLongField(env, this, field_id)); # 242| # 243| if (JSS_PK11_WrapAttribute(env, this, (void *)ptr, sizeof(*ptr)) == PR_FAILURE) { Error: GCC_ANALYZER_WARNING (CWE-688): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/ssl/javax/BufferPRFD.c: scope_hint: In function ‘newBufferPRFileDesc’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/ssl/javax/BufferPRFD.c:348:9: warning[-Wanalyzer-possible-null-argument]: use of possibly-NULL ‘calloc(16, 1)’ where non-null expected /usr/include/nspr4/nspr.h:26: included_from: Included from here. jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/ssl/javax/BufferPRFD.c:1: included_from: Included from here. /usr/include/nspr4/prmem.h:65:38: note: in expansion of macro ‘PR_MALLOC’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/ssl/javax/BufferPRFD.c:339:22: note: in expansion of macro ‘PR_NEW’ <built-in>: note: argument 1 of ‘__builtin_memcpy’ must be non-null cc1: note: unrecognized command-line option ‘-Wno-unknown-warning-option’ may have been intended to silence earlier diagnostics # 346| # 347| fd->secret->peer_addr = calloc(16, sizeof(uint8_t)); # 348|-> memcpy(fd->secret->peer_addr, peer_info, len); # 349| } # 350| Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/ssl/javax/j_buffer.c:9: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: buf # 7| j_buffer *jb_alloc(size_t length) { # 8| j_buffer *buf = calloc(1, sizeof(j_buffer)); # 9|-> buf->contents = calloc(length, sizeof(uint8_t)); # 10| # 11| buf->capacity = length; Error: GCC_ANALYZER_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/ssl/javax/j_buffer.c: scope_hint: In function ‘jb_alloc’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/ssl/javax/j_buffer.c:9:19: warning[-Wanalyzer-possible-null-dereference]: dereference of possibly-NULL ‘buf’ cc1: note: unrecognized command-line option ‘-Wno-unknown-warning-option’ may have been intended to silence earlier diagnostics # 7| j_buffer *jb_alloc(size_t length) { # 8| j_buffer *buf = calloc(1, sizeof(j_buffer)); # 9|-> buf->contents = calloc(length, sizeof(uint8_t)); # 10| # 11| buf->capacity = length; Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/ssl/javax/j_buffer.c:11: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: buf # 9| buf->contents = calloc(length, sizeof(uint8_t)); # 10| # 11|-> buf->capacity = length; # 12| # 13| // In the beginning, we can only write, not read. Hence, set our read_pos Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/ssl/javax/j_buffer.c:15: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: buf # 13| // In the beginning, we can only write, not read. Hence, set our read_pos # 14| // to the sentinel value, buf->capacity. # 15|-> buf->write_pos = 0; # 16| buf->read_pos = length; # 17| Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/ssl/javax/j_buffer.c:16: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: buf # 14| // to the sentinel value, buf->capacity. # 15| buf->write_pos = 0; # 16|-> buf->read_pos = length; # 17| # 18| return buf; Error: GCC_ANALYZER_WARNING (CWE-688): jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/util/jssutil.c: scope_hint: In function ‘JSS_FromByteArray’ jss-5.6.0-build/jss-5.6.0/native/src/main/native/org/mozilla/jss/util/jssutil.c:709:5: warning[-Wanalyzer-possible-null-argument]: use of possibly-NULL ‘*data’ where non-null expected <built-in>: note: argument 1 of ‘__builtin_memcpy’ must be non-null cc1: note: unrecognized command-line option ‘-Wno-unknown-warning-option’ may have been intended to silence earlier diagnostics # 707| * a structure one larger to guarantee