From: Viktor Szakats Date: Wed, 14 Jan 2026 02:46:19 +0000 (+0100) Subject: build: drop redundant unused variable suppressions X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=59a5fd8518f6136494d04f694e16cd8879f03730;p=thirdparty%2Fcurl.git build: drop redundant unused variable suppressions Also: - digest_sspi: merge some `ifdef`s. Closes #20310 --- diff --git a/lib/altsvc.c b/lib/altsvc.c index cf6f754a04..64bfec420b 100644 --- a/lib/altsvc.c +++ b/lib/altsvc.c @@ -467,9 +467,6 @@ CURLcode Curl_altsvc_parse(struct Curl_easy *data, unsigned short dstport = srcport; /* the same by default */ size_t entries = 0; struct Curl_str alpn; -#ifdef CURL_DISABLE_VERBOSE_STRINGS - (void)data; -#endif DEBUGASSERT(asi); diff --git a/lib/asyn-thrdd.c b/lib/asyn-thrdd.c index 690e8139bd..87dddfa261 100644 --- a/lib/asyn-thrdd.c +++ b/lib/asyn-thrdd.c @@ -116,7 +116,6 @@ static void addr_ctx_unlink(struct async_thrdd_addr_ctx **paddr_ctx, struct async_thrdd_addr_ctx *addr_ctx = *paddr_ctx; bool destroy; - (void)data; if(!addr_ctx) return; diff --git a/lib/cf-h2-proxy.c b/lib/cf-h2-proxy.c index 4f101a05fe..96fc7cd8f8 100644 --- a/lib/cf-h2-proxy.c +++ b/lib/cf-h2-proxy.c @@ -379,7 +379,6 @@ static CURLcode proxy_h2_nw_out_flush(struct Curl_cfilter *cf, size_t nwritten; CURLcode result; - (void)data; if(Curl_bufq_is_empty(&ctx->outbufq)) return CURLE_OK; @@ -716,7 +715,6 @@ static int proxy_h2_on_header(nghttp2_session *session, CURLcode result; (void)flags; - (void)data; (void)session; DEBUGASSERT(stream_id); /* should never be a zero stream ID here */ if(stream_id != ctx->tunnel.stream_id) { @@ -785,7 +783,6 @@ static ssize_t tunnel_send_callback(nghttp2_session *session, size_t nread; (void)source; - (void)data; (void)ctx; if(!stream_id) @@ -849,7 +846,6 @@ static int proxy_h2_on_stream_close(nghttp2_session *session, struct Curl_easy *data = CF_DATA_CURRENT(cf); (void)session; - (void)data; if(stream_id != ctx->tunnel.stream_id) return 0; diff --git a/lib/cf-haproxy.c b/lib/cf-haproxy.c index 6c9bfdd137..782253e83e 100644 --- a/lib/cf-haproxy.c +++ b/lib/cf-haproxy.c @@ -156,7 +156,6 @@ out: static void cf_haproxy_destroy(struct Curl_cfilter *cf, struct Curl_easy *data) { - (void)data; CURL_TRC_CF(data, cf, "destroy"); cf_haproxy_ctx_free(cf->ctx); } diff --git a/lib/cf-https-connect.c b/lib/cf-https-connect.c index d2a08d124f..832b2a95b4 100644 --- a/lib/cf-https-connect.c +++ b/lib/cf-https-connect.c @@ -546,7 +546,6 @@ static void cf_hc_destroy(struct Curl_cfilter *cf, struct Curl_easy *data) { struct cf_hc_ctx *ctx = cf->ctx; - (void)data; CURL_TRC_CF(data, cf, "destroy"); cf_hc_reset(cf, data); Curl_safefree(ctx); diff --git a/lib/cf-socket.c b/lib/cf-socket.c index ce728f5b3e..88c5b810c9 100644 --- a/lib/cf-socket.c +++ b/lib/cf-socket.c @@ -1077,7 +1077,6 @@ static CURLcode cf_socket_open(struct Curl_cfilter *cf, CURLcode result = CURLE_COULDNT_CONNECT; bool is_tcp; - (void)data; DEBUGASSERT(ctx->sock == CURL_SOCKET_BAD); ctx->started_at = *Curl_pgrs_now(data); #ifdef SOCK_NONBLOCK @@ -1277,7 +1276,6 @@ static CURLcode cf_tcp_connect(struct