Remove dead assignments flagged by Clang static analysis
This commit is contained in:
committed by
Tatsuya Kinoshita
parent
2d9d2494fc
commit
7e5b33c30e
@@ -643,7 +643,6 @@ addMultirowsForm(Buffer *buf, AnchorList *al)
|
||||
{
|
||||
int i, j, k, col, ecol, pos;
|
||||
Anchor a_form, *a;
|
||||
FormItemList *fi;
|
||||
Line *l, *ls;
|
||||
|
||||
if (al == NULL || al->nanchor == 0)
|
||||
@@ -670,7 +669,6 @@ addMultirowsForm(Buffer *buf, AnchorList *al)
|
||||
if (!ls)
|
||||
continue;
|
||||
}
|
||||
fi = (FormItemList *)a_form.url;
|
||||
col = COLPOS(ls, a_form.start.pos);
|
||||
ecol = COLPOS(ls, a_form.end.pos);
|
||||
for (j = 0; l && j < a_form.rows; l = l->next, j++) {
|
||||
|
||||
@@ -7405,7 +7405,6 @@ loadBuffer(URLFile *uf, Buffer *volatile newBuf)
|
||||
|
||||
if (newBuf == NULL)
|
||||
newBuf = newBuffer(INIT_BUFFER_WIDTH);
|
||||
lineBuf2 = Strnew();
|
||||
|
||||
if (SETJMP(AbortLoading) != 0) {
|
||||
goto _end;
|
||||
|
||||
@@ -475,8 +475,6 @@ ssl_check_cert_ident(X509 * x, char *hostname)
|
||||
/* FIXME: gettextize? */
|
||||
ret = Sprintf("Bad cert ident %s from %s", buf, hostname);
|
||||
}
|
||||
else
|
||||
match_ident = TRUE;
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
|
||||
@@ -3071,7 +3071,6 @@ handleMailto(char *url)
|
||||
/* follow HREF link */
|
||||
DEFUN(followA, GOTO_LINK, "Go to current link")
|
||||
{
|
||||
Line *l;
|
||||
Anchor *a;
|
||||
ParsedURL u;
|
||||
#ifdef USE_IMAGE
|
||||
@@ -3081,7 +3080,6 @@ DEFUN(followA, GOTO_LINK, "Go to current link")
|
||||
|
||||
if (Currentbuf->firstLine == NULL)
|
||||
return;
|
||||
l = Currentbuf->currentLine;
|
||||
|
||||
#ifdef USE_IMAGE
|
||||
a = retrieveCurrentImg(Currentbuf);
|
||||
@@ -3163,13 +3161,11 @@ bufferA(void)
|
||||
/* view inline image */
|
||||
DEFUN(followI, VIEW_IMAGE, "View image")
|
||||
{
|
||||
Line *l;
|
||||
Anchor *a;
|
||||
Buffer *buf;
|
||||
|
||||
if (Currentbuf->firstLine == NULL)
|
||||
return;
|
||||
l = Currentbuf->currentLine;
|
||||
|
||||
a = retrieveCurrentImg(Currentbuf);
|
||||
if (a == NULL)
|
||||
@@ -3419,7 +3415,6 @@ followForm(void)
|
||||
static void
|
||||
_followForm(int submit)
|
||||
{
|
||||
Line *l;
|
||||
Anchor *a, *a2;
|
||||
char *p;
|
||||
FormItemList *fi, *f2;
|
||||
@@ -3428,7 +3423,6 @@ _followForm(int submit)
|
||||
|
||||
if (Currentbuf->firstLine == NULL)
|
||||
return;
|
||||
l = Currentbuf->currentLine;
|
||||
|
||||
a = retrieveCurrentForm(Currentbuf);
|
||||
if (a == NULL)
|
||||
@@ -3533,7 +3527,6 @@ _followForm(int submit)
|
||||
case FORM_INPUT_BUTTON:
|
||||
do_submit:
|
||||
tmp = Strnew();
|
||||
tmp2 = Strnew();
|
||||
multipart = (fi->parent->method == FORM_METHOD_POST &&
|
||||
fi->parent->enctype == FORM_ENCTYPE_MULTIPART);
|
||||
query_from_followform(&tmp, fi, multipart);
|
||||
|
||||
@@ -361,7 +361,6 @@ geom_menu(Menu *menu, int x, int y, int mselect)
|
||||
if (win_w > COLS) {
|
||||
menu->width = COLS - 2 * FRAME_WIDTH;
|
||||
menu->width -= menu->width % FRAME_WIDTH;
|
||||
win_w = menu->width + 2 * FRAME_WIDTH;
|
||||
}
|
||||
}
|
||||
menu->x = win_x + FRAME_WIDTH;
|
||||
|
||||
@@ -779,7 +779,7 @@ create_option_search_table()
|
||||
qsort(RC_search_table, RC_table_size, sizeof(struct rc_search_table),
|
||||
(int (*)(const void *, const void *))compare_table);
|
||||
|
||||
diff1 = diff2 = 0;
|
||||
diff2 = 0;
|
||||
for (i = 0; i < RC_table_size - 1; i++) {
|
||||
p = RC_search_table[i].param->name;
|
||||
q = RC_search_table[i + 1].param->name;
|
||||
|
||||
@@ -429,7 +429,6 @@ visible_length(char *str)
|
||||
char *t, *r2;
|
||||
int amp_len = 0;
|
||||
|
||||
t = str;
|
||||
while (*str) {
|
||||
prev_status = status;
|
||||
if (next_status(*str, &status)) {
|
||||
@@ -3018,7 +3017,6 @@ feed_table_tag(struct table *tbl, char *line, struct table_mode *mode,
|
||||
break;
|
||||
case HTML_TABLE_ALT:
|
||||
id = -1;
|
||||
w = 0;
|
||||
parsedtag_get_value(tag, ATTR_TID, &id);
|
||||
if (id >= 0 && id < tbl->ntable) {
|
||||
struct table *tbl1 = tbl->tables[id].ptr;
|
||||
|
||||
@@ -1214,7 +1214,6 @@ addch(char pc)
|
||||
{
|
||||
l_prop *pr;
|
||||
int dest, i;
|
||||
short *dirty;
|
||||
#ifdef USE_M17N
|
||||
static Str tmp = NULL;
|
||||
char **p;
|
||||
@@ -1236,7 +1235,6 @@ addch(char pc)
|
||||
return;
|
||||
p = ScreenImage[CurLine]->lineimage;
|
||||
pr = ScreenImage[CurLine]->lineprop;
|
||||
dirty = &ScreenImage[CurLine]->isdirty;
|
||||
|
||||
#ifndef USE_M17N
|
||||
/* Eliminate unprintables according to * iso-8859-*.
|
||||
|
||||
@@ -819,7 +819,7 @@ parseURL(char *url, ParsedURL *p_url, ParsedURL *current)
|
||||
/* scheme://user:pass@... */
|
||||
p_url->user = copyPath(qq, q - 1 - qq, COPYPATH_SPC_IGNORE);
|
||||
p_url->pass = copyPath(q, p - q, COPYPATH_SPC_ALLOW);
|
||||
q = ++p;
|
||||
p++;
|
||||
goto analyze_url;
|
||||
}
|
||||
/* scheme://host:port/ */
|
||||
@@ -832,7 +832,7 @@ parseURL(char *url, ParsedURL *p_url, ParsedURL *current)
|
||||
case '@':
|
||||
/* scheme://user@... */
|
||||
p_url->user = copyPath(q, p - q, COPYPATH_SPC_IGNORE);
|
||||
q = ++p;
|
||||
p++;
|
||||
goto analyze_url;
|
||||
case '\0':
|
||||
/* scheme://host */
|
||||
@@ -1419,7 +1419,6 @@ HTTPrequest(ParsedURL *pu, ParsedURL *current, HRequest *hr, TextList *extra)
|
||||
{
|
||||
Str tmp;
|
||||
TextListItem *i;
|
||||
int seen_www_auth = 0;
|
||||
#ifdef USE_COOKIE
|
||||
Str cookie;
|
||||
#endif /* USE_COOKIE */
|
||||
@@ -1435,7 +1434,6 @@ HTTPrequest(ParsedURL *pu, ParsedURL *current, HRequest *hr, TextList *extra)
|
||||
for (i = extra->first; i != NULL; i = i->next) {
|
||||
if (strncasecmp(i->ptr, "Authorization:",
|
||||
sizeof("Authorization:") - 1) == 0) {
|
||||
seen_www_auth = 1;
|
||||
#ifdef USE_SSL
|
||||
if (hr->command == HR_COMMAND_CONNECT)
|
||||
continue;
|
||||
|
||||
Reference in New Issue
Block a user