VirtualBox

Changeset 62564 in vbox for trunk/src


Ignore:
Timestamp:
Jul 26, 2016 2:43:03 PM (8 years ago)
Author:
vboxsync
Message:

IPRT: Mark unused parameters.

Location:
trunk/src/VBox/Runtime
Files:
76 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/VBox/Runtime/common/alloc/heapoffset.cpp

    r62477 r62564  
    665665    ASSERT_BLOCK_USED(pHeapInt, pBlock);
    666666    ASSERT_ANCHOR(pHeapInt);
    667     Assert(pHeapInt == (PRTHEAPOFFSETINTERNAL)hHeap || !hHeap);
     667    Assert(pHeapInt == (PRTHEAPOFFSETINTERNAL)hHeap || !hHeap); RT_NOREF_PV(hHeap);
    668668
    669669#ifdef RTHEAPOFFSET_FREE_POISON
     
    859859    ASSERT_BLOCK_USED(pHeapInt, pBlock);
    860860    ASSERT_ANCHOR(pHeapInt);
    861     Assert(pHeapInt == (PRTHEAPOFFSETINTERNAL)hHeap || !hHeap);
     861    Assert(pHeapInt == (PRTHEAPOFFSETINTERNAL)hHeap || !hHeap); RT_NOREF_PV(hHeap);
    862862
    863863    /*
  • trunk/src/VBox/Runtime/common/alloc/heapsimple.cpp

    r62477 r62564  
    657657    ASSERT_BLOCK_USED(pHeapInt, pBlock);
    658658    ASSERT_ANCHOR(pHeapInt);
    659     Assert(pHeapInt == (PRTHEAPSIMPLEINTERNAL)hHeap || !hHeap);
     659    Assert(pHeapInt == (PRTHEAPSIMPLEINTERNAL)hHeap || !hHeap); RT_NOREF_PV(hHeap);
    660660
    661661#ifdef RTHEAPSIMPLE_FREE_POISON
     
    851851    ASSERT_BLOCK_USED(pHeapInt, pBlock);
    852852    ASSERT_ANCHOR(pHeapInt);
    853     Assert(pHeapInt == (PRTHEAPSIMPLEINTERNAL)hHeap || !hHeap);
     853    Assert(pHeapInt == (PRTHEAPSIMPLEINTERNAL)hHeap || !hHeap); RT_NOREF_PV(hHeap);
    854854
    855855    /*
  • trunk/src/VBox/Runtime/common/asn1/asn1-basics.cpp

    r62477 r62564  
    588588RTDECL(int) RTAsn1ContextTagN_Clone(PRTASN1CONTEXTTAG pThis, PCRTASN1CONTEXTTAG pSrc, uint32_t uTag)
    589589{
    590     Assert(pSrc->Asn1Core.uTag == uTag || !RTASN1CORE_IS_PRESENT(&pSrc->Asn1Core));
     590    Assert(pSrc->Asn1Core.uTag == uTag || !RTASN1CORE_IS_PRESENT(&pSrc->Asn1Core)); RT_NOREF_PV(uTag);
    591591    return RTAsn1Core_CloneNoContent(&pThis->Asn1Core, &pSrc->Asn1Core);
    592592}
  • trunk/src/VBox/Runtime/common/asn1/asn1-default-allocator.cpp

    r62477 r62564  
    5858static DECLCALLBACK(void) rtAsn1DefaultAllocator_Free(PCRTASN1ALLOCATORVTABLE pThis, PRTASN1ALLOCATION pAllocation, void *pv)
    5959{
     60    RT_NOREF_PV(pThis);
    6061    RTMemFree(pv);
    6162    pAllocation->cbAllocated = 0;
     
    7576        return VINF_SUCCESS;
    7677    }
     78    RT_NOREF_PV(pThis);
    7779    return VERR_NO_MEMORY;
    7880}
     
    9395        return VINF_SUCCESS;
    9496    }
     97    RT_NOREF_PV(pThis);
    9598    return VERR_NO_MEMORY;
    9699}
  • trunk/src/VBox/Runtime/common/asn1/asn1-efence-allocator.cpp

    r62477 r62564  
    4040static DECLCALLBACK(void) rtAsn1EFenceAllocator_Free(PCRTASN1ALLOCATORVTABLE pThis, PRTASN1ALLOCATION pAllocation, void *pv)
    4141{
     42    RT_NOREF_PV(pThis);
    4243    RTMemEfFreeNP(pv);
    4344    pAllocation->cbAllocated = 0;
     
    5657        return VINF_SUCCESS;
    5758    }
     59    RT_NOREF_PV(pThis);
    5860    return VERR_NO_MEMORY;
    5961}
     
    7375        return VINF_SUCCESS;
    7476    }
     77    RT_NOREF_PV(pThis);
    7578    return VERR_NO_MEMORY;
    7679}
  • trunk/src/VBox/Runtime/common/asn1/asn1-encode.cpp

    r62477 r62564  
    167167{
    168168    RTASN1ENCODEPREPARGS *pArgs = (RTASN1ENCODEPREPARGS *)pvUser;
     169    RT_NOREF_PV(pszName);
    169170    if (RTASN1CORE_IS_PRESENT(pAsn1Core))
    170171    {
     
    376377{
    377378    RTASN1ENCODEWRITEARGS *pArgs = (RTASN1ENCODEWRITEARGS *)pvUser;
     379    RT_NOREF_PV(pszName);
    378380    int rc;
    379381    if (RTASN1CORE_IS_PRESENT(pAsn1Core))
     
    460462        pArgs->cbDst  = 0;
    461463    }
     464    RT_NOREF_PV(pErrInfo);
    462465    return VERR_BUFFER_OVERFLOW;
    463466}
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-bitstring.cpp

    r62477 r62564  
    8282        return VERR_NOT_EQUAL;
    8383    pCtx->offBuf += (uint32_t)cbToWrite;
     84    RT_NOREF_PV(pErrInfo);
    8485    return VINF_SUCCESS;
    8586}
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-boolean.cpp

    r62477 r62564  
    5454RTDECL(int) RTAsn1Boolean_InitDefault(PRTASN1BOOLEAN pThis, bool fValue, PCRTASN1ALLOCATORVTABLE pAllocator)
    5555{
     56    RT_NOREF_PV(pAllocator);
    5657    RTAsn1Core_InitEx(&pThis->Asn1Core, ASN1_TAG_BOOLEAN, ASN1_TAGCLASS_UNIVERSAL | ASN1_TAGFLAG_PRIMITIVE,
    5758                      &g_RTAsn1Boolean_Vtable, RTASN1CORE_F_DEFAULT | RTASN1CORE_F_PRIMITE_TAG_STRUCT);
     
    102103RTDECL(int) RTAsn1Boolean_Init(PRTASN1BOOLEAN pThis, PCRTASN1ALLOCATORVTABLE pAllocator)
    103104{
     105    RT_NOREF_PV(pAllocator);
    104106    RTAsn1Core_InitEx(&pThis->Asn1Core, ASN1_TAG_BOOLEAN, ASN1_TAGCLASS_UNIVERSAL | ASN1_TAGFLAG_PRIMITIVE,
    105107                      &g_RTAsn1Boolean_Vtable, RTASN1CORE_F_PRESENT | RTASN1CORE_F_PRIMITE_TAG_STRUCT);
     
    161163{
    162164    Assert(pThis && (!RTAsn1Boolean_IsPresent(pThis) || pThis->Asn1Core.pOps == &g_RTAsn1Boolean_Vtable));
     165    RT_NOREF_PV(pThis); RT_NOREF_PV(pfnCallback); RT_NOREF_PV(uDepth); RT_NOREF_PV(pvUser);
    163166
    164167    /* No children to enumerate. */
     
    190193    if (RT_UNLIKELY(!RTAsn1Boolean_IsPresent(pThis)))
    191194        return RTErrInfoSetF(pErrInfo, VERR_ASN1_NOT_PRESENT, "%s: Missing (BOOLEAN).", pszErrorTag);
     195    RT_NOREF_PV(fFlags);
    192196    return VINF_SUCCESS;
    193197}
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-core-decode.cpp

    r62477 r62564  
    4545        return VINF_SUCCESS;
    4646    }
     47    RT_NOREF_PV(fFlags);
    4748    RT_ZERO(*pThis);
    4849    return rc;
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-core.cpp

    r62477 r62564  
    206206RTDECL(int) RTAsn1Core_Init(PRTASN1CORE pThis, PCRTASN1ALLOCATORVTABLE pAllocator)
    207207{
     208    RT_NOREF_PV(pAllocator);
    208209    return RTAsn1Core_InitEx(pThis, 0, ASN1_TAGCLASS_CONTEXT | ASN1_TAGFLAG_PRIMITIVE,
    209210                             &g_RTAsn1Core_Vtable, RTASN1CORE_F_PRESENT);
     
    262263RTDECL(int) RTAsn1Core_CheckSanity(PCRTASN1CORE pThis, uint32_t fFlags, PRTERRINFO pErrInfo, const char *pszErrorTag)
    263264{
     265    RT_NOREF_PV(fFlags);
     266
    264267    /* We can only check that it's present. */
    265268    if (!RTAsn1Core_IsPresent(pThis))
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-dyntype-decode.cpp

    r62477 r62564  
    4343    RT_ZERO(*pDynType);
    4444
    45     Assert(!(fFlags & RTASN1CURSOR_GET_F_IMPLICIT));
     45    Assert(!(fFlags & RTASN1CURSOR_GET_F_IMPLICIT)); RT_NOREF_PV(fFlags);
    4646    uint32_t        cbSavedLeft = pCursor->cbLeft;
    4747    uint8_t const  *pbSavedCur  = pCursor->pbCur;
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-dyntype.cpp

    r62477 r62564  
    4545RTDECL(int) RTAsn1DynType_Init(PRTASN1DYNTYPE pThis, PCRTASN1ALLOCATORVTABLE pAllocator)
    4646{
     47    RT_NOREF_PV(pAllocator);
    4748    RT_ZERO(*pThis);
    4849    pThis->enmType = RTASN1TYPE_NOT_PRESENT;
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-integer.cpp

    r60030 r62564  
    403403RTDECL(int) RTAsn1Integer_Init(PRTASN1INTEGER pThis, PCRTASN1ALLOCATORVTABLE pAllocator)
    404404{
     405    RT_NOREF_PV(pAllocator);
    405406    RTAsn1Core_InitEx(&pThis->Asn1Core,
    406407                      ASN1_TAG_INTEGER,
     
    462463RTDECL(int) RTAsn1Integer_Enum(PRTASN1INTEGER pThis, PFNRTASN1ENUMCALLBACK pfnCallback, uint32_t uDepth, void *pvUser)
    463464{
     465    RT_NOREF_PV(pThis); RT_NOREF_PV(pfnCallback); RT_NOREF_PV(uDepth); RT_NOREF_PV(pvUser);
    464466    Assert(pThis && (!RTAsn1Integer_IsPresent(pThis) || pThis->Asn1Core.pOps == &g_RTAsn1Integer_Vtable));
    465467
     
    477479RTDECL(int) RTAsn1Integer_CheckSanity(PCRTASN1INTEGER pThis, uint32_t fFlags, PRTERRINFO pErrInfo, const char *pszErrorTag)
    478480{
     481    RT_NOREF_PV(fFlags);
    479482    if (RT_UNLIKELY(!RTAsn1Integer_IsPresent(pThis)))
    480483        return RTErrInfoSetF(pErrInfo, VERR_ASN1_NOT_PRESENT, "%s: Missing (INTEGER).", pszErrorTag);
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-null.cpp

    r62477 r62564  
    6767RTDECL(int) RTAsn1Null_Init(PRTASN1NULL pThis, PCRTASN1ALLOCATORVTABLE pAllocator)
    6868{
     69    RT_NOREF_PV(pAllocator);
    6970    return RTAsn1Core_InitEx(&pThis->Asn1Core, ASN1_TAG_NULL, ASN1_TAGCLASS_UNIVERSAL | ASN1_TAGFLAG_PRIMITIVE,
    7071                             &g_RTAsn1Null_Vtable, RTASN1CORE_F_PRESENT | RTASN1CORE_F_PRIMITE_TAG_STRUCT);
     
