1 |
Submitted By: Robert Connolly <robert at linuxfromscratch dot org> |
--- crypto/rand/md_rand.c 2009-01-03 10:25:32.000000000 +0100 |
2 |
Date: 2005-11-13 |
+++ crypto/rand/md_rand.c 2010-04-01 00:45:00.746327192 +0200 |
|
Initial Package Version: 0.9.8a |
|
|
Upstream Status: Submitted upstream |
|
|
Origin: Anderson Lizardo |
|
|
Description: This patch fixes conflicts between man pages |
|
|
installed by OpenSSL and those found on other |
|
|
packages (particulary Shadow, Perl, and |
|
|
Man-pages). It also fixes syntax errors on some |
|
|
POD files that generates slightly broken man |
|
|
pages. |
|
|
|
|
|
$LastChangedBy: igor $ |
|
|
$Date: 2010-08-17 22:40:33 $ |
|
|
|
|
|
diff -Naur openssl-0.9.8a.orig/FAQ openssl-0.9.8a/FAQ |
|
|
--- openssl-0.9.8a.orig/FAQ 2005-10-11 10:16:06.000000000 +0000 |
|
|
+++ openssl-0.9.8a/FAQ 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -680,7 +680,7 @@ |
|
|
|
|
|
Multi-threaded applications must provide two callback functions to |
|
|
OpenSSL by calling CRYPTO_set_locking_callback() and |
|
|
-CRYPTO_set_id_callback(). This is described in the threads(3) |
|
|
+CRYPTO_set_id_callback(). This is described in the openssl_threads(3) |
|
|
manpage. |
|
|
|
|
|
* I've compiled a program under Windows and it crashes: why? |
|
|
diff -Naur openssl-0.9.8a.orig/crypto/rand/md_rand.c openssl-0.9.8a/crypto/rand/md_rand.c |
|
|
--- openssl-0.9.8a.orig/crypto/rand/md_rand.c 2005-04-07 22:53:35.000000000 +0000 |
|
|
+++ openssl-0.9.8a/crypto/rand/md_rand.c 2005-11-14 03:59:59.000000000 +0000 |
|
3 |
@@ -196,7 +196,7 @@ |
@@ -196,7 +196,7 @@ |
4 |
int do_not_lock; |
int do_not_lock; |
5 |
|
|
9 |
* |
* |
10 |
* The input is chopped up into units of 20 bytes (or less for |
* The input is chopped up into units of 20 bytes (or less for |
11 |
* the last block). Each of these blocks is run through the hash |
* the last block). Each of these blocks is run through the hash |
12 |
@@ -351,7 +351,7 @@ |
@@ -361,7 +361,7 @@ |
13 |
num_ceil = (1 + (num-1)/(MD_DIGEST_LENGTH/2)) * (MD_DIGEST_LENGTH/2); |
num_ceil = (1 + (num-1)/(MD_DIGEST_LENGTH/2)) * (MD_DIGEST_LENGTH/2); |
14 |
|
|
15 |
/* |
/* |
18 |
* |
* |
19 |
* For each group of 10 bytes (or less), we do the following: |
* For each group of 10 bytes (or less), we do the following: |
20 |
* |
* |
21 |
diff -Naur openssl-0.9.8a.orig/doc/apps/openssl-passwd.pod openssl-0.9.8a/doc/apps/openssl-passwd.pod |
--- doc/apps/openssl-passwd.pod 1970-01-01 01:00:00.000000000 +0100 |
22 |
--- openssl-0.9.8a.orig/doc/apps/openssl-passwd.pod 1970-01-01 00:00:00.000000000 +0000 |
+++ doc/apps/openssl-passwd.pod 2010-04-01 00:45:00.796327220 +0200 |
|
+++ openssl-0.9.8a/doc/apps/openssl-passwd.pod 2005-11-14 03:59:59.000000000 +0000 |
|
23 |
@@ -0,0 +1,82 @@ |
@@ -0,0 +1,82 @@ |
24 |
+=pod |
+=pod |
25 |
+ |
+ |
103 |
+B<openssl passwd -apr1 -salt xxxxxxxx password> prints B<$apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0>. |
+B<openssl passwd -apr1 -salt xxxxxxxx password> prints B<$apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0>. |
104 |
+ |
+ |
105 |
+=cut |
+=cut |
106 |
diff -Naur openssl-0.9.8a.orig/doc/apps/openssl.pod openssl-0.9.8a/doc/apps/openssl.pod |
--- doc/apps/openssl.pod 2010-01-21 19:46:28.000000000 +0100 |
107 |
--- openssl-0.9.8a.orig/doc/apps/openssl.pod 2004-01-04 18:59:14.000000000 +0000 |
+++ doc/apps/openssl.pod 2010-04-01 00:45:00.796327220 +0200 |
108 |
+++ openssl-0.9.8a/doc/apps/openssl.pod 2005-11-14 03:59:59.000000000 +0000 |
@@ -163,7 +163,7 @@ |
|
@@ -125,7 +125,7 @@ |
|
109 |
|
|
110 |
Online Certificate Status Protocol utility. |
Online Certificate Status Protocol utility. |
111 |
|
|
114 |
|
|
115 |
Generation of hashed passwords. |
Generation of hashed passwords. |
116 |
|
|
117 |
@@ -325,7 +325,7 @@ |
@@ -401,7 +401,7 @@ |
118 |
L<dhparam(1)|dhparam(1)>, L<dsa(1)|dsa(1)>, L<dsaparam(1)|dsaparam(1)>, |
L<dhparam(1)|dhparam(1)>, L<dsa(1)|dsa(1)>, L<dsaparam(1)|dsaparam(1)>, |
119 |
L<enc(1)|enc(1)>, L<gendsa(1)|gendsa(1)>, |
L<enc(1)|enc(1)>, L<gendsa(1)|gendsa(1)>, L<genpkey(1)|genpkey(1)>, |
120 |
L<genrsa(1)|genrsa(1)>, L<nseq(1)|nseq(1)>, L<openssl(1)|openssl(1)>, |
L<genrsa(1)|genrsa(1)>, L<nseq(1)|nseq(1)>, L<openssl(1)|openssl(1)>, |
121 |
-L<passwd(1)|passwd(1)>, |
-L<passwd(1)|passwd(1)>, |
122 |
+L<openssl-passwd(1)|openssl-passwd(1)>, |
+L<openssl-passwd(1)|openssl-passwd(1)>, |
123 |
L<pkcs12(1)|pkcs12(1)>, L<pkcs7(1)|pkcs7(1)>, L<pkcs8(1)|pkcs8(1)>, |
L<pkcs12(1)|pkcs12(1)>, L<pkcs7(1)|pkcs7(1)>, L<pkcs8(1)|pkcs8(1)>, |
124 |
L<rand(1)|rand(1)>, L<req(1)|req(1)>, L<rsa(1)|rsa(1)>, |
L<rand(1)|rand(1)>, L<req(1)|req(1)>, L<rsa(1)|rsa(1)>, |
125 |
L<rsautl(1)|rsautl(1)>, L<s_client(1)|s_client(1)>, |
L<rsautl(1)|rsautl(1)>, L<s_client(1)|s_client(1)>, |
126 |
diff -Naur openssl-0.9.8a.orig/doc/apps/passwd.pod openssl-0.9.8a/doc/apps/passwd.pod |
--- doc/apps/passwd.pod 2002-10-04 14:59:00.000000000 +0200 |
127 |
--- openssl-0.9.8a.orig/doc/apps/passwd.pod 2002-10-04 12:59:00.000000000 +0000 |
+++ doc/apps/passwd.pod 1970-01-01 01:00:00.000000000 +0100 |
|
+++ openssl-0.9.8a/doc/apps/passwd.pod 1970-01-01 00:00:00.000000000 +0000 |
|
128 |
@@ -1,82 +0,0 @@ |
@@ -1,82 +0,0 @@ |
129 |
-=pod |
-=pod |
130 |
- |
- |
208 |
-B<openssl passwd -apr1 -salt xxxxxxxx password> prints B<$apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0>. |
-B<openssl passwd -apr1 -salt xxxxxxxx password> prints B<$apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0>. |
209 |
- |
- |
210 |
-=cut |
-=cut |
211 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/BN_generate_prime.pod openssl-0.9.8a/doc/crypto/BN_generate_prime.pod |
--- doc/crypto/BN_generate_prime.pod 2003-01-13 14:18:22.000000000 +0100 |
212 |
--- openssl-0.9.8a.orig/doc/crypto/BN_generate_prime.pod 2003-01-13 13:18:22.000000000 +0000 |
+++ doc/crypto/BN_generate_prime.pod 2010-04-01 00:45:00.824035190 +0200 |
|
+++ openssl-0.9.8a/doc/crypto/BN_generate_prime.pod 2005-11-14 03:59:59.000000000 +0000 |
|
213 |
@@ -90,7 +90,7 @@ |
@@ -90,7 +90,7 @@ |
214 |
|
|
215 |
=head1 SEE ALSO |
=head1 SEE ALSO |
219 |
|
|
220 |
=head1 HISTORY |
=head1 HISTORY |
221 |
|
|
222 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/BN_rand.pod openssl-0.9.8a/doc/crypto/BN_rand.pod |
--- doc/crypto/bn.pod 2008-07-03 21:59:24.000000000 +0200 |
223 |
--- openssl-0.9.8a.orig/doc/crypto/BN_rand.pod 2002-09-25 13:33:26.000000000 +0000 |
+++ doc/crypto/bn.pod 2010-04-01 00:45:01.022993777 +0200 |
224 |
+++ openssl-0.9.8a/doc/crypto/BN_rand.pod 2005-11-14 03:59:59.000000000 +0000 |
@@ -167,7 +167,7 @@ |
225 |
|
=head1 SEE ALSO |
226 |
|
|
227 |
|
L<bn_internal(3)|bn_internal(3)>, |
228 |
|
-L<dh(3)|dh(3)>, L<err(3)|err(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, |
229 |
|
+L<dh(3)|dh(3)>, L<openssl_err(3)|openssl_err(3)>, L<openssl_rand(3)|openssl_rand(3)>, L<rsa(3)|rsa(3)>, |
230 |
|
L<BN_new(3)|BN_new(3)>, L<BN_CTX_new(3)|BN_CTX_new(3)>, |
231 |
|
L<BN_copy(3)|BN_copy(3)>, L<BN_swap(3)|BN_swap(3)>, L<BN_num_bytes(3)|BN_num_bytes(3)>, |
232 |
|
L<BN_add(3)|BN_add(3)>, L<BN_add_word(3)|BN_add_word(3)>, |
233 |
|
--- doc/crypto/BN_rand.pod 2002-09-25 15:33:26.000000000 +0200 |
234 |
|
+++ doc/crypto/BN_rand.pod 2010-04-01 00:45:00.824035190 +0200 |
235 |
@@ -45,7 +45,7 @@ |
@@ -45,7 +45,7 @@ |
236 |
|
|
237 |
=head1 SEE ALSO |
=head1 SEE ALSO |
241 |
L<RAND_add(3)|RAND_add(3)>, L<RAND_bytes(3)|RAND_bytes(3)> |
L<RAND_add(3)|RAND_add(3)>, L<RAND_bytes(3)|RAND_bytes(3)> |
242 |
|
|
243 |
=head1 HISTORY |
=head1 HISTORY |
244 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/CONF_modules_free.pod openssl-0.9.8a/doc/crypto/CONF_modules_free.pod |
--- doc/crypto/CONF_modules_free.pod 2006-12-21 22:13:27.000000000 +0100 |
245 |
--- openssl-0.9.8a.orig/doc/crypto/CONF_modules_free.pod 2004-03-02 13:31:32.000000000 +0000 |
+++ doc/crypto/CONF_modules_free.pod 2010-04-01 00:45:00.827162198 +0200 |
|
+++ openssl-0.9.8a/doc/crypto/CONF_modules_free.pod 2005-11-14 03:59:59.000000000 +0000 |
|
246 |
@@ -37,7 +37,7 @@ |
@@ -37,7 +37,7 @@ |
247 |
=head1 SEE ALSO |
=head1 SEE ALSO |
248 |
|
|
252 |
|
|
253 |
=head1 HISTORY |
=head1 HISTORY |
254 |
|
|
255 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/CONF_modules_load_file.pod openssl-0.9.8a/doc/crypto/CONF_modules_load_file.pod |
--- doc/crypto/CONF_modules_load_file.pod 2004-03-02 14:31:32.000000000 +0100 |
256 |
--- openssl-0.9.8a.orig/doc/crypto/CONF_modules_load_file.pod 2004-03-02 13:31:32.000000000 +0000 |
+++ doc/crypto/CONF_modules_load_file.pod 2010-04-01 00:45:00.833827289 +0200 |
|
+++ openssl-0.9.8a/doc/crypto/CONF_modules_load_file.pod 2005-11-14 03:59:59.000000000 +0000 |
|
257 |
@@ -51,7 +51,7 @@ |
@@ -51,7 +51,7 @@ |
258 |
=head1 SEE ALSO |
=head1 SEE ALSO |
259 |
|
|
263 |
|
|
264 |
=head1 HISTORY |
=head1 HISTORY |
265 |
|
|
266 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/DH_generate_key.pod openssl-0.9.8a/doc/crypto/DH_generate_key.pod |
--- doc/crypto/crypto.pod 2002-10-06 14:59:25.000000000 +0200 |
267 |
--- openssl-0.9.8a.orig/doc/crypto/DH_generate_key.pod 2002-09-25 13:33:27.000000000 +0000 |
+++ doc/crypto/crypto.pod 2010-04-01 00:45:01.029660428 +0200 |
268 |
+++ openssl-0.9.8a/doc/crypto/DH_generate_key.pod 2005-11-14 03:59:59.000000000 +0000 |
@@ -46,7 +46,7 @@ |
269 |
|
|
270 |
|
=item AUXILIARY FUNCTIONS |
271 |
|
|
272 |
|
-L<err(3)|err(3)>, L<threads(3)|threads(3)>, L<rand(3)|rand(3)>, |
273 |
|
+L<openssl_err(3)|openssl_err(3)>, L<openssl_threads(3)|openssl_threads(3)>, L<openssl_rand(3)|openssl_rand(3)>, |
274 |
|
L<OPENSSL_VERSION_NUMBER(3)|OPENSSL_VERSION_NUMBER(3)> |
275 |
|
|
276 |
|
=item INPUT/OUTPUT, DATA ENCODING |
277 |
|
--- doc/crypto/des.pod 2003-10-01 17:02:45.000000000 +0200 |
278 |
|
+++ doc/crypto/des.pod 2010-04-01 00:45:01.036327160 +0200 |
279 |
|
@@ -115,7 +115,7 @@ |
280 |
|
the key; it is used to speed the encryption process. |
281 |
|
|
282 |
|
DES_random_key() generates a random key. The PRNG must be seeded |
283 |
|
-prior to using this function (see L<rand(3)|rand(3)>). If the PRNG |
284 |
|
+prior to using this function (see L<openssl_rand(3)|openssl_rand(3)>). If the PRNG |
285 |
|
