@@ -1827,7 +1827,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1827
1827
String::NewFromUtf8 (env->isolate (), mem->data ,
1828
1828
String::kNormalString , mem->length ));
1829
1829
}
1830
- ( void ) BIO_reset (bio);
1830
+ USE ( BIO_reset (bio) );
1831
1831
1832
1832
X509_NAME* issuer_name = X509_get_issuer_name (cert);
1833
1833
if (X509_NAME_print_ex (bio, issuer_name, 0 , X509_NAME_FLAGS) > 0 ) {
@@ -1836,7 +1836,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1836
1836
String::NewFromUtf8 (env->isolate (), mem->data ,
1837
1837
String::kNormalString , mem->length ));
1838
1838
}
1839
- ( void ) BIO_reset (bio);
1839
+ USE ( BIO_reset (bio) );
1840
1840
1841
1841
int nids[] = { NID_subject_alt_name, NID_info_access };
1842
1842
Local<String> keys[] = { env->subjectaltname_string (),
@@ -1863,7 +1863,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1863
1863
String::NewFromUtf8 (env->isolate (), mem->data ,
1864
1864
String::kNormalString , mem->length ));
1865
1865
1866
- ( void ) BIO_reset (bio);
1866
+ USE ( BIO_reset (bio) );
1867
1867
}
1868
1868
1869
1869
EVP_PKEY* pkey = X509_get_pubkey (cert);
@@ -1880,7 +1880,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1880
1880
info->Set (env->modulus_string (),
1881
1881
String::NewFromUtf8 (env->isolate (), mem->data ,
1882
1882
String::kNormalString , mem->length ));
1883
- ( void ) BIO_reset (bio);
1883
+ USE ( BIO_reset (bio) );
1884
1884
1885
1885
uint64_t exponent_word = static_cast <uint64_t >(BN_get_word (e));
1886
1886
uint32_t lo = static_cast <uint32_t >(exponent_word);
@@ -1894,7 +1894,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1894
1894
info->Set (env->exponent_string (),
1895
1895
String::NewFromUtf8 (env->isolate (), mem->data ,
1896
1896
String::kNormalString , mem->length ));
1897
- ( void ) BIO_reset (bio);
1897
+ USE ( BIO_reset (bio) );
1898
1898
}
1899
1899
1900
1900
if (pkey != nullptr ) {
@@ -1911,7 +1911,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1911
1911
info->Set (env->valid_from_string (),
1912
1912
String::NewFromUtf8 (env->isolate (), mem->data ,
1913
1913
String::kNormalString , mem->length ));
1914
- ( void ) BIO_reset (bio);
1914
+ USE ( BIO_reset (bio) );
1915
1915
1916
1916
ASN1_TIME_print (bio, X509_get_notAfter (cert));
1917
1917
BIO_get_mem_ptr (bio, &mem);
@@ -2889,7 +2889,7 @@ int Connection::HandleBIOError(BIO *bio, const char* func, int rv) {
2889
2889
return rv;
2890
2890
2891
2891
int retry = BIO_should_retry (bio);
2892
- ( void ) retry; // unused if !defined(SSL_PRINT_DEBUG)
2892
+ USE ( retry) ; // unused if !defined(SSL_PRINT_DEBUG)
2893
2893
2894
2894
if (BIO_should_write (bio)) {
2895
2895
DEBUG_PRINT (" [%p] BIO: %s want write. should retry %d\n " ,
@@ -5389,7 +5389,7 @@ void ECDH::SetPrivateKey(const FunctionCallbackInfo<Value>& args) {
5389
5389
EC_KEY_set_public_key (ecdh->key_ , nullptr );
5390
5390
5391
5391
MarkPopErrorOnReturn mark_pop_error_on_return;
5392
- ( void ) &mark_pop_error_on_return; // Silence compiler warning.
5392
+ USE ( &mark_pop_error_on_return);
5393
5393
5394
5394
const BIGNUM* priv_key = EC_KEY_get0_private_key (ecdh->key_ );
5395
5395
CHECK_NE (priv_key, nullptr );
@@ -5452,7 +5452,7 @@ bool ECDH::IsKeyValidForCurve(const BIGNUM* private_key) {
5452
5452
5453
5453
bool ECDH::IsKeyPairValid () {
5454
5454
MarkPopErrorOnReturn mark_pop_error_on_return;
5455
- ( void ) &mark_pop_error_on_return; // Silence compiler warning.
5455
+ USE ( &mark_pop_error_on_return);
5456
5456
return 1 == EC_KEY_check_key (key_);
5457
5457
}
5458
5458
0 commit comments