    7475RTDECL(int) RTAsn1Null_Clone(PRTASN1NULL pThis, PCRTASN1NULL pSrc, PCRTASN1ALLOCATORVTABLE pAllocator)
    7576{
    76     AssertPtr(pSrc); AssertPtr(pThis); AssertPtr(pAllocator);
     77    AssertPtr(pSrc); AssertPtr(pThis); AssertPtr(pAllocator); RT_NOREF_PV(pAllocator);
    7778    RT_ZERO(*pThis);
    7879    if (RTAsn1Null_IsPresent(pSrc))
     
    102103RTDECL(int) RTAsn1Null_Enum(PRTASN1NULL pThis, PFNRTASN1ENUMCALLBACK pfnCallback, uint32_t uDepth, void *pvUser)
    103104{
     105    RT_NOREF_PV(pThis); RT_NOREF_PV(pfnCallback); RT_NOREF_PV(uDepth); RT_NOREF_PV(pvUser);
    104106    Assert(pThis && (!RTAsn1Null_IsPresent(pThis) || pThis->Asn1Core.pOps == &g_RTAsn1Null_Vtable));
    105107
     
    120122RTDECL(int) RTAsn1Null_CheckSanity(PCRTASN1NULL pThis, uint32_t fFlags, PRTERRINFO pErrInfo, const char *pszErrorTag)
    121123{
     124    RT_NOREF_PV(fFlags);
    122125    if (RT_UNLIKELY(!RTAsn1Null_IsPresent(pThis)))
    123126        return RTErrInfoSetF(pErrInfo, VERR_ASN1_NOT_PRESENT, "%s: Missing (NULL).", pszErrorTag);
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-objid-decode.cpp

    r62477 r62564  
    233233                        }
    234234                        return RTAsn1CursorSetInfo(pCursor, VERR_ASN1_OBJID_TOO_LONG_STRING_FORM,
    235                                                    "Object ID has a too long string form: %#x (max %#x)",
    236                                                    cchObjId, RT_SIZEOFMEMB(RTASN1OBJID, szObjId));
     235                                                   "%s: Object ID has a too long string form: %#x (max %#x)",
     236                                                   pszErrorTag, cchObjId, RT_SIZEOFMEMB(RTASN1OBJID, szObjId));
    237237                    }
    238238                    return RTAsn1CursorSetInfo(pCursor, VERR_ASN1_OBJID_TOO_MANY_COMPONENTS,
    239                                                "Object ID has too many components: %#x (max 127)", cComponents);
     239                                               "%s: Object ID has too many components: %#x (max 127)", pszErrorTag, cComponents);
    240240                }
    241241
     
    244244            } while (rc > 0);
    245245        }
    246         rc = RTAsn1CursorSetInfo(pCursor, rc, "Bad object ID component #%u encoding: %.*Rhxs",
    247                                  cComponents, cbContent, pbContent);
     246        rc = RTAsn1CursorSetInfo(pCursor, rc, "%s: Bad object ID component #%u encoding: %.*Rhxs",
     247                                 pszErrorTag, cComponents, cbContent, pbContent);
    248248    }
    249249    else if (cbContent)
    250         rc = RTAsn1CursorSetInfo(pCursor, VERR_ASN1_INVALID_OBJID_ENCODING, "Object ID content is loo long: %#x", cbContent);
     250        rc = RTAsn1CursorSetInfo(pCursor, VERR_ASN1_INVALID_OBJID_ENCODING, "%s: Object ID content is loo long: %#x",
     251                                 pszErrorTag, cbContent);
    251252    else
    252         rc = RTAsn1CursorSetInfo(pCursor, VERR_ASN1_INVALID_OBJID_ENCODING, "Zero length object ID content");
     253        rc = RTAsn1CursorSetInfo(pCursor, VERR_ASN1_INVALID_OBJID_ENCODING, "%s: Zero length object ID content", pszErrorTag);
    253254    return rc;
    254255}
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-objid.cpp

    r62477 r62564  
    395395RTDECL(int) RTAsn1ObjId_Init(PRTASN1OBJID pThis, PCRTASN1ALLOCATORVTABLE pAllocator)
    396396{
     397    RT_NOREF_PV(pAllocator);
    397398    RTAsn1Core_InitEx(&pThis->Asn1Core,
    398399                      ASN1_TAG_OID,
     
    497498RTDECL(int) RTAsn1ObjId_Enum(PRTASN1OBJID pThis, PFNRTASN1ENUMCALLBACK pfnCallback, uint32_t uDepth, void *pvUser)
    498499{
     500    RT_NOREF_PV(pThis); RT_NOREF_PV(pfnCallback); RT_NOREF_PV(uDepth); RT_NOREF_PV(pvUser);
    499501    Assert(pThis && (!RTAsn1ObjId_IsPresent(pThis) || pThis->Asn1Core.pOps == &g_RTAsn1ObjId_Vtable));
    500502
     
    527529RTDECL(int) RTAsn1ObjId_CheckSanity(PCRTASN1OBJID pThis, uint32_t fFlags, PRTERRINFO pErrInfo, const char *pszErrorTag)
    528530{
     531    RT_NOREF_PV(fFlags);
    529532    if (RT_UNLIKELY(!RTAsn1ObjId_IsPresent(pThis)))
    530533        return RTErrInfoSetF(pErrInfo, VERR_ASN1_NOT_PRESENT, "%s: Missing (OBJID).", pszErrorTag);
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-octetstring.cpp

    r62477 r62564  
    7878{
    7979    RTASN1OCTETSTRINGWRITERCTX *pCtx = (RTASN1OCTETSTRINGWRITERCTX *)pvUser;
     80    RT_NOREF_PV(pErrInfo);
    8081    AssertReturn(cbToWrite <= pCtx->cbBuf - pCtx->offBuf, VERR_BUFFER_OVERFLOW);
    8182    if (memcmp(&pCtx->pbBuf[pCtx->offBuf], pvBuf, cbToWrite) != 0)
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-string.cpp

    r62477 r62564  
    17361736RTDECL(int) RTAsn1String_Enum(PRTASN1STRING pThis, PFNRTASN1ENUMCALLBACK pfnCallback, uint32_t uDepth, void *pvUser)
    17371737{
     1738    RT_NOREF_PV(pThis); RT_NOREF_PV(pfnCallback); RT_NOREF_PV(uDepth); RT_NOREF_PV(pvUser);
    17381739    Assert(pThis && (!RTAsn1String_IsPresent(pThis) || pThis->Asn1Core.pOps == &g_RTAsn1String_Vtable));
    17391740
     
    17521753RTDECL(int) RTAsn1String_CheckSanity(PCRTASN1STRING pThis, uint32_t fFlags, PRTERRINFO pErrInfo, const char *pszErrorTag)
    17531754{
     1755    RT_NOREF_PV(fFlags);
    17541756    if (RT_UNLIKELY(!RTAsn1String_IsPresent(pThis)))
    17551757        return RTErrInfoSetF(pErrInfo, VERR_ASN1_NOT_PRESENT, "%s: Missing (STRING).", pszErrorTag);
     
    17871789    RTDECL(int) RT_CONCAT(a_Api,_Enum)(PRTASN1STRING pThis, PFNRTASN1ENUMCALLBACK pfnCallback, uint32_t uDepth, void *pvUser) \
    17881790    { \
     1791        RT_NOREF_PV(pThis); RT_NOREF_PV(pfnCallback); RT_NOREF_PV(uDepth); RT_NOREF_PV(pvUser); \
    17891792        Assert(   pThis \
    17901793               && (   !RTAsn1String_IsPresent(pThis) \
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-time-decode.cpp

    r62477 r62564  
    305305RTDECL(int) RTAsn1Time_DecodeAsn1(PRTASN1CURSOR pCursor, uint32_t fFlags, PRTASN1TIME pThis, const char *pszErrorTag)
    306306{
    307     Assert(!(fFlags & RTASN1CURSOR_GET_F_IMPLICIT));
     307    Assert(!(fFlags & RTASN1CURSOR_GET_F_IMPLICIT)); RT_NOREF_PV(fFlags);
    308308    int rc = RTAsn1CursorReadHdr(pCursor, &pThis->Asn1Core, pszErrorTag);
    309309    if (RT_SUCCESS(rc))
  • trunk/src/VBox/Runtime/common/asn1/asn1-ut-time.cpp

    r62477 r62564  
    5555RTDECL(int) RTAsn1Time_InitEx(PRTASN1TIME pThis, uint32_t uTag, PCRTASN1ALLOCATORVTABLE pAllocator)
    5656{
     57    RT_NOREF_PV(pAllocator);
    5758    AssertReturn(uTag == ASN1_TAG_UTC_TIME || uTag == ASN1_TAG_GENERALIZED_TIME, VERR_INVALID_PARAMETER);
    5859    RTAsn1Core_InitEx(&pThis->Asn1Core,
     
    154155RTDECL(int) RTAsn1Time_Enum(PRTASN1TIME pThis, PFNRTASN1ENUMCALLBACK pfnCallback, uint32_t uDepth, void *pvUser)
    155156{
     157    RT_NOREF_PV(pThis); RT_NOREF_PV(pfnCallback); RT_NOREF_PV(uDepth); RT_NOREF_PV(pvUser);
    156158    Assert(pThis && (!RTAsn1Time_IsPresent(pThis) || pThis->Asn1Core.pOps == &g_RTAsn1Time_Vtable));
    157159
     
    190192RTDECL(int) RTAsn1Time_CheckSanity(PCRTASN1TIME pThis, uint32_t fFlags, PRTERRINFO pErrInfo, const char *pszErrorTag)
    191193{
     194    RT_NOREF_PV(fFlags);
    192195    if (RT_UNLIKELY(!RTAsn1Time_IsPresent(pThis)))
    193196        return RTErrInfoSetF(pErrInfo, VERR_ASN1_NOT_PRESENT, "%s: Missing (TIME).", pszErrorTag);
     
    225228    RTDECL(int) RT_CONCAT(a_Api,_Enum)(PRTASN1TIME pThis, PFNRTASN1ENUMCALLBACK pfnCallback, uint32_t uDepth, void *pvUser) \
    226229    { \
     230        RT_NOREF_PV(pThis); RT_NOREF_PV(pfnCallback); RT_NOREF_PV(uDepth); RT_NOREF_PV(pvUser); \
    227231        Assert(   pThis \
    228232               && (   !RTAsn1Time_IsPresent(pThis) \
  • trunk/src/VBox/Runtime/common/checksum/manifest2.cpp

    r62477 r62564  
    301301    AssertPtr(phManifestDst);
    302302
    303 
    304     /** @todo implement cloning. */
     303    RT_NOREF_PV(phManifestDst); /** @todo implement cloning. */
    305304
    306305    return VERR_NOT_IMPLEMENTED;
  • trunk/src/VBox/Runtime/common/crypto/digest-builtin.cpp

    r62477 r62564  
    6464static DECLCALLBACK(int) rtCrDigestMd2_Init(void *pvState, void *pvOpaque, bool fReInit)
    6565{
     66    RT_NOREF_PV(fReInit); RT_NOREF_PV(pvOpaque);
    6667    AssertReturn(pvOpaque == NULL, VERR_INVALID_PARAMETER);
    6768    RTMd2Init((PRTMD2CONTEXT)pvState);
     
