Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
5421196e
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
接近 2 年 前同步成功
通知
12
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
5421196e
编写于
2月 22, 2012
作者:
D
Dr. Stephen Henson
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
ABI compliance fixes.
Move new structure fields to end of structures.
上级
74b4b494
变更
4
隐藏空白更改
内联
并排
Showing
4 changed file
with
70 addition
and
74 deletion
+70
-74
ssl/ssl.h
ssl/ssl.h
+62
-65
ssl/ssl3.h
ssl/ssl3.h
+6
-6
ssl/ssl_err.c
ssl/ssl_err.c
+1
-2
ssl/ssl_lib.c
ssl/ssl_lib.c
+1
-1
未找到文件。
ssl/ssl.h
浏览文件 @
5421196e
...
...
@@ -893,10 +893,6 @@ struct ssl_ctx_st
X509_VERIFY_PARAM
*
param
;
/* Callback for disabling session caching and ticket support
* on a session basis, depending on the chosen cipher. */
int
(
*
not_resumable_session_cb
)(
SSL
*
ssl
,
int
is_forward_secure
);
#if 0
int purpose; /* Purpose setting */
int trust; /* Trust setting */
...
...
@@ -938,25 +934,6 @@ struct ssl_ctx_st
/* draft-rescorla-tls-opaque-prf-input-00.txt information */
int
(
*
tlsext_opaque_prf_input_callback
)(
SSL
*
,
void
*
peerinput
,
size_t
len
,
void
*
arg
);
void
*
tlsext_opaque_prf_input_callback_arg
;
# ifndef OPENSSL_NO_NEXTPROTONEG
/* Next protocol negotiation information */
/* (for experimental NPN extension). */
/* For a server, this contains a callback function by which the set of
* advertised protocols can be provided. */
int
(
*
next_protos_advertised_cb
)(
SSL
*
s
,
const
unsigned
char
**
buf
,
unsigned
int
*
len
,
void
*
arg
);
void
*
next_protos_advertised_cb_arg
;
/* For a client, this contains a callback function that selects the
* next protocol from the list provided by the server. */
int
(
*
next_proto_select_cb
)(
SSL
*
s
,
unsigned
char
**
out
,
unsigned
char
*
outlen
,
const
unsigned
char
*
in
,
unsigned
int
inlen
,
void
*
arg
);
void
*
next_proto_select_cb_arg
;
# endif
#endif
#ifndef OPENSSL_NO_PSK
...
...
@@ -979,9 +956,31 @@ struct ssl_ctx_st
#endif
#ifndef OPENSSL_NO_TLSEXT
# ifndef OPENSSL_NO_NEXTPROTONEG
/* Next protocol negotiation information */
/* (for experimental NPN extension). */
/* For a server, this contains a callback function by which the set of
* advertised protocols can be provided. */
int
(
*
next_protos_advertised_cb
)(
SSL
*
s
,
const
unsigned
char
**
buf
,
unsigned
int
*
len
,
void
*
arg
);
void
*
next_protos_advertised_cb_arg
;
/* For a client, this contains a callback function that selects the
* next protocol from the list provided by the server. */
int
(
*
next_proto_select_cb
)(
SSL
*
s
,
unsigned
char
**
out
,
unsigned
char
*
outlen
,
const
unsigned
char
*
in
,
unsigned
int
inlen
,
void
*
arg
);
void
*
next_proto_select_cb_arg
;
# endif
/* SRTP profiles we are willing to do from RFC 5764 */
STACK_OF
(
SRTP_PROTECTION_PROFILE
)
*
srtp_profiles
;
#endif
/* Callback for disabling session caching and ticket support
* on a session basis, depending on the chosen cipher. */
int
(
*
not_resumable_session_cb
)(
SSL
*
ssl
,
int
is_forward_secure
);
};
#endif
...
...
@@ -1152,10 +1151,6 @@ struct ssl_st
* NB: For servers, the 'new' session may actually be a previously
* cached session or even the previous session unless
* SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION is set */
int
renegotiate
;
/* 1 if we are renegotiating.
