mirror of
https://github.com/ruby/ruby.git
synced 2022-11-09 12:17:21 -05:00
openssl: import v2.0.2
Import Ruby/OpenSSL 2.0.2. This release contains only bugfixes. The full commit log since 2.0.1 (imported at r57041) can be found at: https://github.com/ruby/openssl/compare/v2.0.1...v2.0.2 ---------------------------------------------------------------- Kazuki Yamaguchi (5): ssl: check for SSL_CTX_clear_options() Rename functions in openssl_missing.c ssl: use SSL_SESSION_get_protocol_version() pkey: allow instantiating OpenSSL::PKey::PKey with unsupported key type Ruby/OpenSSL 2.0.2 git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@57146 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
This commit is contained in:
parent
bd288dcc8b
commit
b7458f20ff
7 changed files with 57 additions and 34 deletions
|
@ -23,7 +23,7 @@
|
|||
/* added in 0.9.8X */
|
||||
#if !defined(HAVE_EVP_CIPHER_CTX_NEW)
|
||||
EVP_CIPHER_CTX *
|
||||
EVP_CIPHER_CTX_new(void)
|
||||
ossl_EVP_CIPHER_CTX_new(void)
|
||||
{
|
||||
EVP_CIPHER_CTX *ctx = OPENSSL_malloc(sizeof(EVP_CIPHER_CTX));
|
||||
if (!ctx)
|
||||
|
@ -35,7 +35,7 @@ EVP_CIPHER_CTX_new(void)
|
|||
|
||||
#if !defined(HAVE_EVP_CIPHER_CTX_FREE)
|
||||
void
|
||||
EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx)
|
||||
ossl_EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx)
|
||||
{
|
||||
if (ctx) {
|
||||
EVP_CIPHER_CTX_cleanup(ctx);
|
||||
|
@ -52,7 +52,7 @@ EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx)
|
|||
* tested on 0.9.7d.
|
||||
*/
|
||||
int
|
||||
EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in)
|
||||
ossl_EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in)
|
||||
{
|
||||
memcpy(out, in, sizeof(EVP_CIPHER_CTX));
|
||||
|
||||
|
@ -71,7 +71,7 @@ EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in)
|
|||
#if !defined(OPENSSL_NO_HMAC)
|
||||
#if !defined(HAVE_HMAC_CTX_COPY)
|
||||
int
|
||||
HMAC_CTX_copy(HMAC_CTX *out, HMAC_CTX *in)
|
||||
ossl_HMAC_CTX_copy(HMAC_CTX *out, HMAC_CTX *in)
|
||||
{
|
||||
if (!out || !in)
|
||||
return 0;
|
||||
|
@ -112,7 +112,7 @@ static struct {
|
|||
};
|
||||
|
||||
int
|
||||
EC_curve_nist2nid(const char *name)
|
||||
ossl_EC_curve_nist2nid(const char *name)
|
||||
{
|
||||
size_t i;
|
||||
for (i = 0; i < (sizeof(nist_curves) / sizeof(nist_curves[0])); i++) {
|
||||
|
@ -127,7 +127,7 @@ EC_curve_nist2nid(const char *name)
|
|||
/*** added in 1.1.0 ***/
|
||||
#if !defined(HAVE_HMAC_CTX_NEW)
|
||||
HMAC_CTX *
|
||||
HMAC_CTX_new(void)
|
||||
ossl_HMAC_CTX_new(void)
|
||||
{
|
||||
HMAC_CTX *ctx = OPENSSL_malloc(sizeof(HMAC_CTX));
|
||||
if (!ctx)
|
||||
|
@ -139,7 +139,7 @@ HMAC_CTX_new(void)
|
|||
|
||||
#if !defined(HAVE_HMAC_CTX_FREE)
|
||||
void
|
||||
HMAC_CTX_free(HMAC_CTX *ctx)
|
||||
ossl_HMAC_CTX_free(HMAC_CTX *ctx)
|
||||
{
|
||||
if (ctx) {
|
||||
HMAC_CTX_cleanup(ctx);
|
||||
|
@ -150,8 +150,8 @@ HMAC_CTX_free(HMAC_CTX *ctx)
|
|||
|
||||
#if !defined(HAVE_X509_CRL_GET0_SIGNATURE)
|
||||
void
|
||||
X509_CRL_get0_signature(const X509_CRL *crl, const ASN1_BIT_STRING **psig,
|
||||
const X509_ALGOR **palg)
|
||||
ossl_X509_CRL_get0_signature(const X509_CRL *crl, const ASN1_BIT_STRING **psig,
|
||||
const X509_ALGOR **palg)
|
||||
{
|
||||
if (psig != NULL)
|
||||
*psig = crl->signature;
|
||||
|
@ -162,8 +162,8 @@ X509_CRL_get0_signature(const X509_CRL *crl, const ASN1_BIT_STRING **psig,
|
|||
|
||||
#if !defined(HAVE_X509_REQ_GET0_SIGNATURE)
|
||||
void
|
||||
X509_REQ_get0_signature(const X509_REQ *req, const ASN1_BIT_STRING **psig,
|
||||
const X509_ALGOR **palg)
|
||||
ossl_X509_REQ_get0_signature(const X509_REQ *req, const ASN1_BIT_STRING **psig,
|
||||
const X509_ALGOR **palg)
|
||||
{
|
||||
if (psig != NULL)
|
||||
*psig = req->signature;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue