From 5fdd0bddb4ad19fb7fc1b2fbd423da7dcecfb060 Mon Sep 17 00:00:00 2001 From: Gilles Peskine Date: Tue, 17 Oct 2023 16:04:27 +0200 Subject: [PATCH] Convey that it's ok for mbedtls_ssl_session_save to fail mbedtls_ssl_session_save() always outputs the output length, even on error. Here, we're only calling it to get the needed output length, so it's ok to ignore the return value. Convey this to linters. Signed-off-by: Gilles Peskine --- programs/ssl/ssl_client2.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/programs/ssl/ssl_client2.c b/programs/ssl/ssl_client2.c index ca74c002c6..c0c546eca3 100644 --- a/programs/ssl/ssl_client2.c +++ b/programs/ssl/ssl_client2.c @@ -2145,8 +2145,8 @@ usage: } /* get size of the buffer needed */ - mbedtls_ssl_session_save(mbedtls_ssl_get_session_pointer(&ssl), - NULL, 0, &session_data_len); + (void) mbedtls_ssl_session_save(mbedtls_ssl_get_session_pointer(&ssl), + NULL, 0, &session_data_len); session_data = mbedtls_calloc(1, session_data_len); if (session_data == NULL) { mbedtls_printf(" failed\n ! alloc %u bytes for session data\n",