* 2 if we are a server and are inside a handshake
* (i.e. not just sending a HelloRequest) */
int
quiet_shutdown
;
/* don't send shutdown packets */
int
shutdown
;
/* we have shut things down, 0x01 sent, 0x02
* for received */
...
...
@@ -1186,10 +1181,6 @@ struct ssl_st
X509_VERIFY_PARAM
*
param
;
/* Callback for disabling session caching and ticket support
* on a session basis, depending on the chosen cipher. */
int
(
*
not_resumable_session_cb
)(
SSL
*
ssl
,
int
is_forward_secure
);
#if 0
int purpose; /* Purpose setting */
int trust; /* Trust setting */
...
...
@@ -1338,6 +1329,9 @@ struct ssl_st
unsigned
char
*
next_proto_negotiated
;
unsigned
char
next_proto_negotiated_len
;
#endif
int
renegotiate
;
/* 1 if we are renegotiating.
* 2 if we are a server and are inside a handshake
* (i.e. not just sending a HelloRequest) */
#ifndef OPENSSL_NO_SRP
SRP_CTX
srp_ctx
;
/* ctx for SRP authentication */
#endif
...
...
@@ -1357,6 +1351,10 @@ struct ssl_st
#else
#define session_ctx ctx
#endif
/* OPENSSL_NO_TLSEXT */
/* Callback for disabling session caching and ticket support
* on a session basis, depending on the chosen cipher. */
int
(
*
not_resumable_session_cb
)(
SSL
*
ssl
,
int
is_forward_secure
);
};
#endif
...
...
@@ -2076,7 +2074,7 @@ void SSL_set_not_resumable_session_callback(SSL *ssl,
void
SSL_set_debug
(
SSL
*
s
,
int
debug
);
int
SSL_cache_hit
(
SSL
*
s
);
/* BEGIN ERROR CODES */
/* The following lines are auto generated by the script mkerr.pl. Any changes
* made after this point may be overwritten when the script is next run.
...
...
@@ -2104,7 +2102,7 @@ void ERR_load_SSL_strings(void);
#define SSL_F_DTLS1_GET_MESSAGE_FRAGMENT 253
#define SSL_F_DTLS1_GET_RECORD 254
#define SSL_F_DTLS1_HANDLE_TIMEOUT 297
#define SSL_F_DTLS1_HEARTBEAT 3
14
#define SSL_F_DTLS1_HEARTBEAT 3
05
#define SSL_F_DTLS1_OUTPUT_CERT_CHAIN 255
#define SSL_F_DTLS1_PREPROCESS_FRAGMENT 288
#define SSL_F_DTLS1_PROCESS_OUT_OF_SEQ_MESSAGE 256
...
...
@@ -2154,7 +2152,7 @@ void ERR_load_SSL_strings(void);
#define SSL_F_SSL3_CALLBACK_CTRL 233
#define SSL_F_SSL3_CHANGE_CIPHER_STATE 129
#define SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM 130
#define SSL_F_SSL3_CHECK_CLIENT_HELLO 3
15
#define SSL_F_SSL3_CHECK_CLIENT_HELLO 3
04
#define SSL_F_SSL3_CLIENT_HELLO 131
#define SSL_F_SSL3_CONNECT 132
#define SSL_F_SSL3_CTRL 213
...
...
@@ -2173,7 +2171,7 @@ void ERR_load_SSL_strings(void);
#define SSL_F_SSL3_GET_KEY_EXCHANGE 141
#define SSL_F_SSL3_GET_MESSAGE 142
#define SSL_F_SSL3_GET_NEW_SESSION_TICKET 283
#define SSL_F_SSL3_GET_NEXT_PROTO 30
4
#define SSL_F_SSL3_GET_NEXT_PROTO 30
6
#define SSL_F_SSL3_GET_RECORD 143
#define SSL_F_SSL3_GET_SERVER_CERTIFICATE 144
#define SSL_F_SSL3_GET_SERVER_DONE 145
...
...