C functions work as expected. */ # 708| *data = calloc(array_length + 1, sizeof(uint8_t)); # 709|-> memcpy(*data, array_data, array_length); # 710| # 711| // Copy length, if specified Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/test/native/org/mozilla/jss/tests/TestBufferPRFDSSL.c:361: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: buf # 359| char *server_message = "like a pound of bacon"; # 360| # 361|-> memcpy(buf, client_message, strlen(client_message)); # 362| PRInt32 ret = PR_Write(c_nspr, buf, strlen(buf)); # 363| if (ret < 0) { Error: GCC_ANALYZER_WARNING (CWE-688): jss-5.6.0-build/jss-5.6.0/native/src/test/native/org/mozilla/jss/tests/TestBufferPRFDSSL.c: scope_hint: In function ‘main’ jss-5.6.0-build/jss-5.6.0/native/src/test/native/org/mozilla/jss/tests/TestBufferPRFDSSL.c:361:5: warning[-Wanalyzer-possible-null-argument]: use of possibly-NULL ‘buf’ where non-null expected <built-in>: note: argument 1 of ‘__builtin_memcpy’ must be non-null cc1: note: unrecognized command-line option ‘-Wno-unknown-warning-option’ may have been intended to silence earlier diagnostics # 359| char *server_message = "like a pound of bacon"; # 360| # 361|-> memcpy(buf, client_message, strlen(client_message)); # 362| PRInt32 ret = PR_Write(c_nspr, buf, strlen(buf)); # 363| if (ret < 0) { Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/native/src/test/native/org/mozilla/jss/tests/TestBufferPRFDSSL.c:362: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: buf # 360| # 361| memcpy(buf, client_message, strlen(client_message)); # 362|-> PRInt32 ret = PR_Write(c_nspr, buf, strlen(buf)); # 363| if (ret < 0) { # 364| const PRErrorCode err = PR_GetError(); Error: COMPILER_WARNING (CWE-674): jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SessionKey.cpp: scope_hint: In function ‘JSS_PK11_wrapSymKey(JNIEnv_*, PK11SymKeyStr**)’ jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SessionKey.cpp:120:1: warning[-Winfinite-recursion]: infinite recursion detected # 120 | JSS_PK11_wrapSymKey(JNIEnv *env, PK11SymKey **symKey) # | ^~~~~~~~~~~~~~~~~~~ jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SessionKey.cpp:124:31: note: recursive call # 124 | return JSS_PK11_wrapSymKey(env, symKey); # | ~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ # 118| */ # 119| jobject # 120|-> JSS_PK11_wrapSymKey(JNIEnv *env, PK11SymKey **symKey) # 121| { # 122| // return JSS_PK11_wrapSymKey(env, symKey, NULL); Error: COMPILER_WARNING: jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SessionKey.cpp: scope_hint: In function ‘Java_org_mozilla_jss_symkey_SessionKey_ComputeSessionKeySCP02’ jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SessionKey.cpp:857:16: warning[-Wstringop-truncation]: ‘strncpy’ specified bound 135 equals destination size # 857 | strncpy(keyname,keyNameChars,KEYNAMELENGTH); # | ^ # 855| { # 856| keyNameChars = (char *)(env)->GetStringUTFChars(keyName, NULL); # 857|-> strncpy(keyname,keyNameChars,KEYNAMELENGTH); # 858| (env)->ReleaseStringUTFChars(keyName, (const char *)keyNameChars); # 859| }else Error: COMPILER_WARNING: jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SessionKey.cpp: scope_hint: In function ‘Java_org_mozilla_jss_symkey_SessionKey_ComputeSessionKey’ jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SessionKey.cpp:1317:16: warning[-Wstringop-truncation]: ‘strncpy’ specified bound 135 equals destination size # 1317 | strncpy(keyname,keyNameChars,KEYNAMELENGTH); # | ^ # 1315| { # 1316| keyNameChars = (char *)(env)->GetStringUTFChars(keyName, NULL); # 1317|-> strncpy(keyname,keyNameChars,KEYNAMELENGTH); # 