Loading crypto/ec/ec_lib.c +1 −1 Original line number Diff line number Diff line Loading @@ -68,7 +68,7 @@ #include "ec_lcl.h" static const char EC_version[] = "EC" OPENSSL_VERSION_PTEXT; const char EC_version[] = "EC" OPENSSL_VERSION_PTEXT; /* functions for EC_GROUP objects */ Loading crypto/ec/ecp_nistp256.c +0 −1 Original line number Diff line number Diff line Loading @@ -113,7 +113,6 @@ typedef u64 smallfelem[NLIMBS]; /* This is the value of the prime as four 64-bit words, little-endian. */ static const u64 kPrime[4] = { 0xfffffffffffffffful, 0xffffffff, 0, 0xffffffff00000001ul }; static const limb bottom32bits = 0xffffffff; static const u64 bottom63bits = 0x7ffffffffffffffful; /* bin32_to_felem takes a little-endian byte array and converts it into felem Loading crypto/ec/ectest.c +2 −2 Original line number Diff line number Diff line Loading @@ -1366,7 +1366,7 @@ static const struct nistp_test_params nistp_tests_params[] = }, }; void nistp_single_test(const struct nistp_test_params *test) static void nistp_single_test(const struct nistp_test_params *test) { BN_CTX *ctx; BIGNUM *p, *a, *b, *x, *y, *n, *m, *order; Loading Loading @@ -1469,7 +1469,7 @@ void nistp_single_test(const struct nistp_test_params *test) BN_CTX_free(ctx); } void nistp_tests() static void nistp_tests() { unsigned i; Loading crypto/engine/eng_dyn.c +0 −3 Original line number Diff line number Diff line Loading @@ -114,9 +114,6 @@ static const ENGINE_CMD_DEFN dynamic_cmd_defns[] = { ENGINE_CMD_FLAG_NO_INPUT}, {0, NULL, NULL, 0} }; static const ENGINE_CMD_DEFN dynamic_cmd_defns_empty[] = { {0, NULL, NULL, 0} }; /* Loading code stores state inside the ENGINE structure via the "ex_data" * element. We load all our state into a single structure and use that as a Loading engines/e_padlock.c +2 −0 Original line number Diff line number Diff line Loading @@ -384,6 +384,7 @@ padlock_available(void) } #ifndef OPENSSL_NO_AES #ifndef AES_ASM /* Our own htonl()/ntohl() */ static inline void padlock_bswapl(AES_KEY *ks) Loading @@ -397,6 +398,7 @@ padlock_bswapl(AES_KEY *ks) } } #endif #endif /* Force key reload from memory to the CPU microcode. Loading EFLAGS from the stack clears EFLAGS[30] Loading Loading
crypto/ec/ec_lib.c +1 −1 Original line number Diff line number Diff line Loading @@ -68,7 +68,7 @@ #include "ec_lcl.h" static const char EC_version[] = "EC" OPENSSL_VERSION_PTEXT; const char EC_version[] = "EC" OPENSSL_VERSION_PTEXT; /* functions for EC_GROUP objects */ Loading
crypto/ec/ecp_nistp256.c +0 −1 Original line number Diff line number Diff line Loading @@ -113,7 +113,6 @@ typedef u64 smallfelem[NLIMBS]; /* This is the value of the prime as four 64-bit words, little-endian. */ static const u64 kPrime[4] = { 0xfffffffffffffffful, 0xffffffff, 0, 0xffffffff00000001ul }; static const limb bottom32bits = 0xffffffff; static const u64 bottom63bits = 0x7ffffffffffffffful; /* bin32_to_felem takes a little-endian byte array and converts it into felem Loading
crypto/ec/ectest.c +2 −2 Original line number Diff line number Diff line Loading @@ -1366,7 +1366,7 @@ static const struct nistp_test_params nistp_tests_params[] = }, }; void nistp_single_test(const struct nistp_test_params *test) static void nistp_single_test(const struct nistp_test_params *test) { BN_CTX *ctx; BIGNUM *p, *a, *b, *x, *y, *n, *m, *order; Loading Loading @@ -1469,7 +1469,7 @@ void nistp_single_test(const struct nistp_test_params *test) BN_CTX_free(ctx); } void nistp_tests() static void nistp_tests() { unsigned i; Loading
crypto/engine/eng_dyn.c +0 −3 Original line number Diff line number Diff line Loading @@ -114,9 +114,6 @@ static const ENGINE_CMD_DEFN dynamic_cmd_defns[] = { ENGINE_CMD_FLAG_NO_INPUT}, {0, NULL, NULL, 0} }; static const ENGINE_CMD_DEFN dynamic_cmd_defns_empty[] = { {0, NULL, NULL, 0} }; /* Loading code stores state inside the ENGINE structure via the "ex_data" * element. We load all our state into a single structure and use that as a Loading
engines/e_padlock.c +2 −0 Original line number Diff line number Diff line Loading @@ -384,6 +384,7 @@ padlock_available(void) } #ifndef OPENSSL_NO_AES #ifndef AES_ASM /* Our own htonl()/ntohl() */ static inline void padlock_bswapl(AES_KEY *ks) Loading @@ -397,6 +398,7 @@ padlock_bswapl(AES_KEY *ks) } } #endif #endif /* Force key reload from memory to the CPU microcode. Loading EFLAGS from the stack clears EFLAGS[30] Loading