Loading MacOS/opensslconf.h +1 −1 Original line number Diff line number Diff line Loading @@ -23,7 +23,7 @@ #if !defined(RC4_INT) /* using int types make the structure larger but make the code faster * on most boxes I have tested - up to %20 faster. */ /* /*- * I don't know what does "most" mean, but declaring "int" is a must on: * - Intel P6 because partial register stalls are very expensive; * - elder Alpha because it lacks byte load/store instructions; Loading apps/crl2p7.c +1 −1 Original line number Diff line number Diff line Loading @@ -289,7 +289,7 @@ end: OPENSSL_EXIT(ret); } /* /*- *---------------------------------------------------------------------- * int add_certs_from_file * Loading apps/gendh.c +1 −1 Original line number Diff line number Diff line Loading @@ -121,7 +121,7 @@ int MAIN(int argc, char **argv) } else if (strcmp(*argv,"-2") == 0) g=2; /* else if (strcmp(*argv,"-3") == 0) /*- else if (strcmp(*argv,"-3") == 0) g=3; */ else if (strcmp(*argv,"-5") == 0) g=5; Loading apps/s_cb.c +1 −1 Original line number Diff line number Diff line Loading @@ -199,7 +199,7 @@ int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file) { if (cert_file != NULL) { /* /*- SSL *ssl; X509 *x509; */ Loading apps/s_client.c +16 −15 Original line number Diff line number Diff line Loading @@ -438,19 +438,20 @@ static int srp_Verify_N_and_g(BIGNUM *N, BIGNUM *g) return ret; } /* This callback is used here for two purposes: - extended debugging - making some primality tests for unknown groups The callback is only called for a non default group. An application does not need the call back at all if only the stanard groups are used. In real life situations, client and server already share well known groups, thus there is no need to verify them. Furthermore, in case that a server actually proposes a group that is not one of those defined in RFC 5054, it is more appropriate to add the group to a static list and then compare since primality tests are rather cpu consuming. /*- * This callback is used here for two purposes: * - extended debugging * - making some primality tests for unknown groups * The callback is only called for a non default group. * * An application does not need the call back at all if * only the stanard groups are used. In real life situations, * client and server already share well known groups, * thus there is no need to verify them. * Furthermore, in case that a server actually proposes a group that * is not one of those defined in RFC 5054, it is more appropriate * to add the group to a static list and then compare since * primality tests are rather cpu consuming. */ static int MS_CALLBACK ssl_srp_verify_param_cb(SSL *s, void *arg) Loading Loading @@ -1606,7 +1607,7 @@ SSL_set_tlsext_status_ids(con, ids); openssl_fdset(SSL_get_fd(con),&writefds); } #endif /* printf("mode tty(%d %d%d) ssl(%d%d)\n", /*- printf("mode tty(%d %d%d) ssl(%d%d)\n", tty_on,read_tty,write_tty,read_ssl,write_ssl);*/ /* Note: under VMS with SOCKETSHR the second parameter Loading Loading
MacOS/opensslconf.h +1 −1 Original line number Diff line number Diff line Loading @@ -23,7 +23,7 @@ #if !defined(RC4_INT) /* using int types make the structure larger but make the code faster * on most boxes I have tested - up to %20 faster. */ /* /*- * I don't know what does "most" mean, but declaring "int" is a must on: * - Intel P6 because partial register stalls are very expensive; * - elder Alpha because it lacks byte load/store instructions; Loading
apps/crl2p7.c +1 −1 Original line number Diff line number Diff line Loading @@ -289,7 +289,7 @@ end: OPENSSL_EXIT(ret); } /* /*- *---------------------------------------------------------------------- * int add_certs_from_file * Loading
apps/gendh.c +1 −1 Original line number Diff line number Diff line Loading @@ -121,7 +121,7 @@ int MAIN(int argc, char **argv) } else if (strcmp(*argv,"-2") == 0) g=2; /* else if (strcmp(*argv,"-3") == 0) /*- else if (strcmp(*argv,"-3") == 0) g=3; */ else if (strcmp(*argv,"-5") == 0) g=5; Loading
apps/s_cb.c +1 −1 Original line number Diff line number Diff line Loading @@ -199,7 +199,7 @@ int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file) { if (cert_file != NULL) { /* /*- SSL *ssl; X509 *x509; */ Loading
apps/s_client.c +16 −15 Original line number Diff line number Diff line Loading @@ -438,19 +438,20 @@ static int srp_Verify_N_and_g(BIGNUM *N, BIGNUM *g) return ret; } /* This callback is used here for two purposes: - extended debugging - making some primality tests for unknown groups The callback is only called for a non default group. An application does not need the call back at all if only the stanard groups are used. In real life situations, client and server already share well known groups, thus there is no need to verify them. Furthermore, in case that a server actually proposes a group that is not one of those defined in RFC 5054, it is more appropriate to add the group to a static list and then compare since primality tests are rather cpu consuming. /*- * This callback is used here for two purposes: * - extended debugging * - making some primality tests for unknown groups * The callback is only called for a non default group. * * An application does not need the call back at all if * only the stanard groups are used. In real life situations, * client and server already share well known groups, * thus there is no need to verify them. * Furthermore, in case that a server actually proposes a group that * is not one of those defined in RFC 5054, it is more appropriate * to add the group to a static list and then compare since * primality tests are rather cpu consuming. */ static int MS_CALLBACK ssl_srp_verify_param_cb(SSL *s, void *arg) Loading Loading @@ -1606,7 +1607,7 @@ SSL_set_tlsext_status_ids(con, ids); openssl_fdset(SSL_get_fd(con),&writefds); } #endif /* printf("mode tty(%d %d%d) ssl(%d%d)\n", /*- printf("mode tty(%d %d%d) ssl(%d%d)\n", tty_on,read_tty,write_tty,read_ssl,write_ssl);*/ /* Note: under VMS with SOCKETSHR the second parameter Loading