diff options
author | tb <> | 2022-01-11 19:27:35 +0000 |
---|---|---|
committer | tb <> | 2022-01-11 19:27:35 +0000 |
commit | ebaa4dbd109143655ebbd00aa7d9701a3e0b6cdc (patch) | |
tree | f6dc42c0c0ae3b4516c197b570a0c75f48b5e5c9 /src | |
parent | 7cf312febdc2fe98f0be04638741c476a65ade1c (diff) | |
download | openbsd-ebaa4dbd109143655ebbd00aa7d9701a3e0b6cdc.tar.gz openbsd-ebaa4dbd109143655ebbd00aa7d9701a3e0b6cdc.tar.bz2 openbsd-ebaa4dbd109143655ebbd00aa7d9701a3e0b6cdc.zip |
forgot to zap some dead assignments
Diffstat (limited to 'src')
-rw-r--r-- | src/regress/lib/libcrypto/evp/evp_pkey_check.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/regress/lib/libcrypto/evp/evp_pkey_check.c b/src/regress/lib/libcrypto/evp/evp_pkey_check.c index cc3d0390d2..db26d3aa46 100644 --- a/src/regress/lib/libcrypto/evp/evp_pkey_check.c +++ b/src/regress/lib/libcrypto/evp/evp_pkey_check.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: evp_pkey_check.c,v 1.1 2022/01/11 19:20:36 tb Exp $ */ | 1 | /* $OpenBSD: evp_pkey_check.c,v 1.2 2022/01/11 19:27:35 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2021-2022 Theo Buehler <tb@openbsd.org> | 3 | * Copyright (c) 2021-2022 Theo Buehler <tb@openbsd.org> |
4 | * | 4 | * |
@@ -88,7 +88,7 @@ evp_pkey_check_rsa(void) | |||
88 | } | 88 | } |
89 | 89 | ||
90 | /* Public key checking for RSA is not supported. */ | 90 | /* Public key checking for RSA is not supported. */ |
91 | if ((ret = EVP_PKEY_public_check(pkey_ctx)) != -2) { | 91 | if (EVP_PKEY_public_check(pkey_ctx) != -2) { |
92 | fprintf(stderr, | 92 | fprintf(stderr, |
93 | "%s: EVP_PKEY_public_check() supported for RSA?\n", | 93 | "%s: EVP_PKEY_public_check() supported for RSA?\n", |
94 | __func__); | 94 | __func__); |
@@ -97,7 +97,7 @@ evp_pkey_check_rsa(void) | |||
97 | ERR_clear_error(); | 97 | ERR_clear_error(); |
98 | 98 | ||
99 | /* Parameter checking for RSA is not supported. */ | 99 | /* Parameter checking for RSA is not supported. */ |
100 | if ((ret = EVP_PKEY_param_check(pkey_ctx)) != -2) { | 100 | if (EVP_PKEY_param_check(pkey_ctx) != -2) { |
101 | fprintf(stderr, | 101 | fprintf(stderr, |
102 | "%s: EVP_PKEY_param_check() supported for RSA?\n", | 102 | "%s: EVP_PKEY_param_check() supported for RSA?\n", |
103 | __func__); | 103 | __func__); |
@@ -281,7 +281,7 @@ evp_pkey_check_ec(void) | |||
281 | ERR_clear_error(); | 281 | ERR_clear_error(); |
282 | 282 | ||
283 | /* EVP_PKEY_public_check checks the private key (sigh), so we fail. */ | 283 | /* EVP_PKEY_public_check checks the private key (sigh), so we fail. */ |
284 | if ((ret = EVP_PKEY_public_check(pkey_ctx)) == 1) { | 284 | if (EVP_PKEY_public_check(pkey_ctx) == 1) { |
285 | fprintf(stderr, | 285 | fprintf(stderr, |
286 | "%s: EVP_PKEY_public_check succeeded unexpectedly\n", | 286 | "%s: EVP_PKEY_public_check succeeded unexpectedly\n", |
287 | __func__); | 287 | __func__); |