could not generate a secure key, 0 is returned. |
286 |
|
|
287 |
|
Before a DES key can be used, it must be converted into the |
288 |
|
@@ -317,7 +317,7 @@ |
289 |
|
|
290 |
|
=head1 SEE ALSO |
291 |
|
|
292 |
|
-crypt(3), L<des_modes(7)|des_modes(7)>, L<evp(3)|evp(3)>, L<rand(3)|rand(3)> |
293 |
|
+crypt(3), L<des_modes(7)|des_modes(7)>, L<evp(3)|evp(3)>, L<openssl_rand(3)|openssl_rand(3)> |
294 |
|
|
295 |
|
=head1 HISTORY |
296 |
|
|
297 |
|
--- doc/crypto/DH_generate_key.pod 2002-09-25 15:33:27.000000000 +0200 |
298 |
|
+++ doc/crypto/DH_generate_key.pod 2010-04-01 00:45:00.840494142 +0200 |
299 |
@@ -40,7 +40,7 @@ |
@@ -40,7 +40,7 @@ |
300 |
|
|
301 |
=head1 SEE ALSO |
=head1 SEE ALSO |
305 |
|
|
306 |
=head1 HISTORY |
=head1 HISTORY |
307 |
|
|
308 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/DH_generate_parameters.pod openssl-0.9.8a/doc/crypto/DH_generate_parameters.pod |
--- doc/crypto/DH_generate_parameters.pod 2002-09-25 15:33:27.000000000 +0200 |
309 |
--- openssl-0.9.8a.orig/doc/crypto/DH_generate_parameters.pod 2002-09-25 13:33:27.000000000 +0000 |
+++ doc/crypto/DH_generate_parameters.pod 2010-04-01 00:45:00.847161913 +0200 |
|
+++ openssl-0.9.8a/doc/crypto/DH_generate_parameters.pod 2005-11-14 03:59:59.000000000 +0000 |
|
310 |
@@ -59,7 +59,7 @@ |
@@ -59,7 +59,7 @@ |
311 |
|
|
312 |
=head1 SEE ALSO |
=head1 SEE ALSO |
316 |
L<DH_free(3)|DH_free(3)> |
L<DH_free(3)|DH_free(3)> |
317 |
|
|
318 |
=head1 HISTORY |
=head1 HISTORY |
319 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/DSA_do_sign.pod openssl-0.9.8a/doc/crypto/DSA_do_sign.pod |
--- doc/crypto/dh.pod 2002-08-05 18:27:01.000000000 +0200 |
320 |
--- openssl-0.9.8a.orig/doc/crypto/DSA_do_sign.pod 2002-09-25 13:33:27.000000000 +0000 |
+++ doc/crypto/dh.pod 2010-04-01 00:45:01.036327160 +0200 |
321 |
+++ openssl-0.9.8a/doc/crypto/DSA_do_sign.pod 2005-11-14 03:59:59.000000000 +0000 |
@@ -67,8 +67,8 @@ |
322 |
|
|
323 |
|
=head1 SEE ALSO |
324 |
|
|
325 |
|
-L<dhparam(1)|dhparam(1)>, L<bn(3)|bn(3)>, L<dsa(3)|dsa(3)>, L<err(3)|err(3)>, |
326 |
|
-L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<engine(3)|engine(3)>, |
327 |
|
+L<dhparam(1)|dhparam(1)>, L<bn(3)|bn(3)>, L<dsa(3)|dsa(3)>, L<openssl_err(3)|openssl_err(3)>, |
328 |
|
+L<openssl_rand(3)|openssl_rand(3)>, L<rsa(3)|rsa(3)>, L<engine(3)|engine(3)>, |
329 |
|
L<DH_set_method(3)|DH_set_method(3)>, L<DH_new(3)|DH_new(3)>, |
330 |
|
L<DH_get_ex_new_index(3)|DH_get_ex_new_index(3)>, |
331 |
|
L<DH_generate_parameters(3)|DH_generate_parameters(3)>, |
332 |
|
--- doc/crypto/DSA_do_sign.pod 2002-09-25 15:33:27.000000000 +0200 |
333 |
|
+++ doc/crypto/DSA_do_sign.pod 2010-04-01 00:45:00.847161913 +0200 |
334 |
@@ -36,7 +36,7 @@ |
@@ -36,7 +36,7 @@ |
335 |
|
|
336 |
=head1 SEE ALSO |
=head1 SEE ALSO |
340 |
L<DSA_SIG_new(3)|DSA_SIG_new(3)>, |
L<DSA_SIG_new(3)|DSA_SIG_new(3)>, |
341 |
L<DSA_sign(3)|DSA_sign(3)> |
L<DSA_sign(3)|DSA_sign(3)> |
342 |
|
|
343 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/DSA_generate_key.pod openssl-0.9.8a/doc/crypto/DSA_generate_key.pod |
--- doc/crypto/DSA_generate_key.pod 2002-09-25 15:33:27.000000000 +0200 |
344 |
--- openssl-0.9.8a.orig/doc/crypto/DSA_generate_key.pod 2002-09-25 13:33:27.000000000 +0000 |
+++ doc/crypto/DSA_generate_key.pod 2010-04-01 00:45:00.847161913 +0200 |
|
+++ openssl-0.9.8a/doc/crypto/DSA_generate_key.pod 2005-11-14 03:59:59.000000000 +0000 |
|
345 |
@@ -24,7 +24,7 @@ |
@@ -24,7 +24,7 @@ |
346 |
|
|
347 |
=head1 SEE ALSO |
=head1 SEE ALSO |
351 |
L<DSA_generate_parameters(3)|DSA_generate_parameters(3)> |
L<DSA_generate_parameters(3)|DSA_generate_parameters(3)> |
352 |
|
|
353 |
=head1 HISTORY |
=head1 HISTORY |
354 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/DSA_generate_parameters.pod openssl-0.9.8a/doc/crypto/DSA_generate_parameters.pod |
--- doc/crypto/DSA_generate_parameters.pod 2002-09-25 15:33:27.000000000 +0200 |
355 |
--- openssl-0.9.8a.orig/doc/crypto/DSA_generate_parameters.pod 2002-09-25 13:33:27.000000000 +0000 |
+++ doc/crypto/DSA_generate_parameters.pod 2010-04-01 00:45:00.847161913 +0200 |
|
+++ openssl-0.9.8a/doc/crypto/DSA_generate_parameters.pod 2005-11-14 03:59:59.000000000 +0000 |
|
356 |
@@ -90,7 +90,7 @@ |
@@ -90,7 +90,7 @@ |
357 |
|
|
358 |
=head1 SEE ALSO |
=head1 SEE ALSO |
362 |
L<DSA_free(3)|DSA_free(3)> |
L<DSA_free(3)|DSA_free(3)> |
363 |
|
|
364 |
=head1 HISTORY |
=head1 HISTORY |
365 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/DSA_sign.pod openssl-0.9.8a/doc/crypto/DSA_sign.pod |
--- doc/crypto/dsa.pod 2002-08-05 18:27:01.000000000 +0200 |
366 |
--- openssl-0.9.8a.orig/doc/crypto/DSA_sign.pod 2002-09-25 13:33:27.000000000 +0000 |
+++ doc/crypto/dsa.pod 2010-04-01 00:45:01.042994012 +0200 |
367 |
+++ openssl-0.9.8a/doc/crypto/DSA_sign.pod 2005-11-14 03:59:59.000000000 +0000 |
@@ -100,7 +100,7 @@ |
368 |
|
|
369 |
|
=head1 SEE ALSO |
370 |
|
|
371 |
|
-L<bn(3)|bn(3)>, L<dh(3)|dh(3)>, L<err(3)|err(3)>, L<rand(3)|rand(3)>, |
372 |
|
+L<bn(3)|bn(3)>, L<dh(3)|dh(3)>, L<openssl_err(3)|openssl_err(3)>, L<openssl_rand(3)|openssl_rand(3)>, |
373 |
|