@@ -2244,7 +2242,7 @@ void ERR_load_SSL_strings(void);
#define SSL_F_SSL_DO_HANDSHAKE 180
#define SSL_F_SSL_GET_NEW_SESSION 181
#define SSL_F_SSL_GET_PREV_SESSION 217
#define SSL_F_SSL_GET_SERVER_SEND_
CERT
182
#define SSL_F_SSL_GET_SERVER_SEND_
PKEY
182
#define SSL_F_SSL_GET_SIGN_PKEY 183
#define SSL_F_SSL_INIT_WBIO_BUFFER 184
#define SSL_F_SSL_LOAD_CLIENT_CA_FILE 185
...
...
@@ -2263,7 +2261,7 @@ void ERR_load_SSL_strings(void);
#define SSL_F_SSL_RSA_PUBLIC_ENCRYPT 188
#define SSL_F_SSL_SESSION_NEW 189
#define SSL_F_SSL_SESSION_PRINT_FP 190
#define SSL_F_SSL_SESSION_SET1_ID_CONTEXT 3
06
#define SSL_F_SSL_SESSION_SET1_ID_CONTEXT 3
12
#define SSL_F_SSL_SESS_CERT_NEW 225
#define SSL_F_SSL_SET_CERT 191
#define SSL_F_SSL_SET_CIPHER_LIST 271
...
...
@@ -2277,7 +2275,7 @@ void ERR_load_SSL_strings(void);
#define SSL_F_SSL_SET_TRUST 228
#define SSL_F_SSL_SET_WFD 196
#define SSL_F_SSL_SHUTDOWN 224
#define SSL_F_SSL_SRP_CTX_INIT 3
05
#define SSL_F_SSL_SRP_CTX_INIT 3
13
#define SSL_F_SSL_UNDEFINED_CONST_FUNCTION 243
#define SSL_F_SSL_UNDEFINED_FUNCTION 197
#define SSL_F_SSL_UNDEFINED_VOID_FUNCTION 244
...
...
@@ -2297,8 +2295,8 @@ void ERR_load_SSL_strings(void);
#define SSL_F_TLS1_CHANGE_CIPHER_STATE 209
#define SSL_F_TLS1_CHECK_SERVERHELLO_TLSEXT 274
#define SSL_F_TLS1_ENC 210
#define SSL_F_TLS1_EXPORT_KEYING_MATERIAL 31
2
#define SSL_F_TLS1_HEARTBEAT 31
3
#define SSL_F_TLS1_EXPORT_KEYING_MATERIAL 31
4
#define SSL_F_TLS1_HEARTBEAT 31
5
#define SSL_F_TLS1_PREPARE_CLIENTHELLO_TLSEXT 275
#define SSL_F_TLS1_PREPARE_SERVERHELLO_TLSEXT 276
#define SSL_F_TLS1_PRF 284
...
...
@@ -2338,13 +2336,13 @@ void ERR_load_SSL_strings(void);
#define SSL_R_BAD_RSA_MODULUS_LENGTH 121
#define SSL_R_BAD_RSA_SIGNATURE 122
#define SSL_R_BAD_SIGNATURE 123
#define SSL_R_BAD_SRP_A_LENGTH 34
8
#define SSL_R_BAD_SRP_B_LENGTH 34
9
#define SSL_R_BAD_SRP_G_LENGTH 3
50
#define SSL_R_BAD_SRP_N_LENGTH 35
1
#define SSL_R_BAD_SRP_S_LENGTH 35
2
#define SSL_R_BAD_SRTP_MKI_VALUE 3
71
#define SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST 3
60
#define SSL_R_BAD_SRP_A_LENGTH 34
7
#define SSL_R_BAD_SRP_B_LENGTH 34
8
#define SSL_R_BAD_SRP_G_LENGTH 3
49
#define SSL_R_BAD_SRP_N_LENGTH 35
0
#define SSL_R_BAD_SRP_S_LENGTH 35
1
#define SSL_R_BAD_SRTP_MKI_VALUE 3
52
#define SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST 3
53
#define SSL_R_BAD_SSL_FILETYPE 124
#define SSL_R_BAD_SSL_SESSION_ID_LENGTH 125
#define SSL_R_BAD_STATE 126
...
