• R/O
  • HTTP
  • SSH
  • HTTPS

Commit

Tags
Keine Tags

Frequently used words (click to add to your profile)

javac++androidlinuxc#windowsobjective-ccocoa誰得qtpythonphprubygameguibathyscaphec計画中(planning stage)翻訳omegatframeworktwitterdomtestvb.netdirectxゲームエンジンbtronarduinopreviewer

TLS/SSL and crypto library


Commit MetaInfo

Revision4bc991384404d05e49e3aa622c142c7b7d05ef7b (tree)
Zeit2015-01-22 18:46:26
AutorMatt Caswell <matt@open...>
CommiterMatt Caswell

Log Message

Rerun util/openssl-format-source -v -c .

Reviewed-by: Tim Hudson <tjh@openssl.org>

Ändern Zusammenfassung

Diff

--- a/crypto/asn1/x_crl.c
+++ b/crypto/asn1/x_crl.c
@@ -344,6 +344,7 @@ IMPLEMENT_ASN1_FUNCTIONS(X509_REVOKED)
344344 IMPLEMENT_ASN1_FUNCTIONS(X509_CRL_INFO)
345345
346346 IMPLEMENT_ASN1_FUNCTIONS(X509_CRL)
347+
347348 IMPLEMENT_ASN1_DUP_FUNCTION(X509_CRL)
348349
349350 static int X509_REVOKED_cmp(const X509_REVOKED *const *a,
@@ -510,4 +511,5 @@ IMPLEMENT_STACK_OF(X509_REVOKED)
510511 IMPLEMENT_ASN1_SET_OF(X509_REVOKED)
511512
512513 IMPLEMENT_STACK_OF(X509_CRL)
514+
513515 IMPLEMENT_ASN1_SET_OF(X509_CRL)
--- a/crypto/bio/bss_file.c
+++ b/crypto/bio/bss_file.c
@@ -239,8 +239,7 @@ static int MS_CALLBACK file_read(BIO *b, char *out, int outl)
239239 else
240240 ret = fread(out, 1, (int)outl, (FILE *)b->ptr);
241241 if (ret == 0
242- && (b->
243- flags & BIO_FLAGS_UPLINK) ? UP_ferror((FILE *)b->ptr) :
242+ && (b->flags & BIO_FLAGS_UPLINK) ? UP_ferror((FILE *)b->ptr) :
244243 ferror((FILE *)b->ptr)) {
245244 SYSerr(SYS_F_FREAD, get_last_sys_error());
246245 BIOerr(BIO_F_FILE_READ, ERR_R_SYS_LIB);
--- a/crypto/ec/ecp_smpl.c
+++ b/crypto/ec/ecp_smpl.c
@@ -1650,9 +1650,8 @@ int ec_GFp_simple_points_make_affine(const EC_GROUP *group, size_t num,
16501650
16511651 for (i = 1; i < num; i++) {
16521652 if (!BN_is_zero(&points[i]->Z)) {
1653- if (!group->
1654- meth->field_mul(group, prod_Z[i], prod_Z[i - 1],
1655- &points[i]->Z, ctx))
1653+ if (!group->meth->field_mul(group, prod_Z[i], prod_Z[i - 1],
1654+ &points[i]->Z, ctx))
16561655 goto err;
16571656 } else {
16581657 if (!BN_copy(prod_Z[i], prod_Z[i - 1]))
--- a/crypto/pem/pem_all.c
+++ b/crypto/pem/pem_all.c
@@ -190,6 +190,7 @@ RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u)
190190 IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA,
191191 RSAPrivateKey)
192192
193+
193194 IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC,
194195 RSAPublicKey) IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA,
195196 PEM_STRING_PUBLIC,
--- a/crypto/rsa/rsa_eay.c
+++ b/crypto/rsa/rsa_eay.c
@@ -842,9 +842,8 @@ static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx)
842842 goto err;
843843
844844 if (rsa->e && rsa->n) {
845- if (!rsa->
846- meth->bn_mod_exp(vrfy, r0, rsa->e, rsa->n, ctx,
847- rsa->_method_mod_n))
845+ if (!rsa->meth->bn_mod_exp(vrfy, r0, rsa->e, rsa->n, ctx,
846+ rsa->_method_mod_n))
848847 goto err;
849848 /*
850849 * If 'I' was greater than (or equal to) rsa->n, the operation will
--- a/engines/e_padlock.c
+++ b/engines/e_padlock.c
@@ -579,7 +579,9 @@ pushfd cld mov esi, ecx mov edi, ecx mov ecx, 60 up:lodsd