    118119static DECLCALLBACK(int) rtCrDigestMd5_Init(void *pvState, void *pvOpaque, bool fReInit)
    119120{
     121    RT_NOREF_PV(pvOpaque); RT_NOREF_PV(fReInit);
    120122    AssertReturn(pvOpaque == NULL, VERR_INVALID_PARAMETER);
    121123    RTMd5Init((PRTMD5CONTEXT)pvState);
     
    172174static DECLCALLBACK(int) rtCrDigestSha1_Init(void *pvState, void *pvOpaque, bool fReInit)
    173175{
     176    RT_NOREF_PV(pvOpaque); RT_NOREF_PV(fReInit);
    174177    AssertReturn(pvOpaque == NULL, VERR_INVALID_PARAMETER);
    175178    RTSha1Init((PRTSHA1CONTEXT)pvState);
     
    226229static DECLCALLBACK(int) rtCrDigestSha256_Init(void *pvState, void *pvOpaque, bool fReInit)
    227230{
     231    RT_NOREF_PV(pvOpaque); RT_NOREF_PV(fReInit);
    228232    AssertReturn(pvOpaque == NULL, VERR_INVALID_PARAMETER);
    229233    RTSha256Init((PRTSHA256CONTEXT)pvState);
     
    279283static DECLCALLBACK(int) rtCrDigestSha512_Init(void *pvState, void *pvOpaque, bool fReInit)
    280284{
     285    RT_NOREF_PV(pvOpaque); RT_NOREF_PV(fReInit);
    281286    AssertReturn(pvOpaque == NULL, VERR_INVALID_PARAMETER);
    282287    RTSha512Init((PRTSHA512CONTEXT)pvState);
     
    332337static DECLCALLBACK(int) rtCrDigestSha224_Init(void *pvState, void *pvOpaque, bool fReInit)
    333338{
     339    RT_NOREF_PV(pvOpaque); RT_NOREF_PV(fReInit);
    334340    AssertReturn(pvOpaque == NULL, VERR_INVALID_PARAMETER);
    335341    RTSha224Init((PRTSHA224CONTEXT)pvState);
     
    385391static DECLCALLBACK(int) rtCrDigestSha384_Init(void *pvState, void *pvOpaque, bool fReInit)
    386392{
     393    RT_NOREF_PV(pvOpaque); RT_NOREF_PV(fReInit);
    387394    AssertReturn(pvOpaque == NULL, VERR_INVALID_PARAMETER);
    388395    RTSha384Init((PRTSHA384CONTEXT)pvState);
     
    439446static DECLCALLBACK(int) rtCrDigestSha512t224_Init(void *pvState, void *pvOpaque, bool fReInit)
    440447{
     448    RT_NOREF_PV(pvOpaque); RT_NOREF_PV(fReInit);
    441449    AssertReturn(pvOpaque == NULL, VERR_INVALID_PARAMETER);
    442450    RTSha512t224Init((PRTSHA512T224CONTEXT)pvState);
     
    493501static DECLCALLBACK(int) rtCrDigestSha512t256_Init(void *pvState, void *pvOpaque, bool fReInit)
    494502{
     503    RT_NOREF_PV(pvOpaque); RT_NOREF_PV(fReInit);
    495504    AssertReturn(pvOpaque == NULL, VERR_INVALID_PARAMETER);
    496505    RTSha512t256Init((PRTSHA512T256CONTEXT)pvState);
     
    639648static DECLCALLBACK(RTDIGESTTYPE) rtCrDigestOsslEvp_GetDigestType(void *pvState)
    640649{
    641     //EVP_MD_CTX *pThis = (EVP_MD_CTX *)pvState;
     650    RT_NOREF_PV(pvState); //EVP_MD_CTX *pThis = (EVP_MD_CTX *)pvState;
    642651    /** @todo figure which digest algorithm it is! */
    643652    return RTDIGESTTYPE_UNKNOWN;
  • trunk/src/VBox/Runtime/common/crypto/pemfile.cpp

    r62477 r62564  
    334334                                PCRTCRPEMSECTION *ppSectionHead, PRTERRINFO pErrInfo)
    335335{
     336    RT_NOREF_PV(pErrInfo);
     337
    336338    /*
    337339     * Input validation.
  • trunk/src/VBox/Runtime/common/crypto/pkcs7-asn1-decoder.cpp

    r62477 r62564  
    5757                                            const char *pszErrorTag)
    5858{
     59    RT_NOREF_PV(fFlags); RT_NOREF_PV(pszErrorTag);
    5960    pThis->u.pCore = NULL;
    6061
  • trunk/src/VBox/Runtime/common/crypto/pkcs7-sanity.cpp

    r62477 r62564  
    4444{
    4545    bool const fAuthenticode = RT_BOOL(fFlags & RTCRPKCS7SIGNEDDATA_SANITY_F_AUTHENTICODE);
     46    RT_NOREF_PV(fFlags);
    4647
    4748    //RTAsn1Dump(&pSignedData->SeqCore.Asn1Core, 0, 0, RTAsn1DumpStrmPrintfV, g_pStdOut);
     
    6162    if (pSignedData->DigestAlgorithms.cItems != 1 && fAuthenticode)
    6263        return RTErrInfoSetF(pErrInfo, VERR_CR_SPC_NOT_EXACTLY_ONE_DIGEST_ALGO,
    63                              "SignedData.DigestAlgorithms has more than one algorithm (%u)",
    64                              pSignedData->DigestAlgorithms.cItems);
     64                             "%s: SignedData.DigestAlgorithms has more than one algorithm (%u)",
     65                             pszErrorTag, pSignedData->DigestAlgorithms.cItems);
    6566
    6667    if (fFlags & RTCRPKCS7SIGNEDDATA_SANITY_F_ONLY_KNOWN_HASH)
     
    6970            if (RTCrX509AlgorithmIdentifier_QueryDigestType(&pSignedData->DigestAlgorithms.paItems[i]) == RTDIGESTTYPE_INVALID)
    7071                return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_UNKNOWN_DIGEST_ALGORITHM,
    71                                      "SignedData.DigestAlgorithms[%i] is not known: %s",
    72                                      i, pSignedData->DigestAlgorithms.paItems[i].Algorithm.szObjId);
     72                                     "%s: SignedData.DigestAlgorithms[%i] is not known: %s",
     73                                     pszErrorTag, i, pSignedData->DigestAlgorithms.paItems[i].Algorithm.szObjId);
    7374            if (pSignedData->DigestAlgorithms.paItems[i].Parameters.enmType != RTASN1TYPE_NULL)
    7475                return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_DIGEST_PARAMS_NOT_IMPL,
    75                                      "SignedData.DigestAlgorithms[%i] has parameters: tag=%u",
    76                                      i, pSignedData->DigestAlgorithms.paItems[i].Parameters.u.Core.uTag);
     76                                     "%s: SignedData.DigestAlgorithms[%i] has parameters: tag=%u",
     77                                     pszErrorTag, i, pSignedData->DigestAlgorithms.paItems[i].Parameters.u.Core.uTag);
    7778        }
    7879
     
    8283    if (   (fFlags & RTCRPKCS7SIGNEDDATA_SANITY_F_SIGNING_CERT_PRESENT)
    8384        && pSignedData->Certificates.cItems == 0)
    84         return RTErrInfoSet(pErrInfo, VERR_CR_PKCS7_NO_CERTIFICATES,
    85                             "SignedData.Certifcates is empty, expected at least one certificate");
     85        return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_NO_CERTIFICATES,
     86                             "%s: SignedData.Certifcates is empty, expected at least one certificate", pszErrorTag);
    8687
    8788    /*
     
    8990     */
    9091    if (fAuthenticode && RTAsn1Core_IsPresent(&pSignedData->Crls))
    91         return RTErrInfoSet(pErrInfo, VERR_CR_PKCS7_EXPECTED_NO_CRLS,
    92                             "SignedData.Crls is not empty as expected for authenticode.");
     92        return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_EXPECTED_NO_CRLS,
     93                             "%s: SignedData.Crls is not empty as expected for authenticode.", pszErrorTag);
    9394    /** @todo check Crls when they become important. */
    9495
     
    9798     */
    9899    if (pSignedData->SignerInfos.cItems == 0)
    99         return RTErrInfoSet(pErrInfo, VERR_CR_PKCS7_NO_SIGNER_INFOS, "SignedData.SignerInfos is empty?");
     100        return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_NO_SIGNER_INFOS, "%s: SignedData.SignerInfos is empty?", pszErrorTag);
    100101    if (fAuthenticode && pSignedData->SignerInfos.cItems != 1)
    101102        return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_EXPECTED_ONE_SIGNER_INFO,
    102                              "SignedData.SignerInfos should have one entry for authenticode: %u",
    103                              pSignedData->SignerInfos.cItems);
     103                             "%s: SignedData.SignerInfos should have one entry for authenticode: %u",
     104                             pszErrorTag, pSignedData->SignerInfos.cItems);
    104105
    105106    for (uint32_t i = 0; i < pSignedData->SignerInfos.cItems; i++)
     
    109110        if (RTAsn1Integer_UnsignedCompareWithU32(&pSignerInfo->Version, RTCRPKCS7SIGNERINFO_V1) != 0)
    110111            return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_SIGNER_INFO_VERSION,
    111                                  "SignedData.SignerInfos[%u] version is %llu, expected %u",
    112                                  i, pSignerInfo->Version.uValue.u, RTCRPKCS7SIGNERINFO_V1);
     112                                 "%s: SignedData.SignerInfos[%u] version is %llu, expected %u",
     113                                 pszErrorTag, i, pSignerInfo->Version.uValue.u, RTCRPKCS7SIGNERINFO_V1);
    113114
    114115        /* IssuerAndSerialNumber. */
     
    120121        if (pSignerInfo->IssuerAndSerialNumber.SerialNumber.Asn1Core.cb == 0)
    121122            return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_SIGNER_INFO_NO_ISSUER_SERIAL_NO,
    122                                  "SignedData.SignerInfos[%u].IssuerAndSerialNumber.SerialNumber is missing (zero length)", i);
     123                                 "%s: SignedData.SignerInfos[%u].IssuerAndSerialNumber.SerialNumber is missing (zero length)",
     124                                 pszErrorTag, i);
    123125
    124126        PCRTCRX509CERTIFICATE pCert;
     
    128130        if (!pCert && (fFlags & RTCRPKCS7SIGNEDDATA_SANITY_F_SIGNING_CERT_PRESENT))
    129131            return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_SIGNER_CERT_NOT_SHIPPED,
    130                                  "SignedData.SignerInfos[%u].IssuerAndSerialNumber not found in T0.Certificates", i);
     132                                 "%s: SignedData.SignerInfos[%u].IssuerAndSerialNumber not found in T0.Certificates",
     133                                 pszErrorTag, i);
    131134
    132135        /* DigestAlgorithm */
     
    138141        if (j >= pSignedData->DigestAlgorithms.cItems)
    139142            return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_DIGEST_ALGO_NOT_FOUND_IN_LIST,
    140                                  "SignedData.SignerInfos[%u].DigestAlgorithm (%s) not found in SignedData.DigestAlgorithms",
    141                                  i, pSignerInfo->DigestAlgorithm.Algorithm.szObjId);
     143                                 "%s: SignedData.SignerInfos[%u].DigestAlgorithm (%s) not found in SignedData.DigestAlgorithms",
     144                                 pszErrorTag, i, pSignerInfo->DigestAlgorithm.Algorithm.szObjId);
    142145
    143146        /* Digest encryption algorithm. */
     