1318| (env)->ReleaseStringUTFChars(keyName, (const char *)keyNameChars); # 1319| }else Error: COMPILER_WARNING: jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SessionKey.cpp: scope_hint: In function ‘Java_org_mozilla_jss_symkey_SessionKey_ComputeEncSessionKey’ jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SessionKey.cpp:1718:16: warning[-Wstringop-truncation]: ‘strncpy’ specified bound 135 equals destination size # 1718 | strncpy(keyname,keyNameChars,KEYNAMELENGTH); # | ^ # 1716| { # 1717| keyNameChars = (char *)(env)->GetStringUTFChars(keyName, NULL); # 1718|-> strncpy(keyname,keyNameChars,KEYNAMELENGTH); # 1719| (env)->ReleaseStringUTFChars(keyName, (const char *)keyNameChars); # 1720| } Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SymKey.cpp:313: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: result # 311| char *result= (char *)malloc(1); # 312| # 313|-> result[0] = '\0'; # 314| if( tokenNameChars == NULL || keyNameChars==NULL) # 315| { Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SymKey.cpp:401: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: result # 399| # 400| result = (char *) malloc(1); # 401|-> result[0] = '\0'; # 402| # 403| if (tokenName) { Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SymKey.cpp:433: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: result # 431| temp = result; # 432| result = (char*)malloc( strlen(name) + strlen(temp) + 2 ); # 433|-> result[0]='\0'; # 434| strcat(result, temp); # 435| strcat(result, ","); Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SymKey.cpp:434: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: result # 432| result = (char*)malloc( strlen(name) + strlen(temp) + 2 ); # 433| result[0]='\0'; # 434|-> strcat(result, temp); # 435| strcat(result, ","); # 436| strcat(result, name); Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SymKey.cpp:435: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: result # 433| result[0]='\0'; # 434| strcat(result, temp); # 435|-> strcat(result, ","); # 436| strcat(result, name); # 437| free(temp); Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SymKey.cpp:436: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: result # 434| strcat(result, temp); # 435| strcat(result, ","); # 436|-> strcat(result, name); # 437| free(temp); # 438| Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SymKey.cpp:553: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: keyData # 551| for (i = 0;i < keysize; i++) # 552| { # 553|-> keyData[i] = 0x0; # 554| } # 555| Error: COMPILER_WARNING: jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SymKey.cpp: scope_hint: In function ‘GetSharedSecretKeyName(char*)’ jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SymKey.cpp:1087:19: warning[-Wstringop-truncation]: ‘strncpy’ specified bound 135 equals destination size # 1087 | strncpy( sharedSecretSymKeyName, newKeyName, KEYNAMELENGTH); # | ^ # 1085| if ( newKeyName && strlen( newKeyName ) > 0 ) { # 1086| if( strlen( sharedSecretSymKeyName) == 0) { # 1087|-> strncpy( sharedSecretSymKeyName, newKeyName, KEYNAMELENGTH); # 1088| } # 1089| } Error: COMPILER_WARNING (CWE-697): jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SymKey.cpp: scope_hint: In function ‘_jbyteArray* Java_org_mozilla_jss_symkey_SessionKey_DiversifyKey(JNIEnv*, jclass, jstring, jstring, jstring, jstring, jbyteArray, jbyteArray, jbyte, jboolean, jbyteArray, jbyteArray, jbyteArray, jstring, jstring, jbyte)’ jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SymKey.cpp:1457:30: warning[-Waddress]: the address