@@ -768,7 +768,6 @@ void SecureContext::AddCACert(const FunctionCallbackInfo<Value>& args) {
768
768
SecureContext* sc;
769
769
ASSIGN_OR_RETURN_UNWRAP (&sc, args.Holder ());
770
770
ClearErrorOnReturn clear_error_on_return;
771
- (void ) &clear_error_on_return; // Silence compiler warning.
772
771
773
772
if (args.Length () != 1 ) {
774
773
return env->ThrowTypeError (" CA certificate argument is mandatory" );
@@ -806,7 +805,6 @@ void SecureContext::AddCRL(const FunctionCallbackInfo<Value>& args) {
806
805
}
807
806
808
807
ClearErrorOnReturn clear_error_on_return;
809
- (void ) &clear_error_on_return; // Silence compiler warning.
810
808
811
809
BIO *bio = LoadBIO (env, args[0 ]);
812
810
if (!bio)
@@ -872,7 +870,6 @@ void SecureContext::AddRootCerts(const FunctionCallbackInfo<Value>& args) {
872
870
SecureContext* sc;
873
871
ASSIGN_OR_RETURN_UNWRAP (&sc, args.Holder ());
874
872
ClearErrorOnReturn clear_error_on_return;
875
- (void ) &clear_error_on_return; // Silence compiler warning.
876
873
877
874
if (!root_cert_store) {
878
875
root_cert_store = NewRootCertStore ();
@@ -901,7 +898,6 @@ void SecureContext::SetCiphers(const FunctionCallbackInfo<Value>& args) {
901
898
ASSIGN_OR_RETURN_UNWRAP (&sc, args.Holder ());
902
899
Environment* env = sc->env ();
903
900
ClearErrorOnReturn clear_error_on_return;
904
- (void ) &clear_error_on_return; // Silence compiler warning.
905
901
906
902
if (args.Length () != 1 ) {
907
903
return env->ThrowTypeError (" Ciphers argument is mandatory" );
@@ -948,7 +944,6 @@ void SecureContext::SetDHParam(const FunctionCallbackInfo<Value>& args) {
948
944
ASSIGN_OR_RETURN_UNWRAP (&sc, args.This ());
949
945
Environment* env = sc->env ();
950
946
ClearErrorOnReturn clear_error_on_return;
951
- (void ) &clear_error_on_return; // Silence compiler warning.
952
947
953
948
// Auto DH is not supported in openssl 1.0.1, so dhparam needs
954
949
// to be specified explicitly
@@ -1073,7 +1068,6 @@ void SecureContext::LoadPKCS12(const FunctionCallbackInfo<Value>& args) {
1073
1068
SecureContext* sc;
1074
1069
ASSIGN_OR_RETURN_UNWRAP (&sc, args.Holder ());
1075
1070
ClearErrorOnReturn clear_error_on_return;
1076
- (void ) &clear_error_on_return; // Silence compiler warning.
1077
1071
1078
1072
if (args.Length () < 1 ) {
1079
1073
return env->ThrowTypeError (" PFX certificate argument is mandatory" );
@@ -1697,7 +1691,6 @@ void SSLWrap<Base>::GetPeerCertificate(
1697
1691
Environment* env = w->ssl_env ();
1698
1692
1699
1693
ClearErrorOnReturn clear_error_on_return;
1700
- (void ) &clear_error_on_return; // Silence unused variable warning.
1701
1694
1702
1695
Local<Object> result;
1703
1696
Local<Object> info;
@@ -1894,7 +1887,6 @@ void SSLWrap<Base>::Renegotiate(const FunctionCallbackInfo<Value>& args) {
1894
1887
ASSIGN_OR_RETURN_UNWRAP (&w, args.Holder ());
1895
1888
1896
1889
ClearErrorOnReturn clear_error_on_return;
1897
- (void ) &clear_error_on_return; // Silence unused variable warning.
1898
1890
1899
1891
bool yes = SSL_renegotiate (w->ssl_ ) == 1 ;
1900
1892
args.GetReturnValue ().Set (yes);
@@ -2644,7 +2636,6 @@ int Connection::HandleSSLError(const char* func,
2644
2636
ZeroStatus zs,
2645
2637
SyscallStatus ss) {
2646
2638
ClearErrorOnReturn clear_error_on_return;
2647
- (void ) &clear_error_on_return; // Silence unused variable warning.
2648
2639
2649
2640
if (rv > 0 )
2650
2641
return rv;
@@ -4259,7 +4250,6 @@ void Sign::SignFinal(const FunctionCallbackInfo<Value>& args) {
4259
4250
md_value = new unsigned char [md_len];
4260
4251
4261
4252
ClearErrorOnReturn clear_error_on_return;
4262
- (void ) &clear_error_on_return; // Silence compiler warning.
4263
4253
4264
4254
Error err = sign->SignFinal (
4265
4255
buf,
@@ -4382,7 +4372,6 @@ SignBase::Error Verify::VerifyFinal(const char* key_pem,
4382
4372
return kSignNotInitialised ;
4383
4373
4384
4374
ClearErrorOnReturn clear_error_on_return;
4385
- (void ) &clear_error_on_return; // Silence compiler warning.
4386
4375
4387
4376
EVP_PKEY* pkey = nullptr ;
4388
4377
BIO* bp = nullptr ;
@@ -4614,7 +4603,6 @@ void PublicKeyCipher::Cipher(const FunctionCallbackInfo<Value>& args) {
4614
4603
size_t out_len = 0 ;
4615
4604
4616
4605
ClearErrorOnReturn clear_error_on_return;
4617
- (void ) &clear_error_on_return; // Silence compiler warning.
4618
4606
4619
4607
bool r = Cipher<operation, EVP_PKEY_cipher_init, EVP_PKEY_cipher>(
4620
4608
kbuf,
@@ -4922,7 +4910,6 @@ void DiffieHellman::ComputeSecret(const FunctionCallbackInfo<Value>& args) {
4922
4910
}
4923
4911
4924
4912
ClearErrorOnReturn clear_error_on_return;
4925
- (void ) &clear_error_on_return; // Silence compiler warning.
4926
4913
BIGNUM* key = nullptr ;
4927
4914
4928
4915
if (args.Length () == 0 ) {
@@ -6165,7 +6152,6 @@ void SetEngine(const FunctionCallbackInfo<Value>& args) {
6165
6152
unsigned int flags = args[1 ]->Uint32Value ();
6166
6153
6167
6154
ClearErrorOnReturn clear_error_on_return;
6168
- (void ) &clear_error_on_return; // Silence compiler warning.
6169
6155
6170
6156
const node::Utf8Value engine_id (env->isolate (), args[0 ]);
6171
6157
ENGINE* engine = ENGINE_by_id (*engine_id);
0 commit comments