From ebaa4dbd109143655ebbd00aa7d9701a3e0b6cdc Mon Sep 17 00:00:00 2001 From: tb <> Date: Tue, 11 Jan 2022 19:27:35 +0000 Subject: forgot to zap some dead assignments --- src/regress/lib/libcrypto/evp/evp_pkey_check.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'src') diff --git a/src/regress/lib/libcrypto/evp/evp_pkey_check.c b/src/regress/lib/libcrypto/evp/evp_pkey_check.c index cc3d0390d2..db26d3aa46 100644 --- a/src/regress/lib/libcrypto/evp/evp_pkey_check.c +++ b/src/regress/lib/libcrypto/evp/evp_pkey_check.c @@ -1,4 +1,4 @@ -/* $OpenBSD: evp_pkey_check.c,v 1.1 2022/01/11 19:20:36 tb Exp $ */ +/* $OpenBSD: evp_pkey_check.c,v 1.2 2022/01/11 19:27:35 tb Exp $ */ /* * Copyright (c) 2021-2022 Theo Buehler * @@ -88,7 +88,7 @@ evp_pkey_check_rsa(void) } /* Public key checking for RSA is not supported. */ - if ((ret = EVP_PKEY_public_check(pkey_ctx)) != -2) { + if (EVP_PKEY_public_check(pkey_ctx) != -2) { fprintf(stderr, "%s: EVP_PKEY_public_check() supported for RSA?\n", __func__); @@ -97,7 +97,7 @@ evp_pkey_check_rsa(void) ERR_clear_error(); /* Parameter checking for RSA is not supported. */ - if ((ret = EVP_PKEY_param_check(pkey_ctx)) != -2) { + if (EVP_PKEY_param_check(pkey_ctx) != -2) { fprintf(stderr, "%s: EVP_PKEY_param_check() supported for RSA?\n", __func__); @@ -281,7 +281,7 @@ evp_pkey_check_ec(void) ERR_clear_error(); /* EVP_PKEY_public_check checks the private key (sigh), so we fail. */ - if ((ret = EVP_PKEY_public_check(pkey_ctx)) == 1) { + if (EVP_PKEY_public_check(pkey_ctx) == 1) { fprintf(stderr, "%s: EVP_PKEY_public_check succeeded unexpectedly\n", __func__); -- cgit v1.2.3-55-g6feb