• R/O
  • HTTP
  • SSH
  • HTTPS

Commit

Tags
No Tags

Frequently used words (click to add to your profile)

javac++androidlinuxc#windowsobjective-ccocoa誰得qtpythonphprubygameguibathyscaphec計画中(planning stage)翻訳omegatframeworktwitterdomtestvb.netdirectxゲームエンジンbtronarduinopreviewer

TLS/SSL and crypto library


Commit MetaInfo

Revisión739a5eee619fc8c03736140828891b369f8690f4 (tree)
Tiempo2015-01-22 18:20:10
AutorMatt Caswell <matt@open...>
CommiterMatt Caswell

Log Message

Rerun util/openssl-format-source -v -c .

Reviewed-by: Tim Hudson <tjh@openssl.org>

Cambiar Resumen

Diferencia incremental

--- a/crypto/asn1/x_crl.c
+++ b/crypto/asn1/x_crl.c
@@ -344,7 +344,9 @@ IMPLEMENT_ASN1_FUNCTIONS(X509_REVOKED)
344344 IMPLEMENT_ASN1_DUP_FUNCTION(X509_REVOKED)
345345
346346 IMPLEMENT_ASN1_FUNCTIONS(X509_CRL_INFO)
347+
347348 IMPLEMENT_ASN1_FUNCTIONS(X509_CRL)
349+
348350 IMPLEMENT_ASN1_DUP_FUNCTION(X509_CRL)
349351
350352 static int X509_REVOKED_cmp(const X509_REVOKED *const *a,
@@ -511,4 +513,5 @@ IMPLEMENT_STACK_OF(X509_REVOKED)
511513 IMPLEMENT_ASN1_SET_OF(X509_REVOKED)
512514
513515 IMPLEMENT_STACK_OF(X509_CRL)
516+
514517 IMPLEMENT_ASN1_SET_OF(X509_CRL)
--- a/crypto/bio/bss_file.c
+++ b/crypto/bio/bss_file.c
@@ -239,8 +239,7 @@ static int file_read(BIO *b, char *out, int outl)
239239 else
240240 ret = fread(out, 1, (int)outl, (FILE *)b->ptr);
241241 if (ret == 0
242- && (b->
243- flags & BIO_FLAGS_UPLINK) ? UP_ferror((FILE *)b->ptr) :
242+ && (b->flags & BIO_FLAGS_UPLINK) ? UP_ferror((FILE *)b->ptr) :
244243 ferror((FILE *)b->ptr)) {
245244 SYSerr(SYS_F_FREAD, get_last_sys_error());
246245 BIOerr(BIO_F_FILE_READ, ERR_R_SYS_LIB);
--- a/crypto/pem/pem_all.c
+++ b/crypto/pem/pem_all.c
@@ -190,6 +190,7 @@ RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u)
190190 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA,
191191 RSAPrivateKey)
192192
193+
193194 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC,
194195 RSAPublicKey) IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA,
195196 PEM_STRING_PUBLIC,
--- a/crypto/rsa/rsa_eay.c
+++ b/crypto/rsa/rsa_eay.c
@@ -881,9 +881,8 @@ static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx)
881881 goto err;
882882
883883 if (rsa->e && rsa->n) {
884- if (!rsa->
885- meth->bn_mod_exp(vrfy, r0, rsa->e, rsa->n, ctx,
886- rsa->_method_mod_n))
884+ if (!rsa->meth->bn_mod_exp(vrfy, r0, rsa->e, rsa->n, ctx,
885+ rsa->_method_mod_n))
887886 goto err;
888887 /*
889888 * If 'I' was greater than (or equal to) rsa->n, the operation will
--- a/ssl/d1_srvr.c
+++ b/ssl/d1_srvr.c
@@ -491,8 +491,7 @@ int dtls1_accept(SSL *s)
491491 || ((alg_k & SSL_kRSA)
492492 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
493493 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
494- && EVP_PKEY_size(s->cert->
495- pkeys
494+ && EVP_PKEY_size(s->cert->pkeys
496495 [SSL_PKEY_RSA_ENC].privatekey) *
497496 8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
498497 )
--- a/ssl/s3_pkt.c
+++ b/ssl/s3_pkt.c
@@ -710,8 +710,7 @@ int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len)
710710 u_len >= 4 * (max_send_fragment = s->max_send_fragment) &&
711711 s->compress == NULL && s->msg_callback == NULL &&
712712 !SSL_USE_ETM(s) && SSL_USE_EXPLICIT_IV(s) &&
713- EVP_CIPHER_flags(s->
714- enc_write_ctx->cipher) &
713+ EVP_CIPHER_flags(s->enc_write_ctx->cipher) &
715714 EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK) {
716715 unsigned char aad[13];
717716 EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM mb_param;
@@ -921,8 +920,7 @@ static int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
921920 #if 0 && !defined(OPENSSL_NO_MULTIBLOCK) && EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK
922921 if (type == SSL3_RT_APPLICATION_DATA && s->compress == NULL &&
923922 !SSL_USE_ETM(s) && SSL_USE_EXPLICIT_IV(s) &&
924- EVP_CIPHER_flags(s->
925- enc_write_ctx->cipher) &
923+ EVP_CIPHER_flags(s->enc_write_ctx->cipher) &
926924 EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK)
927925 do {
928926 unsigned char aad[13];
--- a/ssl/s3_srvr.c
+++ b/ssl/s3_srvr.c
@@ -480,8 +480,7 @@ int ssl3_accept(SSL *s)
480480 || ((alg_k & SSL_kRSA)
481481 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
482482 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
483- && EVP_PKEY_size(s->cert->
484- pkeys
483+ && EVP_PKEY_size(s->cert->pkeys
485484 [SSL_PKEY_RSA_ENC].privatekey) *
486485 8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
487486 )
--- a/ssl/ssl_sess.c
+++ b/ssl/ssl_sess.c
@@ -468,8 +468,7 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len,
468468
469469 if (try_session_cache &&
470470 ret == NULL &&
471- !(s->
472- session_ctx->session_cache_mode &
471+ !(s->session_ctx->session_cache_mode &
473472 SSL_SESS_CACHE_NO_INTERNAL_LOOKUP)) {
474473 SSL_SESSION data;
475474 data.ssl_version = s->version;
@@ -510,8 +509,7 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len,
510509 * well if and only if we are supposed to.
511510 */
512511 if (!
513- (s->
514- session_ctx->session_cache_mode &
512+ (s->session_ctx->session_cache_mode &
515513 SSL_SESS_CACHE_NO_INTERNAL_STORE))
516514 /*
517515 * The following should not return 1, otherwise, things are