提交 f7d53487 编写于 作者: D Dr. Stephen Henson

Use uint32_t consistently for flags.

Reviewed-by: NRich Salz <rsalz@openssl.org>
上级 0bc2f365
...@@ -124,11 +124,11 @@ struct ssl_conf_ctx_st { ...@@ -124,11 +124,11 @@ struct ssl_conf_ctx_st {
SSL_CTX *ctx; SSL_CTX *ctx;
SSL *ssl; SSL *ssl;
/* Pointer to SSL or SSL_CTX options field or NULL if none */ /* Pointer to SSL or SSL_CTX options field or NULL if none */
unsigned long *poptions; uint32_t *poptions;
/* Certificate filenames for each type */ /* Certificate filenames for each type */
char *cert_filename[SSL_PKEY_NUM]; char *cert_filename[SSL_PKEY_NUM];
/* Pointer to SSL or SSL_CTX cert_flags or NULL if none */ /* Pointer to SSL or SSL_CTX cert_flags or NULL if none */
unsigned int *pcert_flags; uint32_t *pcert_flags;
/* Current flag table being worked on */ /* Current flag table being worked on */
const ssl_flag_tbl *tbl; const ssl_flag_tbl *tbl;
/* Size of table */ /* Size of table */
......
...@@ -1937,7 +1937,7 @@ void ssl_set_masks(SSL *s, const SSL_CIPHER *cipher) ...@@ -1937,7 +1937,7 @@ void ssl_set_masks(SSL *s, const SSL_CIPHER *cipher)
{ {
CERT_PKEY *cpk; CERT_PKEY *cpk;
CERT *c = s->cert; CERT *c = s->cert;
int *pvalid = s->s3->tmp.valid_flags; uint32_t *pvalid = s->s3->tmp.valid_flags;
int rsa_enc, rsa_tmp, rsa_sign, dh_tmp, dh_rsa, dh_dsa, dsa_sign; int rsa_enc, rsa_tmp, rsa_sign, dh_tmp, dh_rsa, dh_dsa, dsa_sign;
int rsa_enc_export, dh_rsa_export, dh_dsa_export; int rsa_enc_export, dh_rsa_export, dh_dsa_export;
int rsa_tmp_export, dh_tmp_export, kl; int rsa_tmp_export, dh_tmp_export, kl;
......
...@@ -662,7 +662,7 @@ struct ssl_session_st { ...@@ -662,7 +662,7 @@ struct ssl_session_st {
# ifndef OPENSSL_NO_SRP # ifndef OPENSSL_NO_SRP
char *srp_username; char *srp_username;
# endif # endif
long flags; uint32_t flags;
}; };
/* Extended master secret support */ /* Extended master secret support */
...@@ -720,7 +720,7 @@ struct ssl_ctx_st { ...@@ -720,7 +720,7 @@ struct ssl_ctx_st {
* SSL_SESS_CACHE_SERVER, Default is SSL_SESSION_CACHE_SERVER, which * SSL_SESS_CACHE_SERVER, Default is SSL_SESSION_CACHE_SERVER, which
* means only SSL_accept which cache SSL_SESSIONS. * means only SSL_accept which cache SSL_SESSIONS.
*/ */
int session_cache_mode; uint32_t session_cache_mode;
/* /*
* If timeout is not 0, it is the default timeout value set when * If timeout is not 0, it is the default timeout value set when
* SSL_new() is called. This has been put in to make life easier to set * SSL_new() is called. This has been put in to make life easier to set
...@@ -806,8 +806,8 @@ struct ssl_ctx_st { ...@@ -806,8 +806,8 @@ struct ssl_ctx_st {
* SSL_new) * SSL_new)
*/ */
unsigned long options; uint32_t options;
unsigned long mode; uint32_t mode;
long max_cert_list; long max_cert_list;
struct cert_st /* CERT */ *cert; struct cert_st /* CERT */ *cert;
...@@ -818,7 +818,7 @@ struct ssl_ctx_st { ...@@ -818,7 +818,7 @@ struct ssl_ctx_st {
const void *buf, size_t len, SSL *ssl, void *arg); const void *buf, size_t len, SSL *ssl, void *arg);
void *msg_callback_arg; void *msg_callback_arg;
int verify_mode; uint32_t verify_mode;
unsigned int sid_ctx_length; unsigned int sid_ctx_length;
unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];
/* called 'verify_callback' in the SSL */ /* called 'verify_callback' in the SSL */
...@@ -1019,7 +1019,7 @@ struct ssl_st { ...@@ -1019,7 +1019,7 @@ struct ssl_st {
* These are the ones being used, the ones in SSL_SESSION are the ones to * These are the ones being used, the ones in SSL_SESSION are the ones to
* be 'copied' into these ones * be 'copied' into these ones
*/ */
int mac_flags; uint32_t mac_flags;
EVP_CIPHER_CTX *enc_read_ctx; /* cryptographic state */ EVP_CIPHER_CTX *enc_read_ctx; /* cryptographic state */
EVP_MD_CTX *read_hash; /* used for mac generation */ EVP_MD_CTX *read_hash; /* used for mac generation */
COMP_CTX *compress; /* compression */ COMP_CTX *compress; /* compression */
...@@ -1045,7 +1045,7 @@ struct ssl_st { ...@@ -1045,7 +1045,7 @@ struct ssl_st {
* 0 don't care about verify failure. * 0 don't care about verify failure.
