diff options
author | bodo <bodo> | 1999-06-10 16:29:19 +0000 |
---|---|---|
committer | bodo <bodo> | 1999-06-10 16:29:19 +0000 |
commit | 79ac7fefe42aa74c745968fa86fd7f87e8922235 (patch) | |
tree | 8b684915e677d2716601b7a58cdca2f4ffe84349 /ssl | |
parent | be03d6154c811ca628cd87fbc41cf7d47adcb941 (diff) | |
download | openssl-79ac7fefe42aa74c745968fa86fd7f87e8922235.tar.gz |
Avoid warnings.
Diffstat (limited to 'ssl')
-rw-r--r-- | ssl/s23_clnt.c | 2 | ||||
-rw-r--r-- | ssl/s3_pkt.c | 2 | ||||
-rw-r--r-- | ssl/ssl_lib.c | 2 | ||||
-rw-r--r-- | ssl/ssltest.c | 7 |
4 files changed, 8 insertions, 5 deletions
diff --git a/ssl/s23_clnt.c b/ssl/s23_clnt.c index 386ebe3f8..299d2ae5d 100644 --- a/ssl/s23_clnt.c +++ b/ssl/s23_clnt.c @@ -186,7 +186,7 @@ int ssl23_connect(SSL *s) /* break; */ } - if (s->debug) BIO_flush(s->wbio); + if (s->debug) { (void)BIO_flush(s->wbio); } if ((cb != NULL) && (s->state != state)) { diff --git a/ssl/s3_pkt.c b/ssl/s3_pkt.c index 016af31cb..4a195095d 100644 --- a/ssl/s3_pkt.c +++ b/ssl/s3_pkt.c @@ -1016,7 +1016,7 @@ int ssl3_dispatch_alert(SSL *s) * does not get sent due to non-blocking IO, we will * not worry too much. */ if (s->s3->send_alert[0] == SSL3_AL_FATAL) - BIO_flush(s->wbio); + (void)BIO_flush(s->wbio); if (s->info_callback != NULL) cb=s->info_callback; diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c index aa181ab8c..95e8405cd 100644 --- a/ssl/ssl_lib.c +++ b/ssl/ssl_lib.c @@ -1695,7 +1695,7 @@ int ssl_init_wbio_buffer(SSL *s,int push) if (s->bbio == s->wbio) s->wbio=BIO_pop(s->wbio); } - BIO_reset(bbio); + (void)BIO_reset(bbio); /* if (!BIO_set_write_buffer_size(bbio,16*1024)) */ if (!BIO_set_read_buffer_size(bbio,1)) { diff --git a/ssl/ssltest.c b/ssl/ssltest.c index d6f4c88d9..c02c26c71 100644 --- a/ssl/ssltest.c +++ b/ssl/ssltest.c @@ -97,9 +97,12 @@ BIO *bio_stdout=NULL; static char *cipher=NULL; int verbose=0; int debug=0; +#if 0 +/* Not used yet. */ #ifdef FIONBIO static int s_nbio=0; #endif +#endif int doit(SSL *s_ssl,SSL *c_ssl,long bytes); @@ -731,10 +734,10 @@ static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength) if (rsa_tmp == NULL) { BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength); - BIO_flush(bio_err); + (void)BIO_flush(bio_err); rsa_tmp=RSA_generate_key(keylength,RSA_F4,NULL,NULL); BIO_printf(bio_err,"\n"); - BIO_flush(bio_err); + (void)BIO_flush(bio_err); } return(rsa_tmp); } |