    163166                {
    164167                    if (fFoundContentInfo)
    165                         return RTErrInfoSet(pErrInfo, VERR_CR_PKCS7_MISSING_CONTENT_TYPE_ATTRIB,
    166                                             "Multiple authenticated content-type attributes.");
     168                        return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_MISSING_CONTENT_TYPE_ATTRIB,
     169                                             "%s: Multiple authenticated content-type attributes.", pszErrorTag);
    167170                    fFoundContentInfo = true;
    168171                    AssertReturn(pAttrib->enmType == RTCRPKCS7ATTRIBUTETYPE_OBJ_IDS, VERR_INTERNAL_ERROR_3);
    169172                    if (pAttrib->uValues.pObjIds->cItems != 1)
    170173                        return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_BAD_CONTENT_TYPE_ATTRIB,
    171                                              "Expected exactly one value for content-type attrib, found: %u",
    172                                              pAttrib->uValues.pObjIds->cItems);
     174                                             "%s: Expected exactly one value for content-type attrib, found: %u",
     175                                             pszErrorTag, pAttrib->uValues.pObjIds->cItems);
    173176                }
    174177                else if (RTAsn1ObjId_CompareWithString(&pAttrib->Type, RTCR_PKCS9_ID_MESSAGE_DIGEST_OID) == 0)
    175178                {
    176179                    if (fFoundMessageDigest)
    177                         return RTErrInfoSet(pErrInfo, VERR_CR_PKCS7_MISSING_MESSAGE_DIGEST_ATTRIB,
    178                                             "Multiple authenticated message-digest attributes.");
     180                        return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_MISSING_MESSAGE_DIGEST_ATTRIB,
     181                                             "%s: Multiple authenticated message-digest attributes.", pszErrorTag);
    179182                    fFoundMessageDigest = true;
    180183                    AssertReturn(pAttrib->enmType == RTCRPKCS7ATTRIBUTETYPE_OCTET_STRINGS, VERR_INTERNAL_ERROR_3);
    181184                    if (pAttrib->uValues.pOctetStrings->cItems != 1)
    182185                        return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_BAD_CONTENT_TYPE_ATTRIB,
    183                                              "Expected exactly one value for message-digest attrib, found: %u",
    184                                              pAttrib->uValues.pOctetStrings->cItems);
     186                                             "%s: Expected exactly one value for message-digest attrib, found: %u",
     187                                             pszErrorTag, pAttrib->uValues.pOctetStrings->cItems);
    185188                }
    186189            }
    187190
    188191            if (!fFoundContentInfo)
    189                 return RTErrInfoSet(pErrInfo, VERR_CR_PKCS7_MISSING_CONTENT_TYPE_ATTRIB,
    190                                     "Missing authenticated content-type attribute.");
     192                return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_MISSING_CONTENT_TYPE_ATTRIB,
     193                                     "%s: Missing authenticated content-type attribute.", pszErrorTag);
    191194            if (!fFoundMessageDigest)
    192                 return RTErrInfoSet(pErrInfo, VERR_CR_PKCS7_MISSING_MESSAGE_DIGEST_ATTRIB,
    193                                     "Missing authenticated message-digest attribute.");
     195                return RTErrInfoSetF(pErrInfo, VERR_CR_PKCS7_MISSING_MESSAGE_DIGEST_ATTRIB,
     196                                     "%s: Missing authenticated message-digest attribute.", pszErrorTag);
    194197        }
    195198    }
  • trunk/src/VBox/Runtime/common/crypto/pkcs7-verify.cpp

    r62477 r62564  
    5353                                                 void const *pvContent, uint32_t cbContent, PRTERRINFO pErrInfo)
    5454{
     55    RT_NOREF_PV(fFlags);
     56
    5557    /*
    5658     * Verify using OpenSSL.
     
    149151                                               void *pvUser, PRTERRINFO pErrInfo)
    150152{
     153    RT_NOREF_PV(hCertPaths); RT_NOREF_PV(pvUser);
    151154    int rc = VINF_SUCCESS;
    152155
     
    169172                                                   void *pvUser, PRTERRINFO pErrInfo)
    170173{
     174    RT_NOREF_PV(hCertPaths); RT_NOREF_PV(pvUser);
    171175    int rc = VINF_SUCCESS;
    172176    if (fFlags & RTCRPKCS7VCC_F_SIGNED_DATA)
  • trunk/src/VBox/Runtime/common/crypto/pkix-signature-rsa.cpp

    r62477 r62564  
    140140                                                   bool fSigning, PCRTASN1BITSTRING pKey, PCRTASN1DYNTYPE pParams)
    141141{
     142    RT_NOREF_PV(pDesc); RT_NOREF_PV(pvState); RT_NOREF_PV(pvOpaque);
     143
    142144    if (pParams)
    143145        return VERR_CR_PKIX_SIGNATURE_TAKES_NO_PARAMETERS;
     
    199201{
    200202    PRTCRPKIXSIGNATURERSA pThis = (PRTCRPKIXSIGNATURERSA)pvState;
     203    RT_NOREF_PV(fSigning); RT_NOREF_PV(pDesc);
    201204    Assert(pThis->fSigning == fSigning); NOREF(pThis);
    202205    return VINF_SUCCESS;
     
    208211{
    209212    PRTCRPKIXSIGNATURERSA pThis = (PRTCRPKIXSIGNATURERSA)pvState;
    210     Assert(pThis->fSigning == fSigning); NOREF(pThis);
     213    RT_NOREF_PV(fSigning); RT_NOREF_PV(pDesc);
     214    Assert(pThis->fSigning == fSigning);
    211215
    212216    RTBigNumDestroy(&pThis->Modulus);
     
    297301{
    298302    PRTCRPKIXSIGNATURERSA pThis = (PRTCRPKIXSIGNATURERSA)pvState;
     303    RT_NOREF_PV(pDesc);
    299304    Assert(!pThis->fSigning);
    300305    if (cbSignature > sizeof(pThis->Scratch) / 2)
     
    386391{
    387392    PRTCRPKIXSIGNATURERSA pThis = (PRTCRPKIXSIGNATURERSA)pvState;
     393    RT_NOREF_PV(pDesc);  RT_NOREF_PV(hDigest); RT_NOREF_PV(pvSignature); RT_NOREF_PV(pcbSignature);
    388394    Assert(pThis->fSigning); NOREF(pThis);
    389395    return VERR_NOT_IMPLEMENTED;
  • trunk/src/VBox/Runtime/common/crypto/spc-asn1-decoder.cpp

    r62477 r62564  
    4848
    4949{
     50    RT_NOREF_PV(fFlags); RT_NOREF_PV(pszErrorTag);
     51
    5052    int rc;
    5153    RTASN1CURSOR SubCursor;
  • trunk/src/VBox/Runtime/common/crypto/store-inmem.cpp

    r62477 r62564  
    228228                                                               uint8_t *pbKey, size_t cbKey, size_t *pcbKeyRet)
    229229{
     230    RT_NOREF_PV(pvProvider); RT_NOREF_PV(pCertCtx); RT_NOREF_PV(pbKey); RT_NOREF_PV(cbKey); RT_NOREF_PV(pcbKeyRet);
    230231    //PRTCRSTOREINMEM pThis = (PRTCRSTOREINMEM)pvProvider;
    231232    return VERR_NOT_FOUND;
  • trunk/src/VBox/Runtime/common/crypto/store.cpp

    r62477 r62564  
    323323    AssertPtrReturn(pThis, VERR_INVALID_HANDLE);
    324324    AssertReturn(pThis->u32Magic == RTCRSTOREINT_MAGIC, VERR_INVALID_HANDLE);
     325    RT_NOREF_PV(fFlags);
    325326
    326327    /*
     
    376377    AssertPtrReturn(pThis, VERR_INVALID_HANDLE);
    377378    AssertReturn(pThis->u32Magic == RTCRSTOREINT_MAGIC, VERR_INVALID_HANDLE);
     379    RT_NOREF_PV(fFlags);
    378380
    379381    /*
  • trunk/src/VBox/Runtime/common/crypto/x509-asn1-decoder.cpp

    r62477 r62564  
    4444                                                   PRTCRX509EXTENSION pThis, const char *pszErrorTag)
    4545{
     46    RT_NOREF_PV(fFlags); RT_NOREF_PV(pszErrorTag);
     47
    4648    pThis->enmValue = RTCRX509EXTENSIONVALUE_UNKNOWN;
    4749
  • trunk/src/VBox/Runtime/common/crypto/x509-certpaths.cpp

    r62477 r62564  
    750750        pNode = pParent;
    751751    }
     752
     753    RT_NOREF_PV(pThis);
    752754}
    753755
     
    11371139                                           uint32_t uVerbosity, PFNRTDUMPPRINTFV pfnPrintfV, void *pvUser)
    11381140{
     1141    RT_NOREF_PV(pThis);
    11391142    rtDumpPrintf(pfnPrintfV, pvUser, "Path #%u: %s, %u deep, rcVerify=%Rrc\n",
    11401143                 iPath, RTCRX509CERTPATHNODE_SRC_IS_TRUSTED(pCurLeaf->uSrc) ? "trusted" : "untrusted", pCurLeaf->uDepth,
  • trunk/src/VBox/Runtime/common/crypto/x509-sanity.cpp

    r62477 r62564  
    4141static int rtCrX509Validity_CheckSanityExtra(PCRTCRX509VALIDITY pThis, uint32_t fFlags, PRTERRINFO pErrInfo, const char *pszErrorTag)
    4242{
     43    RT_NOREF_PV(fFlags);
     44
    4345    if (RTAsn1Time_Compare(&pThis->NotBefore, &pThis->NotAfter) > 0)
    4446        return RTErrInfoSetF(pErrInfo, VERR_CR_X509_VALIDITY_SWAPPED, "%s: NotBefore is after NotAfter", pszErrorTag);
     
    5052static int rtCrX509Name_CheckSanityExtra(PCRTCRX509NAME pThis, uint32_t fFlags, PRTERRINFO pErrInfo, const char *pszErrorTag)
    5153{
     54    RT_NOREF_PV(fFlags);
     55
    5256    if (pThis->cItems == 0)
    5357        return RTErrInfoSetF(pErrInfo, VERR_CR_X509_NAME_EMPTY_SET, "%s: Has no components.", pszErrorTag);
     
    9498                                                         PRTERRINFO pErrInfo, const char *pszErrorTag)
    9599{
     100    RT_NOREF_PV(fFlags);
    96101    if (pThis->SubjectPublicKey.cBits <= 32)
    97102        return RTErrInfoSetF(pErrInfo, VERR_CR_X509_PUBLIC_KEY_TOO_SMALL,
     
    104109                                                   PRTERRINFO pErrInfo, const char *pszErrorTag)
    105110{
     111    RT_NOREF_PV(fFlags);
     112
    106113    if (   RTAsn1Integer_IsPresent(&pThis->T0.Version)
    107114        && RTAsn1Integer_UnsignedCompareWithU32(&pThis->T0.Version, RTCRX509TBSCERTIFICATE_V1) != 0
     
    134141                                               PRTERRINFO pErrInfo, const char *pszErrorTag)
    135142{
     143    RT_NOREF_PV(fFlags);
     144
    136145    if (RTCrX509AlgorithmIdentifier_Compare(&pThis->SignatureAlgorithm, &pThis->TbsCertificate.Signature) != 0)
    137146        return RTErrInfoSetF(pErrInfo, VERR_CR_X509_CERT_TBS_SIGN_ALGO_MISMATCH,
  • trunk/src/VBox/Runtime/common/dbg/dbgcfg.cpp

    r62477 r62564  
    870870
    871871#else  /* !IPRT_WITH_HTTP */
     872    RT_NOREF_PV(pThis); RT_NOREF_PV(pszServer); RT_NOREF_PV(pszPath); RT_NOREF_PV(pszCacheSubDir);
     873    RT_NOREF_PV(pszUuidMappingSubDir); RT_NOREF_PV(pSplitFn); RT_NOREF_PV(pszCacheSuffix); RT_NOREF_PV(fFlags);
     874    RT_NOREF_PV(pfnCallback); RT_NOREF_PV(pvUser1); RT_NOREF_PV(pvUser2);
    872875    return VWRN_NOT_FOUND;
    873876#endif /* !IPRT_WITH_HTTP */
     