* 1 fail if verify fails * 1 fail if verify fails
*/ */
int verify_mode; uint32_t verify_mode;
/* fail if callback returns 0 */ /* fail if callback returns 0 */
int (*verify_callback) (int ok, X509_STORE_CTX *ctx); int (*verify_callback) (int ok, X509_STORE_CTX *ctx);
/* optional informational callback */ /* optional informational callback */
...@@ -1077,9 +1077,9 @@ struct ssl_st { ...@@ -1077,9 +1077,9 @@ struct ssl_st {
STACK_OF(X509_NAME) *client_CA; STACK_OF(X509_NAME) *client_CA;
int references; int references;
/* protocol behaviour */ /* protocol behaviour */
unsigned long options; uint32_t options;
/* API behaviour */ /* API behaviour */
unsigned long mode; uint32_t mode;
long max_cert_list; long max_cert_list;
int first_packet; int first_packet;
/* what was passed, used for SSLv3/TLS rollback check */ /* what was passed, used for SSLv3/TLS rollback check */
...@@ -1287,7 +1287,7 @@ typedef struct ssl3_state_st { ...@@ -1287,7 +1287,7 @@ typedef struct ssl3_state_st {
* SSL session: e.g. appropriate curve, signature algorithms etc. * SSL session: e.g. appropriate curve, signature algorithms etc.
* If zero it can't be used at all. * If zero it can't be used at all.
*/ */
int valid_flags[SSL_PKEY_NUM]; uint32_t valid_flags[SSL_PKEY_NUM];
/* /*
* For servers the following masks are for the key and auth algorithms * For servers the following masks are for the key and auth algorithms
* that are supported by the certs below. For clients they are masks of * that are supported by the certs below. For clients they are masks of
...@@ -1475,7 +1475,7 @@ typedef struct { ...@@ -1475,7 +1475,7 @@ typedef struct {
* Per-connection flags relating to this extension type: not used if * Per-connection flags relating to this extension type: not used if
* part of an SSL_CTX structure. * part of an SSL_CTX structure.
*/ */
unsigned short ext_flags; uint32_t ext_flags;
custom_ext_add_cb add_cb; custom_ext_add_cb add_cb;
custom_ext_free_cb free_cb; custom_ext_free_cb free_cb;
void *add_arg; void *add_arg;
...@@ -1526,7 +1526,7 @@ typedef struct cert_st { ...@@ -1526,7 +1526,7 @@ typedef struct cert_st {
int ecdh_tmp_auto; int ecdh_tmp_auto;
# endif # endif
/* Flags related to certificates */ /* Flags related to certificates */
unsigned int cert_flags; uint32_t cert_flags;
CERT_PKEY pkeys[SSL_PKEY_NUM]; CERT_PKEY pkeys[SSL_PKEY_NUM];
/* /*
* Certificate types (received or sent) in certificate request message. * Certificate types (received or sent) in certificate request message.
...@@ -1656,7 +1656,7 @@ typedef struct ssl3_enc_method { ...@@ -1656,7 +1656,7 @@ typedef struct ssl3_enc_method {
const unsigned char *, size_t, const unsigned char *, size_t,
int use_context); int use_context);
/* Various flags indicating protocol version requirements */ /* Various flags indicating protocol version requirements */
unsigned int enc_flags; uint32_t enc_flags;
/* Handshake header length */ /* Handshake header length */
unsigned int hhlen; unsigned int hhlen;
/* Set the handshake header */ /* Set the handshake header */
......
...@@ -3459,7 +3459,7 @@ int tls1_process_sigalgs(SSL *s) ...@@ -3459,7 +3459,7 @@ int tls1_process_sigalgs(SSL *s)
size_t i; size_t i;
const EVP_MD *md; const EVP_MD *md;
const EVP_MD **pmd = s->s3->tmp.md; const EVP_MD **pmd = s->s3->tmp.md;
int *pvalid = s->s3->tmp.valid_flags; uint32_t *pvalid = s->s3->tmp.valid_flags;
CERT *c = s->cert; CERT *c = s->cert;
TLS_SIGALGS *sigptr; TLS_SIGALGS *sigptr;
if (!tls1_set_shared_sigalgs(s)) if (!tls1_set_shared_sigalgs(s))
...@@ -3890,7 +3890,7 @@ int tls1_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain, ...@@ -3890,7 +3890,7 @@ int tls1_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain,
int check_flags = 0, strict_mode; int check_flags = 0, strict_mode;
CERT_PKEY *cpk = NULL; CERT_PKEY *cpk = NULL;
CERT *c = s->cert; CERT *c = s->cert;
int *pvalid; uint32_t *pvalid;
unsigned int suiteb_flags = tls1_suiteb(s); unsigned int suiteb_flags = tls1_suiteb(s);
/* idx == -1 means checking server chains */ /* idx == -1 means checking server chains */
if (idx != -1) { if (idx != -1) {
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册