提交 4a640fb6 编写于 作者: D Dr. Stephen Henson

Fix declarations and constification for inline stack.

Reviewed-by: NRichard Levitte <levitte@openssl.org>
上级 411abf2d
...@@ -200,7 +200,7 @@ int ciphers_main(int argc, char **argv) ...@@ -200,7 +200,7 @@ int ciphers_main(int argc, char **argv)
if (!verbose) { if (!verbose) {
for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) { for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) {
SSL_CIPHER *c = sk_SSL_CIPHER_value(sk, i); const SSL_CIPHER *c = sk_SSL_CIPHER_value(sk, i);
p = SSL_CIPHER_get_name(c); p = SSL_CIPHER_get_name(c);
if (p == NULL) if (p == NULL)
break; break;
...@@ -212,7 +212,7 @@ int ciphers_main(int argc, char **argv) ...@@ -212,7 +212,7 @@ int ciphers_main(int argc, char **argv)
} else { } else {
for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) { for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) {
SSL_CIPHER *c; const SSL_CIPHER *c;
c = sk_SSL_CIPHER_value(sk, i); c = sk_SSL_CIPHER_value(sk, i);
......
...@@ -92,7 +92,7 @@ static const EVP_PKEY_ASN1_METHOD *standard_methods[] = { ...@@ -92,7 +92,7 @@ static const EVP_PKEY_ASN1_METHOD *standard_methods[] = {
}; };
typedef int sk_cmp_fn_type(const char *const *a, const char *const *b); typedef int sk_cmp_fn_type(const char *const *a, const char *const *b);
DECLARE_STACK_OF(EVP_PKEY_ASN1_METHOD) DECLARE_CONST_STACK_OF(EVP_PKEY_ASN1_METHOD)
static STACK_OF(EVP_PKEY_ASN1_METHOD) *app_methods = NULL; static STACK_OF(EVP_PKEY_ASN1_METHOD) *app_methods = NULL;
#ifdef TEST #ifdef TEST
......
...@@ -65,8 +65,6 @@ ...@@ -65,8 +65,6 @@
/* CMS EnvelopedData Utilities */ /* CMS EnvelopedData Utilities */
DECLARE_STACK_OF(CMS_RecipientInfo)
CMS_EnvelopedData *cms_get0_enveloped(CMS_ContentInfo *cms) CMS_EnvelopedData *cms_get0_enveloped(CMS_ContentInfo *cms)
{ {
if (OBJ_obj2nid(cms->contentType) != NID_pkcs7_enveloped) { if (OBJ_obj2nid(cms->contentType) != NID_pkcs7_enveloped) {
......
...@@ -109,6 +109,8 @@ struct CMS_ContentInfo_st { ...@@ -109,6 +109,8 @@ struct CMS_ContentInfo_st {
} d; } d;
}; };
DECLARE_STACK_OF(CMS_CertificateChoices)
struct CMS_SignedData_st { struct CMS_SignedData_st {
long version; long version;
STACK_OF(X509_ALGOR) *digestAlgorithms; STACK_OF(X509_ALGOR) *digestAlgorithms;
......
...@@ -64,9 +64,6 @@ ...@@ -64,9 +64,6 @@
IMPLEMENT_ASN1_FUNCTIONS(CMS_ContentInfo) IMPLEMENT_ASN1_FUNCTIONS(CMS_ContentInfo)
IMPLEMENT_ASN1_PRINT_FUNCTION(CMS_ContentInfo) IMPLEMENT_ASN1_PRINT_FUNCTION(CMS_ContentInfo)
DECLARE_STACK_OF(CMS_CertificateChoices)
DECLARE_STACK_OF(CMS_RevocationInfoChoice)
const ASN1_OBJECT *CMS_get0_type(CMS_ContentInfo *cms) const ASN1_OBJECT *CMS_get0_type(CMS_ContentInfo *cms)
{ {
return cms->contentType; return cms->contentType;
......
...@@ -66,9 +66,6 @@ ...@@ -66,9 +66,6 @@
/* Password based encryption (PBE) functions */ /* Password based encryption (PBE) functions */
DECLARE_STACK_OF(EVP_PBE_CTL)
static STACK_OF(EVP_PBE_CTL) *pbe_algs;
/* Setup a cipher context from a PBE algorithm */ /* Setup a cipher context from a PBE algorithm */
typedef struct { typedef struct {
...@@ -79,6 +76,9 @@ typedef struct { ...@@ -79,6 +76,9 @@ typedef struct {
EVP_PBE_KEYGEN *keygen; EVP_PBE_KEYGEN *keygen;
} EVP_PBE_CTL; } EVP_PBE_CTL;
DECLARE_STACK_OF(EVP_PBE_CTL)
static STACK_OF(EVP_PBE_CTL) *pbe_algs;
static const EVP_PBE_CTL builtin_pbe[] = { static const EVP_PBE_CTL builtin_pbe[] = {
{EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndDES_CBC, {EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndDES_CBC,
NID_des_cbc, NID_md2, PKCS5_PBE_keyivgen}, NID_des_cbc, NID_md2, PKCS5_PBE_keyivgen},
......
