Deal with the consequences of constifying getters
Reviewed-by: Stephen Henson <steve@openssl.org> Reviewed-by: Emilia Käsper <emilia@openssl.org>
This commit is contained in:
parent
fd809cfdbd
commit
2ac6115d9e
13 changed files with 22 additions and 19 deletions
|
@ -1148,7 +1148,7 @@ void print_name(BIO *out, const char *title, X509_NAME *nm,
|
|||
}
|
||||
}
|
||||
|
||||
void print_bignum_var(BIO *out, BIGNUM *in, const char *var,
|
||||
void print_bignum_var(BIO *out, const BIGNUM *in, const char *var,
|
||||
int len, unsigned char *buffer)
|
||||
{
|
||||
BIO_printf(out, " static unsigned char %s_%d[] = {", var, len);
|
||||
|
|
|
@ -380,7 +380,8 @@ int dump_cert_text(BIO *out, X509 *x);
|
|||
void print_name(BIO *out, const char *title, X509_NAME *nm,
|
||||
unsigned long lflags);
|
||||
# endif
|
||||
void print_bignum_var(BIO *, BIGNUM *, const char*, int, unsigned char *);
|
||||
void print_bignum_var(BIO *, const BIGNUM *, const char*,
|
||||
int, unsigned char *);
|
||||
void print_array(BIO *, const char *, int, const unsigned char *);
|
||||
int set_cert_ex(unsigned long *flags, const char *arg);
|
||||
int set_name_ex(unsigned long *flags, const char *arg);
|
||||
|
|
|
@ -298,7 +298,7 @@ int dhparam_main(int argc, char **argv)
|
|||
if (C) {
|
||||
unsigned char *data;
|
||||
int len, bits;
|
||||
BIGNUM *pbn, *gbn;
|
||||
const BIGNUM *pbn, *gbn;
|
||||
|
||||
len = DH_size(dh);
|
||||
bits = DH_bits(dh);
|
||||
|
@ -337,7 +337,7 @@ int dhparam_main(int argc, char **argv)
|
|||
}
|
||||
|
||||
if (!noout) {
|
||||
BIGNUM *q;
|
||||
const BIGNUM *q;
|
||||
DH_get0_pqg(dh, NULL, &q, NULL);
|
||||
if (outformat == FORMAT_ASN1)
|
||||
i = i2d_DHparams_bio(out, dh);
|
||||
|
|
|
@ -195,7 +195,7 @@ int dsa_main(int argc, char **argv)
|
|||
}
|
||||
|
||||
if (modulus) {
|
||||
BIGNUM *pub_key = NULL;
|
||||
const BIGNUM *pub_key = NULL;
|
||||
DSA_get0_key(dsa, &pub_key, NULL);
|
||||
BIO_printf(out, "Public Key=");
|
||||
BN_print(out, pub_key);
|
||||
|
|
|
@ -215,7 +215,7 @@ int dsaparam_main(int argc, char **argv)
|
|||
}
|
||||
|
||||
if (C) {
|
||||
BIGNUM *p = NULL, *q = NULL, *g = NULL;
|
||||
const BIGNUM *p = NULL, *q = NULL, *g = NULL;
|
||||
unsigned char *data;
|
||||
int len, bits_p;
|
||||
|
||||
|
|
|
@ -53,7 +53,7 @@ int gendsa_main(int argc, char **argv)
|
|||
char *outfile = NULL, *passoutarg = NULL, *passout = NULL, *prog;
|
||||
OPTION_CHOICE o;
|
||||
int ret = 1, private = 0;
|
||||
BIGNUM *p = NULL;
|
||||
const BIGNUM *p = NULL;
|
||||
|
||||
prog = opt_init(argc, argv, gendsa_options);
|
||||
while ((o = opt_next()) != OPT_EOF) {
|
||||
|
|
|
@ -59,7 +59,7 @@ int genrsa_main(int argc, char **argv)
|
|||
ENGINE *eng = NULL;
|
||||
BIGNUM *bn = BN_new();
|
||||
BIO *out = NULL;
|
||||
BIGNUM *e;
|
||||
const BIGNUM *e;
|
||||
RSA *rsa = NULL;
|
||||
const EVP_CIPHER *enc = NULL;
|
||||
int ret = 1, num = DEFBITS, private = 0;
|
||||
|
|
|
@ -768,7 +768,7 @@ int req_main(int argc, char **argv)
|
|||
fprintf(stdout, "Modulus=");
|
||||
#ifndef OPENSSL_NO_RSA
|
||||
if (EVP_PKEY_base_id(tpubkey) == EVP_PKEY_RSA) {
|
||||
BIGNUM *n;
|
||||
const BIGNUM *n;
|
||||
RSA_get0_key(EVP_PKEY_get0_RSA(tpubkey), &n, NULL, NULL);
|
||||
BN_print(out, n);
|
||||
} else
|
||||
|
|
|
@ -214,7 +214,7 @@ int rsa_main(int argc, char **argv)
|
|||
}
|
||||
|
||||
if (modulus) {
|
||||
