diff options
author | deraadt <> | 2014-04-13 20:37:12 +0000 |
---|---|---|
committer | deraadt <> | 2014-04-13 20:37:12 +0000 |
commit | 055493ad24265ed26872a3a87865dd61fa3b713f (patch) | |
tree | 526e4a52c465ca5d0107849ce38aa20fe23ad8e4 /src/lib/libssl/src/ssl/ssltest.c | |
parent | 5a9459278c02e9167c3cf08369b67bc609c3865b (diff) | |
download | openbsd-055493ad24265ed26872a3a87865dd61fa3b713f.tar.gz openbsd-055493ad24265ed26872a3a87865dd61fa3b713f.tar.bz2 openbsd-055493ad24265ed26872a3a87865dd61fa3b713f.zip |
remove more cases of MS_STATIC, MS_CALLBACK, and MS_FAR. Did you
know that MS_STATIC doesn't mean it is static? How far can lies
and half-truths be layered? I wonder if anyone got fooled, and
actually returned a pointer..
ok beck
Diffstat (limited to 'src/lib/libssl/src/ssl/ssltest.c')
-rw-r--r-- | src/lib/libssl/src/ssl/ssltest.c | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/src/lib/libssl/src/ssl/ssltest.c b/src/lib/libssl/src/ssl/ssltest.c index 4f80be8ee4..8a602cc551 100644 --- a/src/lib/libssl/src/ssl/ssltest.c +++ b/src/lib/libssl/src/ssl/ssltest.c | |||
@@ -217,12 +217,12 @@ | |||
217 | #define COMP_RLE 255 | 217 | #define COMP_RLE 255 |
218 | #define COMP_ZLIB 1 | 218 | #define COMP_ZLIB 1 |
219 | 219 | ||
220 | static int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx); | 220 | static int verify_callback(int ok, X509_STORE_CTX *ctx); |
221 | #ifndef OPENSSL_NO_RSA | 221 | #ifndef OPENSSL_NO_RSA |
222 | static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export,int keylength); | 222 | static RSA *tmp_rsa_cb(SSL *s, int is_export,int keylength); |
223 | static void free_tmp_rsa(void); | 223 | static void free_tmp_rsa(void); |
224 | #endif | 224 | #endif |
225 | static int MS_CALLBACK app_verify_callback(X509_STORE_CTX *ctx, void *arg); | 225 | static int app_verify_callback(X509_STORE_CTX *ctx, void *arg); |
226 | #define APP_CALLBACK_STRING "Test Callback Argument" | 226 | #define APP_CALLBACK_STRING "Test Callback Argument" |
227 | struct app_verify_arg | 227 | struct app_verify_arg |
228 | { | 228 | { |
@@ -260,7 +260,7 @@ typedef struct srp_client_arg_st | |||
260 | 260 | ||
261 | #define PWD_STRLEN 1024 | 261 | #define PWD_STRLEN 1024 |
262 | 262 | ||
263 | static char * MS_CALLBACK ssl_give_srp_client_pwd_cb(SSL *s, void *arg) | 263 | static char * ssl_give_srp_client_pwd_cb(SSL *s, void *arg) |
264 | { | 264 | { |
265 | SRP_CLIENT_ARG *srp_client_arg = (SRP_CLIENT_ARG *)arg; | 265 | SRP_CLIENT_ARG *srp_client_arg = (SRP_CLIENT_ARG *)arg; |
266 | return BUF_strdup((char *)srp_client_arg->srppassin); | 266 | return BUF_strdup((char *)srp_client_arg->srppassin); |
@@ -274,7 +274,7 @@ typedef struct srp_server_arg_st | |||
274 | char *pass; | 274 | char *pass; |
275 | } SRP_SERVER_ARG; | 275 | } SRP_SERVER_ARG; |
276 | 276 | ||
277 | static int MS_CALLBACK ssl_srp_server_param_cb(SSL *s, int *ad, void *arg) | 277 | static int ssl_srp_server_param_cb(SSL *s, int *ad, void *arg) |
