summaryrefslogtreecommitdiffstats
path: root/ssl
diff options
context:
space:
mode:
authorBodo Möller <bodo@openssl.org>1999-06-10 16:29:32 +0000
committerBodo Möller <bodo@openssl.org>1999-06-10 16:29:32 +0000
commitd58d092bc9f0a541ce5f0b265ee819f7ab086560 (patch)
tree497575b6ed095b6672e9f17ffb3f20223d3b6b36 /ssl
parent9d9b559ef03e481d2feec5a3a9a28f4a41f8189a (diff)
Avoid warnings.
Diffstat (limited to 'ssl')
-rw-r--r--ssl/s23_clnt.c2
-rw-r--r--ssl/s3_pkt.c2
-rw-r--r--ssl/ssl_lib.c2
-rw-r--r--ssl/ssltest.c7
4 files changed, 8 insertions, 5 deletions
diff --git a/ssl/s23_clnt.c b/ssl/s23_clnt.c
index 386ebe3f8e..299d2ae5d2 100644
--- a/ssl/s23_clnt.c
+++ b/ssl/s23_clnt.c
@@ -186,7 +186,7 @@ int ssl23_connect(SSL *s)
/* break; */
}
- if (s->debug) BIO_flush(s->wbio);
+ if (s->debug) { (void)BIO_flush(s->wbio); }
if ((cb != NULL) && (s->state != state))
{
diff --git a/ssl/s3_pkt.c b/ssl/s3_pkt.c
index 016af31cb4..4a195095d9 100644
--- a/ssl/s3_pkt.c
+++ b/ssl/s3_pkt.c
@@ -1016,7 +1016,7 @@ int ssl3_dispatch_alert(SSL *s)
* does not get sent due to non-blocking IO, we will
* not worry too much. */
if (s->s3->send_alert[0] == SSL3_AL_FATAL)
- BIO_flush(s->wbio);
+ (void)BIO_flush(s->wbio);
if (s->info_callback != NULL)
cb=s->info_callback;
diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c
index aa181ab8c1..95e8405cd7 100644
--- a/ssl/ssl_lib.c
+++ b/ssl/ssl_lib.c
@@ -1695,7 +1695,7 @@ int ssl_init_wbio_buffer(SSL *s,int push)
if (s->bbio == s->wbio)
s->wbio=BIO_pop(s->wbio);
}
- BIO_reset(bbio);
+ (void)BIO_reset(bbio);
/* if (!BIO_set_write_buffer_size(bbio,16*1024)) */
if (!BIO_set_read_buffer_size(bbio,1))
{
diff --git a/ssl/ssltest.c b/ssl/ssltest.c
index d6f4c88d90..c02c26c716 100644
--- a/ssl/ssltest.c
+++ b/ssl/ssltest.c
@@ -97,9 +97,12 @@ BIO *bio_stdout=NULL;
static char *cipher=NULL;
int verbose=0;
int debug=0;
+#if 0
+/* Not used yet. */
#ifdef FIONBIO
static int s_nbio=0;
#endif
+#endif
int doit(SSL *s_ssl,SSL *c_ssl,long bytes);
@@ -731,10 +734,10 @@ static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength)
if (rsa_tmp == NULL)
{
BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength);
- BIO_flush(bio_err);
+ (void)BIO_flush(bio_err);
rsa_tmp=RSA_generate_key(keylength,RSA_F4,NULL,NULL);
BIO_printf(bio_err,"\n");
- BIO_flush(bio_err);
+ (void)BIO_flush(bio_err);
}
return(rsa_tmp);
}