Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
f7d53487
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
10 个月 前同步成功
通知
8
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
前往新版Gitcode,体验更适合开发者的 AI 搜索 >>
提交
f7d53487
编写于
7月 14, 2015
作者:
D
Dr. Stephen Henson
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Use uint32_t consistently for flags.
Reviewed-by:
N
Rich Salz
<
rsalz@openssl.org
>
上级
0bc2f365
变更
4
隐藏空白更改
内联
并排
Showing
4 changed file
with
18 addition
and
18 deletion
+18
-18
ssl/ssl_conf.c
ssl/ssl_conf.c
+2
-2
ssl/ssl_lib.c
ssl/ssl_lib.c
+1
-1
ssl/ssl_locl.h
ssl/ssl_locl.h
+13
-13
ssl/t1_lib.c
ssl/t1_lib.c
+2
-2
未找到文件。
ssl/ssl_conf.c
浏览文件 @
f7d53487
...
...
@@ -124,11 +124,11 @@ struct ssl_conf_ctx_st {
SSL_CTX
*
ctx
;
SSL
*
ssl
;
/* Pointer to SSL or SSL_CTX options field or NULL if none */
u
nsigned
long
*
poptions
;
u
int32_t
*
poptions
;
/* Certificate filenames for each type */
char
*
cert_filename
[
SSL_PKEY_NUM
];
/* Pointer to SSL or SSL_CTX cert_flags or NULL if none */
u
nsigned
in
t
*
pcert_flags
;
u
int32_
t
*
pcert_flags
;
/* Current flag table being worked on */
const
ssl_flag_tbl
*
tbl
;
/* Size of table */
...
...
ssl/ssl_lib.c
浏览文件 @
f7d53487
...
...
@@ -1937,7 +1937,7 @@ void ssl_set_masks(SSL *s, const SSL_CIPHER *cipher)
{
CERT_PKEY
*
cpk
;
CERT
*
c
=
s
->
cert
;
in
t
*
pvalid
=
s
->
s3
->
tmp
.
valid_flags
;
uint32_
t
*
pvalid
=
s
->
s3
->
tmp
.
valid_flags
;
int
rsa_enc
,
rsa_tmp
,
rsa_sign
,
dh_tmp
,
dh_rsa
,
dh_dsa
,
dsa_sign
;
int
rsa_enc_export
,
dh_rsa_export
,
dh_dsa_export
;
int
rsa_tmp_export
,
dh_tmp_export
,
kl
;
...
...
ssl/ssl_locl.h
浏览文件 @
f7d53487
...
...
@@ -662,7 +662,7 @@ struct ssl_session_st {
# ifndef OPENSSL_NO_SRP
char
*
srp_username
;
# endif
long
flags
;
uint32_t
flags
;
};
/* Extended master secret support */
...
...
@@ -720,7 +720,7 @@ struct ssl_ctx_st {
* SSL_SESS_CACHE_SERVER, Default is SSL_SESSION_CACHE_SERVER, which
* means only SSL_accept which cache SSL_SESSIONS.
*/
in
t
session_cache_mode
;
uint32_
t
session_cache_mode
;
/*
* If timeout is not 0, it is the default timeout value set when
* SSL_new() is called. This has been put in to make life easier to set
...
...
@@ -806,8 +806,8 @@ struct ssl_ctx_st {
* SSL_new)
*/
u
nsigned
long
options
;
u
nsigned
long
mode
;
u
int32_t
options
;
u
int32_t
mode
;
long
max_cert_list
;
struct
cert_st
/* CERT */
*
cert
;
...
...
@@ -818,7 +818,7 @@ struct ssl_ctx_st {
const
void
*
buf
,
size_t
len
,
SSL
*
ssl
,
void
*
arg
);
void
*
msg_callback_arg
;
in
t
verify_mode
;
uint32_
t
verify_mode
;
unsigned
int
sid_ctx_length
;
unsigned
char
sid_ctx
[
SSL_MAX_SID_CTX_LENGTH
];
/* called 'verify_callback' in the SSL */
...
...
@@ -1019,7 +1019,7 @@ struct ssl_st {
* These are the ones being used, the ones in SSL_SESSION are the ones to
* be 'copied' into these ones
*/
in
t
mac_flags
;
uint32_
t
mac_flags
;
EVP_CIPHER_CTX
*
enc_read_ctx
;
/* cryptographic state */
EVP_MD_CTX
*
read_hash
;
/* used for mac generation */
COMP_CTX
*
compress
;
/* compression */
...
...
@@ -1045,7 +1045,7 @@ struct ssl_st {
* 0 don't care about verify failure.
* 1 fail if verify fails
*/
in
t
verify_mode
;
uint32_
t
verify_mode
;
/* fail if callback returns 0 */
int
(
*
verify_callback
)
(
int
ok
,
X509_STORE_CTX
*
ctx
);
/* optional informational callback */
...
...
@@ -1077,9 +1077,9 @@ struct ssl_st {
STACK_OF
(
X509_NAME
)
*
client_CA
;
int
references
;
/* protocol behaviour */
u
nsigned
long
options
;
u
int32_t
options
;
/* API behaviour */
u
nsigned
long
mode
;
u
int32_t
mode
;
long
max_cert_list
;
int
first_packet
;
/* what was passed, used for SSLv3/TLS rollback check */
...
...
@@ -1287,7 +1287,7 @@ typedef struct ssl3_state_st {
* SSL session: e.g. appropriate curve, signature algorithms etc.
* If zero it can't be used at all.
*/
in
t
valid_flags
[
SSL_PKEY_NUM
];
uint32_
t
valid_flags
[
SSL_PKEY_NUM
];
/*
* For servers the following masks are for the key and auth algorithms
* that are supported by the certs below. For clients they are masks of
...
...
@@ -1475,7 +1475,7 @@ typedef struct {
* Per-connection flags relating to this extension type: not used if
* part of an SSL_CTX structure.
*/
u
nsigned
shor
t
ext_flags
;
u
int32_
t
ext_flags
;
custom_ext_add_cb
add_cb
;
custom_ext_free_cb
free_cb
;
void
*
add_arg
;
...
...
@@ -1526,7 +1526,7 @@ typedef struct cert_st {
int
ecdh_tmp_auto
;
# endif
/* Flags related to certificates */
u
nsigned
in
t
cert_flags
;
u
int32_
t
cert_flags
;
CERT_PKEY
pkeys
[
SSL_PKEY_NUM
];
/*
* Certificate types (received or sent) in certificate request message.
...
...
@@ -1656,7 +1656,7 @@ typedef struct ssl3_enc_method {
const
unsigned
char
*
,
size_t
,
int
use_context
);
/* Various flags indicating protocol version requirements */
u
nsigned
in
t
enc_flags
;
u
int32_
t
enc_flags
;
/* Handshake header length */
unsigned
int
hhlen
;
/* Set the handshake header */
...
...
ssl/t1_lib.c
浏览文件 @
f7d53487
...
...
@@ -3459,7 +3459,7 @@ int tls1_process_sigalgs(SSL *s)
size_t
i
;
const
EVP_MD
*
md
;
const
EVP_MD
**
pmd
=
s
->
s3
->
tmp
.
md
;
in
t
*
pvalid
=
s
->
s3
->
tmp
.
valid_flags
;
uint32_
t
*
pvalid
=
s
->
s3
->
tmp
.
valid_flags
;
CERT
*
c
=
s
->
cert
;
TLS_SIGALGS
*
sigptr
;
if
(
!
tls1_set_shared_sigalgs
(
s
))
...
...
@@ -3890,7 +3890,7 @@ int tls1_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain,
int
check_flags
=
0
,
strict_mode
;
CERT_PKEY
*
cpk
=
NULL
;
CERT
*
c
=
s
->
cert
;
in
t
*
pvalid
;
uint32_
t
*
pvalid
;
unsigned
int
suiteb_flags
=
tls1_suiteb
(
s
);
/* idx == -1 means checking server chains */
if
(
idx
!=
-
1
)
{
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录