L<rsa(3)|rsa(3)>, L<sha(3)|sha(3)>, L<engine(3)|engine(3)>, |
374 |
|
L<DSA_new(3)|DSA_new(3)>, |
375 |
|
L<DSA_size(3)|DSA_size(3)>, |
376 |
|
--- doc/crypto/DSA_sign.pod 2002-09-25 15:33:27.000000000 +0200 |
377 |
|
+++ doc/crypto/DSA_sign.pod 2010-04-01 00:45:00.847161913 +0200 |
378 |
@@ -55,7 +55,7 @@ |
@@ -55,7 +55,7 @@ |
379 |
|
|
380 |
=head1 SEE ALSO |
=head1 SEE ALSO |
384 |
L<DSA_do_sign(3)|DSA_do_sign(3)> |
L<DSA_do_sign(3)|DSA_do_sign(3)> |
385 |
|
|
386 |
=head1 HISTORY |
=head1 HISTORY |
387 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/ERR_GET_LIB.pod openssl-0.9.8a/doc/crypto/ERR_GET_LIB.pod |
--- doc/crypto/engine.pod 2007-11-19 10:18:03.000000000 +0100 |
388 |
--- openssl-0.9.8a.orig/doc/crypto/ERR_GET_LIB.pod 2000-02-01 01:36:58.000000000 +0000 |
+++ doc/crypto/engine.pod 2010-04-01 00:45:01.049660583 +0200 |
389 |
+++ openssl-0.9.8a/doc/crypto/ERR_GET_LIB.pod 2005-11-14 03:59:59.000000000 +0000 |
@@ -594,6 +594,6 @@ |
|
@@ -41,7 +41,7 @@ |
|
390 |
|
|
391 |
=head1 SEE ALSO |
=head1 SEE ALSO |
392 |
|
|
393 |
-L<err(3)|err(3)>, L<ERR_get_error(3)|ERR_get_error(3)> |
-L<rsa(3)|rsa(3)>, L<dsa(3)|dsa(3)>, L<dh(3)|dh(3)>, L<rand(3)|rand(3)> |
394 |
+L<openssl_err(3)|openssl_err(3)>, L<ERR_get_error(3)|ERR_get_error(3)> |
+L<rsa(3)|rsa(3)>, L<dsa(3)|dsa(3)>, L<dh(3)|dh(3)>, L<openssl_rand(3)|openssl_rand(3)> |
|
|
|
|
=head1 HISTORY |
|
395 |
|
|
396 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/ERR_clear_error.pod openssl-0.9.8a/doc/crypto/ERR_clear_error.pod |
=cut |
397 |
--- openssl-0.9.8a.orig/doc/crypto/ERR_clear_error.pod 2000-02-01 01:36:58.000000000 +0000 |
--- doc/crypto/ERR_clear_error.pod 2000-02-01 02:36:58.000000000 +0100 |
398 |
+++ openssl-0.9.8a/doc/crypto/ERR_clear_error.pod 2005-11-14 03:59:59.000000000 +0000 |
+++ doc/crypto/ERR_clear_error.pod 2010-04-01 00:45:00.857161750 +0200 |
399 |
@@ -20,7 +20,7 @@ |
@@ -20,7 +20,7 @@ |
400 |
|
|
401 |
=head1 SEE ALSO |
=head1 SEE ALSO |
405 |
|
|
406 |
=head1 HISTORY |
=head1 HISTORY |
407 |
|
|
408 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/ERR_error_string.pod openssl-0.9.8a/doc/crypto/ERR_error_string.pod |
--- doc/crypto/ERR_error_string.pod 2004-11-14 16:11:37.000000000 +0100 |
409 |
--- openssl-0.9.8a.orig/doc/crypto/ERR_error_string.pod 2004-11-14 15:11:37.000000000 +0000 |
+++ doc/crypto/ERR_error_string.pod 2010-04-01 00:45:00.863828202 +0200 |
|
+++ openssl-0.9.8a/doc/crypto/ERR_error_string.pod 2005-11-14 03:59:59.000000000 +0000 |
|
410 |
@@ -60,7 +60,7 @@ |
@@ -60,7 +60,7 @@ |
411 |
|
|
412 |
=head1 SEE ALSO |
=head1 SEE ALSO |
416 |
L<ERR_load_crypto_strings(3)|ERR_load_crypto_strings(3)>, |
L<ERR_load_crypto_strings(3)|ERR_load_crypto_strings(3)>, |
417 |
L<SSL_load_error_strings(3)|SSL_load_error_strings(3)> |
L<SSL_load_error_strings(3)|SSL_load_error_strings(3)> |
418 |
L<ERR_print_errors(3)|ERR_print_errors(3)> |
L<ERR_print_errors(3)|ERR_print_errors(3)> |
419 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/ERR_get_error.pod openssl-0.9.8a/doc/crypto/ERR_get_error.pod |
--- doc/crypto/ERR_get_error.pod 2002-11-29 15:21:54.000000000 +0100 |
420 |
--- openssl-0.9.8a.orig/doc/crypto/ERR_get_error.pod 2002-11-29 14:21:54.000000000 +0000 |
+++ doc/crypto/ERR_get_error.pod 2010-04-01 00:45:00.870494614 +0200 |
|
+++ openssl-0.9.8a/doc/crypto/ERR_get_error.pod 2005-11-14 03:59:59.000000000 +0000 |
|
421 |
@@ -61,7 +61,7 @@ |
@@ -61,7 +61,7 @@ |
422 |
|
|
423 |
=head1 SEE ALSO |
=head1 SEE ALSO |
427 |
L<ERR_GET_LIB(3)|ERR_GET_LIB(3)> |
L<ERR_GET_LIB(3)|ERR_GET_LIB(3)> |
428 |
|
|
429 |
=head1 HISTORY |
=head1 HISTORY |
430 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/ERR_load_crypto_strings.pod openssl-0.9.8a/doc/crypto/ERR_load_crypto_strings.pod |
--- doc/crypto/ERR_GET_LIB.pod 2000-02-01 02:36:58.000000000 +0100 |
431 |
--- openssl-0.9.8a.orig/doc/crypto/ERR_load_crypto_strings.pod 2000-02-24 11:55:08.000000000 +0000 |
+++ doc/crypto/ERR_GET_LIB.pod 2010-04-01 00:45:00.850495218 +0200 |
432 |
+++ openssl-0.9.8a/doc/crypto/ERR_load_crypto_strings.pod 2005-11-14 03:59:59.000000000 +0000 |
@@ -41,7 +41,7 @@ |
|
@@ -35,7 +35,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<err(3)|err(3)>, L<ERR_error_string(3)|ERR_error_string(3)> |
|
|
+L<openssl_err(3)|openssl_err(3)>, L<ERR_error_string(3)|ERR_error_string(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
|
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/ERR_load_strings.pod openssl-0.9.8a/doc/crypto/ERR_load_strings.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/ERR_load_strings.pod 2000-02-24 11:55:08.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/ERR_load_strings.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -43,7 +43,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<err(3)|err(3)>, L<ERR_load_strings(3)|ERR_load_strings(3)> |
|
|
+L<openssl_err(3)|openssl_err(3)>, L<ERR_load_strings(3)|ERR_load_strings(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
|