of ‘fullNewMasterKeyName’ will never be NULL # 1457 | if (fullNewMasterKeyName != NULL && strcmp(fullNewMasterKeyName, "#01#01") == 0) # | ^ jss-5.6.0-build/jss-5.6.0/symkey/src/main/native/org/mozilla/jss/symkey/SymKey.cpp:1133:10: note: ‘fullNewMasterKeyName’ declared here # 1133 | char fullNewMasterKeyName[KEYNAMELENGTH]; # | ^~~~~~~~~~~~~~~~~~~~ # 1455| # 1456| /* special case #01#01 */ # 1457|-> if (fullNewMasterKeyName != NULL && strcmp(fullNewMasterKeyName, "#01#01") == 0) # 1458| { # 1459| Buffer empty = Buffer(); Error: COMPILER_WARNING (CWE-563): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/p7tool.c: scope_hint: In function ‘DecodeAndPrintFile’ jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/p7tool.c:261:17: warning[-Wunused-but-set-variable]: variable ‘nb’ set but not used # 261 | int nb = 0; # | ^~ # 259| FILE *outFile; # 260| char filename[256]; # 261|-> int nb = 0; # 262| # 263| sprintf(filename, "%s%d.der", prefix, i); Error: COMPILER_WARNING (CWE-704): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/p7tool.c: scope_hint: In function ‘main’ jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/p7tool.c:341:16: warning[-Wdiscarded-qualifiers]: assignment discards ‘const’ qualifier from pointer target type # 339| # 340| case 'p': # 341|-> prefix = optstate->value; # 342| break; # 343| Error: COMPILER_WARNING (CWE-252): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secpwd.c: scope_hint: In function ‘SEC_GetPassword’ jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secpwd.c:69:21: warning[-Wunused-result]: ignoring return value of ‘fgets’ declared with attribute ‘warn_unused_result’ # 69 | #define QUIET_FGETS fgets # | ^ jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secpwd.c:117:9: note: in expansion of macro ‘QUIET_FGETS’ # 117 | QUIET_FGETS ( phrase, sizeof(phrase), input); # | ^~~~~~~~~~~ # 67| static char * quiet_fgets (char *buf, int length, FILE *input); # 68| #else # 69|-> #define QUIET_FGETS fgets # 70| #endif # 71| Error: COMPILER_WARNING (CWE-563): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secutil.c: scope_hint: In function ‘SECU_ChangePW’ jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secutil.c:378:15: warning[-Wunused-but-set-variable]: variable ‘rv’ set but not used # 378 | SECStatus rv; # | ^~ # 376| SECU_ChangePW(PK11SlotInfo *slot, char *passwd, char *pwFile) # 377| { # 378|-> SECStatus rv; # 379| secuPWData pwdata, newpwdata; # 380| char *oldpw = NULL, *newpw = NULL; Error: COMPILER_WARNING (CWE-477): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secutil.c: scope_hint: In function ‘printflags’ jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secutil.c:2153:5: warning[-Wdeprecated-declarations]: ‘__CERTDB_VALID_PEER’ is deprecated: CERTDB_VALID_PEER is now CERTDB_TERMINAL_RECORD # 2151| !(flags & CERTDB_TRUSTED_CLIENT_CA)) # 2152| PORT_Strcat(trusts, "c"); # 2153|-> if (flags & CERTDB_VALID_PEER) # 2154| if (!(flags & CERTDB_TRUSTED)) # 2155| PORT_Strcat(trusts, "p"); Error: COMPILER_WARNING (CWE-477): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secutil.c: scope_hint: In function ‘printFlags’ jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secutil.c:2953:5: warning[-Wdeprecated-declarations]: ‘__CERTDB_VALID_PEER’ is deprecated: CERTDB_VALID_PEER is now CERTDB_TERMINAL_RECORD # 2951| printFlags(FILE *out, unsigned int flags, int level) # 2952| { # 2953|-> if ( flags & CERTDB_VALID_PEER ) { # 2954| SECU_Indent(out, level); fprintf(out, "Valid Peer\n"); # 2955| } Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secutil.c:3041: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: optstring # 3039| # 3040| for (i=0; i<cmd->numCommands; i++) { # 3041|-> optstring[j++] = cmd->commands[i].flag; # 3042| } # 3043| for (i=0; i<cmd->numOptions; i++) { Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secutil.c:3044: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: optstring # 3042| } # 3043| for (i=0; i<cmd->numOptions; i++) { # 3044|-> optstring[j++] = cmd->options[i].flag; # 3045| if (cmd->options[i].needsArg) # 3046| optstring[j++] = ':'; Error: CPPCHECK_WARNING (CWE-476): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secutil.c:3048: warning[nullPointerOutOfMemory]: If memory allocation fails, then there is a possible null pointer dereference: optstring # 3046| optstring[j++] = ':'; # 3047| } # 3048|-> optstring[j] = '\0'; # 3049| optstate = PL_CreateOptState(argc, argv, optstring); # 3050| Error: COMPILER_WARNING (CWE-704): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secutil.c: scope_hint: In function ‘SECU_printCertProblems’ jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secutil.c:3291:25: warning[-Wpointer-to-int-cast]: cast from pointer to integer of different size # 3289| switch (node->error) { # 3290| case SEC_ERROR_INADEQUATE_KEY_USAGE: # 3291|-> flags = (unsigned int)node->arg; # 3292| switch (flags) { # 3293| case KU_DIGITAL_SIGNATURE: Error: COMPILER_WARNING (CWE-704): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/p7tool/secutil.c:3307:25: warning[-Wpointer-to-int-cast]: cast from pointer to integer of different size # 3305| } # 3306| case SEC_ERROR_INADEQUATE_CERT_TYPE: # 3307|-> flags = (unsigned int)node->arg; # 3308| switch (flags) { # 3309| case NS_CERT_TYPE_SSL_CLIENT: Error: COMPILER_WARNING (CWE-704): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/sslget/sslget.c: scope_hint: In function ‘my_GetClientAuthData’ jss-5.6.0-build/jss-5.6.0/tools/src/main/native/sslget/sslget.c:218:59: warning[-Wpointer-to-int-cast]: cast from pointer to integer of different size # 216| if (chosenNickName) { # 217| cert = PK11_FindCertFromNickname(chosenNickName, proto_win); # 218|-> FPRINTF(stderr," mygetclientauthdata - cert = %x\n",(unsigned int)cert); # 219| if ( cert ) { # 220| privkey = PK11_FindKeyByAnyCert(cert, proto_win); Error: COMPILER_WARNING (CWE-704): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/sslget/sslget.c:221:64: warning[-Wpointer-to-int-cast]: cast from pointer to integer of different size # 219| if ( cert ) { # 220| privkey = PK11_FindKeyByAnyCert(cert, proto_win); # 221|-> FPRINTF(stderr," mygetclientauthdata - privkey = %x\n",(unsigned int)privkey); # 222| if ( privkey ) { # 223| rv = SECSuccess; Error: COMPILER_WARNING (CWE-563): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/sslget/sslget.c: scope_hint: In function ‘do_connect’ jss-5.6.0-build/jss-5.6.0/tools/src/main/native/sslget/sslget.c:485:25: warning[-Wunused-but-set-variable]: variable ‘result’ set but not used # 485 | SECStatus result; # | ^~~~~~ # 483| PRFileDesc * tcp_sock; # 484| PRStatus prStatus; # 485|-> SECStatus result; # 486| int rv = SECSuccess; # 487| PRSocketOptionData opt; Error: COMPILER_WARNING (CWE-1164): jss-5.6.0-build/jss-5.6.0/tools/src/main/native/sslget/sslget.c: scope_hint: At top level jss-5.6.0-build/jss-5.6.0/tools/src/main/native/sslget/sslget.c:548:1: warning[-Wunused-function]: ‘getIPAddress’ defined but not used # 548 | getIPAddress(const char * hostName) # | ^~~~~~~~~~~~ # 546| */ # 547| static PRUint32 # 548|-> getIPAddress(const char * hostName) # 549| { # 550| const unsigned char *p;