    878881                                   const char *pszCacheSubDir, const char *pszUuidMappingSubDir, PRTPATHSPLIT pSplitFn)
    879882{
     883    RT_NOREF_PV(pThis); RT_NOREF_PV(pszSrc); RT_NOREF_PV(pchCache); RT_NOREF_PV(cchCache);
     884    RT_NOREF_PV(pszUuidMappingSubDir); RT_NOREF_PV(pSplitFn);
     885
    880886    if (!pszCacheSubDir || !*pszCacheSubDir)
    881887        return VINF_SUCCESS;
     
    13151321                              PFNRTDBGCFGOPEN pfnCallback, void *pvUser1, void *pvUser2)
    13161322{
     1323    RT_NOREF_PV(cbImage);
    13171324    /** @todo test this! */
    13181325    char szSubDir[32];
     
    18651872                                    PRTLISTANCHOR pList)
    18661873{
     1874    RT_NOREF_PV(pThis); RT_NOREF_PV(fPaths);
     1875
    18671876    if (enmOp == RTDBGCFGOP_SET)
    18681877        rtDbgCfgFreeStrList(pList);
     
    19391948                                   PCRTDBGCFGU64MNEMONIC paMnemonics, uint64_t *puValue)
    19401949{
     1950    RT_NOREF_PV(pThis);
     1951
    19411952    uint64_t    uNew = enmOp == RTDBGCFGOP_SET ? 0 : *puValue;
    1942 
    19431953    char        ch;
    19441954    while ((ch = *pszValue))
     
    20952105                                   char *pszValue, size_t cbValue)
    20962106{
     2107    RT_NOREF_PV(hDbgCfg);
     2108
    20972109    /*
    20982110     * Check the length first.
     
    21352147                                  char *pszValue, size_t cbValue)
    21362148{
     2149    RT_NOREF_PV(hDbgCfg);
     2150
    21372151    /*
    21382152     * If no mnemonics, just return the hex value.
  • trunk/src/VBox/Runtime/common/dbg/dbgmod.cpp

    r62477 r62564  
    369369                                  RTUINTPTR uSubtrahend, RTDBGCFG hDbgCfg)
    370370{
     371    RT_NOREF_PV(hDbgCfg);
     372
    371373    /*
    372374     * Input validation and lazy initialization.
     
    505507    PRTDBGMODINT        pDbgMod   = (PRTDBGMODINT)pvUser1;
    506508    PCRTLDRDBGINFO      pDbgInfo  = (PCRTLDRDBGINFO)pvUser2;
    507     NOREF(pDbgInfo); /** @todo consider a more direct search for a interpreter. */
     509    RT_NOREF_PV(pDbgInfo); /** @todo consider a more direct search for a interpreter. */
     510    RT_NOREF_PV(hDbgCfg);
    508511
    509512    Assert(!pDbgMod->pDbgVt);
     
    563566{
    564567    RTDBGMODOPENDIETI *pArgs = (RTDBGMODOPENDIETI *)pvUser;
     568    RT_NOREF_PV(hLdrMod);
    565569
    566570    Assert(pDbgInfo->enmType > RTLDRDBGINFOTYPE_INVALID && pDbgInfo->enmType < RTLDRDBGINFOTYPE_END);
     
    675679{
    676680    PRTDBGMODINT        pDbgMod   = (PRTDBGMODINT)pvUser1;
    677     NOREF(pvUser2); /** @todo image matching string or smth. */
     681    RT_NOREF_PV(pvUser2); /** @todo image matching string or smth. */
     682    RT_NOREF_PV(hDbgCfg);
    678683
    679684    Assert(!pDbgMod->pDbgVt);
     
    945950    PRTDBGMODDEFERRED   pDeferred = (PRTDBGMODDEFERRED)pvUser2;
    946951    LogFlow(("rtDbgModFromPeImageOpenCallback: %s\n", pszFilename));
     952    RT_NOREF_PV(hDbgCfg);
    947953
    948954    Assert(pDbgMod->pImgVt == NULL);
     
    12121218    PRTDBGMODINT        pDbgMod = (PRTDBGMODINT)pvUser1;
    12131219    PCRTDBGMODMACHOARGS pArgs   = (PCRTDBGMODMACHOARGS)pvUser2;
     1220    RT_NOREF_PV(hDbgCfg);
    12141221
    12151222    Assert(!pDbgMod->pDbgVt);
     
    13311338                                        uint32_t cSegs, PCRTDBGSEGMENT paSegs, PCRTUUID pUuid, RTDBGCFG hDbgCfg)
    13321339{
     1340    RT_NOREF_PV(cbImage); RT_NOREF_PV(cSegs); RT_NOREF_PV(paSegs);
     1341
    13331342    RTDBGMODMACHOARGS Args;
    13341343    Args.enmArch    = enmArch;
  • trunk/src/VBox/Runtime/common/dbg/dbgmodcodeview.cpp

    r62477 r62564  
    582582                               uint32_t cchName, uint32_t fFlags, uint32_t cbSym)
    583583{
     584    RT_NOREF_PV(fFlags);
    584585    const char *pszName = rtDbgModCvAddSanitizedStringToCache(pchName, cchName);
    585586    int rc;
     
    667668    RTCPTRUNION uCursor;
    668669    uCursor.pv = pvSymTab;
     670
     671    RT_NOREF_PV(fFlags);
    669672
    670673    while (cbSymTab > 0 && RT_SUCCESS(rc))
     
    827830static int rtDbgModCvSsProcessV8SrcStrings(PRTDBGMODCV pThis, void const *pvSrcStrings, size_t cbSrcStrings, uint32_t fFlags)
    828831{
     832    RT_NOREF_PV(fFlags);
     833
    829834    if (pThis->cbSrcStrings)
    830835        Log(("\n!!More than one source file string table for this module!!\n\n"));
     
    872877static int rtDbgModCvSsProcessV8SrcInfo(PRTDBGMODCV pThis, void const *pvSrcInfo, size_t cbSrcInfo, uint32_t fFlags)
    873878{
     879    RT_NOREF_PV(fFlags);
     880
    874881    if (pThis->cbSrcInfo)
    875882        Log(("\n!!More than one source file info table for this module!!\n\n"));
     
    903910static int rtDbgModCvSsProcessV8SectLines(PRTDBGMODCV pThis, void const *pvSectLines, size_t cbSectLines, uint32_t fFlags)
    904911{
     912    RT_NOREF_PV(fFlags);
     913
    905914    /*
    906915     * Starts with header.
     
    10981107{
    10991108    PCRTCVGLOBALSYMTABHDR pHdr = (PCRTCVGLOBALSYMTABHDR)pvSubSect;
     1109    RT_NOREF_PV(pDirEnt);
    11001110
    11011111    /*
     
    11241134rtDbgModCvSs_Module(PRTDBGMODCV pThis, void const *pvSubSect, size_t cbSubSect, PCRTCVDIRENT32 pDirEnt)
    11251135{
     1136    RT_NOREF_PV(pDirEnt);
     1137
    11261138    RTCPTRUNION uCursor;
    11271139    uCursor.pv = pvSubSect;
     
    11621174rtDbgModCvSs_Symbols_PublicSym_AlignSym(PRTDBGMODCV pThis, void const *pvSubSect, size_t cbSubSect, PCRTCVDIRENT32 pDirEnt)
    11631175{
     1176    RT_NOREF_PV(pDirEnt);
    11641177    RTDBGMODCV_CHECK_NOMSG_RET_BF(pThis->uCurStyle == RT_MAKE_U16('C', 'V'));
    11651178    RTDBGMODCV_CHECK_NOMSG_RET_BF(cbSubSect >= 8);
     
    11801193rtDbgModCvSs_SrcModule(PRTDBGMODCV pThis, void const *pvSubSect, size_t cbSubSect, PCRTCVDIRENT32 pDirEnt)
    11811194{
     1195    RT_NOREF_PV(pDirEnt);
    11821196    Log(("rtDbgModCvSs_SrcModule: uCurStyle=%#x\n%.*Rhxd\n", pThis->uCurStyle, cbSubSect, pvSubSect));
    11831197
     
    16601674    if (pEntry1->uSubSectType > pEntry2->uSubSectType)
    16611675        return 1;
     1676
     1677    RT_NOREF_PV(pvUser);
    16621678    return 0;
    16631679}
     
    21102126                                         PCIMAGE_LINENUMBER paLines, uint32_t cLines)
    21112127{
     2128    RT_NOREF_PV(iSection);
    21122129    Log4(("Adding %u line numbers in section #%u  for %s\n", cLines, iSection, pszFile));
    21132130    PCIMAGE_LINENUMBER pCur = paLines;
     
    24392456{
    24402457    PRTDBGMODCV pThis = (PRTDBGMODCV)pMod->pvDbgPriv;
    2441     Assert(!pszSymbol[cchSymbol]);
     2458    Assert(!pszSymbol[cchSymbol]); RT_NOREF_PV(cchSymbol);
    24422459    return RTDbgModSymbolByName(pThis->hCnt, pszSymbol/*, cchSymbol*/, pSymInfo);
    24432460}
     
    25722589static int rtDbgModCvAddSegmentsFromDbg(PRTDBGMODCV pThis, PCIMAGE_SEPARATE_DEBUG_HEADER pDbgHdr, const char *pszFilename)
    25732590{
     2591    RT_NOREF_PV(pszFilename);
     2592
    25742593    /*
    25752594     * Validate the header fields a little.
     
    27412760                               uint32_t off, uint32_t cb, const char *pszFilename)
    27422761{
     2762    RT_NOREF_PV(pszFilename);
     2763
    27432764    /*
    27442765     * Check that there is sufficient data for a header, then read it.
     
    28342855{
    28352856    int rc = VERR_DBG_NO_MATCHING_INTERPRETER;
     2857    RT_NOREF_PV(enmArch); RT_NOREF_PV(pszFilename);
    28362858
    28372859    /* Is a codeview format we (wish to) support? */
     
    28782900    PRTDBGMODINT pDbgMod = (PRTDBGMODINT)pvUser;
    28792901    Assert(!pDbgMod->pvDbgPriv);
     2902    RT_NOREF_PV(hLdrMod);
    28802903
    28812904    /* Skip external files, RTDbgMod will deal with those
  • trunk/src/VBox/Runtime/common/dbg/dbgmoddwarf.cpp

    r62477 r62564  
    35303530static int rtDwarfLoc_Evaluate(PRTDWARFLOCST pLoc, void *pvLater, void *pvUser)
    35313531{
     3532    RT_NOREF_PV(pvLater); RT_NOREF_PV(pvUser);
     3533
    35323534    while (!rtDwarfCursor_IsAtEndOfUnit(&pLoc->Cursor))
    35333535    {
     
    44244426{
    44254427    PRTDBGMODDWARF pThis = (PRTDBGMODDWARF)pvUser;
    4426     NOREF(hLdrMod);
     4428    RT_NOREF_PV(hLdrMod); RT_NOREF_PV(uSymbol);
    44274429    Assert(pThis->iWatcomPass != 1);
    44284430
     
    45564558{
    45574559    PRTDBGMODDWARF pThis = (PRTDBGMODDWARF)pMod->pvDbgPriv;
    4558     Assert(!pszSymbol[cchSymbol]);
     4560    Assert(!pszSymbol[cchSymbol]); RT_NOREF_PV(cchSymbol);
    45594561    return RTDbgModSymbolByName(pThis->hCnt, pszSymbol/*, cchSymbol*/, pSymInfo);
    45604562}
     