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/ERR_print_errors.pod openssl-0.9.8a/doc/crypto/ERR_print_errors.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/ERR_print_errors.pod 2000-02-01 01:36:59.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/ERR_print_errors.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -38,7 +38,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<err(3)|err(3)>, L<ERR_error_string(3)|ERR_error_string(3)>, |
|
|
+L<openssl_err(3)|openssl_err(3)>, L<ERR_error_string(3)|ERR_error_string(3)>, |
|
|
L<ERR_get_error(3)|ERR_get_error(3)>, |
|
|
L<ERR_load_crypto_strings(3)|ERR_load_crypto_strings(3)>, |
|
|
L<SSL_load_error_strings(3)|SSL_load_error_strings(3)> |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/ERR_put_error.pod openssl-0.9.8a/doc/crypto/ERR_put_error.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/ERR_put_error.pod 2000-02-24 11:55:08.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/ERR_put_error.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -34,7 +34,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<err(3)|err(3)>, L<ERR_load_strings(3)|ERR_load_strings(3)> |
|
|
+L<openssl_err(3)|openssl_err(3)>, L<ERR_load_strings(3)|ERR_load_strings(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
|
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/ERR_remove_state.pod openssl-0.9.8a/doc/crypto/ERR_remove_state.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/ERR_remove_state.pod 2000-05-19 07:54:42.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/ERR_remove_state.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -25,7 +25,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<err(3)|err(3)> |
|
|
+L<openssl_err(3)|openssl_err(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
|
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/EVP_BytesToKey.pod openssl-0.9.8a/doc/crypto/EVP_BytesToKey.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/EVP_BytesToKey.pod 2004-11-25 17:47:30.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/EVP_BytesToKey.pod 2005-11-14 04:00:45.000000000 +0000 |
|
|
@@ -59,7 +59,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<evp(3)|evp(3)>, L<rand(3)|rand(3)>, |
|
|
+L<evp(3)|evp(3)>, L<openssl_rand(3)|openssl_rand(3)>, |
|
|
L<EVP_EncryptInit(3)|EVP_EncryptInit(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/EVP_OpenInit.pod openssl-0.9.8a/doc/crypto/EVP_OpenInit.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/EVP_OpenInit.pod 2000-09-23 07:16:14.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/EVP_OpenInit.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -54,7 +54,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<evp(3)|evp(3)>, L<rand(3)|rand(3)>, |
|
|
+L<evp(3)|evp(3)>, L<openssl_rand(3)|openssl_rand(3)>, |
|
|
L<EVP_EncryptInit(3)|EVP_EncryptInit(3)>, |
|
|
L<EVP_SealInit(3)|EVP_SealInit(3)> |
|
|
|
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/EVP_SealInit.pod openssl-0.9.8a/doc/crypto/EVP_SealInit.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/EVP_SealInit.pod 2005-03-29 17:50:08.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/EVP_SealInit.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -74,7 +74,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<evp(3)|evp(3)>, L<rand(3)|rand(3)>, |
|
|
+L<evp(3)|evp(3)>, L<openssl_rand(3)|openssl_rand(3)>, |
|
|
L<EVP_EncryptInit(3)|EVP_EncryptInit(3)>, |
|
|
L<EVP_OpenInit(3)|EVP_OpenInit(3)> |
|
|
|
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/EVP_SignInit.pod openssl-0.9.8a/doc/crypto/EVP_SignInit.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/EVP_SignInit.pod 2005-03-22 17:55:33.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/EVP_SignInit.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -80,7 +80,7 @@ |
|
|
=head1 SEE ALSO |
|
|
|
|
|
L<EVP_VerifyInit(3)|EVP_VerifyInit(3)>, |
|
|
-L<EVP_DigestInit(3)|EVP_DigestInit(3)>, L<err(3)|err(3)>, |
|
|
+L<EVP_DigestInit(3)|EVP_DigestInit(3)>, L<openssl_err(3)|openssl_err(3)>, |
|
|
L<evp(3)|evp(3)>, L<hmac(3)|hmac(3)>, L<md2(3)|md2(3)>, |
|
|
L<md5(3)|md5(3)>, L<mdc2(3)|mdc2(3)>, L<ripemd(3)|ripemd(3)>, |
|
|
L<sha(3)|sha(3)>, L<dgst(1)|dgst(1)> |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/EVP_VerifyInit.pod openssl-0.9.8a/doc/crypto/EVP_VerifyInit.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/EVP_VerifyInit.pod 2002-07-10 19:35:46.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/EVP_VerifyInit.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -71,7 +71,7 @@ |
|
433 |
|
|
|
L<evp(3)|evp(3)>, |
|
|
L<EVP_SignInit(3)|EVP_SignInit(3)>, |
|
|
-L<EVP_DigestInit(3)|EVP_DigestInit(3)>, L<err(3)|err(3)>, |
|
|
+L<EVP_DigestInit(3)|EVP_DigestInit(3)>, L<openssl_err(3)|openssl_err(3)>, |
|
|
L<evp(3)|evp(3)>, L<hmac(3)|hmac(3)>, L<md2(3)|md2(3)>, |
|
|
L<md5(3)|md5(3)>, L<mdc2(3)|mdc2(3)>, L<ripemd(3)|ripemd(3)>, |
|
|
L<sha(3)|sha(3)>, L<dgst(1)|dgst(1)> |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/OPENSSL_config.pod openssl-0.9.8a/doc/crypto/OPENSSL_config.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/OPENSSL_config.pod 2005-06-02 23:17:38.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/OPENSSL_config.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -73,7 +73,7 @@ |