...@@ -69,7 +69,7 @@ ...@@ -69,7 +69,7 @@
typedef int sk_cmp_fn_type(const char *const *a, const char *const *b); typedef int sk_cmp_fn_type(const char *const *a, const char *const *b);
DECLARE_STACK_OF(EVP_PKEY_METHOD) DECLARE_CONST_STACK_OF(EVP_PKEY_METHOD)
static STACK_OF(EVP_PKEY_METHOD) *app_pkey_methods = NULL; static STACK_OF(EVP_PKEY_METHOD) *app_pkey_methods = NULL;
static const EVP_PKEY_METHOD *standard_methods[] = { static const EVP_PKEY_METHOD *standard_methods[] = {
......
...@@ -207,7 +207,7 @@ X509_POLICY_NODE *tree_find_sk(STACK_OF(X509_POLICY_NODE) *sk, ...@@ -207,7 +207,7 @@ X509_POLICY_NODE *tree_find_sk(STACK_OF(X509_POLICY_NODE) *sk,
const ASN1_OBJECT *id); const ASN1_OBJECT *id);
X509_POLICY_NODE *level_add_node(X509_POLICY_LEVEL *level, X509_POLICY_NODE *level_add_node(X509_POLICY_LEVEL *level,
const X509_POLICY_DATA *data, X509_POLICY_DATA *data,
X509_POLICY_NODE *parent, X509_POLICY_NODE *parent,
X509_POLICY_TREE *tree); X509_POLICY_TREE *tree);
void policy_node_free(X509_POLICY_NODE *node); void policy_node_free(X509_POLICY_NODE *node);
......
...@@ -109,7 +109,7 @@ X509_POLICY_NODE *level_find_node(const X509_POLICY_LEVEL *level, ...@@ -109,7 +109,7 @@ X509_POLICY_NODE *level_find_node(const X509_POLICY_LEVEL *level,
} }
X509_POLICY_NODE *level_add_node(X509_POLICY_LEVEL *level, X509_POLICY_NODE *level_add_node(X509_POLICY_LEVEL *level,
const X509_POLICY_DATA *data, X509_POLICY_DATA *data,
X509_POLICY_NODE *parent, X509_POLICY_NODE *parent,
X509_POLICY_TREE *tree) X509_POLICY_TREE *tree)
{ {
......
...@@ -292,7 +292,7 @@ static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs, ...@@ -292,7 +292,7 @@ static int tree_init(X509_POLICY_TREE **ptree, STACK_OF(X509) *certs,
} }
static int tree_link_matching_nodes(X509_POLICY_LEVEL *curr, static int tree_link_matching_nodes(X509_POLICY_LEVEL *curr,
const X509_POLICY_DATA *data) X509_POLICY_DATA *data)
{ {
X509_POLICY_LEVEL *last = curr - 1; X509_POLICY_LEVEL *last = curr - 1;
X509_POLICY_NODE *node; X509_POLICY_NODE *node;
......