...
@@ -2383,15 +2381,15 @@ void ERR_load_SSL_strings(void);
#define SSL_R_ECC_CERT_SHOULD_HAVE_RSA_SIGNATURE 322
#define SSL_R_ECC_CERT_SHOULD_HAVE_SHA1_SIGNATURE 323
#define SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER 310
#define SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST 3
61
#define SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST 3
54
#define SSL_R_ENCRYPTED_LENGTH_TOO_LONG 150
#define SSL_R_ERROR_GENERATING_TMP_RSA_KEY 282
#define SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST 151
#define SSL_R_EXCESSIVE_MESSAGE_SIZE 152
#define SSL_R_EXTRA_DATA_IN_MESSAGE 153
#define SSL_R_GOT_A_FIN_BEFORE_A_CCS 154
#define SSL_R_GOT_NEXT_PROTO_BEFORE_A_CCS 3
46
#define SSL_R_GOT_NEXT_PROTO_WITHOUT_EXTENSION 3
47
#define SSL_R_GOT_NEXT_PROTO_BEFORE_A_CCS 3
55
#define SSL_R_GOT_NEXT_PROTO_WITHOUT_EXTENSION 3
56
#define SSL_R_HTTPS_PROXY_REQUEST 155
#define SSL_R_HTTP_REQUEST 156
#define SSL_R_ILLEGAL_PADDING 283
...
...
@@ -2400,7 +2398,7 @@ void ERR_load_SSL_strings(void);
#define SSL_R_INVALID_COMMAND 280
#define SSL_R_INVALID_COMPRESSION_ALGORITHM 341
#define SSL_R_INVALID_PURPOSE 278
#define SSL_R_INVALID_SRP_USERNAME 35
3
#define SSL_R_INVALID_SRP_USERNAME 35
7
#define SSL_R_INVALID_STATUS_RESPONSE 328
#define SSL_R_INVALID_TICKET_KEYS_LENGTH 325
#define SSL_R_INVALID_TRUST 279
...
...
@@ -2430,14 +2428,13 @@ void ERR_load_SSL_strings(void);
#define SSL_R_MISSING_RSA_CERTIFICATE 168
#define SSL_R_MISSING_RSA_ENCRYPTING_CERT 169
#define SSL_R_MISSING_RSA_SIGNING_CERT 170
#define SSL_R_MISSING_SRP_PARAM 354
#define SSL_R_MISSING_SRP_USERNAME 355
#define SSL_R_MISSING_SRP_PARAM 358
#define SSL_R_MISSING_TMP_DH_KEY 171
#define SSL_R_MISSING_TMP_ECDH_KEY 311
#define SSL_R_MISSING_TMP_RSA_KEY 172
#define SSL_R_MISSING_TMP_RSA_PKEY 173
#define SSL_R_MISSING_VERIFY_MESSAGE 174
#define SSL_R_MULTIPLE_SGC_RESTARTS 3
70
#define SSL_R_MULTIPLE_SGC_RESTARTS 3
46
#define SSL_R_NON_SSLV2_INITIAL_PACKET 175
#define SSL_R_NO_CERTIFICATES_RETURNED 176
#define SSL_R_NO_CERTIFICATE_ASSIGNED 177
...
...
@@ -2461,7 +2458,7 @@ void ERR_load_SSL_strings(void);
#define SSL_R_NO_RENEGOTIATION 339
#define SSL_R_NO_REQUIRED_DIGEST 324
#define SSL_R_NO_SHARED_CIPHER 193
#define SSL_R_NO_SRTP_PROFILES 3
62
#define SSL_R_NO_SRTP_PROFILES 3
59
#define SSL_R_NO_VERIFY_CALLBACK 194
#define SSL_R_NULL_SSL_CTX 195
#define SSL_R_NULL_SSL_METHOD_PASSED 196
...
