{"schema":"libjg2-1",
"vpath":"/git/",
"avatar":"/git/avatar/",
"alang":"",
"gen_ut":1755716977,
"reponame":"openssl",
"desc":"OpenSSL",
"owner": { "name": "Andy Green", "email": "andy@warmcat.com", "md5": "c50933ca2aa61e0fe2c43d46bb6b59cb" },"url":"https://warmcat.com/repo/openssl",
"f":3,
"items": [
{"schema":"libjg2-1",
"cid":"3f2e65dbc602756db654255377da4564",
"commit": {"type":"commit",
"time": 1421918410,
"time_ofs": 0,
"oid_tree": { "oid": "055d593c853598e031351cfb4d0ccf350fad877c", "alias": []},
"oid":{ "oid": "739a5eee619fc8c03736140828891b369f8690f4", "alias": []},
"msg": "Rerun util/openssl-format-source -v -c .",
"sig_commit": { "git_time": { "time": 1421918410, "offset": 0 }, "name": "Matt Caswell", "email": "matt@openssl.org", "md5": "10f7b441a32d5790efad9fc68cae4af2" },
"sig_author": { "git_time": { "time": 1421898091, "offset": 0 }, "name": "Matt Caswell", "email": "matt@openssl.org", "md5": "10f7b441a32d5790efad9fc68cae4af2" }},
"body": "Rerun util/openssl-format-source -v -c .\n\nReviewed-by: Tim Hudson \u003ctjh@openssl.org\u003e\n"
,
"diff": "diff --git a/crypto/asn1/x_crl.c b/crypto/asn1/x_crl.c\nindex 8012eb1..0279503 100644\n--- a/crypto/asn1/x_crl.c\n+++ b/crypto/asn1/x_crl.c\n@@ -344,7 +344,9 @@ IMPLEMENT_ASN1_FUNCTIONS(X509_REVOKED)\n IMPLEMENT_ASN1_DUP_FUNCTION(X509_REVOKED)\n \n IMPLEMENT_ASN1_FUNCTIONS(X509_CRL_INFO)\n+\n IMPLEMENT_ASN1_FUNCTIONS(X509_CRL)\n+\n IMPLEMENT_ASN1_DUP_FUNCTION(X509_CRL)\n \n static int X509_REVOKED_cmp(const X509_REVOKED *const *a,\n@@ -511,4 +513,5 @@ IMPLEMENT_STACK_OF(X509_REVOKED)\n IMPLEMENT_ASN1_SET_OF(X509_REVOKED)\n \n IMPLEMENT_STACK_OF(X509_CRL)\n+\n IMPLEMENT_ASN1_SET_OF(X509_CRL)\ndiff --git a/crypto/bio/bss_file.c b/crypto/bio/bss_file.c\nindex b3849e7..0776383 100644\n--- a/crypto/bio/bss_file.c\n+++ b/crypto/bio/bss_file.c\n@@ -239,8 +239,7 @@ static int file_read(BIO *b, char *out, int outl)\n else\n ret \u003d fread(out, 1, (int)outl, (FILE *)b-\u003eptr);\n if (ret \u003d\u003d 0\n- \u0026\u0026 (b-\u003e\n- flags \u0026 BIO_FLAGS_UPLINK) ? UP_ferror((FILE *)b-\u003eptr) :\n+ \u0026\u0026 (b-\u003eflags \u0026 BIO_FLAGS_UPLINK) ? UP_ferror((FILE *)b-\u003eptr) :\n ferror((FILE *)b-\u003eptr)) {\n SYSerr(SYS_F_FREAD, get_last_sys_error());\n BIOerr(BIO_F_FILE_READ, ERR_R_SYS_LIB);\ndiff --git a/crypto/pem/pem_all.c b/crypto/pem/pem_all.c\nindex 1a867a8..8ef8f18 100644\n--- a/crypto/pem/pem_all.c\n+++ b/crypto/pem/pem_all.c\n@@ -190,6 +190,7 @@ RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u)\n IMPLEMENT_PEM_write_cb_const(RSAPrivateKey, RSA, PEM_STRING_RSA,\n RSAPrivateKey)\n \n+\n IMPLEMENT_PEM_rw_const(RSAPublicKey, RSA, PEM_STRING_RSA_PUBLIC,\n RSAPublicKey) IMPLEMENT_PEM_rw(RSA_PUBKEY, RSA,\n PEM_STRING_PUBLIC,\ndiff --git a/crypto/rsa/rsa_eay.c b/crypto/rsa/rsa_eay.c\nindex e1981d0..b8d9221 100644\n--- a/crypto/rsa/rsa_eay.c\n+++ b/crypto/rsa/rsa_eay.c\n@@ -881,9 +881,8 @@ static int RSA_eay_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx)\n goto err;\n \n if (rsa-\u003ee \u0026\u0026 rsa-\u003en) {\n- if (!rsa-\u003e\n- meth-\u003ebn_mod_exp(vrfy, r0, rsa-\u003ee, rsa-\u003en, ctx,\n- rsa-\u003e_method_mod_n))\n+ if (!rsa-\u003emeth-\u003ebn_mod_exp(vrfy, r0, rsa-\u003ee, rsa-\u003en, ctx,\n+ rsa-\u003e_method_mod_n))\n goto err;\n /*\n * If 'I' was greater than (or equal to) rsa-\u003en, the operation will\ndiff --git a/ssl/d1_srvr.c b/ssl/d1_srvr.c\nindex 0eabf41..1ccdc35 100644\n--- a/ssl/d1_srvr.c\n+++ b/ssl/d1_srvr.c\n@@ -491,8 +491,7 @@ int dtls1_accept(SSL *s)\n || ((alg_k \u0026 SSL_kRSA)\n \u0026\u0026 (s-\u003ecert-\u003epkeys[SSL_PKEY_RSA_ENC].privatekey \u003d\u003d NULL\n || (SSL_C_IS_EXPORT(s-\u003es3-\u003etmp.new_cipher)\n- \u0026\u0026 EVP_PKEY_size(s-\u003ecert-\u003e\n- pkeys\n+ \u0026\u0026 EVP_PKEY_size(s-\u003ecert-\u003epkeys\n [SSL_PKEY_RSA_ENC].privatekey) *\n 8 \u003e SSL_C_EXPORT_PKEYLENGTH(s-\u003es3-\u003etmp.new_cipher)\n )\ndiff --git a/ssl/s3_pkt.c b/ssl/s3_pkt.c\nindex 737dabb..c1421b1 100644\n--- a/ssl/s3_pkt.c\n+++ b/ssl/s3_pkt.c\n@@ -710,8 +710,7 @@ int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len)\n u_len \u003e\u003d 4 * (max_send_fragment \u003d s-\u003emax_send_fragment) \u0026\u0026\n s-\u003ecompress \u003d\u003d NULL \u0026\u0026 s-\u003emsg_callback \u003d\u003d NULL \u0026\u0026\n !SSL_USE_ETM(s) \u0026\u0026 SSL_USE_EXPLICIT_IV(s) \u0026\u0026\n- EVP_CIPHER_flags(s-\u003e\n- enc_write_ctx-\u003ecipher) \u0026\n+ EVP_CIPHER_flags(s-\u003eenc_write_ctx-\u003ecipher) \u0026\n EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK) {\n unsigned char aad[13];\n EVP_CTRL_TLS1_1_MULTIBLOCK_PARAM mb_param;\n@@ -921,8 +920,7 @@ static int do_ssl3_write(SSL *s, int type, const unsigned char *buf,\n #if 0 \u0026\u0026 !defined(OPENSSL_NO_MULTIBLOCK) \u0026\u0026 EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK\n if (type \u003d\u003d SSL3_RT_APPLICATION_DATA \u0026\u0026 s-\u003ecompress \u003d\u003d NULL \u0026\u0026\n !SSL_USE_ETM(s) \u0026\u0026 SSL_USE_EXPLICIT_IV(s) \u0026\u0026\n- EVP_CIPHER_flags(s-\u003e\n- enc_write_ctx-\u003ecipher) \u0026\n+ EVP_CIPHER_flags(s-\u003eenc_write_ctx-\u003ecipher) \u0026\n EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK)\n do {\n unsigned char aad[13];\ndiff --git a/ssl/s3_srvr.c b/ssl/s3_srvr.c\nindex f77c4c6..0191790 100644\n--- a/ssl/s3_srvr.c\n+++ b/ssl/s3_srvr.c\n@@ -480,8 +480,7 @@ int ssl3_accept(SSL *s)\n || ((alg_k \u0026 SSL_kRSA)\n \u0026\u0026 (s-\u003ecert-\u003epkeys[SSL_PKEY_RSA_ENC].privatekey \u003d\u003d NULL\n || (SSL_C_IS_EXPORT(s-\u003es3-\u003etmp.new_cipher)\n- \u0026\u0026 EVP_PKEY_size(s-\u003ecert-\u003e\n- pkeys\n+ \u0026\u0026 EVP_PKEY_size(s-\u003ecert-\u003epkeys\n [SSL_PKEY_RSA_ENC].privatekey) *\n 8 \u003e SSL_C_EXPORT_PKEYLENGTH(s-\u003es3-\u003etmp.new_cipher)\n )\ndiff --git a/ssl/ssl_sess.c b/ssl/ssl_sess.c\nindex 9ee1366..ed17429 100644\n--- a/ssl/ssl_sess.c\n+++ b/ssl/ssl_sess.c\n@@ -468,8 +468,7 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len,\n \n if (try_session_cache \u0026\u0026\n ret \u003d\u003d NULL \u0026\u0026\n- !(s-\u003e\n- session_ctx-\u003esession_cache_mode \u0026\n+ !(s-\u003esession_ctx-\u003esession_cache_mode \u0026\n SSL_SESS_CACHE_NO_INTERNAL_LOOKUP)) {\n SSL_SESSION data;\n data.ssl_version \u003d s-\u003eversion;\n@@ -510,8 +509,7 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len,\n * well if and only if we are supposed to.\n */\n if (!\n- (s-\u003e\n- session_ctx-\u003esession_cache_mode \u0026\n+ (s-\u003esession_ctx-\u003esession_cache_mode \u0026\n SSL_SESS_CACHE_NO_INTERNAL_STORE))\n /*\n * The following should not return 1, otherwise, things are\n","s":{"c":1755716977,"u": 24067}}
],"g": 25505,"chitpc": 0,"ehitpc": 0,"indexed":0
,
"ab": 0, "si": 0, "db":0, "di":0, "sat":0, "lfc": "0000"}