Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
60f43e9e
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
60f43e9e
编写于
12月 09, 2015
作者:
R
Richard Levitte
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Fix warnings about unused variables when EC is disabled.
Reviewed-by:
N
Stephen Henson
<
steve@openssl.org
>
上级
f8d3ab49
变更
2
隐藏空白更改
内联
并排
Showing
2 changed file
with
7 addition
and
8 deletion
+7
-8
ssl/ssl_lib.c
ssl/ssl_lib.c
+2
-6
ssl/statem/statem_clnt.c
ssl/statem/statem_clnt.c
+5
-2
未找到文件。
ssl/ssl_lib.c
浏览文件 @
60f43e9e
...
@@ -2001,7 +2001,9 @@ void SSL_set_cert_cb(SSL *s, int (*cb) (SSL *ssl, void *arg), void *arg)
...
@@ -2001,7 +2001,9 @@ void SSL_set_cert_cb(SSL *s, int (*cb) (SSL *ssl, void *arg), void *arg)
void
ssl_set_masks
(
SSL
*
s
,
const
SSL_CIPHER
*
cipher
)
void
ssl_set_masks
(
SSL
*
s
,
const
SSL_CIPHER
*
cipher
)
{
{
#if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_GOST)
CERT_PKEY
*
cpk
;
CERT_PKEY
*
cpk
;
#endif
CERT
*
c
=
s
->
cert
;
CERT
*
c
=
s
->
cert
;
uint32_t
*
pvalid
=
s
->
s3
->
tmp
.
valid_flags
;
uint32_t
*
pvalid
=
s
->
s3
->
tmp
.
valid_flags
;
int
rsa_enc
,
rsa_sign
,
dh_tmp
,
dh_rsa
,
dh_dsa
,
dsa_sign
;
int
rsa_enc
,
rsa_sign
,
dh_tmp
,
dh_rsa
,
dh_dsa
,
dsa_sign
;
...
@@ -2021,17 +2023,11 @@ void ssl_set_masks(SSL *s, const SSL_CIPHER *cipher)
...
@@ -2021,17 +2023,11 @@ void ssl_set_masks(SSL *s, const SSL_CIPHER *cipher)
dh_tmp
=
0
;
dh_tmp
=
0
;
#endif
#endif
cpk
=
&
(
c
->
pkeys
[
SSL_PKEY_RSA_ENC
]);
rsa_enc
=
pvalid
[
SSL_PKEY_RSA_ENC
]
&
CERT_PKEY_VALID
;
rsa_enc
=
pvalid
[
SSL_PKEY_RSA_ENC
]
&
CERT_PKEY_VALID
;
cpk
=
&
(
c
->
pkeys
[
SSL_PKEY_RSA_SIGN
]);
rsa_sign
=
pvalid
[
SSL_PKEY_RSA_SIGN
]
&
CERT_PKEY_SIGN
;
rsa_sign
=
pvalid
[
SSL_PKEY_RSA_SIGN
]
&
CERT_PKEY_SIGN
;
cpk
=
&
(
c
->
pkeys
[
SSL_PKEY_DSA_SIGN
]);
dsa_sign
=
pvalid
[
SSL_PKEY_DSA_SIGN
]
&
CERT_PKEY_SIGN
;
dsa_sign
=
pvalid
[
SSL_PKEY_DSA_SIGN
]
&
CERT_PKEY_SIGN
;
cpk
=
&
(
c
->
pkeys
[
SSL_PKEY_DH_RSA
]);
dh_rsa
=
pvalid
[
SSL_PKEY_DH_RSA
]
&
CERT_PKEY_VALID
;
dh_rsa
=
pvalid
[
SSL_PKEY_DH_RSA
]
&
CERT_PKEY_VALID
;
cpk
=
&
(
c
->
pkeys
[
SSL_PKEY_DH_DSA
]);
dh_dsa
=
pvalid
[
SSL_PKEY_DH_DSA
]
&
CERT_PKEY_VALID
;
dh_dsa
=
pvalid
[
SSL_PKEY_DH_DSA
]
&
CERT_PKEY_VALID
;
cpk
=
&
(
c
->
pkeys
[
SSL_PKEY_ECC
]);
#ifndef OPENSSL_NO_EC
#ifndef OPENSSL_NO_EC
have_ecc_cert
=
pvalid
[
SSL_PKEY_ECC
]
&
CERT_PKEY_VALID
;
have_ecc_cert
=
pvalid
[
SSL_PKEY_ECC
]
&
CERT_PKEY_VALID
;
#endif
#endif
...
...
ssl/statem/statem_clnt.c
浏览文件 @
60f43e9e
...
@@ -3101,7 +3101,10 @@ int tls_construct_client_certificate(SSL *s)
...
@@ -3101,7 +3101,10 @@ int tls_construct_client_certificate(SSL *s)
int
ssl3_check_cert_and_algorithm
(
SSL
*
s
)
int
ssl3_check_cert_and_algorithm
(
SSL
*
s
)
{
{
int
i
,
idx
;
int
i
;
#ifndef OPENSSL_NO_EC
int
idx
;
#endif
long
alg_k
,
alg_a
;
long
alg_k
,
alg_a
;
EVP_PKEY
*
pkey
=
NULL
;
EVP_PKEY
*
pkey
=
NULL
;
#ifndef OPENSSL_NO_DH
#ifndef OPENSSL_NO_DH
...
@@ -3121,8 +3124,8 @@ int ssl3_check_cert_and_algorithm(SSL *s)
...
@@ -3121,8 +3124,8 @@ int ssl3_check_cert_and_algorithm(SSL *s)
/* This is the passed certificate */
/* This is the passed certificate */
idx
=
s
->
session
->
peer_type
;
#ifndef OPENSSL_NO_EC
#ifndef OPENSSL_NO_EC
idx
=
s
->
session
->
peer_type
;
if
(
idx
==
SSL_PKEY_ECC
)
{
if
(
idx
==
SSL_PKEY_ECC
)
{
if
(
ssl_check_srvr_ecc_cert_and_alg
(
s
->
session
->
peer
,
s
)
==
0
)
{
if
(
ssl_check_srvr_ecc_cert_and_alg
(
s
->
session
->
peer
,
s
)
==
0
)
{
/* check failed */
/* check failed */
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录