summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authortb <>2021-10-22 09:44:58 +0000
committertb <>2021-10-22 09:44:58 +0000
commit243969ff8bb99d05b9147a770faa64a9f7c8bfd7 (patch)
treef823eb0ff4583c4e878e0ba8fe0839899f850ef4 /src
parent566f14a6b460b4c53a0e51580a50b870bc319d05 (diff)
downloadopenbsd-243969ff8bb99d05b9147a770faa64a9f7c8bfd7.tar.gz
openbsd-243969ff8bb99d05b9147a770faa64a9f7c8bfd7.tar.bz2
openbsd-243969ff8bb99d05b9147a770faa64a9f7c8bfd7.zip
Garbage collect an unused variable.
Diffstat (limited to 'src')
-rw-r--r--src/usr.bin/openssl/s_client.c6
1 files changed, 2 insertions, 4 deletions
diff --git a/src/usr.bin/openssl/s_client.c b/src/usr.bin/openssl/s_client.c
index df35ffbc65..3a5355b870 100644
--- a/src/usr.bin/openssl/s_client.c
+++ b/src/usr.bin/openssl/s_client.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: s_client.c,v 1.54 2021/03/17 18:11:01 jsing Exp $ */ 1/* $OpenBSD: s_client.c,v 1.55 2021/10/22 09:44:58 tb Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -894,7 +894,7 @@ s_client_main(int argc, char **argv)
894 char *cbuf = NULL, *sbuf = NULL, *mbuf = NULL, *pbuf = NULL; 894 char *cbuf = NULL, *sbuf = NULL, *mbuf = NULL, *pbuf = NULL;
895 int cbuf_len, cbuf_off; 895 int cbuf_len, cbuf_off;
896 int sbuf_len, sbuf_off; 896 int sbuf_len, sbuf_off;
897 int pbuf_len, pbuf_off; 897 int pbuf_len;
898 int full_log = 1; 898 int full_log = 1;
899 char *pass = NULL; 899 char *pass = NULL;
900 X509 *cert = NULL; 900 X509 *cert = NULL;
@@ -1196,7 +1196,6 @@ s_client_main(int argc, char **argv)
1196 sbuf_len = 0; 1196 sbuf_len = 0;
1197 sbuf_off = 0; 1197 sbuf_off = 0;
1198 pbuf_len = 0; 1198 pbuf_len = 0;
1199 pbuf_off = 0;
1200 1199
1201 /* This is an ugly hack that does a lot of assumptions */ 1200 /* This is an ugly hack that does a lot of assumptions */
1202 /* 1201 /*
@@ -1503,7 +1502,6 @@ s_client_main(int argc, char **argv)
1503 if (SSL_get_error(con, p) == SSL_ERROR_NONE) { 1502 if (SSL_get_error(con, p) == SSL_ERROR_NONE) {
1504 if (p <= 0) 1503 if (p <= 0)
1505 goto end; 1504 goto end;
1506 pbuf_off = 0;
1507 pbuf_len = p; 1505 pbuf_len = p;
1508 1506
1509 k = SSL_read(con, sbuf, p); 1507 k = SSL_read(con, sbuf, p);