    46704672static DECLCALLBACK(int) rtDbgModDwarfEnumCallback(RTLDRMOD hLdrMod, PCRTLDRDBGINFO pDbgInfo, void *pvUser)
    46714673{
     4674    RT_NOREF_PV(hLdrMod);
     4675
    46724676    /*
    46734677     * Skip stuff we can't handle.
  • trunk/src/VBox/Runtime/common/dbg/dbgmodldr.cpp

    r62477 r62564  
    8989{
    9090    PRTDBGMODLDR pThis = (PRTDBGMODLDR)pMod->pvImgPriv;
     91    RT_NOREF_PV(iDbgInfoHint);
    9192    return rtLdrReadAt(pThis->hLdrMod, pvBuf, UINT32_MAX /** @todo iDbgInfo*/, off, cb);
    9293}
  • trunk/src/VBox/Runtime/common/ldr/ldrELF.cpp

    r62477 r62564  
    123123    const char *pszLogName = pReader->pfnLogName(pReader); NOREF(pszLogName);
    124124
     125    RT_NOREF_PV(pErrInfo); /** @todo implement */
     126
    125127    /*
    126128     * Read the ident to decide if this is 32-bit or 64-bit
  • trunk/src/VBox/Runtime/common/ldr/ldrELFRelocatable.cpp.h

    r62477 r62564  
    10201020{
    10211021    PRTLDRMODELF pModElf = (PRTLDRMODELF)pMod;
     1022    RT_NOREF_PV(pvBits);
    10221023
    10231024    /*
     
    12901291                                                              unsigned uSymbol, PRTLDRADDR pValue, void *pvUser)
    12911292{
     1293    RT_NOREF_PV(hLdrMod); RT_NOREF_PV(pszModule); RT_NOREF_PV(pszSymbol);
     1294    RT_NOREF_PV(uSymbol); RT_NOREF_PV(pValue); RT_NOREF_PV(pvUser);
    12921295    return VERR_SYMBOL_NOT_FOUND;
    12931296}
     
    17441747    const char *pszLogName = pReader->pfnLogName(pReader);
    17451748    RTFOFF      cbRawImage = pReader->pfnSize(pReader);
     1749    RT_NOREF_PV(fFlags);
    17461750
    17471751    /*
  • trunk/src/VBox/Runtime/common/ldr/ldrPE.cpp

    r62477 r62564  
    27662766    return rc;
    27672767#else
     2768    RT_NOREF_PV(pMod); RT_NOREF_PV(pfnCallback); RT_NOREF_PV(pvUser); RT_NOREF_PV(pErrInfo);
    27682769    return VERR_NOT_SUPPORTED;
    27692770#endif
     
    30543055static int rtldrPEValidateFileHeader(PIMAGE_FILE_HEADER pFileHdr, uint32_t fFlags, const char *pszLogName, PRTLDRARCH penmArch)
    30553056{
     3057    RT_NOREF_PV(pszLogName);
     3058
    30563059    size_t cbOptionalHeader;
    30573060    switch (pFileHdr->Machine)
     
    31153118                                         const IMAGE_FILE_HEADER *pFileHdr, RTFOFF cbRawImage, uint32_t fFlags)
    31163119{
     3120    RT_NOREF_PV(pszLogName);
     3121
    31173122    const uint16_t CorrectMagic = pFileHdr->SizeOfOptionalHeader == sizeof(IMAGE_OPTIONAL_HEADER32)
    31183123                                ? IMAGE_NT_OPTIONAL_HDR32_MAGIC : IMAGE_NT_OPTIONAL_HDR64_MAGIC;
     
    33063311                                         const IMAGE_OPTIONAL_HEADER64 *pOptHdr, RTFOFF cbRawImage, uint32_t fFlags, bool fNoCode)
    33073312{
     3313    RT_NOREF_PV(pszLogName);
     3314
    33083315    const uint32_t              cbImage  = pOptHdr->SizeOfImage;
    33093316    const IMAGE_SECTION_HEADER *pSH      = &paSections[0];
  • trunk/src/VBox/Runtime/common/ldr/ldrkStuff.cpp

    r62477 r62564  
    600600{
    601601    PRTLDRMODKLDRARGS pArgs = (PRTLDRMODKLDRARGS)pvUser;
    602     NOREF(pMod);
     602    RT_NOREF_PV(pMod); RT_NOREF_PV(iMajorVer); RT_NOREF_PV(iMinorVer);
     603
    603604
    604605    RTLDRDBGINFO DbgInfo;
     
    832833{
    833834    PRTLDRMODKLDR   pThis = (PRTLDRMODKLDR)pMod;
     835    RT_NOREF_PV(iDbgInfo);
    834836    /** @todo May have to apply fixups here. */
    835837    return pThis->Core.pReader->pfnRead(pThis->Core.pReader, pvBuf, cb, off);
     
    850852                return VERR_NOT_FOUND;
    851853            AssertReturn(rc == 0, VERR_INVALID_PARAMETER);
     854            cbBuf = RT_MIN(cbBuf, sizeof(RTUUID));
    852855            break;
    853856
    854857        default:
     858            RT_NOREF_PV(pvBits);
    855859            return VERR_NOT_FOUND;
    856860    }
     861    if (pcbRet)
     862        *pcbRet = cbBuf;
    857863    return VINF_SUCCESS;
    858864}
     
    901907int rtldrkLdrOpen(PRTLDRREADER pReader, uint32_t fFlags, RTLDRARCH enmArch, PRTLDRMOD phLdrMod, PRTERRINFO pErrInfo)
    902908{
     909    RT_NOREF_PV(pErrInfo);
     910
    903911    /* Convert enmArch to k-speak. */
    904912    KCPUARCH enmCpuArch;
  • trunk/src/VBox/Runtime/common/misc/json.cpp

    r62461 r62564  
    432432        if (   !rtJsonTokenizerIsEos(pTokenizer)
    433433            && !rtJsonTokenizerIsSkipNewLine(pTokenizer))
    434         {
    435434            break; /* Skipped everything, next is some real content. */
    436         }
    437435    }
    438436}
     
    723721static void rtJsonTokenizerDestroy(PRTJSONTOKENIZER pTokenizer)
    724722{
    725 
     723    RT_NOREF_PV(pTokenizer);
    726724}
    727725
     
    11421140                                                      size_t *pcbRead)
    11431141{
    1144     int rc = VINF_SUCCESS;
    11451142    PRTJSONREADERARGS pArgs = (PRTJSONREADERARGS)pvUser;
     1143
     1144    RT_NOREF_PV(offInput);
     1145
    11461146    size_t cbRead = 0;
    1147 
    1148     rc = RTStrmReadEx(pArgs->u.hStream, pvBuf, cbBuf, &cbRead);
     1147    int rc = RTStrmReadEx(pArgs->u.hStream, pvBuf, cbBuf, &cbRead);
    11491148    if (RT_SUCCESS(rc))
    11501149        *pcbRead = cbRead;
     
    11601159    AssertReturn(cbBuf > 0, VERR_INVALID_PARAMETER);
    11611160
    1162     int rc = VINF_SUCCESS;
     1161    RTJSONTOKENIZER Tokenizer;
    11631162    RTJSONREADERARGS Args;
    1164     RTJSONTOKENIZER Tokenizer;
    1165 
    11661163    Args.cbData  = cbBuf;
    11671164    Args.u.pbBuf = pbBuf;
    11681165
    1169     rc = rtJsonTokenizerInit(&Tokenizer, rtJsonTokenizerParseFromBuf, &Args);
     1166    int rc = rtJsonTokenizerInit(&Tokenizer, rtJsonTokenizerParseFromBuf, &Args);
    11701167    if (RT_SUCCESS(rc))
    11711168    {
     
    11821179    AssertPtrReturn(pszStr, VERR_INVALID_POINTER);
    11831180
    1184     int rc = VINF_SUCCESS;
    11851181    RTJSONTOKENIZER Tokenizer;
    1186 
    1187     rc = rtJsonTokenizerInit(&Tokenizer, rtJsonTokenizerParseFromString, (void *)pszStr);
     1182    int rc = rtJsonTokenizerInit(&Tokenizer, rtJsonTokenizerParseFromString, (void *)pszStr);
    11881183    if (RT_SUCCESS(rc))
    11891184    {
  • trunk/src/VBox/Runtime/common/misc/lockvalidator.cpp

    r62477 r62564  
    30613061    if (pRecU->Excl.hThread == hThreadSelf)
    30623062    {
    3063         Assert(!fFirstRecursion);
     3063        Assert(!fFirstRecursion); RT_NOREF_PV(fFirstRecursion);
    30643064        pRecU->Excl.cRecursion++;
    30653065        rtLockValidatorStackPushRecursion(hThreadSelf, pRecU, pSrcPos);
     
    30983098    {
    30993099        Assert(c < UINT32_C(0xffff0000));
    3100         Assert(!fFinalRecursion);
     3100        Assert(!fFinalRecursion); RT_NOREF_PV(fFinalRecursion);
    31013101        rtLockValidatorStackPopRecursion(pThread, pRec);
    31023102    }
  • trunk/src/VBox/Runtime/common/path/RTPathGlob.cpp

    r62477 r62564  
    459459                                             PRTPATHMATCHCACHE pCache)
    460460{
     461    RT_NOREF_PV(pCache);
     462
    461463    /*
    462464     * Query the PATH value.
     
    16501652    if (!(pGlob->fFlags & (RTPATHGLOB_F_NO_DIRS | RTPATHGLOB_F_ONLY_DIRS)))
    16511653        return true;
    1652     return RT_BOOL(pGlob->fFlags & RTPATHGLOB_F_ONLY_DIRS) == RTFS_IS_DIRECTORY(pGlob->u.ObjInfo.Attr.fMode);
     1654    return RT_BOOL(pGlob->fFlags & RTPATHGLOB_F_ONLY_DIRS) == RTFS_IS_DIRECTORY(fMode);
    16531655}
    16541656
     
    16701672{
    16711673    /** @todo implement multi subdir matching. */
     1674    RT_NOREF_PV(pGlob);
     1675    RT_NOREF_PV(offPath);
     1676    RT_NOREF_PV(iStarStarComp);
     1677    RT_NOREF_PV(offStarStarPath);
    16721678    return VERR_PATH_MATCH_FEATURE_NOT_IMPLEMENTED;
    16731679}
  • trunk/src/VBox/Runtime/common/string/strcache.cpp

    r62477 r62564  
    349349        RTMemFree(pThis);
    350350    }
     351
     352    RT_NOREF_PV(pszName);
    351353    return rc;
    352354}
     
    431433    }
    432434# endif
     435    RT_NOREF_PV(pThis);
    433436}
    434437#else
  • trunk/src/VBox/Runtime/common/string/strformatrt.cpp

    r62477 r62564  
    375375
    376376                AssertMsg(!chArgSize, ("Not argument size '%c' for RT types! '%.10s'\n", chArgSize, pszFormatOrg));
     377                RT_NOREF_PV(chArgSize);
    377378
    378379                /*
  • trunk/src/VBox/Runtime/common/vfs/vfsiosmisc.cpp

    r62477 r62564  
    220220    /* Make sure the caller isn't messing with us. Hardcoded, but works. */
    221221    Assert(((size_t *)pvBuf)[0] == READ_ALL_HEADER_MAGIC);
    222     Assert(((size_t *)pvBuf)[1] == cbBuf);
     222    Assert(((size_t *)pvBuf)[1] == cbBuf); RT_NOREF_PV(cbBuf);
    223223
    224224    /* Free it. */
  • trunk/src/VBox/Runtime/common/zip/pkzip.cpp

    r62477 r62564  
    9191    PMEMIOSTREAM pThis = (PMEMIOSTREAM)pvThis;
    9292    Assert(pSgBuf->cSegs == 1);
     93    RT_NOREF_PV(fBlocking);
    9394
    9495    if (off < 0)
     
