summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjca <>2021-10-25 11:47:39 +0000
committerjca <>2021-10-25 11:47:39 +0000
commit9cce299b20e35232dd51711ea587f4f8a717a95a (patch)
tree91fbe43e7d7eece7e2066cde1a67a6dc74e12369
parent0e1dfee67fce5df9c6b4694351bc4fba5e38a19e (diff)
downloadopenbsd-9cce299b20e35232dd51711ea587f4f8a717a95a.tar.gz
openbsd-9cce299b20e35232dd51711ea587f4f8a717a95a.tar.bz2
openbsd-9cce299b20e35232dd51711ea587f4f8a717a95a.zip
Garbage collect another unused variable.
Spotted by egcc and probably clang 13. ok tb@
-rw-r--r--src/usr.bin/openssl/s_client.c5
1 files changed, 1 insertions, 4 deletions
diff --git a/src/usr.bin/openssl/s_client.c b/src/usr.bin/openssl/s_client.c
index 3a5355b870..1e932226b2 100644
--- a/src/usr.bin/openssl/s_client.c
+++ b/src/usr.bin/openssl/s_client.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: s_client.c,v 1.55 2021/10/22 09:44:58 tb Exp $ */ 1/* $OpenBSD: s_client.c,v 1.56 2021/10/25 11:47:39 jca Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -894,7 +894,6 @@ s_client_main(int argc, char **argv)
894 char *cbuf = NULL, *sbuf = NULL, *mbuf = NULL, *pbuf = NULL; 894 char *cbuf = NULL, *sbuf = NULL, *mbuf = NULL, *pbuf = NULL;
895 int cbuf_len, cbuf_off; 895 int cbuf_len, cbuf_off;
896 int sbuf_len, sbuf_off; 896 int sbuf_len, sbuf_off;
897 int pbuf_len;
898 int full_log = 1; 897 int full_log = 1;
899 char *pass = NULL; 898 char *pass = NULL;
900 X509 *cert = NULL; 899 X509 *cert = NULL;
@@ -1195,7 +1194,6 @@ s_client_main(int argc, char **argv)
1195 cbuf_off = 0; 1194 cbuf_off = 0;
1196 sbuf_len = 0; 1195 sbuf_len = 0;
1197 sbuf_off = 0; 1196 sbuf_off = 0;
1198 pbuf_len = 0;
1199 1197
1200 /* This is an ugly hack that does a lot of assumptions */ 1198 /* This is an ugly hack that does a lot of assumptions */
1201 /* 1199 /*
@@ -1502,7 +1500,6 @@ s_client_main(int argc, char **argv)
1502 if (SSL_get_error(con, p) == SSL_ERROR_NONE) { 1500 if (SSL_get_error(con, p) == SSL_ERROR_NONE) {
1503 if (p <= 0) 1501 if (p <= 0)
1504 goto end; 1502 goto end;
1505 pbuf_len = p;
1506 1503
1507 k = SSL_read(con, sbuf, p); 1504 k = SSL_read(con, sbuf, p);
1508 } 1505 }