278 | { | 278 | { |
279 | SRP_SERVER_ARG * p = (SRP_SERVER_ARG *) arg; | 279 | SRP_SERVER_ARG * p = (SRP_SERVER_ARG *) arg; |
280 | 280 | ||
@@ -1230,7 +1230,7 @@ int doit_biopair(SSL *s_ssl, SSL *c_ssl, long count, | |||
1230 | { | 1230 | { |
1231 | /* CLIENT */ | 1231 | /* CLIENT */ |
1232 | 1232 | ||
1233 | MS_STATIC char cbuf[1024*8]; | 1233 | char cbuf[1024*8]; |
1234 | int i, r; | 1234 | int i, r; |
1235 | clock_t c_clock = clock(); | 1235 | clock_t c_clock = clock(); |
1236 | 1236 | ||
@@ -1316,7 +1316,7 @@ int doit_biopair(SSL *s_ssl, SSL *c_ssl, long count, | |||
1316 | { | 1316 | { |
1317 | /* SERVER */ | 1317 | /* SERVER */ |
1318 | 1318 | ||
1319 | MS_STATIC char sbuf[1024*8]; | 1319 | char sbuf[1024*8]; |
1320 | int i, r; | 1320 | int i, r; |
1321 | clock_t s_clock = clock(); | 1321 | clock_t s_clock = clock(); |
1322 | 1322 | ||
@@ -1550,7 +1550,7 @@ end: | |||
1550 | 1550 | ||
1551 | int doit(SSL *s_ssl, SSL *c_ssl, long count) | 1551 | int doit(SSL *s_ssl, SSL *c_ssl, long count) |
1552 | { | 1552 | { |
1553 | MS_STATIC char cbuf[1024*8],sbuf[1024*8]; | 1553 | char cbuf[1024*8],sbuf[1024*8]; |
1554 | long cw_num=count,cr_num=count; | 1554 | long cw_num=count,cr_num=count; |
1555 | long sw_num=count,sr_num=count; | 1555 | long sw_num=count,sr_num=count; |
1556 | int ret=1; | 1556 | int ret=1; |
@@ -1858,7 +1858,7 @@ static int get_proxy_auth_ex_data_idx(void) | |||
1858 | return idx; | 1858 | return idx; |
1859 | } | 1859 | } |
1860 | 1860 | ||
1861 | static int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx) | 1861 | static int verify_callback(int ok, X509_STORE_CTX *ctx) |
1862 | { | 1862 | { |
1863 | char *s,buf[256]; | 1863 | char *s,buf[256]; |
1864 | 1864 | ||
@@ -2232,7 +2232,7 @@ static int process_proxy_cond(unsigned int letters[26], | |||
2232 | return process_proxy_cond_adders(letters, cond, cond_end, &pos, 1); | 2232 | return process_proxy_cond_adders(letters, cond, cond_end, &pos, 1); |
2233 | } | 2233 | } |
2234 | 2234 | ||
2235 | static int MS_CALLBACK app_verify_callback(X509_STORE_CTX *ctx, void *arg) | 2235 | static int app_verify_callback(X509_STORE_CTX *ctx, void *arg) |
2236 | { | 2236 | { |
2237 | int ok=1; | 2237 | int ok=1; |
2238 | struct app_verify_arg *cb_arg = arg; | 2238 | struct app_verify_arg *cb_arg = arg; |
@@ -2326,7 +2326,7 @@ static int MS_CALLBACK app_verify_callback(X509_STORE_CTX *ctx, void *arg) | |||
2326 | #ifndef OPENSSL_NO_RSA | 2326 | #ifndef OPENSSL_NO_RSA |
2327 | static RSA *rsa_tmp=NULL; | 2327 | static RSA *rsa_tmp=NULL; |
2328 | 2328 | ||
2329 | static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength) | 2329 | static RSA *tmp_rsa_cb(SSL *s, int is_export, int keylength) |
2330 | { | 2330 | { |
2331 | BIGNUM *bn = NULL; | 2331 | BIGNUM *bn = NULL; |
2332 | if (rsa_tmp == NULL) | 2332 | if (rsa_tmp == NULL) |