diff options
Diffstat (limited to '')
| -rw-r--r-- | src/regress/lib/libcrypto/evp/evp_pkey_check.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/regress/lib/libcrypto/evp/evp_pkey_check.c b/src/regress/lib/libcrypto/evp/evp_pkey_check.c index cc3d0390d2..db26d3aa46 100644 --- a/src/regress/lib/libcrypto/evp/evp_pkey_check.c +++ b/src/regress/lib/libcrypto/evp/evp_pkey_check.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: evp_pkey_check.c,v 1.1 2022/01/11 19:20:36 tb Exp $ */ | 1 | /* $OpenBSD: evp_pkey_check.c,v 1.2 2022/01/11 19:27:35 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2021-2022 Theo Buehler <tb@openbsd.org> | 3 | * Copyright (c) 2021-2022 Theo Buehler <tb@openbsd.org> |
| 4 | * | 4 | * |
| @@ -88,7 +88,7 @@ evp_pkey_check_rsa(void) | |||
| 88 | } | 88 | } |
| 89 | 89 | ||
| 90 | /* Public key checking for RSA is not supported. */ | 90 | /* Public key checking for RSA is not supported. */ |
| 91 | if ((ret = EVP_PKEY_public_check(pkey_ctx)) != -2) { | 91 | if (EVP_PKEY_public_check(pkey_ctx) != -2) { |
| 92 | fprintf(stderr, | 92 | fprintf(stderr, |
| 93 | "%s: EVP_PKEY_public_check() supported for RSA?\n", | 93 | "%s: EVP_PKEY_public_check() supported for RSA?\n", |
| 94 | __func__); | 94 | __func__); |
| @@ -97,7 +97,7 @@ evp_pkey_check_rsa(void) | |||
| 97 | ERR_clear_error(); | 97 | ERR_clear_error(); |
| 98 | 98 | ||
| 99 | /* Parameter checking for RSA is not supported. */ | 99 | /* Parameter checking for RSA is not supported. */ |
| 100 | if ((ret = EVP_PKEY_param_check(pkey_ctx)) != -2) { | 100 | if (EVP_PKEY_param_check(pkey_ctx) != -2) { |
| 101 | fprintf(stderr, | 101 | fprintf(stderr, |
| 102 | "%s: EVP_PKEY_param_check() supported for RSA?\n", | 102 | "%s: EVP_PKEY_param_check() supported for RSA?\n", |
| 103 | __func__); | 103 | __func__); |
| @@ -281,7 +281,7 @@ evp_pkey_check_ec(void) | |||
| 281 | ERR_clear_error(); | 281 | ERR_clear_error(); |
| 282 | 282 | ||
| 283 | /* EVP_PKEY_public_check checks the private key (sigh), so we fail. */ | 283 | /* EVP_PKEY_public_check checks the private key (sigh), so we fail. */ |
| 284 | if ((ret = EVP_PKEY_public_check(pkey_ctx)) == 1) { | 284 | if (EVP_PKEY_public_check(pkey_ctx) == 1) { |
| 285 | fprintf(stderr, | 285 | fprintf(stderr, |
| 286 | "%s: EVP_PKEY_public_check succeeded unexpectedly\n", | 286 | "%s: EVP_PKEY_public_check succeeded unexpectedly\n", |
| 287 | __func__); | 287 | __func__); |