|
434 |
=head1 SEE ALSO |
=head1 SEE ALSO |
435 |
|
|
436 |
L<conf(5)|conf(5)>, L<CONF_load_modules_file(3)|CONF_load_modules_file(3)>, |
-L<err(3)|err(3)>, L<ERR_get_error(3)|ERR_get_error(3)> |
437 |
-L<CONF_modules_free(3),CONF_modules_free(3)> |
+L<openssl_err(3)|openssl_err(3)>, L<ERR_get_error(3)|ERR_get_error(3)> |
|
+L<CONF_modules_free(3)|CONF_modules_free(3)> |
|
438 |
|
|
439 |
=head1 HISTORY |
=head1 HISTORY |
440 |
|
|
441 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/RAND_add.pod openssl-0.9.8a/doc/crypto/RAND_add.pod |
--- doc/crypto/ERR_load_crypto_strings.pod 2000-02-24 12:55:08.000000000 +0100 |
442 |
--- openssl-0.9.8a.orig/doc/crypto/RAND_add.pod 2000-03-22 15:30:03.000000000 +0000 |
+++ doc/crypto/ERR_load_crypto_strings.pod 2010-04-01 00:45:00.873827919 +0200 |
|
+++ openssl-0.9.8a/doc/crypto/RAND_add.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -65,7 +65,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<rand(3)|rand(3)>, L<RAND_egd(3)|RAND_egd(3)>, |
|
|
+L<openssl_rand(3)|openssl_rand(3)>, L<RAND_egd(3)|RAND_egd(3)>, |
|
|
L<RAND_load_file(3)|RAND_load_file(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/RAND_bytes.pod openssl-0.9.8a/doc/crypto/RAND_bytes.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/RAND_bytes.pod 2002-09-25 13:33:27.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/RAND_bytes.pod 2005-11-14 03:59:59.000000000 +0000 |
|
443 |
@@ -35,7 +35,7 @@ |
@@ -35,7 +35,7 @@ |
444 |
|
|
445 |
=head1 SEE ALSO |
=head1 SEE ALSO |
446 |
|
|
447 |
-L<rand(3)|rand(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, |
-L<err(3)|err(3)>, L<ERR_error_string(3)|ERR_error_string(3)> |
448 |
+L<openssl_rand(3)|openssl_rand(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, |
+L<openssl_err(3)|openssl_err(3)>, L<ERR_error_string(3)|ERR_error_string(3)> |
|
L<RAND_add(3)|RAND_add(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/RAND_cleanup.pod openssl-0.9.8a/doc/crypto/RAND_cleanup.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/RAND_cleanup.pod 2000-01-27 01:25:06.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/RAND_cleanup.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -20,7 +20,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<rand(3)|rand(3)> |
|
|
+L<openssl_rand(3)|openssl_rand(3)> |
|
449 |
|
|
450 |
=head1 HISTORY |
=head1 HISTORY |
451 |
|
|
452 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/RAND_egd.pod openssl-0.9.8a/doc/crypto/RAND_egd.pod |
--- doc/crypto/ERR_load_strings.pod 2000-02-24 12:55:08.000000000 +0100 |
453 |
--- openssl-0.9.8a.orig/doc/crypto/RAND_egd.pod 2001-02-10 19:10:36.000000000 +0000 |
+++ doc/crypto/ERR_load_strings.pod 2010-04-01 00:45:00.876327759 +0200 |
|
+++ openssl-0.9.8a/doc/crypto/RAND_egd.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -69,7 +69,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, |
|
|
+L<openssl_rand(3)|openssl_rand(3)>, L<RAND_add(3)|RAND_add(3)>, |
|
|
L<RAND_cleanup(3)|RAND_cleanup(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/RAND_load_file.pod openssl-0.9.8a/doc/crypto/RAND_load_file.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/RAND_load_file.pod 2001-03-21 15:25:56.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/RAND_load_file.pod 2005-11-14 03:59:59.000000000 +0000 |
|
454 |
@@ -43,7 +43,7 @@ |
@@ -43,7 +43,7 @@ |
455 |
|
|
456 |
=head1 SEE ALSO |
=head1 SEE ALSO |
457 |
|
|
458 |
-L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> |
-L<err(3)|err(3)>, L<ERR_load_strings(3)|ERR_load_strings(3)> |
459 |
+L<openssl_rand(3)|openssl_rand(3)>, L<RAND_add(3)|RAND_add(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> |
+L<openssl_err(3)|openssl_err(3)>, L<ERR_load_strings(3)|ERR_load_strings(3)> |
|
|
|
|
=head1 HISTORY |
|
|
|
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/RAND_set_rand_method.pod openssl-0.9.8a/doc/crypto/RAND_set_rand_method.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/RAND_set_rand_method.pod 2002-08-05 16:27:01.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/RAND_set_rand_method.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -67,7 +67,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<rand(3)|rand(3)>, L<engine(3)|engine(3)> |
|
|
+L<openssl_rand(3)|openssl_rand(3)>, L<engine(3)|engine(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
|
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/RSA_blinding_on.pod openssl-0.9.8a/doc/crypto/RSA_blinding_on.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/RSA_blinding_on.pod 2000-02-24 11:55:10.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/RSA_blinding_on.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -34,7 +34,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<rsa(3)|rsa(3)>, L<rand(3)|rand(3)> |
|
|
+L<rsa(3)|rsa(3)>, L<openssl_rand(3)|openssl_rand(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
|
