summaryrefslogtreecommitdiffstats
path: root/crypto/engine
diff options
context:
space:
mode:
authorRichard Levitte <levitte@openssl.org>2002-04-29 10:19:19 +0000
committerRichard Levitte <levitte@openssl.org>2002-04-29 10:19:19 +0000
commitd4294c8984a1aa1e60d38f7c49d1646fa042bf53 (patch)
treecda6618de474c67149942ea7a292d080f8928fd2 /crypto/engine
parent8df61b5011fb6f38a67c6fcd07c05008b9a86a91 (diff)
Synchronise with 0.9.7-stable.
Diffstat (limited to 'crypto/engine')
-rw-r--r--crypto/engine/hw_4758_cca.c28
-rw-r--r--crypto/engine/hw_sureware.c8
2 files changed, 18 insertions, 18 deletions
diff --git a/crypto/engine/hw_4758_cca.c b/crypto/engine/hw_4758_cca.c
index 959d8f1a61..77d3d2ffdf 100644
--- a/crypto/engine/hw_4758_cca.c
+++ b/crypto/engine/hw_4758_cca.c
@@ -287,13 +287,13 @@ err:
DSO_free(dso);
dso = NULL;
- keyRecordRead = (F_KEYRECORDREAD)NULL;
- randomNumberGenerate = (F_RANDOMNUMBERGENERATE)NULL;
- digitalSignatureGenerate = (F_DIGITALSIGNATUREGENERATE)NULL;
- digitalSignatureVerify = (F_DIGITALSIGNATUREVERIFY)NULL;
- publicKeyExtract = (F_PUBLICKEYEXTRACT)NULL;
- pkaEncrypt = (F_PKAENCRYPT)NULL;
- pkaDecrypt = (F_PKADECRYPT)NULL;
+ keyRecordRead = (F_KEYRECORDREAD)0;
+ randomNumberGenerate = (F_RANDOMNUMBERGENERATE)0;
+ digitalSignatureGenerate = (F_DIGITALSIGNATUREGENERATE)0;
+ digitalSignatureVerify = (F_DIGITALSIGNATUREVERIFY)0;
+ publicKeyExtract = (F_PUBLICKEYEXTRACT)0;
+ pkaEncrypt = (F_PKAENCRYPT)0;
+ pkaDecrypt = (F_PKADECRYPT)0;
return 0;
}
@@ -312,13 +312,13 @@ static int ibm_4758_cca_finish(ENGINE *e)
return 0;
}
dso = NULL;
- keyRecordRead = (F_KEYRECORDREAD)NULL;
- randomNumberGenerate = (F_RANDOMNUMBERGENERATE)NULL;
- digitalSignatureGenerate = (F_DIGITALSIGNATUREGENERATE)NULL;
- digitalSignatureVerify = (F_DIGITALSIGNATUREVERIFY)NULL;
- publicKeyExtract = (F_PUBLICKEYEXTRACT)NULL;
- pkaEncrypt = (F_PKAENCRYPT)NULL;
- pkaDecrypt = (F_PKADECRYPT)NULL;
+ keyRecordRead = (F_KEYRECORDREAD)0;
+ randomNumberGenerate = (F_RANDOMNUMBERGENERATE)0;
+ digitalSignatureGenerate = (F_DIGITALSIGNATUREGENERATE)0;
+ digitalSignatureVerify = (F_DIGITALSIGNATUREVERIFY)0;
+ publicKeyExtract = (F_PUBLICKEYEXTRACT)0;
+ pkaEncrypt = (F_PKAENCRYPT)0;
+ pkaDecrypt = (F_PKADECRYPT)0;
return 1;
}
diff --git a/crypto/engine/hw_sureware.c b/crypto/engine/hw_sureware.c
index 73a274cd48..27d380e8b9 100644
--- a/crypto/engine/hw_sureware.c
+++ b/crypto/engine/hw_sureware.c
@@ -95,10 +95,10 @@ static EVP_PKEY *surewarehk_load_privkey(ENGINE *e, const char *key_id,
static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id,
UI_METHOD *ui_method, void *callback_data);
static void surewarehk_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad,
- int index_,long argl, void *argp);
+ int idx,long argl, void *argp);
#if 0
static void surewarehk_dh_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad,
- int index_,long argl, void *argp);
+ int idx,long argl, void *argp);
#endif
#ifndef OPENSSL_NO_RSA
@@ -816,7 +816,7 @@ static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id,
/* This cleans up an RSA/DSA KM key(do not destroy the key into the hardware)
, called when ex_data is freed */
static void surewarehk_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad,
- int index_,long argl, void *argp)
+ int idx,long argl, void *argp)
{
if(!p_surewarehk_Free)
{
@@ -831,7 +831,7 @@ static void surewarehk_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad,
/* This cleans up an DH KM key (destroys the key into hardware),
called when ex_data is freed */
static void surewarehk_dh_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad,
- int index_,long argl, void *argp)
+ int idx,long argl, void *argp)
{
if(!p_surewarehk_Free)
{