Curl_cfilter *cf, CURLcode result = CURLE_COULDNT_CONNECT; int rc = 0; - (void)data; if(cf->connected) { *done = TRUE; return CURLE_OK; @@ -1627,7 +1625,7 @@ static bool cf_socket_conn_is_alive(struct Curl_cfilter *cf, int r; *input_pending = FALSE; - (void)data; + if(!ctx || ctx->sock == CURL_SOCKET_BAD) return FALSE; diff --git a/lib/cfilters.c b/lib/cfilters.c index b91d30c204..8a6a163067 100644 --- a/lib/cfilters.c +++ b/lib/cfilters.c @@ -339,7 +339,6 @@ void Curl_conn_cf_add(struct Curl_easy *data, int index, struct Curl_cfilter *cf) { - (void)data; DEBUGASSERT(conn); DEBUGASSERT(!cf->conn); DEBUGASSERT(!cf->next); diff --git a/lib/conncache.c b/lib/conncache.c index 1a3dba7f63..f19d061ca3 100644 --- a/lib/conncache.c +++ b/lib/conncache.c @@ -808,7 +808,7 @@ static int cpool_do_conn(struct Curl_easy *data, struct connectdata *conn, void *param) { struct cpool_do_conn_ctx *dctx = param; - (void)data; + if(conn->connection_id == dctx->id) { dctx->cb(conn, data, dctx->cbdata); return 1; @@ -858,7 +858,6 @@ static int cpool_mark_stale(struct Curl_easy *data, static int cpool_reap_no_reuse(struct Curl_easy *data, struct connectdata *conn, void *param) { - (void)data; (void)param; if(!CONN_INUSE(conn) && conn->bits.no_reuse) { Curl_conn_terminate(data, conn, FALSE); diff --git a/lib/connect.c b/lib/connect.c index 6e178345f4..681ead7227 100644 --- a/lib/connect.c +++ b/lib/connect.c @@ -465,7 +465,6 @@ static void cf_setup_destroy(struct Curl_cfilter *cf, struct Curl_easy *data) { struct cf_setup_ctx *ctx = cf->ctx; - (void)data; CURL_TRC_CF(data, cf, "destroy"); Curl_safefree(ctx); } diff --git a/lib/curl_gssapi.c b/lib/curl_gssapi.c index 8c82f778cd..352a5ad1e5 100644 --- a/lib/curl_gssapi.c +++ b/lib/curl_gssapi.c @@ -437,10 +437,6 @@ void Curl_gss_log_error(struct Curl_easy *data, const char *prefix, display_gss_error(minor, GSS_C_MECH_CODE, buf, len); infof(data, "%s%s", prefix, buf); -#ifdef CURL_DISABLE_VERBOSE_STRINGS - (void)data; - (void)prefix; -#endif } #if defined(__GNUC__) && defined(__APPLE__) diff --git a/lib/hostip4.c b/lib/hostip4.c index 422e0b222a..0d5942362c 100644 --- a/lib/hostip4.c +++ b/lib/hostip4.c @@ -74,9 +74,6 @@ struct Curl_addrinfo *Curl_sync_getaddrinfo(struct Curl_easy *data, struct Curl_addrinfo *ai = NULL; (void)ip_version; -#ifdef CURL_DISABLE_VERBOSE_STRINGS - (void)data; -#endif ai = Curl_ipv4_resolve_r(hostname, port); if(!ai) diff --git a/lib/http2.c b/lib/http2.c index a8b8d5c52f..f1c9fb59d6 100644 --- a/lib/http2.c +++ b/lib/http2.c @@ -745,7 +745,6 @@ static CURLcode nw_out_flush(struct Curl_cfilter *cf, size_t nwritten; CURLcode result; - (void)data; if(Curl_bufq_is_empty(&ctx->outbufq)) return CURLE_OK; diff --git a/lib/http_proxy.c b/lib/http_proxy.c index c5b2f3e871..1e30d21d96 100644 --- a/lib/http_proxy.c +++ b/lib/http_proxy.c @@ -380,7 +380,6 @@ static void http_proxy_cf_destroy(struct Curl_cfilter *cf, { struct cf_proxy_ctx *ctx = cf->ctx; - (void)data; CURL_TRC_CF(data, cf, "destroy"); curlx_free(ctx); } diff --git a/lib/imap.c b/lib/imap.c index 7027c8ef05..4c9d14232a 100644 --- a/lib/imap.c +++ b/lib/imap.c @@ -1494,7 +1494,6 @@ static CURLcode imap_pp_statemachine(struct Curl_easy *data, struct pingpong *pp; size_t nread = 0; - (void)data; if(!imapc || !imap) return CURLE_FAILED_INIT; pp = &imapc->pp; @@ -2161,7 +2160,6 @@ static CURLcode imap_disconnect(struct Curl_easy *data, { struct imap_conn *imapc = Curl_conn_meta_get(conn, CURL_META_IMAP_CONN); - (void)data; if(imapc) { /* We cannot send quit unconditionally. If this connection is stale or bad in any way (pingpong has pending data to send), diff --git a/lib/rtsp.c b/lib/rtsp.c index 8712a456cc..09b01f176b 100644 --- a/lib/rtsp.c +++ b/lib/rtsp.c @@ -161,7 +161,6 @@ static uint32_t rtsp_conncheck(struct Curl_easy *data, uint32_t checks_to_perform) { unsigned int ret_val = CONNRESULT_NONE; - (void)data; if(checks_to_perform & CONNCHECK_ISDEAD) { bool input_pending; diff --git a/lib/select.c b/lib/select.c index cae5085fdc..a3d77145ce 100644 --- a/lib/select.c +++ b/lib/select.c @@ -568,7 +568,6 @@ CURLcode Curl_pollset_change(struct Curl_easy *data, DEBUGASSERT(ps->init == CURL_EASY_POLLSET_MAGIC); #endif - (void)data; DEBUGASSERT(VALID_SOCK(sock)); if(!VALID_SOCK(sock)) return CURLE_BAD_FUNCTION_ARGUMENT; diff --git a/lib/sendf.c b/lib/sendf.c index 2d66ed58dd..680cd11356 100644 --- a/lib/sendf.c +++ b/lib/sendf.c @@ -625,7 +625,6 @@ struct cr_in_ctx { static CURLcode cr_in_init(struct Curl_easy *data, struct Curl_creader *reader) { struct cr_in_ctx *ctx = reader->ctx; - (void)data; ctx->read_cb = data->state.fread_func; ctx->cb_user_data = data->state.in; ctx->total_len = -1; @@ -1294,7 +1293,6 @@ static CURLcode cr_buf_read(struct Curl_easy *data, struct cr_buf_ctx *ctx = reader->ctx; size_t nread = ctx->blen - ctx->index; - (void)data; if(!nread || !ctx->buf) { *pnread = 0; *peos = TRUE; diff --git a/lib/smtp.c b/lib/smtp.c index 431113550d..5c376dfce9 100644 --- a/lib/smtp.c +++ b/lib/smtp.c @@ -1904,7 +1904,6 @@ static CURLcode smtp_disconnect(struct Curl_easy *data, { struct smtp_conn *smtpc = Curl_conn_meta_get(conn, CURL_META_SMTP_CONN); - (void)data; if(!smtpc) return CURLE_FAILED_INIT; diff --git a/lib/url.c b/lib/url.c index 47df6b3913..c7e77b0b42 100644 --- a/lib/url.c +++ b/lib/url.c @@ -2053,9 +2053,6 @@ static char *detect_proxy(struct Curl_easy *data, */ char proxy_env[20]; const char *envp = proxy_env; -#ifdef CURL_DISABLE_VERBOSE_STRINGS - (void)data; -#endif curl_msnprintf(proxy_env, sizeof(proxy_env), "%s_proxy", conn->handler->scheme); @@ -2832,10 +2829,6 @@ static CURLcode parse_connect_to_host_port(struct Curl_easy *data, int port = -1; CURLcode result = CURLE_OK; -#ifdef CURL_DISABLE_VERBOSE_STRINGS - (void)data; -#endif - *hostname_result = NULL; *port_result = -1; diff --git a/lib/vauth/digest_sspi.c b/lib/vauth/digest_sspi.c index 615b4bc827..6958a71d1e 100644 --- a/lib/vauth/digest_sspi.c +++ b/lib/vauth/digest_sspi.c @@ -193,10 +193,6 @@ CURLcode Curl_auth_create_digest_md5_message(struct Curl_easy *data, status == SEC_I_COMPLETE_AND_CONTINUE) Curl_pSecFn->CompleteAuthToken(&credentials, &resp_desc); else if(status != SEC_E_OK && status != SEC_I_CONTINUE_NEEDED) { -#ifndef CURL_DISABLE_VERBOSE_STRINGS - char buffer[STRERROR_LEN]; -#endif - Curl_pSecFn->FreeCredentialsHandle(&credentials); Curl_sspi_free_identity(p_identity); curlx_free(spn); @@ -206,8 +202,11 @@ CURLcode Curl_auth_create_digest_md5_message(struct Curl_easy *data, return CURLE_OUT_OF_MEMORY; #ifndef CURL_DISABLE_VERBOSE_STRINGS - infof(data, "schannel: InitializeSecurityContext failed: %s", - Curl_sspi_strerror(status, buffer, sizeof(buffer))); + { + char buffer[STRERROR_LEN]; + infof(data, "schannel: InitializeSecurityContext failed: %s", + Curl_sspi_strerror(status, buffer, sizeof(buffer))); + } #endif return CURLE_AUTH_ERROR; @@ -401,8 +400,6 @@ CURLcode Curl_auth_create_digest_http_message(struct Curl_easy *data, SecBufferDesc chlg_desc; SECURITY_STATUS status; - (void)data; - /* Query the security package for DigestSSP */ status = Curl_pSecFn->QuerySecurityPackageInfo( @@ -594,10 +591,6 @@ CURLcode Curl_auth_create_digest_http_message(struct Curl_easy *data, status == SEC_I_COMPLETE_AND_CONTINUE) Curl_pSecFn->CompleteAuthToken(&credentials, &resp_desc); else if(status != SEC_E_OK && status != SEC_I_CONTINUE_NEEDED) { -#ifndef CURL_DISABLE_VERBOSE_STRINGS - char buffer[STRERROR_LEN]; -#endif - Curl_pSecFn->FreeCredentialsHandle(&credentials); Curl_sspi_free_identity(p_identity); @@ -609,8 +602,11 @@ CURLcode Curl_auth_create_digest_http_message(struct Curl_easy *data, return CURLE_OUT_OF_MEMORY; #ifndef CURL_DISABLE_VERBOSE_STRINGS - infof(data, "schannel: InitializeSecurityContext failed: %s", - Curl_sspi_strerror(status, buffer, sizeof(buffer))); + { + char buffer[STRERROR_LEN]; + infof(data, "schannel: InitializeSecurityContext failed: %s", + Curl_sspi_strerror(status, buffer, sizeof(buffer))); + } #endif return CURLE_AUTH_ERROR; diff --git a/lib/vauth/krb5_sspi.c b/lib/vauth/krb5_sspi.c index 8bf2091a54..7aad4badfa 100644 --- a/lib/vauth/krb5_sspi.c +++ b/lib/vauth/krb5_sspi.c @@ -259,10 +259,6 @@ CURLcode Curl_auth_create_gssapi_security_message(struct Curl_easy *data, SecPkgContext_Sizes sizes; SECURITY_STATUS status; -#ifdef CURL_DISABLE_VERBOSE_STRINGS - (void)data; -#endif - /* Ensure we have a valid challenge message */ DEBUGASSERT(chlg); if(!Curl_bufref_len(chlg)) { diff --git a/lib/vauth/ntlm.c b/lib/vauth/ntlm.c index 54755733e9..fe45867b2f 100644 --- a/lib/vauth/ntlm.c +++ b/lib/vauth/ntlm.c @@ -254,10 +254,6 @@ static CURLcode ntlm_decode_type2_target(struct Curl_easy *data, const unsigned char *type2 = Curl_bufref_uptr(type2ref); size_t type2len = Curl_bufref_len(type2ref); -#ifdef CURL_DISABLE_VERBOSE_STRINGS - (void)data; -#endif - if(type2len >= 48) { target_info_len = Curl_read16_le(&type2[40]); target_info_offset = Curl_read32_le(&type2[44]); @@ -354,10 +350,6 @@ CURLcode Curl_auth_decode_ntlm_type2_message(struct Curl_easy *data, const unsigned char *type2 = Curl_bufref_uptr(type2ref); size_t type2len = Curl_bufref_len(type2ref); -#ifdef CURL_DISABLE_VERBOSE_STRINGS - (void)data; -#endif - ntlm->flags = 0; if((type2len < 32) || diff --git a/lib/vauth/ntlm_sspi.c b/lib/vauth/ntlm_sspi.c index 