...
@@ -2505,12 +2502,12 @@ void ERR_load_SSL_strings(void);
#define SSL_R_SERVERHELLO_TLSEXT 275
#define SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED 277
#define SSL_R_SHORT_READ 219
#define SSL_R_SIGNATURE_ALGORITHMS_ERROR 3
59
#define SSL_R_SIGNATURE_ALGORITHMS_ERROR 3
60
#define SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE 220
#define SSL_R_SRP_A_CALC 3
56
#define SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES 36
3
#define SSL_R_SRTP_PROTECTION_PROFILE_LIST_TOO_LONG 36
4
#define SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE 36
5
#define SSL_R_SRP_A_CALC 3
61
#define SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES 36
2
#define SSL_R_SRTP_PROTECTION_PROFILE_LIST_TOO_LONG 36
3
#define SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE 36
4
#define SSL_R_SSL23_DOING_SESSION_ID_REUSE 221
#define SSL_R_SSL2_CONNECTION_ID_TOO_LONG 299
#define SSL_R_SSL3_EXT_INVALID_ECPOINTFORMAT 321
...
...
@@ -2555,8 +2552,8 @@ void ERR_load_SSL_strings(void);
#define SSL_R_TLSV1_UNRECOGNIZED_NAME 1112
#define SSL_R_TLSV1_UNSUPPORTED_EXTENSION 1110
#define SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER 232
#define SSL_R_TLS_HEARTBEAT_PEER_DOESNT_ACCEPT 36
8
#define SSL_R_TLS_HEARTBEAT_PENDING 36
9
#define SSL_R_TLS_HEARTBEAT_PEER_DOESNT_ACCEPT 36
5
#define SSL_R_TLS_HEARTBEAT_PENDING 36
6
#define SSL_R_TLS_ILLEGAL_EXPORTER_LABEL 367
#define SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST 157
#define SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST 233
...
...
@@ -2579,7 +2576,7 @@ void ERR_load_SSL_strings(void);
#define SSL_R_UNKNOWN_CERTIFICATE_TYPE 247
#define SSL_R_UNKNOWN_CIPHER_RETURNED 248
#define SSL_R_UNKNOWN_CIPHER_TYPE 249
#define SSL_R_UNKNOWN_DIGEST 3
57
#define SSL_R_UNKNOWN_DIGEST 3
68
#define SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE 250
#define SSL_R_UNKNOWN_PKEY_TYPE 251
#define SSL_R_UNKNOWN_PROTOCOL 252
...
...
@@ -2594,14 +2591,14 @@ void ERR_load_SSL_strings(void);
#define SSL_R_UNSUPPORTED_PROTOCOL 258
#define SSL_R_UNSUPPORTED_SSL_VERSION 259
#define SSL_R_UNSUPPORTED_STATUS_TYPE 329
#define SSL_R_USE_SRTP_NOT_NEGOTIATED 36
6
#define SSL_R_USE_SRTP_NOT_NEGOTIATED 36
9
#define SSL_R_WRITE_BIO_NOT_SET 260
#define SSL_R_WRONG_CIPHER_RETURNED 261
#define SSL_R_WRONG_MESSAGE_TYPE 262
#define SSL_R_WRONG_NUMBER_OF_KEY_BITS 263
#define SSL_R_WRONG_SIGNATURE_LENGTH 264
#define SSL_R_WRONG_SIGNATURE_SIZE 265
#define SSL_R_WRONG_SIGNATURE_TYPE 3
58
#define SSL_R_WRONG_SIGNATURE_TYPE 3
70
#define SSL_R_WRONG_SSL_VERSION 266
#define SSL_R_WRONG_VERSION_NUMBER 267
#define SSL_R_X509_LIB 268
...
...
ssl/ssl3.h
浏览文件 @
5421196e
...
...
@@ -477,12 +477,6 @@ typedef struct ssl3_state_st
void
*
server_opaque_prf_input
;
size_t
server_opaque_prf_input_len
;
#ifndef OPENSSL_NO_NEXTPROTONEG
/* Set if we saw the Next Protocol Negotiation extension from
our peer. */
int
next_proto_neg_seen
;
#endif
struct
{
/* actually only needs to be 16+20 */
unsigned
char
cert_verify_md
[
EVP_MAX_MD_SIZE
*
2
];
...
...
@@ -540,6 +534,12 @@ typedef struct ssl3_state_st
unsigned
char
previous_server_finished
[
EVP_MAX_MD_SIZE
];
unsigned
char
previous_server_finished_len
;
int
send_connection_binding
;
/* TODOEKR */
#ifndef OPENSSL_NO_NEXTPROTONEG
/* Set if we saw the Next Protocol Negotiation extension from
our peer. */
int
next_proto_neg_seen
;
#endif
}
SSL3_STATE
;
#endif
...
...
ssl/ssl_err.c
浏览文件 @
5421196e
...
...
@@ -228,7 +228,7 @@ static ERR_STRING_DATA SSL_str_functs[]=
{
ERR_FUNC
(
SSL_F_SSL_DO_HANDSHAKE
),
"SSL_do_handshake"
},
{
ERR_FUNC
(
SSL_F_SSL_GET_NEW_SESSION
),
"SSL_GET_NEW_SESSION"
},
{
ERR_FUNC
(
SSL_F_SSL_GET_PREV_SESSION
),
"SSL_GET_PREV_SESSION"
},
{
ERR_FUNC
(
SSL_F_SSL_GET_SERVER_SEND_
CERT
),
"SSL_GET_SERVER_SEND_CERT
"
},
{
ERR_FUNC
(
SSL_F_SSL_GET_SERVER_SEND_
PKEY
),
"SSL_GET_SERVER_SEND_PKEY
"
},
{
ERR_FUNC
(
SSL_F_SSL_GET_SIGN_PKEY
),
"SSL_GET_SIGN_PKEY"
},
{
ERR_FUNC
(
SSL_F_SSL_INIT_WBIO_BUFFER
),
"SSL_INIT_WBIO_BUFFER"
},
{
ERR_FUNC
(
SSL_F_SSL_LOAD_CLIENT_CA_FILE
),
"SSL_load_client_CA_file"
},
...
...
@@ -418,7 +418,6 @@ static ERR_STRING_DATA SSL_str_reasons[]=
{
ERR_REASON
(
SSL_R_MISSING_RSA_ENCRYPTING_CERT
),
"missing rsa encrypting cert"
},
{
ERR_REASON
(
SSL_R_MISSING_RSA_SIGNING_CERT
),
"missing rsa signing cert"
},
{
ERR_REASON
(
SSL_R_MISSING_SRP_PARAM
)
,
"can't find SRP server param"
},
{
ERR_REASON
(
SSL_R_MISSING_SRP_USERNAME
)
,
"missing srp username"
},
{
ERR_REASON
(
SSL_R_MISSING_TMP_DH_KEY
)
,
"missing tmp dh key"
},
{
ERR_REASON
(
SSL_R_MISSING_TMP_ECDH_KEY
)
,
"missing tmp ecdh key"
},
{
ERR_REASON
(
SSL_R_MISSING_TMP_RSA_KEY
)
,
"missing tmp rsa key"
},
...
...
ssl/ssl_lib.c
浏览文件 @
5421196e
...
...
@@ -2348,7 +2348,7 @@ CERT_PKEY *ssl_get_server_send_pkey(SSL *s)
i
=
SSL_PKEY_GOST01
;
else
/* if (alg_a & SSL_aNULL) */
{
SSLerr
(
SSL_F_SSL_GET_SERVER_SEND_
CERT
,
ERR_R_INTERNAL_ERROR
);
SSLerr
(
SSL_F_SSL_GET_SERVER_SEND_
PKEY
,
ERR_R_INTERNAL_ERROR
);
return
(
NULL
);
}
if
(
c
->
pkeys
[
i
].
x509
==
NULL
)
return
(
NULL
);
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录