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/RSA_generate_key.pod openssl-0.9.8a/doc/crypto/RSA_generate_key.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/RSA_generate_key.pod 2002-09-25 13:33:27.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/RSA_generate_key.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -59,7 +59,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, |
|
|
+L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl_rand(3)|openssl_rand(3)>, L<rsa(3)|rsa(3)>, |
|
|
L<RSA_free(3)|RSA_free(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/RSA_public_encrypt.pod openssl-0.9.8a/doc/crypto/RSA_public_encrypt.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/RSA_public_encrypt.pod 2004-03-23 21:01:34.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/RSA_public_encrypt.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -73,7 +73,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, |
|
|
+L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl_rand(3)|openssl_rand(3)>, L<rsa(3)|rsa(3)>, |
|
|
L<RSA_size(3)|RSA_size(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod openssl-0.9.8a/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod 2002-09-25 13:33:28.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -48,7 +48,7 @@ |
|
|
=head1 SEE ALSO |
|
|
|
|
|
L<ERR_get_error(3)|ERR_get_error(3)>, L<objects(3)|objects(3)>, |
|
|
-L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<RSA_sign(3)|RSA_sign(3)>, |
|
|
+L<openssl_rand(3)|openssl_rand(3)>, L<rsa(3)|rsa(3)>, L<RSA_sign(3)|RSA_sign(3)>, |
|
|
L<RSA_verify(3)|RSA_verify(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/X509_NAME_ENTRY_get_object.pod openssl-0.9.8a/doc/crypto/X509_NAME_ENTRY_get_object.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/X509_NAME_ENTRY_get_object.pod 2005-03-30 11:50:14.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/X509_NAME_ENTRY_get_object.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -63,7 +63,7 @@ |
|
|
=head1 SEE ALSO |
|
|
|
|
|
L<ERR_get_error(3)|ERR_get_error(3)>, L<d2i_X509_NAME(3)|d2i_X509_NAME(3)>, |
|
|
-L<OBJ_nid2obj(3),OBJ_nid2obj(3)> |
|
|
+L<OBJ_nid2obj(3)|OBJ_nid2obj(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
|
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/bn.pod openssl-0.9.8a/doc/crypto/bn.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/bn.pod 2005-04-29 15:07:34.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/bn.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -167,7 +167,7 @@ |
|
|
=head1 SEE ALSO |
|
|
|
|
|
L<bn_internal(3)|bn_internal(3)>, |
|
|
-L<dh(3)|dh(3)>, L<err(3)|err(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, |
|
|
+L<dh(3)|dh(3)>, L<openssl_err(3)|openssl_err(3)>, L<openssl_rand(3)|openssl_rand(3)>, L<rsa(3)|rsa(3)>, |
|
|
L<BN_new(3)|BN_new(3)>, L<BN_CTX_new(3)|BN_CTX_new(3)>, |
|
|
L<BN_copy(3)|BN_copy(3)>, L<BN_swap(3)|BN_swap(3)>, L<BN_num_bytes(3)|BN_num_bytes(3)>, |
|
|
L<BN_add(3)|BN_add(3)>, L<BN_add_word(3)|BN_add_word(3)>, |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/crypto.pod openssl-0.9.8a/doc/crypto/crypto.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/crypto.pod 2002-10-06 12:59:25.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/crypto.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -46,7 +46,7 @@ |
|
|
|
|
|
=item AUXILIARY FUNCTIONS |
|
|
|
|
|
-L<err(3)|err(3)>, L<threads(3)|threads(3)>, L<rand(3)|rand(3)>, |
|
|
+L<openssl_err(3)|openssl_err(3)>, L<openssl_threads(3)|openssl_threads(3)>, L<openssl_rand(3)|openssl_rand(3)>, |
|
|
L<OPENSSL_VERSION_NUMBER(3)|OPENSSL_VERSION_NUMBER(3)> |
|
|
|
|
|
=item INPUT/OUTPUT, DATA ENCODING |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/des.pod openssl-0.9.8a/doc/crypto/des.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/des.pod 2003-10-01 15:02:45.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/des.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -115,7 +115,7 @@ |
|
|
the key; it is used to speed the encryption process. |
|
|
|
|
|
DES_random_key() generates a random key. The PRNG must be seeded |
|
|
-prior to using this function (see L<rand(3)|rand(3)>). If the PRNG |
|
|
+prior to using this function (see L<openssl_rand(3)|openssl_rand(3)>). If the PRNG |
|
|
could not generate a secure key, 0 is returned. |
|
|
|
|
|
Before a DES key can be used, it must be converted into the |
|
|
@@ -317,7 +317,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-crypt(3), L<des_modes(7)|des_modes(7)>, L<evp(3)|evp(3)>, L<rand(3)|rand(3)> |
|
|
+crypt(3), L<des_modes(7)|des_modes(7)>, L<evp(3)|evp(3)>, L<openssl_rand(3)|openssl_rand(3)> |
|
|
|
|
|
=head1 HISTORY |
|
|
|
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/dh.pod openssl-0.9.8a/doc/crypto/dh.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/dh.pod 2002-08-05 16:27:01.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/dh.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -67,8 +67,8 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<dhparam(1)|dhparam(1)>, L<bn(3)|bn(3)>, L<dsa(3)|dsa(3)>, L<err(3)|err(3)>, |
|
|