3197dd0a2e..9040df1b88 100644 --- a/lib/vauth/ntlm_sspi.c +++ b/lib/vauth/ntlm_sspi.c @@ -194,10 +194,6 @@ CURLcode Curl_auth_decode_ntlm_type2_message(struct Curl_easy *data, const struct bufref *type2, struct ntlmdata *ntlm) { -#ifdef CURL_DISABLE_VERBOSE_STRINGS - (void)data; -#endif - /* Ensure we have a valid type-2 message */ if(!Curl_bufref_len(type2)) { infof(data, "NTLM handshake failure (empty type-2 message)"); @@ -244,9 +240,6 @@ CURLcode Curl_auth_create_ntlm_type3_message(struct Curl_easy *data, SECURITY_STATUS status; unsigned long attrs; -#ifdef CURL_DISABLE_VERBOSE_STRINGS - (void)data; -#endif (void)passwdp; (void)userp; diff --git a/lib/vauth/spnego_sspi.c b/lib/vauth/spnego_sspi.c index 4211763166..12bdc3afd7 100644 --- a/lib/vauth/spnego_sspi.c +++ b/lib/vauth/spnego_sspi.c @@ -95,10 +95,6 @@ CURLcode Curl_auth_decode_spnego_message(struct Curl_easy *data, SecBufferDesc resp_desc; unsigned long attrs; -#ifdef CURL_DISABLE_VERBOSE_STRINGS - (void)data; -#endif - if(nego->context && nego->status == SEC_E_OK) { /* We finished successfully our part of authentication, but server * rejected it (since we are again here). Exit with an error since we diff --git a/lib/vquic/curl_ngtcp2.c b/lib/vquic/curl_ngtcp2.c index 5c615616c2..87db325770 100644 --- a/lib/vquic/curl_ngtcp2.c +++ b/lib/vquic/curl_ngtcp2.c @@ -614,7 +614,6 @@ static int cb_recv_stream_data(ngtcp2_conn *tconn, uint32_t flags, int fin = (flags & NGTCP2_STREAM_DATA_FLAG_FIN) ? 1 : 0; struct Curl_easy *data = stream_user_data; (void)offset; - (void)data; nconsumed = nghttp3_conn_read_stream(ctx->h3conn, stream_id, buf, buflen, fin); @@ -705,7 +704,6 @@ static int cb_stream_reset(ngtcp2_conn *tconn, int64_t stream_id, (void)tconn; (void)final_size; (void)app_error_code; - (void)data; rv = nghttp3_conn_shutdown_stream_read(ctx->h3conn, stream_id); CURL_TRC_CF(data, cf, "[%" PRId64 "] reset -> %d", stream_id, rv); @@ -1263,7 +1261,6 @@ static int cb_h3_reset_stream(nghttp3_conn *conn, int64_t stream_id, struct Curl_easy *data = stream_user_data; int rv; (void)conn; - (void)data; rv = ngtcp2_conn_shutdown_stream_write(ctx->qconn, 0, stream_id, app_error_code); @@ -2907,7 +2904,6 @@ CURLcode Curl_cf_ngtcp2_create(struct Curl_cfilter **pcf, struct Curl_cfilter *cf = NULL; CURLcode result; - (void)data; ctx = curlx_calloc(1, sizeof(*ctx)); if(!ctx) { result = CURLE_OUT_OF_MEMORY; diff --git a/lib/vquic/curl_osslq.c b/lib/vquic/curl_osslq.c index bcf9ab9549..958b9a4a74 100644 --- a/lib/vquic/curl_osslq.c +++ b/lib/vquic/curl_osslq.c @@ -2399,7 +2399,6 @@ CURLcode Curl_cf_osslq_create(struct Curl_cfilter **pcf, struct Curl_cfilter *cf = NULL; CURLcode result; - (void)data; ctx = curlx_calloc(1, sizeof(*ctx)); if(!ctx) { result = CURLE_OUT_OF_MEMORY; diff --git a/lib/vquic/curl_quiche.c b/lib/vquic/curl_quiche.c index 01f1bf5edd..f179360439 100644 --- a/lib/vquic/curl_quiche.c +++ b/lib/vquic/curl_quiche.c @@ -1629,8 +1629,6 @@ CURLcode Curl_cf_quiche_create(struct Curl_cfilter **pcf, struct Curl_cfilter *cf = NULL; CURLcode result; - (void)data; - (void)conn; ctx = curlx_calloc(1, sizeof(*ctx)); if(!ctx) { result = CURLE_OUT_OF_MEMORY; diff --git a/lib/vquic/vquic.c b/lib/vquic/vquic.c index 33ba12f476..96a3bcb594 100644 --- a/lib/vquic/vquic.c +++ b/lib/vquic/vquic.c @@ -854,8 +854,8 @@ CURLcode Curl_conn_may_http3(struct Curl_easy *data, const struct connectdata *conn, unsigned char transport) { - (void)conn; (void)data; + (void)conn; (void)transport; DEBUGF(infof(data, "QUIC is not supported in this build")); return CURLE_NOT_BUILT_IN; diff --git a/lib/vtls/gtls.c b/lib/vtls/gtls.c index 934273e0ee..ae9e0e82b7 100644 --- a/lib/vtls/gtls.c +++ b/lib/vtls/gtls.c @@ -2069,7 +2069,6 @@ static CURLcode gtls_send(struct Curl_cfilter *cf, ssize_t nwritten; size_t remain = blen; - (void)data; DEBUGASSERT(backend); *pnwritten = 0; @@ -2186,7 +2185,6 @@ static void gtls_close(struct Curl_cfilter *cf, struct gtls_ssl_backend_data *backend = (struct gtls_ssl_backend_data *)connssl->backend; - (void)data; DEBUGASSERT(backend); CURL_TRC_CF(data, cf, "close"); if(backend->gtls.session) { @@ -2215,7 +2213,6 @@ static CURLcode gtls_recv(struct Curl_cfilter *cf, CURLcode result = CURLE_OK; ssize_t nread; - (void)data; DEBUGASSERT(backend); nread = gnutls_record_recv(backend->gtls.session, buf, blen); diff --git a/lib/vtls/mbedtls.c b/lib/vtls/mbedtls.c index dff45a3299..bb9197f7fa 100644 --- a/lib/vtls/mbedtls.c +++ b/lib/vtls/mbedtls.c @@ -1133,7 +1133,6 @@ static CURLcode mbed_send(struct Curl_cfilter *cf, struct Curl_easy *data, CURLcode result = CURLE_OK; int nwritten; - (void)data; DEBUGASSERT(backend); *pnwritten = 0; connssl->io_need = CURL_SSL_IO_NEED_NONE; @@ -1305,7 +1304,6 @@ static CURLcode mbed_recv(struct Curl_cfilter *cf, struct Curl_easy *data, CURLcode result = CURLE_OK; int nread; - (void)data; DEBUGASSERT(backend); *pnread = 0; connssl->io_need = CURL_SSL_IO_NEED_NONE; diff --git a/lib/vtls/openssl.c b/lib/vtls/openssl.c index 7390af8c64..b80891f654 100644 --- a/lib/vtls/openssl.c +++ b/lib/vtls/openssl.c @@ -5036,7 +5036,6 @@ static CURLcode ossl_send(struct Curl_cfilter *cf, CURLcode result = CURLE_OK; int nwritten; - (void)data; DEBUGASSERT(octx); *pnwritten = 0; ERR_clear_error(); @@ -5129,7 +5128,6 @@ static CURLcode ossl_recv(struct Curl_cfilter *cf, CURLcode result = CURLE_OK; int nread; - (void)data; DEBUGASSERT(octx); *pnread = 0; diff --git a/lib/vtls/vtls.c b/lib/vtls/vtls.c index be0c032bff..f11b11f8b9 100644 --- a/lib/vtls/vtls.c +++ b/lib/vtls/vtls.c @@ -752,9 +752,6 @@ CURLcode Curl_pin_peer_pubkey(struct Curl_easy *data, const unsigned char *pubkey, size_t pubkeylen) { CURLcode result = CURLE_SSL_PINNEDPUBKEYNOTMATCH; -#ifdef CURL_DISABLE_VERBOSE_STRINGS - (void)data; -#endif /* if a path was not specified, do not pin */ if(!pinnedpubkey) diff --git a/lib/ws.c b/lib/ws.c index ff6557a222..dd3c996ceb 100644 --- a/lib/ws.c +++ b/lib/ws.c @@ -486,7 +486,6 @@ static CURLcode ws_dec_pass_payload(struct ws_decoder *dec, size_t remain = curlx_sotouz_range(dec->payload_len - dec->payload_offset, 0, SIZE_MAX); - (void)data; while(remain && Curl_bufq_peek(inraw, &inbuf, &inlen)) { if(inlen > remain) inlen = remain;