diff --git a/apps/ca.c b/apps/ca.c index 9428c3018aff01c4a4abce14b8906c5e96db76ae..6a615ed55e74ed7e8be0acd2e8ab7b58a0ca40c6 100644 --- a/apps/ca.c +++ b/apps/ca.c @@ -2132,7 +2132,7 @@ static int get_certificate_status(const char *serial, CA_DB *db) if (serial_len % 2) { /* * Set the first char to 0 - */ ; + */ row[DB_serial][0] = '0'; /* Copy String from serial to row[DB_serial] */ diff --git a/apps/s_cb.c b/apps/s_cb.c index 080fc59c87a99f27375af7a80eee32e304389454..50bd965dd1587da2553facdda8274cc380f77e6e 100644 --- a/apps/s_cb.c +++ b/apps/s_cb.c @@ -1096,7 +1096,6 @@ void print_ssl_summary(SSL *s) { const SSL_CIPHER *c; X509 *peer; - /* const char *pnam = SSL_is_server(s) ? "client" : "server"; */ BIO_printf(bio_err, "Protocol version: %s\n", SSL_get_version(s)); print_raw_cipherlist(s); diff --git a/apps/s_client.c b/apps/s_client.c index 4db3748f30233b34e90f2d7f2d52475bbbe7bc40..6e790cf8fb8b2192041aca79e3160866dd0a3d58 100644 --- a/apps/s_client.c +++ b/apps/s_client.c @@ -136,9 +136,6 @@ static void do_ssl_shutdown(SSL *ssl) #ifndef OPENSSL_NO_PSK /* Default PSK identity and key */ static char *psk_identity = "Client_identity"; -/* - * char *psk_key=NULL; by default PSK is not used - */ static unsigned int psk_client_cb(SSL *ssl, const char *hint, char *identity, unsigned int max_identity_len, @@ -2405,7 +2402,6 @@ int s_client_main(int argc, char **argv) BIO_printf(bio_err, "bad select %d\n", get_last_socket_error()); goto shut; - /* goto end; */ } } @@ -2496,7 +2492,6 @@ int s_client_main(int argc, char **argv) BIO_printf(bio_c_out, "DONE\n"); ret = 0; goto shut; - /* goto end; */ } sbuf_len -= i; @@ -2566,7 +2561,6 @@ int s_client_main(int argc, char **argv) case SSL_ERROR_SSL: ERR_print_errors(bio_err); goto shut; - /* break; */ } } /* OPENSSL_SYS_MSDOS includes OPENSSL_SYS_WINDOWS */