BIGNUM *n;
|
||||
const BIGNUM *n;
|
||||
RSA_get0_key(rsa, &n, NULL, NULL);
|
||||
BIO_printf(out, "Modulus=");
|
||||
BN_print(out, n);
|
||||
|
|
|
@ -684,14 +684,14 @@ int x509_main(int argc, char **argv)
|
|||
BIO_printf(out, "Modulus=");
|
||||
#ifndef OPENSSL_NO_RSA
|
||||
if (EVP_PKEY_id(pkey) == EVP_PKEY_RSA) {
|
||||
BIGNUM *n;
|
||||
const BIGNUM *n;
|
||||
RSA_get0_key(EVP_PKEY_get0_RSA(pkey), &n, NULL, NULL);
|
||||
BN_print(out, n);
|
||||
} else
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
if (EVP_PKEY_id(pkey) == EVP_PKEY_DSA) {
|
||||
BIGNUM *dsapub = NULL;
|
||||
const BIGNUM *dsapub = NULL;
|
||||
DSA_get0_key(EVP_PKEY_get0_DSA(pkey), &dsapub, NULL);
|
||||
BN_print(out, dsapub);
|
||||
} else
|
||||
|
|
|
@ -467,7 +467,8 @@ static int do_i2b_bio(BIO *out, EVP_PKEY *pk, int ispub)
|
|||
static int check_bitlen_dsa(DSA *dsa, int ispub, unsigned int *pmagic)
|
||||
{
|
||||
int bitlen;
|
||||
BIGNUM *p = NULL, *q = NULL, *g = NULL, *pub_key = NULL, *priv_key = NULL;
|
||||
const BIGNUM *p = NULL, *q = NULL, *g = NULL;
|
||||
const BIGNUM *pub_key = NULL, *priv_key = NULL;
|
||||
|
||||
DSA_get0_pqg(dsa, &p, &q, &g);
|
||||
DSA_get0_key(dsa, &pub_key, &priv_key);
|
||||
|
@ -494,7 +495,7 @@ static int check_bitlen_dsa(DSA *dsa, int ispub, unsigned int *pmagic)
|
|||
static int check_bitlen_rsa(RSA *rsa, int ispub, unsigned int *pmagic)
|
||||
{
|
||||
int nbyte, hnbyte, bitlen;
|
||||
BIGNUM *e;
|
||||
const BIGNUM *e;
|
||||
|
||||
RSA_get0_key(rsa, &e, NULL, NULL);
|
||||
if (BN_num_bits(e) > 32)
|
||||
|
@ -506,7 +507,7 @@ static int check_bitlen_rsa(RSA *rsa, int ispub, unsigned int *pmagic)
|
|||
*pmagic = MS_RSA1MAGIC;
|
||||
return bitlen;
|
||||
} else {
|
||||
BIGNUM *d, *p, *q, *iqmp, *dmp1, *dmq1;
|
||||
const BIGNUM *d, *p, *q, *iqmp, *dmp1, *dmq1;
|
||||
|
||||
*pmagic = MS_RSA2MAGIC;
|
||||
|
||||
|
@ -534,7 +535,7 @@ static int check_bitlen_rsa(RSA *rsa, int ispub, unsigned int *pmagic)
|
|||
static void write_rsa(unsigned char **out, RSA *rsa, int ispub)
|
||||
{
|
||||
int nbyte, hnbyte;
|
||||
BIGNUM *n, *d, *e, *p, *q, *iqmp, *dmp1, *dmq1;
|
||||
const BIGNUM *n, *d, *e, *p, *q, *iqmp, *dmp1, *dmq1;
|
||||
|
||||
nbyte = RSA_size(rsa);
|
||||
hnbyte = (RSA_bits(rsa) + 15) >> 4;
|
||||
|
@ -556,7 +557,8 @@ static void write_rsa(unsigned char **out, RSA *rsa, int ispub)
|
|||
static void write_dsa(unsigned char **out, DSA *dsa, int ispub)
|
||||
{
|
||||
int nbyte;
|
||||
BIGNUM *p = NULL, *q = NULL, *g = NULL, *pub_key = NULL, *priv_key = NULL;
|
||||
const BIGNUM *p = NULL, *q = NULL, *g = NULL;
|
||||
const BIGNUM *pub_key = NULL, *priv_key = NULL;
|
||||
|
||||
DSA_get0_pqg(dsa, &p, &q, &g);
|
||||
DSA_get0_key(dsa, &pub_key, &priv_key);
|
||||
|
|
|
@ -2178,7 +2178,7 @@ psk_err:
|
|||
#ifndef OPENSSL_NO_DH
|
||||
else if (alg_k & (SSL_kDHE | SSL_kDHEPSK)) {
|
||||
DH *dh_clnt = NULL;
|
||||
BIGNUM *pub_key;
|
||||
const BIGNUM *pub_key;
|
||||
skey = s->s3->peer_tmp;
|
||||
if (skey == NULL) {
|
||||
SSLerr(SSL_F_TLS_CONSTRUCT_CLIENT_KEY_EXCHANGE,
|
||||
|
|
|
@ -1602,7 +1602,7 @@ int tls_construct_server_key_exchange(SSL *s)
|
|||
int al, i;
|
||||
unsigned long type;
|
||||
int n;
|
||||
BIGNUM *r[4];
|
||||
const BIGNUM *r[4];
|
||||
int nr[4], kn;
|
||||
BUF_MEM *buf;
|
||||
EVP_MD_CTX *md_ctx = EVP_MD_CTX_new();
|
||||
|
|
Loading…
Reference in a new issue