@@ -1820,7 +1820,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1820
1820
String::NewFromUtf8 (env->isolate (), mem->data ,
1821
1821
String::kNormalString , mem->length ));
1822
1822
}
1823
- ( void ) BIO_reset (bio);
1823
+ USE ( BIO_reset (bio) );
1824
1824
1825
1825
X509_NAME* issuer_name = X509_get_issuer_name (cert);
1826
1826
if (X509_NAME_print_ex (bio, issuer_name, 0 , X509_NAME_FLAGS) > 0 ) {
@@ -1829,7 +1829,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1829
1829
String::NewFromUtf8 (env->isolate (), mem->data ,
1830
1830
String::kNormalString , mem->length ));
1831
1831
}
1832
- ( void ) BIO_reset (bio);
1832
+ USE ( BIO_reset (bio) );
1833
1833
1834
1834
int nids[] = { NID_subject_alt_name, NID_info_access };
1835
1835
Local<String> keys[] = { env->subjectaltname_string (),
@@ -1856,7 +1856,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1856
1856
String::NewFromUtf8 (env->isolate (), mem->data ,
1857
1857
String::kNormalString , mem->length ));
1858
1858
1859
- ( void ) BIO_reset (bio);
1859
+ USE ( BIO_reset (bio) );
1860
1860
}
1861
1861
1862
1862
EVP_PKEY* pkey = X509_get_pubkey (cert);
@@ -1873,7 +1873,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1873
1873
info->Set (env->modulus_string (),
1874
1874
String::NewFromUtf8 (env->isolate (), mem->data ,
1875
1875
String::kNormalString , mem->length ));
1876
- ( void ) BIO_reset (bio);
1876
+ USE ( BIO_reset (bio) );
1877
1877
1878
1878
uint64_t exponent_word = static_cast <uint64_t >(BN_get_word (e));
1879
1879
uint32_t lo = static_cast <uint32_t >(exponent_word);
@@ -1887,7 +1887,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1887
1887
info->Set (env->exponent_string (),
1888
1888
String::NewFromUtf8 (env->isolate (), mem->data ,
1889
1889
String::kNormalString , mem->length ));
1890
- ( void ) BIO_reset (bio);
1890
+ USE ( BIO_reset (bio) );
1891
1891
}
1892
1892
1893
1893
if (pkey != nullptr ) {
@@ -1904,7 +1904,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1904
1904
info->Set (env->valid_from_string (),
1905
1905
String::NewFromUtf8 (env->isolate (), mem->data ,
1906
1906
String::kNormalString , mem->length ));
1907
- ( void ) BIO_reset (bio);
1907
+ USE ( BIO_reset (bio) );
1908
1908
1909
1909
ASN1_TIME_print (bio, X509_get_notAfter (cert));
1910
1910
BIO_get_mem_ptr (bio, &mem);
@@ -2882,7 +2882,7 @@ int Connection::HandleBIOError(BIO *bio, const char* func, int rv) {
2882
2882
return rv;
2883
2883
2884
2884
int retry = BIO_should_retry (bio);
2885
- ( void ) retry; // unused if !defined(SSL_PRINT_DEBUG)
2885
+ USE ( retry) ; // unused if !defined(SSL_PRINT_DEBUG)
2886
2886
2887
2887
if (BIO_should_write (bio)) {
2888
2888
DEBUG_PRINT (" [%p] BIO: %s want write. should retry %d\n " ,
@@ -5358,7 +5358,7 @@ void ECDH::SetPrivateKey(const FunctionCallbackInfo<Value>& args) {
5358
5358
EC_KEY_set_public_key (ecdh->key_ , nullptr );
5359
5359
5360
5360
MarkPopErrorOnReturn mark_pop_error_on_return;
5361
- ( void ) &mark_pop_error_on_return; // Silence compiler warning.
5361
+ USE ( &mark_pop_error_on_return);
5362
5362
5363
5363
const BIGNUM* priv_key = EC_KEY_get0_private_key (ecdh->key_ );
5364
5364
CHECK_NE (priv_key, nullptr );
@@ -5421,7 +5421,7 @@ bool ECDH::IsKeyValidForCurve(const BIGNUM* private_key) {
5421
5421
5422
5422
bool ECDH::IsKeyPairValid () {
5423
5423
MarkPopErrorOnReturn mark_pop_error_on_return;
5424
- ( void ) &mark_pop_error_on_return; // Silence compiler warning.
5424
+ USE ( &mark_pop_error_on_return);
5425
5425
return 1 == EC_KEY_check_key (key_);
5426
5426
}
5427
5427
0 commit comments