    119120static DECLCALLBACK(int) memFssIos_Write(void *pvThis, RTFOFF off, PCRTSGBUF pSgBuf, bool fBlocking, size_t *pcbWritten)
    120121{
     122    RT_NOREF_PV(pvThis); RT_NOREF_PV(off); RT_NOREF_PV(pSgBuf); RT_NOREF_PV(fBlocking); RT_NOREF_PV(pcbWritten);
    121123    return VERR_NOT_IMPLEMENTED;
    122124}
     
    127129static DECLCALLBACK(int) memFssIos_Flush(void *pvThis)
    128130{
     131    RT_NOREF_PV(pvThis);
    129132    return VERR_NOT_IMPLEMENTED;
    130133}
     
    135138static DECLCALLBACK(int) memFssIos_PollOne(void *pvThis, uint32_t fEvents, RTMSINTERVAL cMillies, bool fIntr, uint32_t *pfRetEvents)
    136139{
     140    RT_NOREF_PV(pvThis); RT_NOREF_PV(fEvents); RT_NOREF_PV(cMillies); RT_NOREF_PV(fIntr); RT_NOREF_PV(pfRetEvents);
    137141    return VERR_NOT_IMPLEMENTED;
    138142}
  • trunk/src/VBox/Runtime/common/zip/pkzipvfs.cpp

    r62477 r62564  
    898898    PRTZIPPKZIPIOSTREAM pThis = (PRTZIPPKZIPIOSTREAM)pvThis;
    899899    Assert(pSgBuf->cSegs == 1);
     900    RT_NOREF_PV(fBlocking);
    900901
    901902    if (off < 0)
     
    981982}
    982983
    983 static DECLCALLBACK(int) rtZipPkzipFssIos_Write(void *pvThis, RTFOFF off, PCRTSGBUF pSgBuf, bool fBlocking, size_t *pcWritten)
    984 {
     984static DECLCALLBACK(int) rtZipPkzipFssIos_Write(void *pvThis, RTFOFF off, PCRTSGBUF pSgBuf, bool fBlocking, size_t *pcbWritten)
     985{
     986    RT_NOREF_PV(pvThis); RT_NOREF_PV(off); RT_NOREF_PV(pSgBuf); RT_NOREF_PV(fBlocking); RT_NOREF_PV(pcbWritten);
    985987    return VERR_NOT_IMPLEMENTED;
    986988}
     
    988990static DECLCALLBACK(int) rtZipPkzipFssIos_Flush(void *pvThis)
    989991{
     992    RT_NOREF_PV(pvThis);
    990993    return VERR_NOT_IMPLEMENTED;
    991994}
  • trunk/src/VBox/Runtime/common/zip/unzipcmd.cpp

    r62477 r62564  
    9595                                            const char *pszName, RTEXITCODE rcExit, PRTFOFF pcBytes)
    9696{
     97    RT_NOREF_PV(pOpts);
     98
    9799    /*
    98100     * Query all the information.
  • trunk/src/VBox/Runtime/common/zip/zip.cpp

    r62477 r62564  
    17201720{
    17211721    /* input validation - the crash and burn approach as speed is essential here. */
    1722     Assert(enmLevel <= RTZIPLEVEL_MAX && enmLevel >= RTZIPLEVEL_STORE);
    1723     Assert(!fFlags);
     1722    Assert(enmLevel <= RTZIPLEVEL_MAX && enmLevel >= RTZIPLEVEL_STORE); RT_NOREF_PV(enmLevel);
     1723    Assert(!fFlags);                                                    RT_NOREF_PV(fFlags);
    17241724
    17251725    /*
     
    18361836{
    18371837    /* input validation - the crash and burn approach as speed is essential here. */
    1838     Assert(!fFlags);
     1838    Assert(!fFlags); RT_NOREF_PV(fFlags);
    18391839
    18401840    /*
  • trunk/src/VBox/Runtime/generic/RTFileReadAllFree-generic.cpp

    r62477 r62564  
    4545     */
    4646    pvFile = (void *)((uintptr_t)pvFile - 32);
    47     Assert(*(size_t *)pvFile == cbFile);
     47    Assert(*(size_t *)pvFile == cbFile); RT_NOREF_PV(cbFile);
    4848    *(size_t *)pvFile = ~(size_t)1;
    4949
  • trunk/src/VBox/Runtime/generic/cdrom-generic.cpp

    r62477 r62564  
    3838RTDECL(int) RTCdromOpen(const char *psz, uint32_t fFlags, PRTCDROM phCdrom)
    3939{
     40    RT_NOREF_PV(psz); RT_NOREF_PV(fFlags); RT_NOREF_PV(phCdrom);
    4041    return VERR_NOT_IMPLEMENTED;
    4142}
     
    4445RTDECL(uint32_t) RTCdromRetain(RTCDROM hCdrom)
    4546{
     47    RT_NOREF_PV(hCdrom);
    4648    AssertFailedReturn(UINT32_MAX);
    4749}
     
    5052RTDECL(uint32_t)    RTCdromRelease(RTCDROM hCdrom)
    5153{
     54    RT_NOREF_PV(hCdrom);
    5255    AssertFailedReturn(UINT32_MAX);
    5356}
     
    5659RTDECL(int) RTCdromQueryMountPoint(RTCDROM hCdrom, char *pszMountPoint, size_t cbMountPoint)
    5760{
     61    RT_NOREF_PV(hCdrom);
     62    RT_NOREF_PV(pszMountPoint);
     63    RT_NOREF_PV(cbMountPoint);
    5864    AssertFailedReturn(VERR_NOT_IMPLEMENTED);
    5965}
     
    6268RTDECL(int)         RTCdromUnmount(RTCDROM hCdrom)
    6369{
     70    RT_NOREF_PV(hCdrom);
    6471    AssertFailedReturn(VERR_NOT_IMPLEMENTED);
    6572}
     
    6875RTDECL(int)         RTCdromEject(RTCDROM hCdrom, bool fForce)
    6976{
     77    RT_NOREF_PV(hCdrom);
     78    RT_NOREF_PV(fForce);
    7079    AssertFailedReturn(VERR_NOT_IMPLEMENTED);
    7180}
     
    7483RTDECL(int)         RTCdromLock(RTCDROM hCdrom)
    7584{
     85    RT_NOREF_PV(hCdrom);
    7686    AssertFailedReturn(VERR_NOT_IMPLEMENTED);
    7787}
     
    8090RTDECL(int)         RTCdromUnlock(RTCDROM hCdrom)
    8191{
     92    RT_NOREF_PV(hCdrom);
    8293    AssertFailedReturn(VERR_NOT_IMPLEMENTED);
    8394}
     
    91102RTDECL(int)         RTCdromOrdinalToName(unsigned iCdrom, char *pszName, size_t cbName)
    92103{
     104    RT_NOREF_PV(iCdrom);
    93105    if (cbName)
    94106        *pszName = '\0';
     
    99111RTDECL(int)         RTCdromOpenByOrdinal(unsigned iCdrom, uint32_t fFlags, PRTCDROM phCdrom)
    100112{
     113    RT_NOREF_PV(iCdrom);
     114    RT_NOREF_PV(fFlags);
     115    RT_NOREF_PV(phCdrom);
    101116    return VERR_OUT_OF_RANGE;
    102117}
  • trunk/src/VBox/Runtime/generic/critsectrw-generic.cpp

    r62556 r62564  
    927927RTDECL(bool) RTCritSectRwIsReadOwner(PRTCRITSECTRW pThis, bool fWannaHear)
    928928{
     929    RT_NOREF_PV(fWannaHear);
     930
    929931    /*
    930932     * Validate handle.
  • trunk/src/VBox/Runtime/generic/mempool-generic.cpp

    r62477 r62564  
    380380    Assert(    hMemPool == NIL_RTMEMPOOL
    381381           ||  hMemPool == pEntry->pMemPool
    382            ||  (hMemPool == RTMEMPOOL_DEFAULT && pEntry->pMemPool == &g_rtMemPoolDefault));
     382           ||  (hMemPool == RTMEMPOOL_DEFAULT && pEntry->pMemPool == &g_rtMemPoolDefault)); RT_NOREF_PV(hMemPool);
    383383    AssertReturn(pEntry->cRefs > 0, UINT32_MAX);
    384384
  • trunk/src/VBox/Runtime/generic/spinlock-generic.cpp

    r62477 r62564  
    7878    PRTSPINLOCKINTERNAL pThis;
    7979    AssertReturn(fFlags == RTSPINLOCK_FLAGS_INTERRUPT_SAFE || fFlags == RTSPINLOCK_FLAGS_INTERRUPT_UNSAFE, VERR_INVALID_PARAMETER);
     80    RT_NOREF_PV(pszName);
    8081
    8182    /*
  • trunk/src/VBox/Runtime/r3/allocex.cpp

    r62477 r62564  
    4141RTDECL(int) RTMemAllocExTag(size_t cb, size_t cbAlignment, uint32_t fFlags, const char *pszTag, void **ppv) RT_NO_THROW_DEF
    4242{
     43    RT_NOREF_PV(pszTag);
     44
    4345    /*
    4446     * Validate and adjust input.
     
    114116    AssertMsg(pHdr->u32Magic == RTMEMHDR_MAGIC, ("pHdr->u32Magic=%RX32 pv=%p cb=%#x\n", pHdr->u32Magic, pv, cb));
    115117    pHdr->u32Magic = RTMEMHDR_MAGIC_DEAD;
    116     Assert(pHdr->cbReq == cb);
     118    Assert(pHdr->cbReq == cb); RT_NOREF_PV(cb);
    117119
    118120    if (pHdr->fFlags & (RTMEMALLOCEX_FLAGS_16BIT_REACH | RTMEMALLOCEX_FLAGS_32BIT_REACH))
  • trunk/src/VBox/Runtime/r3/dir.cpp

    r62477 r62564  
    656656    AssertMsgReturn(VALID_PTR(ppDir), ("%p\n", ppDir), VERR_INVALID_POINTER);
    657657    AssertMsgReturn(VALID_PTR(pszPath), ("%p\n", pszPath), VERR_INVALID_POINTER);
     658    AssertReturn(!(fOpen & ~RTDIROPEN_FLAGS_NO_SYMLINKS), VERR_INVALID_FLAGS);
    658659    switch (enmFilter)
    659660    {
  • trunk/src/VBox/Runtime/r3/init.cpp

    r62477 r62564  
    146146 || defined(RT_OS_LINUX)  || defined(RT_OS_OS2)     || defined(RT_OS_SOLARIS) /** @todo add host init hooks everywhere. */
    147147/* Stubs */
    148 DECLHIDDEN(int)  rtR3InitNativeFirst(uint32_t fFlags) { return VINF_SUCCESS; }
    149 DECLHIDDEN(int)  rtR3InitNativeFinal(uint32_t fFlags) { return VINF_SUCCESS; }
    150 DECLHIDDEN(void) rtR3InitNativeObtrusive(uint32_t fFlags) { }
     148DECLHIDDEN(int)  rtR3InitNativeFirst(uint32_t fFlags)     { RT_NOREF_PV(fFlags); return VINF_SUCCESS; }
     149DECLHIDDEN(int)  rtR3InitNativeFinal(uint32_t fFlags)     { RT_NOREF_PV(fFlags); return VINF_SUCCESS; }
     150DECLHIDDEN(void) rtR3InitNativeObtrusive(uint32_t fFlags) { RT_NOREF_PV(fFlags); }
    151151#endif
    152152
  • trunk/src/VBox/Runtime/r3/linux/sched-linux.cpp

    r62477 r62564  
    589589    Assert(enmType > RTTHREADTYPE_INVALID && enmType < RTTHREADTYPE_END);
    590590    Assert(enmType == g_pProcessPriority->paTypes[enmType].enmType);
    591     Assert((pthread_t)pThread->Core.Key == pthread_self());
     591    Assert((pthread_t)pThread->Core.Key == pthread_self()); RT_NOREF_PV(pThread);
    592592
    593593    /*
  • trunk/src/VBox/Runtime/r3/memsafer-r3.cpp

    r62477 r62564  
    114114static DECLCALLBACK(int32_t) rtMemSaferOnceInit(void *pvUserIgnore)
    115115{
     116    RT_NOREF_PV(pvUserIgnore);
     117
    116118    g_uMemSaferScramblerXor = (uintptr_t)RTRandU64();
    117119    g_uMemSaferPtrScramblerXor = (uintptr_t)RTRandU64();
     
