Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
2afe3167
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
9
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
2afe3167
编写于
2月 19, 2007
作者:
B
Bodo Möller
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
fix warnings for CIPHER_DEBUG builds
上级
7e69565f
变更
2
隐藏空白更改
内联
并排
Showing
2 changed file
with
25 addition
and
25 deletion
+25
-25
ssl/s3_lib.c
ssl/s3_lib.c
+24
-24
ssl/ssl_lib.c
ssl/ssl_lib.c
+1
-1
未找到文件。
ssl/s3_lib.c
浏览文件 @
2afe3167
...
...
@@ -2489,30 +2489,30 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
#endif
#ifdef CIPHER_DEBUG
printf
(
"Server has %d from %p:
\n
"
,
sk_SSL_CIPHER_num
(
srvr
),
srvr
);
for
(
i
=
0
;
i
<
sk_SSL_CIPHER_num
(
srvr
)
;
++
i
)
{
c
=
sk_SSL_CIPHER_value
(
srvr
,
i
);
printf
(
"%p:%s
\n
"
,
c
,
c
->
name
);
}
printf
(
"Client sent %d from %p:
\n
"
,
sk_SSL_CIPHER_num
(
clnt
),
clnt
);
for
(
i
=
0
;
i
<
sk_SSL_CIPHER_num
(
clnt
)
;
++
i
)
printf
(
"Server has %d from %p:
\n
"
,
sk_SSL_CIPHER_num
(
srvr
),
(
void
*
)
srvr
);
for
(
i
=
0
;
i
<
sk_SSL_CIPHER_num
(
srvr
)
;
++
i
)
{
c
=
sk_SSL_CIPHER_value
(
srvr
,
i
);
printf
(
"%p:%s
\n
"
,(
void
*
)
c
,
c
->
name
);
}
printf
(
"Client sent %d from %p:
\n
"
,
sk_SSL_CIPHER_num
(
clnt
),
(
void
*
)
clnt
);
for
(
i
=
0
;
i
<
sk_SSL_CIPHER_num
(
clnt
)
;
++
i
)
{
c
=
sk_SSL_CIPHER_value
(
clnt
,
i
);
printf
(
"%p:%s
\n
"
,
c
,
c
->
name
);
printf
(
"%p:%s
\n
"
,
(
void
*
)
c
,
c
->
name
);
}
#endif
if
(
s
->
options
&
SSL_OP_CIPHER_SERVER_PREFERENCE
)
{
prio
=
srvr
;
allow
=
clnt
;
}
{
prio
=
srvr
;
allow
=
clnt
;
}
else
{
prio
=
clnt
;
allow
=
srvr
;
}
{
prio
=
clnt
;
allow
=
srvr
;
}
for
(
i
=
0
;
i
<
sk_SSL_CIPHER_num
(
prio
);
i
++
)
{
...
...
@@ -2532,11 +2532,11 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
alg_a
=
c
->
algorithm_auth
;
#ifndef OPENSSL_NO_KRB5
if
(
alg_k
&
SSL_kKRB5
)
{
if
(
!
kssl_keytab_is_available
(
s
->
kssl_ctx
)
)
continue
;
}
if
(
alg_k
&
SSL_kKRB5
)
{
if
(
!
kssl_keytab_is_available
(
s
->
kssl_ctx
)
)
continue
;
}
#endif
/* OPENSSL_NO_KRB5 */
#ifndef OPENSSL_NO_PSK
/* with PSK there must be server callback set */
...
...
@@ -2549,14 +2549,14 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
ok
=
(
alg_k
&
emask_k
)
&&
(
alg_a
&
emask_a
);
#ifdef CIPHER_DEBUG
printf
(
"%d:[%08lX:%08lX:%08lX:%08lX]%p:%s (export)
\n
"
,
ok
,
alg_k
,
alg_a
,
emask_k
,
emask_a
,
c
,
c
->
name
);
(
void
*
)
c
,
c
->
name
);
#endif
}
else
{
ok
=
(
alg_k
&
mask_k
)
&&
(
alg_a
&
mask_a
);
#ifdef CIPHER_DEBUG
printf
(
"%d:[%08lX:%08lX:%08lX:%08lX]%p:%s
\n
"
,
ok
,
alg_k
,
alg_a
,
mask_k
,
mask_a
,
c
,
printf
(
"%d:[%08lX:%08lX:%08lX:%08lX]%p:%s
\n
"
,
ok
,
alg_k
,
alg_a
,
mask_k
,
mask_a
,
(
void
*
)
c
,
c
->
name
);
#endif
}
...
...
ssl/ssl_lib.c
浏览文件 @
2afe3167
...
...
@@ -1712,7 +1712,7 @@ void ssl_set_cert_masks(CERT *c, SSL_CIPHER *cipher)
#ifdef CIPHER_DEBUG
printf
(
"rt=%d rte=%d dht=%d ecdht=%d re=%d ree=%d rs=%d ds=%d dhr=%d dhd=%d
\n
"
,
rsa_tmp
,
rsa_tmp_export
,
dh_tmp
,
ecdh_tmp
,
rsa_tmp
,
rsa_tmp_export
,
dh_tmp
,
have_
ecdh_tmp
,
rsa_enc
,
rsa_enc_export
,
rsa_sign
,
dsa_sign
,
dh_rsa
,
dh_dsa
);
#endif
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录