if (!noservername && (servername != NULL || dane_tlsa_domain == NULL)) {
if (servername == NULL) {
- if(host == NULL || is_dNS_name(host))
+ if(host == NULL || is_dNS_name(host))
servername = (host == NULL) ? "localhost" : host;
}
if (servername != NULL && !SSL_set_tlsext_host_name(con, servername)) {
}
/*
- * Host dNS Name verifier: used for checking that the hostname is in dNS format
+ * Host dNS Name verifier: used for checking that the hostname is in dNS format
* before setting it as SNI
*/
static int is_dNS_name(const char *host)
/*
* Verify that the two keys are different.
- *
+ *
* This addresses Rogaway's vulnerability.
* See comment in aes_xts_init_key() below.
*/
/*
* Verify that the two keys are different.
- *
+ *
* This addresses Rogaway's vulnerability.
* See comment in aes_xts_init_key() below.
*/
* we have our own copy of ossl_init_thread_start, which cascades notifications
* about threads stopping from libcrypto to all the code in the FIPS provider
* that needs to know about it.
- *
+ *
* The FIPS provider tells libcrypto about which threads it is interested in
* by calling "c_thread_start" which is a function pointer created during
* provider initialisation (i.e. OSSL_init_provider).
/*
* Typedef for the thread stop handling callback. Used both internally and by
* providers.
- *
+ *
* Providers may register for notifications about threads stopping by
* registering a callback to hear about such events. Providers register the
* callback using the OSSL_FUNC_CORE_THREAD_START function in the |in| dispatch
*/
const char *ossl_prov_util_nid_to_name(int nid)
{
- return OBJ_nid2sn(nid);
+ return OBJ_nid2sn(nid);
}
|| !BN_add(a, a, b)
|| BN_cmp(a, b) != 0)
goto err;
-
+
if (RAND_DRBG_bytes(drbg, randbuf, sizeof(randbuf)) <= 0)
goto err;
err:
BN_CTX_end(bnctx);
BN_CTX_free(bnctx);
-
+
EVP_MD_CTX_free(ctx);
EVP_MD_meth_free(sha256);
return ret;
if (strcmp(name, all_tests[i].test_case_name) == 0) {
single_test = 1 + i;
break;
- }
+ }
}
- if (i >= num_tests)
+ if (i >= num_tests)
single_test = atoi(name);
}