Loading crypto/engine/hw_sureware.c +9 −4 Original line number Diff line number Diff line Loading @@ -95,9 +95,11 @@ static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id, static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, UI_METHOD *ui_method, void *callback_data); static void surewarehk_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad, int index,long argl, void *argp); int index_,long argl, void *argp); #if 0 static void surewarehk_dh_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad, int index,long argl, void *argp); int index_,long argl, void *argp); #endif /* This function is aliased to mod_exp (with the mont stuff dropped). */ static int surewarehk_mod_exp_mont(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, Loading Loading @@ -759,7 +761,7 @@ static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, /* This cleans up an RSA/DSA KM key(do not destroy the key into the hardware) , called when ex_data is freed */ static void surewarehk_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad, int index,long argl, void *argp) int index_,long argl, void *argp) { if(!p_surewarehk_Free) { Loading @@ -768,10 +770,12 @@ static void surewarehk_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad, else p_surewarehk_Free((char *)item,0); } #if 0 /* not currently used (bug?) */ /* This cleans up an DH KM key (destroys the key into hardware), called when ex_data is freed */ static void surewarehk_dh_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad, int index,long argl, void *argp) int index_,long argl, void *argp) { if(!p_surewarehk_Free) { Loading @@ -780,6 +784,7 @@ static void surewarehk_dh_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad, else p_surewarehk_Free((char *)item,1); } #endif /* * return number of decrypted bytes */ Loading Loading
crypto/engine/hw_sureware.c +9 −4 Original line number Diff line number Diff line Loading @@ -95,9 +95,11 @@ static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id, static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, UI_METHOD *ui_method, void *callback_data); static void surewarehk_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad, int index,long argl, void *argp); int index_,long argl, void *argp); #if 0 static void surewarehk_dh_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad, int index,long argl, void *argp); int index_,long argl, void *argp); #endif /* This function is aliased to mod_exp (with the mont stuff dropped). */ static int surewarehk_mod_exp_mont(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, Loading Loading @@ -759,7 +761,7 @@ static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id, /* This cleans up an RSA/DSA KM key(do not destroy the key into the hardware) , called when ex_data is freed */ static void surewarehk_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad, int index,long argl, void *argp) int index_,long argl, void *argp) { if(!p_surewarehk_Free) { Loading @@ -768,10 +770,12 @@ static void surewarehk_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad, else p_surewarehk_Free((char *)item,0); } #if 0 /* not currently used (bug?) */ /* This cleans up an DH KM key (destroys the key into hardware), called when ex_data is freed */ static void surewarehk_dh_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad, int index,long argl, void *argp) int index_,long argl, void *argp) { if(!p_surewarehk_Free) { Loading @@ -780,6 +784,7 @@ static void surewarehk_dh_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad, else p_surewarehk_Free((char *)item,1); } #endif /* * return number of decrypted bytes */ Loading