    126128static DECLCALLBACK(void) rtMemSaferOnceTerm(void *pvUser, bool fLazyCleanUpOk)
    127129{
     130    RT_NOREF_PV(pvUser);
     131
    128132    if (!fLazyCleanUpOk)
    129133    {
     
    314318    }
    315319    return rc;
     320
    316321#else  /* !IN_SUP_R3 */
     322    RT_NOREF_PV(pThis);
    317323    return VERR_NOT_SUPPORTED;
    318324#endif /* !IN_SUP_R3 */
     
    362368RTDECL(int) RTMemSaferAllocZExTag(void **ppvNew, size_t cb, uint32_t fFlags, const char *pszTag) RT_NO_THROW_DEF
    363369{
     370    RT_NOREF_PV(pszTag);
     371
    364372    /*
    365373     * Validate input.
  • trunk/src/VBox/Runtime/r3/poll.cpp

    r62477 r62564  
    353353
    354354#else  /* POSIX */
     355
     356    RT_NOREF_PV(MsStart);
    355357
    356358    /* clear the revents. */
  • trunk/src/VBox/Runtime/r3/posix/allocex-r3-posix.cpp

    r62477 r62564  
    105105DECLHIDDEN(void) rtMemFreeExYyBitReach(void *pv, size_t cb, uint32_t fFlags)
    106106{
     107    RT_NOREF_PV(fFlags);
    107108    munmap(pv, cb);
    108109}
  • trunk/src/VBox/Runtime/r3/posix/dir-posix.cpp

    r62477 r62564  
    7979RTDECL(int) RTDirCreate(const char *pszPath, RTFMODE fMode, uint32_t fCreate)
    8080{
     81    RT_NOREF_PV(fCreate);
     82
    8183    int rc;
    8284    fMode = rtFsModeNormalize(fMode, pszPath, 0);
  • trunk/src/VBox/Runtime/r3/posix/fs-posix.cpp

    r62477 r62564  
    177177RTR3DECL(bool) RTFsIsCaseSensitive(const char *pszFsPath)
    178178{
     179    RT_NOREF_PV(pszFsPath);
    179180#if defined(RT_OS_OS2) || defined(RT_OS_WINDOWS)
    180181    return false;
  • trunk/src/VBox/Runtime/r3/posix/ldrNative-posix.cpp

    r62477 r62564  
    123123int rtldrNativeLoadSystem(const char *pszFilename, const char *pszExt, uint32_t fFlags, PRTLDRMOD phLdrMod)
    124124{
     125    RT_NOREF_PV(pszFilename); RT_NOREF_PV(pszExt); RT_NOREF_PV(fFlags); RT_NOREF_PV(phLdrMod);
    125126    /** @todo implement this in some sensible fashion. */
    126127    return VERR_NOT_SUPPORTED;
  • trunk/src/VBox/Runtime/r3/posix/localipc-posix.cpp

    r62477 r62564  
    10491049RTDECL(int) RTLocalIpcSessionQueryProcess(RTLOCALIPCSESSION hSession, PRTPROCESS pProcess)
    10501050{
     1051    RT_NOREF_PV(hSession); RT_NOREF_PV(pProcess);
    10511052    return VERR_NOT_SUPPORTED;
    10521053}
     
    10551056RTDECL(int) RTLocalIpcSessionQueryUserId(RTLOCALIPCSESSION hSession, PRTUID pUid)
    10561057{
     1058    RT_NOREF_PV(hSession); RT_NOREF_PV(pUid);
    10571059    return VERR_NOT_SUPPORTED;
    10581060}
     
    10611063RTDECL(int) RTLocalIpcSessionQueryGroupId(RTLOCALIPCSESSION hSession, PRTGID pGid)
    10621064{
     1065    RT_NOREF_PV(hSession); RT_NOREF_PV(pGid);
    10631066    return VERR_NOT_SUPPORTED;
    10641067}
  • trunk/src/VBox/Runtime/r3/posix/path-posix.cpp

    r62477 r62564  
    302302RTR3DECL(int) RTPathUnlink(const char *pszPath, uint32_t fUnlink)
    303303{
     304    RT_NOREF_PV(pszPath); RT_NOREF_PV(fUnlink);
    304305    return VERR_NOT_IMPLEMENTED;
    305306}
  • trunk/src/VBox/Runtime/r3/posix/process-creation-posix.cpp

    r62477 r62564  
    314314            rc = VERR_BUFFER_OVERFLOW;
    315315    }
     316#else
     317    RT_NOREF_PV(hEnvToUse); RT_NOREF_PV(fFlags); RT_NOREF_PV(hEnv);
    316318#endif
    317319    return rc;
  • trunk/src/VBox/Runtime/r3/posix/semevent-posix.cpp

    r61751 r62564  
    151151                }
    152152                pThis->fEverHadSignallers = false;
     153#else
     154                RT_NOREF_PV(hClass); RT_NOREF_PV(pszNameFmt);
    153155#endif
    154156
     
    500502    ASMAtomicWriteBool(&pThis->fEverHadSignallers, true);
    501503    RTLockValidatorRecSharedResetOwner(&pThis->Signallers, hThread, NULL);
     504#else
     505    RT_NOREF_PV(hEventSem); RT_NOREF_PV(hThread);
    502506#endif
    503507}
     
    514518    ASMAtomicWriteBool(&pThis->fEverHadSignallers, true);
    515519    RTLockValidatorRecSharedAddOwner(&pThis->Signallers, hThread, NULL);
     520#else
     521    RT_NOREF_PV(hEventSem); RT_NOREF_PV(hThread);
    516522#endif
    517523}
     
    527533
    528534    RTLockValidatorRecSharedRemoveOwner(&pThis->Signallers, hThread);
    529 #endif
    530 }
    531 
     535#else
     536    RT_NOREF_PV(hEventSem); RT_NOREF_PV(hThread);
     537#endif
     538}
     539
  • trunk/src/VBox/Runtime/r3/posix/semeventmulti-posix.cpp

    r61751 r62564  
    167167                    }
    168168                    pThis->fEverHadSignallers = false;
     169#else
     170                    RT_NOREF_PV(hClass); RT_NOREF_PV(pszNameFmt);
    169171#endif
    170172
     
    421423#else
    422424        RTTHREAD hThreadSelf = RTThreadSelf();
     425        RT_NOREF_PV(pSrcPos);
    423426#endif
    424427        RTThreadBlocking(hThreadSelf, RTTHREADSTATE_EVENT_MULTI, true);
     
    632635    ASMAtomicWriteBool(&pThis->fEverHadSignallers, true);
    633636    RTLockValidatorRecSharedResetOwner(&pThis->Signallers, hThread, NULL);
     637#else
     638    RT_NOREF_PV(hEventMultiSem); RT_NOREF_PV(hThread);
    634639#endif
    635640}
     
    646651    ASMAtomicWriteBool(&pThis->fEverHadSignallers, true);
    647652    RTLockValidatorRecSharedAddOwner(&pThis->Signallers, hThread, NULL);
     653#else
     654    RT_NOREF_PV(hEventMultiSem); RT_NOREF_PV(hThread);
    648655#endif
    649656}
     
    659666
    660667    RTLockValidatorRecSharedRemoveOwner(&pThis->Signallers, hThread);
    661 #endif
    662 }
    663 
     668#else
     669    RT_NOREF_PV(hEventMultiSem); RT_NOREF_PV(hThread);
     670#endif
     671}
     672
  • trunk/src/VBox/Runtime/r3/posix/semmutex-posix.cpp

    r61751 r62564  
    149149                va_end(va);
    150150            }
     151#else
     152            RT_NOREF_PV(hClass); RT_NOREF_PV(uSubClass); RT_NOREF_PV(pszNameFmt);
    151153#endif
    152154
     
    211213    return RTLockValidatorRecExclSetSubClass(&pThis->ValidatorRec, uSubClass);
    212214#else
     215    RT_NOREF_PV(hMutexSem); RT_NOREF_PV(uSubClass);
    213216    return RTLOCKVAL_SUB_CLASS_INVALID;
    214217#endif
     
    256259        hThreadSelf = RTThreadSelf();
    257260        RTThreadBlocking(hThreadSelf, RTTHREADSTATE_MUTEX, true);
     261        RT_NOREF_PV(pSrcPos);
    258262#endif
    259263    }
  • trunk/src/VBox/Runtime/r3/posix/semrw-posix.cpp

    r61751 r62564  
    145145            }
    146146            RTLockValidatorRecMakeSiblings(&pThis->ValidatorWrite.Core, &pThis->ValidatorRead.Core);
     147#else
     148            RT_NOREF_PV(hClass); RT_NOREF_PV(uSubClass); RT_NOREF_PV(pszNameFmt);
    147149#endif
    148150            *phRWSem = pThis;
     
    215217    return RTLockValidatorRecExclSetSubClass(&pThis->ValidatorWrite, uSubClass);
    216218#else
     219    RT_NOREF_PV(hRWSem); RT_NOREF_PV(uSubClass);
    217220    return RTLOCKVAL_SUB_CLASS_INVALID;
    218221#endif
     
    264267        hThreadSelf = RTThreadSelf();
    265268        RTThreadBlocking(hThreadSelf, RTTHREADSTATE_RW_READ, true);
     269        RT_NOREF_PV(pSrcPos);
    266270#endif
    267271    }
     
    459463        hThreadSelf = RTThreadSelf();
    460464        RTThreadBlocking(hThreadSelf, RTTHREADSTATE_RW_WRITE, true);
     465        RT_NOREF_PV(pSrcPos);
    461466#endif
    462467    }
  • trunk/src/VBox/Runtime/r3/posix/symlink-posix.cpp

    r62477 r62564  
    9494RTDECL(int) RTSymlinkCreate(const char *pszSymlink, const char *pszTarget, RTSYMLINKTYPE enmType, uint32_t fCreate)
    9595{
     96    RT_NOREF_PV(fCreate);
     97
    9698    /*
    9799     * Validate the input.
     
    132134RTDECL(int) RTSymlinkDelete(const char *pszSymlink, uint32_t fDelete)
    133135{
     136    RT_NOREF_PV(fDelete);
     137
    134138    char const *pszNativeSymlink;
    135139    int rc = rtPathToNative(&pszNativeSymlink, pszSymlink, NULL);
     
    161165RTDECL(int) RTSymlinkRead(const char *pszSymlink, char *pszTarget, size_t cbTarget, uint32_t fRead)
    162166{
     167    RT_NOREF_PV(fRead);
     168
    163169    char *pszMyTarget;
    164170    int rc = RTSymlinkReadA(pszSymlink, &pszMyTarget);
  • trunk/src/VBox/Runtime/r3/socket.cpp

    r62477 r62564  
    19811981
    19821982#else  /* !RT_OS_WINDOWS */
     1983    RT_NOREF_PV(fEvents);
    19831984    *phNative = (RTHCUINTPTR)pThis->hNative;
    19841985    return VINF_SUCCESS;
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette