summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authortb <>2022-01-11 19:27:35 +0000
committertb <>2022-01-11 19:27:35 +0000
commitebaa4dbd109143655ebbd00aa7d9701a3e0b6cdc (patch)
treef6dc42c0c0ae3b4516c197b570a0c75f48b5e5c9 /src
parent7cf312febdc2fe98f0be04638741c476a65ade1c (diff)
downloadopenbsd-ebaa4dbd109143655ebbd00aa7d9701a3e0b6cdc.tar.gz
openbsd-ebaa4dbd109143655ebbd00aa7d9701a3e0b6cdc.tar.bz2
openbsd-ebaa4dbd109143655ebbd00aa7d9701a3e0b6cdc.zip
forgot to zap some dead assignments
Diffstat (limited to 'src')
-rw-r--r--src/regress/lib/libcrypto/evp/evp_pkey_check.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/regress/lib/libcrypto/evp/evp_pkey_check.c b/src/regress/lib/libcrypto/evp/evp_pkey_check.c
index cc3d0390d2..db26d3aa46 100644
--- a/src/regress/lib/libcrypto/evp/evp_pkey_check.c
+++ b/src/regress/lib/libcrypto/evp/evp_pkey_check.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: evp_pkey_check.c,v 1.1 2022/01/11 19:20:36 tb Exp $ */ 1/* $OpenBSD: evp_pkey_check.c,v 1.2 2022/01/11 19:27:35 tb Exp $ */
2/* 2/*
3 * Copyright (c) 2021-2022 Theo Buehler <tb@openbsd.org> 3 * Copyright (c) 2021-2022 Theo Buehler <tb@openbsd.org>
4 * 4 *
@@ -88,7 +88,7 @@ evp_pkey_check_rsa(void)
88 } 88 }
89 89
90 /* Public key checking for RSA is not supported. */ 90 /* Public key checking for RSA is not supported. */
91 if ((ret = EVP_PKEY_public_check(pkey_ctx)) != -2) { 91 if (EVP_PKEY_public_check(pkey_ctx) != -2) {
92 fprintf(stderr, 92 fprintf(stderr,
93 "%s: EVP_PKEY_public_check() supported for RSA?\n", 93 "%s: EVP_PKEY_public_check() supported for RSA?\n",
94 __func__); 94 __func__);
@@ -97,7 +97,7 @@ evp_pkey_check_rsa(void)
97 ERR_clear_error(); 97 ERR_clear_error();
98 98
99 /* Parameter checking for RSA is not supported. */ 99 /* Parameter checking for RSA is not supported. */
100 if ((ret = EVP_PKEY_param_check(pkey_ctx)) != -2) { 100 if (EVP_PKEY_param_check(pkey_ctx) != -2) {
101 fprintf(stderr, 101 fprintf(stderr,
102 "%s: EVP_PKEY_param_check() supported for RSA?\n", 102 "%s: EVP_PKEY_param_check() supported for RSA?\n",
103 __func__); 103 __func__);
@@ -281,7 +281,7 @@ evp_pkey_check_ec(void)
281 ERR_clear_error(); 281 ERR_clear_error();
282 282
283 /* EVP_PKEY_public_check checks the private key (sigh), so we fail. */ 283 /* EVP_PKEY_public_check checks the private key (sigh), so we fail. */
284 if ((ret = EVP_PKEY_public_check(pkey_ctx)) == 1) { 284 if (EVP_PKEY_public_check(pkey_ctx) == 1) {
285 fprintf(stderr, 285 fprintf(stderr,
286 "%s: EVP_PKEY_public_check succeeded unexpectedly\n", 286 "%s: EVP_PKEY_public_check succeeded unexpectedly\n",
287 __func__); 287 __func__);