...@@ -56,6 +56,7 @@ ...@@ -56,6 +56,7 @@
# define HEADER_CMS_H # define HEADER_CMS_H
# include <openssl/x509.h> # include <openssl/x509.h>
# include <openssl/x509v3.h>
# ifdef OPENSSL_NO_CMS # ifdef OPENSSL_NO_CMS
# error CMS is disabled. # error CMS is disabled.
...@@ -76,8 +77,9 @@ typedef struct CMS_RecipientEncryptedKey_st CMS_RecipientEncryptedKey; ...@@ -76,8 +77,9 @@ typedef struct CMS_RecipientEncryptedKey_st CMS_RecipientEncryptedKey;
typedef struct CMS_OtherKeyAttribute_st CMS_OtherKeyAttribute; typedef struct CMS_OtherKeyAttribute_st CMS_OtherKeyAttribute;
DECLARE_STACK_OF(CMS_SignerInfo) DECLARE_STACK_OF(CMS_SignerInfo)
DECLARE_STACK_OF(GENERAL_NAMES)
DECLARE_STACK_OF(CMS_RecipientEncryptedKey) DECLARE_STACK_OF(CMS_RecipientEncryptedKey)
DECLARE_STACK_OF(CMS_RecipientInfo)
DECLARE_STACK_OF(CMS_RevocationInfoChoice)
DECLARE_ASN1_FUNCTIONS(CMS_ContentInfo) DECLARE_ASN1_FUNCTIONS(CMS_ContentInfo)
DECLARE_ASN1_FUNCTIONS(CMS_ReceiptRequest) DECLARE_ASN1_FUNCTIONS(CMS_ReceiptRequest)
DECLARE_ASN1_PRINT_FUNCTION(CMS_ContentInfo) DECLARE_ASN1_PRINT_FUNCTION(CMS_ContentInfo)
......
...@@ -325,7 +325,7 @@ typedef struct ssl_session_st SSL_SESSION; ...@@ -325,7 +325,7 @@ typedef struct ssl_session_st SSL_SESSION;
typedef struct tls_sigalgs_st TLS_SIGALGS; typedef struct tls_sigalgs_st TLS_SIGALGS;
typedef struct ssl_conf_ctx_st SSL_CONF_CTX; typedef struct ssl_conf_ctx_st SSL_CONF_CTX;
DECLARE_STACK_OF(SSL_CIPHER) DECLARE_CONST_STACK_OF(SSL_CIPHER)
DECLARE_STACK_OF(danetls_record) DECLARE_STACK_OF(danetls_record)
...@@ -343,7 +343,7 @@ typedef int (*tls_session_ticket_ext_cb_fn) (SSL *s, ...@@ -343,7 +343,7 @@ typedef int (*tls_session_ticket_ext_cb_fn) (SSL *s,
typedef int (*tls_session_secret_cb_fn) (SSL *s, void *secret, typedef int (*tls_session_secret_cb_fn) (SSL *s, void *secret,
int *secret_len, int *secret_len,
STACK_OF(SSL_CIPHER) *peer_ciphers, STACK_OF(SSL_CIPHER) *peer_ciphers,
SSL_CIPHER **cipher, void *arg); const SSL_CIPHER **cipher, void *arg);
/* Typedefs for handling custom extensions */ /* Typedefs for handling custom extensions */
......
...@@ -206,8 +206,6 @@ typedef struct GENERAL_NAME_st { ...@@ -206,8 +206,6 @@ typedef struct GENERAL_NAME_st {
} d; } d;
} GENERAL_NAME; } GENERAL_NAME;
typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES;
typedef struct ACCESS_DESCRIPTION_st { typedef struct ACCESS_DESCRIPTION_st {
ASN1_OBJECT *method; ASN1_OBJECT *method;
GENERAL_NAME *location; GENERAL_NAME *location;
...@@ -220,6 +218,8 @@ typedef STACK_OF(ASN1_OBJECT) EXTENDED_KEY_USAGE; ...@@ -220,6 +218,8 @@ typedef STACK_OF(ASN1_OBJECT) EXTENDED_KEY_USAGE;
typedef STACK_OF(ASN1_INTEGER) TLS_FEATURE; typedef STACK_OF(ASN1_INTEGER) TLS_FEATURE;
DECLARE_STACK_OF(GENERAL_NAME) DECLARE_STACK_OF(GENERAL_NAME)
typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES;
DECLARE_STACK_OF(GENERAL_NAMES)
DECLARE_STACK_OF(ACCESS_DESCRIPTION) DECLARE_STACK_OF(ACCESS_DESCRIPTION)
......
...@@ -4105,10 +4105,10 @@ int ssl3_put_cipher_by_char(const SSL_CIPHER *c, unsigned char *p) ...@@ -4105,10 +4105,10 @@ int ssl3_put_cipher_by_char(const SSL_CIPHER *c, unsigned char *p)
return (2); return (2);
} }
SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt, const SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
STACK_OF(SSL_CIPHER) *srvr) STACK_OF(SSL_CIPHER) *srvr)
{ {
SSL_CIPHER *c, *ret = NULL; const SSL_CIPHER *c, *ret = NULL;
STACK_OF(SSL_CIPHER) *prio, *allow; STACK_OF(SSL_CIPHER) *prio, *allow;
int i, ii, ok; int i, ii, ok;
unsigned long alg_k, alg_a, mask_k, mask_a; unsigned long alg_k, alg_a, mask_k, mask_a;
...@@ -4201,7 +4201,7 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt, ...@@ -4201,7 +4201,7 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
if (ii >= 0) { if (ii >= 0) {
/* Check security callback permits this cipher */ /* Check security callback permits this cipher */
if (!ssl_security(s, SSL_SECOP_CIPHER_SHARED, if (!ssl_security(s, SSL_SECOP_CIPHER_SHARED,
c->strength_bits, 0, c)) c->strength_bits, 0, (void *)c))
continue; continue;
#if !defined(OPENSSL_NO_EC) #if !defined(OPENSSL_NO_EC)
if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA) if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA)
......
...@@ -1883,7 +1883,7 @@ STACK_OF(SSL_CIPHER) *ssl_get_ciphers_by_id(SSL *s) ...@@ -1883,7 +1883,7 @@ STACK_OF(SSL_CIPHER) *ssl_get_ciphers_by_id(SSL *s)
/** The old interface to get the same thing as SSL_get_ciphers() */ /** The old interface to get the same thing as SSL_get_ciphers() */
const char *SSL_get_cipher_list(const SSL *s, int n) const char *SSL_get_cipher_list(const SSL *s, int n)
{ {
SSL_CIPHER *c; const SSL_CIPHER *c;
STACK_OF(SSL_CIPHER) *sk; STACK_OF(SSL_CIPHER) *sk;
if (s == NULL) if (s == NULL)
...@@ -1941,7 +1941,7 @@ char *SSL_get_shared_ciphers(const SSL *s, char *buf, int len) ...@@ -1941,7 +1941,7 @@ char *SSL_get_shared_ciphers(const SSL *s, char *buf, int len)
{ {
char *p; char *p;
STACK_OF(SSL_CIPHER) *sk; STACK_OF(SSL_CIPHER) *sk;
SSL_CIPHER *c; const SSL_CIPHER *c;
int i; int i;
if ((s->session == NULL) || (s->session->ciphers == NULL) || (len < 2)) if ((s->session == NULL) || (s->session->ciphers == NULL) || (len < 2))
......
...@@ -1910,8 +1910,9 @@ __owur int ssl3_final_finish_mac(SSL *s, const char *sender, int slen, ...@@ -1910,8 +1910,9 @@ __owur int ssl3_final_finish_mac(SSL *s, const char *sender, int slen,
void ssl3_finish_mac(SSL *s, const unsigned char *buf, int len); void ssl3_finish_mac(SSL *s, const unsigned char *buf, int len);
void ssl3_free_digest_list(SSL *s); void ssl3_free_digest_list(SSL *s);
__owur unsigned long ssl3_output_cert_chain(SSL *s, CERT_PKEY *cpk); __owur unsigned long ssl3_output_cert_chain(SSL *s, CERT_PKEY *cpk);
__owur SSL_CIPHER *ssl3_choose_cipher(SSL *ssl, STACK_OF(SSL_CIPHER) *clnt, __owur const SSL_CIPHER *ssl3_choose_cipher(SSL *ssl,
STACK_OF(SSL_CIPHER) *srvr); STACK_OF(SSL_CIPHER) *clnt,
STACK_OF(SSL_CIPHER) *srvr);
__owur int ssl3_digest_cached_records(SSL *s, int keep); __owur int ssl3_digest_cached_records(SSL *s, int keep);
__owur int ssl3_new(SSL *s); __owur int ssl3_new(SSL *s);
void ssl3_free(SSL *s); void ssl3_free(SSL *s);
......
...@@ -989,7 +989,7 @@ int SSL_set_session_secret_cb(SSL *s, ...@@ -989,7 +989,7 @@ int SSL_set_session_secret_cb(SSL *s,
int *secret_len, int *secret_len,
STACK_OF(SSL_CIPHER) STACK_OF(SSL_CIPHER)
*peer_ciphers, *peer_ciphers,
SSL_CIPHER const SSL_CIPHER
**cipher, **cipher,
void *arg), void *arg),
void *arg) void *arg)
......