579579 # if defined(NID_aes_256_ofb128) && ! defined (NID_aes_256_ofb)
580580 # define NID_aes_256_ofb NID_aes_256_ofb128
581581 # endif
582-/* List of supported ciphers. */ static int padlock_cipher_nids[] = {
582+/*
583+ * List of supported ciphers.
584+ */ static int padlock_cipher_nids[] = {
583585 NID_aes_128_ecb,
584586 NID_aes_128_cbc,
585587 NID_aes_128_cfb,
--- a/ssl/d1_srvr.c
+++ b/ssl/d1_srvr.c
@@ -394,8 +394,7 @@ int dtls1_accept(SSL *s)
394394 || ((alg_k & SSL_kRSA)
395395 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
396396 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
397- && EVP_PKEY_size(s->cert->
398- pkeys
397+ && EVP_PKEY_size(s->cert->pkeys
399398 [SSL_PKEY_RSA_ENC].privatekey) *
400399 8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
401400 )
--- a/ssl/s2_srvr.c
+++ b/ssl/s2_srvr.c
@@ -484,8 +484,7 @@ static int get_client_master_key(SSL *s)
484484 if ((i < 0) || ((!is_export && (i != EVP_CIPHER_key_length(c)))
485485 || (is_export && ((i != ek)
486486 || (s->s2->tmp.clear +
487- (unsigned int)i !=
488- (unsigned int)
487+ (unsigned int)i != (unsigned int)
489488 EVP_CIPHER_key_length(c)))))) {
490489 ERR_clear_error();
491490 if (is_export)
--- a/ssl/s3_lib.c
+++ b/ssl/s3_lib.c
@@ -3034,9 +3034,8 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
30343034 j++) {
30353035 if ((s->session->tlsext_ellipticcurvelist[2 * j] ==
30363036 ec_search1)
3037- && (s->
3038- session->tlsext_ellipticcurvelist[2 * j +
3039- 1] ==
3037+ && (s->session->tlsext_ellipticcurvelist[2 * j +
3038+ 1] ==
30403039 ec_search2)) {
30413040 ec_ok = 1;
30423041 break;
@@ -3089,9 +3088,8 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
30893088 j++) {
30903089 if ((s->session->tlsext_ellipticcurvelist[2 * j] ==
30913090 ec_search1)
3092- && (s->
3093- session->tlsext_ellipticcurvelist[2 * j +
3094- 1] ==
3091+ && (s->session->tlsext_ellipticcurvelist[2 * j +
3092+ 1] ==
30953093 ec_search2)) {
30963094 ec_ok = 1;
30973095 break;
--- a/ssl/s3_srvr.c
+++ b/ssl/s3_srvr.c
@@ -402,8 +402,7 @@ int ssl3_accept(SSL *s)
402402 || ((alg_k & SSL_kRSA)
403403 && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL
404404 || (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher)
405- && EVP_PKEY_size(s->cert->
406- pkeys
405+ && EVP_PKEY_size(s->cert->pkeys
407406 [SSL_PKEY_RSA_ENC].privatekey) *
408407 8 > SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)
409408 )
--- a/ssl/ssl_sess.c
+++ b/ssl/ssl_sess.c
@@ -439,8 +439,7 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len,
439439 } else if (r == 0 || (!ret && !len))
440440 goto err;
441441 else if (!ret
442- && !(s->
443- session_ctx->session_cache_mode &
442+ && !(s->session_ctx->session_cache_mode &
444443 SSL_SESS_CACHE_NO_INTERNAL_LOOKUP))
445444 #else
446445 if (len == 0)
@@ -490,8 +489,7 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len,
490489 * well if and only if we are supposed to.
491490 */
492491 if (!
493- (s->
494- session_ctx->session_cache_mode &
492+ (s->session_ctx->session_cache_mode &
495493 SSL_SESS_CACHE_NO_INTERNAL_STORE))
496494 /*
497495 * The following should not return 1, otherwise, things are