summaryrefslogtreecommitdiff
path: root/ssl
diff options
context:
space:
mode:
authorbodo <bodo>1999-06-10 16:29:19 +0000
committerbodo <bodo>1999-06-10 16:29:19 +0000
commit79ac7fefe42aa74c745968fa86fd7f87e8922235 (patch)
tree8b684915e677d2716601b7a58cdca2f4ffe84349 /ssl
parentbe03d6154c811ca628cd87fbc41cf7d47adcb941 (diff)
downloadopenssl-79ac7fefe42aa74c745968fa86fd7f87e8922235.tar.gz
Avoid warnings.
Diffstat (limited to 'ssl')
-rw-r--r--ssl/s23_clnt.c2
-rw-r--r--ssl/s3_pkt.c2
-rw-r--r--ssl/ssl_lib.c2
-rw-r--r--ssl/ssltest.c7
4 files changed, 8 insertions, 5 deletions
diff --git a/ssl/s23_clnt.c b/ssl/s23_clnt.c
index 386ebe3f8..299d2ae5d 100644
--- a/ssl/s23_clnt.c
+++ b/ssl/s23_clnt.c
@@ -186,7 +186,7 @@ int ssl23_connect(SSL *s)
/* break; */
}
- if (s->debug) BIO_flush(s->wbio);
+ if (s->debug) { (void)BIO_flush(s->wbio); }
if ((cb != NULL) && (s->state != state))
{
diff --git a/ssl/s3_pkt.c b/ssl/s3_pkt.c
index 016af31cb..4a195095d 100644
--- a/ssl/s3_pkt.c
+++ b/ssl/s3_pkt.c
@@ -1016,7 +1016,7 @@ int ssl3_dispatch_alert(SSL *s)
* does not get sent due to non-blocking IO, we will
* not worry too much. */
if (s->s3->send_alert[0] == SSL3_AL_FATAL)
- BIO_flush(s->wbio);
+ (void)BIO_flush(s->wbio);
if (s->info_callback != NULL)
cb=s->info_callback;
diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c
index aa181ab8c..95e8405cd 100644
--- a/ssl/ssl_lib.c
+++ b/ssl/ssl_lib.c
@@ -1695,7 +1695,7 @@ int ssl_init_wbio_buffer(SSL *s,int push)
if (s->bbio == s->wbio)
s->wbio=BIO_pop(s->wbio);
}
- BIO_reset(bbio);
+ (void)BIO_reset(bbio);
/* if (!BIO_set_write_buffer_size(bbio,16*1024)) */
if (!BIO_set_read_buffer_size(bbio,1))
{
diff --git a/ssl/ssltest.c b/ssl/ssltest.c
index d6f4c88d9..c02c26c71 100644
--- a/ssl/ssltest.c
+++ b/ssl/ssltest.c
@@ -97,9 +97,12 @@ BIO *bio_stdout=NULL;
static char *cipher=NULL;
int verbose=0;
int debug=0;
+#if 0
+/* Not used yet. */
#ifdef FIONBIO
static int s_nbio=0;
#endif
+#endif
int doit(SSL *s_ssl,SSL *c_ssl,long bytes);
@@ -731,10 +734,10 @@ static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength)
if (rsa_tmp == NULL)
{
BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength);
- BIO_flush(bio_err);
+ (void)BIO_flush(bio_err);
rsa_tmp=RSA_generate_key(keylength,RSA_F4,NULL,NULL);
BIO_printf(bio_err,"\n");
- BIO_flush(bio_err);
+ (void)BIO_flush(bio_err);
}
return(rsa_tmp);
}