...@@ -1090,7 +1090,7 @@ MSG_PROCESS_RETURN tls_process_server_hello(SSL *s, PACKET *pkt) ...@@ -1090,7 +1090,7 @@ MSG_PROCESS_RETURN tls_process_server_hello(SSL *s, PACKET *pkt)
*/ */
if (s->version >= TLS1_VERSION && s->tls_session_secret_cb && if (s->version >= TLS1_VERSION && s->tls_session_secret_cb &&
s->session->tlsext_tick) { s->session->tlsext_tick) {
SSL_CIPHER *pref_cipher = NULL; const SSL_CIPHER *pref_cipher = NULL;
s->session->master_key_length = sizeof(s->session->master_key); s->session->master_key_length = sizeof(s->session->master_key);
if (s->tls_session_secret_cb(s, s->session->master_key, if (s->tls_session_secret_cb(s, s->session->master_key,
&s->session->master_key_length, &s->session->master_key_length,
...@@ -2865,7 +2865,7 @@ int ssl_cipher_list_to_bytes(SSL *s, STACK_OF(SSL_CIPHER) *sk, ...@@ -2865,7 +2865,7 @@ int ssl_cipher_list_to_bytes(SSL *s, STACK_OF(SSL_CIPHER) *sk,
unsigned char *p) unsigned char *p)
{ {
int i, j = 0; int i, j = 0;
SSL_CIPHER *c; const SSL_CIPHER *c;
unsigned char *q; unsigned char *q;
int empty_reneg_info_scsv = !s->renegotiate; int empty_reneg_info_scsv = !s->renegotiate;
/* Set disabled masks for this session */ /* Set disabled masks for this session */
......
...@@ -965,7 +965,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt) ...@@ -965,7 +965,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt)
int i, al = SSL_AD_INTERNAL_ERROR; int i, al = SSL_AD_INTERNAL_ERROR;
unsigned int j, complen = 0; unsigned int j, complen = 0;
unsigned long id; unsigned long id;
SSL_CIPHER *c; const SSL_CIPHER *c;
#ifndef OPENSSL_NO_COMP #ifndef OPENSSL_NO_COMP
SSL_COMP *comp = NULL; SSL_COMP *comp = NULL;
#endif #endif
...@@ -1295,7 +1295,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt) ...@@ -1295,7 +1295,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt)
} }
if (!s->hit && s->version >= TLS1_VERSION && s->tls_session_secret_cb) { if (!s->hit && s->version >= TLS1_VERSION && s->tls_session_secret_cb) {
SSL_CIPHER *pref_cipher = NULL; const SSL_CIPHER *pref_cipher = NULL;
s->session->master_key_length = sizeof(s->session->master_key); s->session->master_key_length = sizeof(s->session->master_key);
if (s->tls_session_secret_cb(s, s->session->master_key, if (s->tls_session_secret_cb(s, s->session->master_key,
...@@ -1446,7 +1446,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt) ...@@ -1446,7 +1446,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt)
WORK_STATE tls_post_process_client_hello(SSL *s, WORK_STATE wst) WORK_STATE tls_post_process_client_hello(SSL *s, WORK_STATE wst)
{ {
int al = SSL_AD_HANDSHAKE_FAILURE; int al = SSL_AD_HANDSHAKE_FAILURE;
SSL_CIPHER *cipher; const SSL_CIPHER *cipher;
if (wst == WORK_MORE_A) { if (wst == WORK_MORE_A) {
if (!s->hit) { if (!s->hit) {
......
...@@ -1127,7 +1127,7 @@ unsigned char *ssl_add_clienthello_tlsext(SSL *s, unsigned char *buf, ...@@ -1127,7 +1127,7 @@ unsigned char *ssl_add_clienthello_tlsext(SSL *s, unsigned char *buf,
STACK_OF(SSL_CIPHER) *cipher_stack = SSL_get_ciphers(s); STACK_OF(SSL_CIPHER) *cipher_stack = SSL_get_ciphers(s);
for (i = 0; i < sk_SSL_CIPHER_num(cipher_stack); i++) { for (i = 0; i < sk_SSL_CIPHER_num(cipher_stack); i++) {
SSL_CIPHER *c = sk_SSL_CIPHER_value(cipher_stack, i); const SSL_CIPHER *c = sk_SSL_CIPHER_value(cipher_stack, i);
alg_k = c->algorithm_mkey; alg_k = c->algorithm_mkey;
alg_a = c->algorithm_auth; alg_a = c->algorithm_auth;
......
...@@ -1049,7 +1049,7 @@ int main(int argc, char *argv[]) ...@@ -1049,7 +1049,7 @@ int main(int argc, char *argv[])
SSL_CONF_CTX *s_cctx = NULL, *c_cctx = NULL; SSL_CONF_CTX *s_cctx = NULL, *c_cctx = NULL;
STACK_OF(OPENSSL_STRING) *conf_args = NULL; STACK_OF(OPENSSL_STRING) *conf_args = NULL;
const char *arg = NULL, *argn = NULL; char *arg = NULL, *argn = NULL;
verbose = 0; verbose = 0;
debug = 0; debug = 0;
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册