-L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<engine(3)|engine(3)>, |
|
|
+L<dhparam(1)|dhparam(1)>, L<bn(3)|bn(3)>, L<dsa(3)|dsa(3)>, L<openssl_err(3)|openssl_err(3)>, |
|
|
+L<openssl_rand(3)|openssl_rand(3)>, L<rsa(3)|rsa(3)>, L<engine(3)|engine(3)>, |
|
|
L<DH_set_method(3)|DH_set_method(3)>, L<DH_new(3)|DH_new(3)>, |
|
|
L<DH_get_ex_new_index(3)|DH_get_ex_new_index(3)>, |
|
|
L<DH_generate_parameters(3)|DH_generate_parameters(3)>, |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/dsa.pod openssl-0.9.8a/doc/crypto/dsa.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/dsa.pod 2002-08-05 16:27:01.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/dsa.pod 2005-11-14 03:59:59.000000000 +0000 |
|
|
@@ -100,7 +100,7 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<bn(3)|bn(3)>, L<dh(3)|dh(3)>, L<err(3)|err(3)>, L<rand(3)|rand(3)>, |
|
|
+L<bn(3)|bn(3)>, L<dh(3)|dh(3)>, L<openssl_err(3)|openssl_err(3)>, L<openssl_rand(3)|openssl_rand(3)>, |
|
|
L<rsa(3)|rsa(3)>, L<sha(3)|sha(3)>, L<engine(3)|engine(3)>, |
|
|
L<DSA_new(3)|DSA_new(3)>, |
|
|
L<DSA_size(3)|DSA_size(3)>, |
|
|
diff -Naur openssl-0.9.8a.orig/doc/crypto/engine.pod openssl-0.9.8a/doc/crypto/engine.pod |
|
|
--- openssl-0.9.8a.orig/doc/crypto/engine.pod 2004-06-17 23:40:14.000000000 +0000 |
|
|
+++ openssl-0.9.8a/doc/crypto/engine.pod 2005-11-14 04:01:19.000000000 +0000 |
|
|
@@ -594,6 +594,6 @@ |
|
|
|
|
|
=head1 SEE ALSO |
|
|
|
|
|
-L<rsa(3)|rsa(3)>, L<dsa(3)|dsa(3)>, L<dh(3)|dh(3)>, L<rand(3)|rand(3)> |
|
|
+L<rsa(3)|rsa(3)>, L<dsa(3)|dsa(3)>, L<dh(3)|dh(3)>, L<openssl_rand(3)|openssl_rand(3)> |
|
460 |
|
|
461 |
=cut |
=head1 HISTORY |
462 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/err.pod openssl-0.9.8a/doc/crypto/err.pod |
|
463 |
--- openssl-0.9.8a.orig/doc/crypto/err.pod 2002-07-10 19:35:46.000000000 +0000 |
--- doc/crypto/err.pod 2002-07-10 21:35:46.000000000 +0200 |
464 |
+++ openssl-0.9.8a/doc/crypto/err.pod 1970-01-01 00:00:00.000000000 +0000 |
+++ doc/crypto/err.pod 1970-01-01 01:00:00.000000000 +0100 |
465 |
@@ -1,187 +0,0 @@ |
@@ -1,187 +0,0 @@ |
466 |
-=pod |
-=pod |
467 |
- |
- |
650 |
-L<SSL_get_error(3)|SSL_get_error(3)> |
-L<SSL_get_error(3)|SSL_get_error(3)> |
651 |
- |
- |
652 |
-=cut |
-=cut |
653 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/openssl_err.pod openssl-0.9.8a/doc/crypto/openssl_err.pod |
--- doc/crypto/ERR_print_errors.pod 2000-02-01 02:36:59.000000000 +0100 |
654 |
--- openssl-0.9.8a.orig/doc/crypto/openssl_err.pod 1970-01-01 00:00:00.000000000 +0000 |
+++ doc/crypto/ERR_print_errors.pod 2010-04-01 00:45:00.879660945 +0200 |
655 |
+++ openssl-0.9.8a/doc/crypto/openssl_err.pod 2005-11-14 03:59:59.000000000 +0000 |
@@ -38,7 +38,7 @@ |
656 |
|
|
657 |
|
=head1 SEE ALSO |
658 |
|
|
659 |
|
-L<err(3)|err(3)>, L<ERR_error_string(3)|ERR_error_string(3)>, |
660 |
|
+L<openssl_err(3)|openssl_err(3)>, L<ERR_error_string(3)|ERR_error_string(3)>, |
661 |
|
L<ERR_get_error(3)|ERR_get_error(3)>, |
662 |
|
L<ERR_load_crypto_strings(3)|ERR_load_crypto_strings(3)>, |
663 |
|
L<SSL_load_error_strings(3)|SSL_load_error_strings(3)> |
664 |
|
--- doc/crypto/ERR_put_error.pod 2000-02-24 12:55:08.000000000 +0100 |
665 |
|
+++ doc/crypto/ERR_put_error.pod 2010-04-01 00:45:00.886327158 +0200 |
666 |
|
@@ -34,7 +34,7 @@ |
667 |
|
|
668 |
|
=head1 SEE ALSO |
669 |
|
|
670 |
|
-L<err(3)|err(3)>, L<ERR_load_strings(3)|ERR_load_strings(3)> |
671 |
|
+L<openssl_err(3)|openssl_err(3)>, L<ERR_load_strings(3)|ERR_load_strings(3)> |
672 |
|
|
673 |
|
=head1 HISTORY |
674 |
|
|
675 |
|
--- doc/crypto/ERR_remove_state.pod 2000-05-19 09:54:42.000000000 +0200 |
676 |
|
+++ doc/crypto/ERR_remove_state.pod 2010-04-01 00:45:00.892994288 +0200 |
677 |
|
@@ -25,7 +25,7 @@ |
678 |
|
|
679 |
|
=head1 SEE ALSO |
680 |
|
|
681 |
|
-L<err(3)|err(3)> |
682 |
|
+L<openssl_err(3)|openssl_err(3)> |
683 |
|
|
684 |
|
=head1 HISTORY |
685 |
|
|
686 |
|
--- doc/crypto/EVP_BytesToKey.pod 2004-11-25 18:47:30.000000000 +0100 |
687 |
|
+++ doc/crypto/EVP_BytesToKey.pod 2010-04-01 00:45:00.899660540 +0200 |
688 |
|
@@ -59,7 +59,7 @@ |
689 |
|
|
690 |
|
=head1 SEE ALSO |
691 |
|
|
692 |
|
-L<evp(3)|evp(3)>, L<rand(3)|rand(3)>, |
693 |
|
+L<evp(3)|evp(3)>, L<openssl_rand(3)|openssl_rand(3)>, |
694 |
|
L<EVP_EncryptInit(3)|EVP_EncryptInit(3)> |
695 |
|
|
696 |
|
=head1 HISTORY |
697 |
|
--- doc/crypto/EVP_OpenInit.pod 2000-09-23 09:16:14.000000000 +0200 |
698 |
|
+++ doc/crypto/EVP_OpenInit.pod 2010-04-01 00:45:00.906327633 +0200 |
699 |
|
@@ -54,7 +54,7 @@ |
700 |
|
|
701 |
|
=head1 SEE ALSO |
702 |
|
|
703 |
|
-L<evp(3)|evp(3)>, L<rand(3)|rand(3)>, |
704 |
|
+L<evp(3)|evp(3)>, L<openssl_rand(3)|openssl_rand(3)>, |
705 |
|
L<EVP_EncryptInit(3)|EVP_EncryptInit(3)>, |
706 |
|
L<EVP_SealInit(3)|EVP_SealInit(3)> |
707 |
|
|
708 |
|
--- doc/crypto/EVP_SealInit.pod 2005-03-29 19:50:08.000000000 +0200 |
709 |
|
+++ doc/crypto/EVP_SealInit.pod 2010-04-01 00:45:00.912995642 +0200 |
710 |
|
@@ -74,7 +74,7 @@ |
711 |
|
|
712 |
|
=head1 SEE ALSO |
713 |
|
|
714 |
|
-L<evp(3)|evp(3)>, L<rand(3)|rand(3)>, |
715 |
|
+L<evp(3)|evp(3)>, L<openssl_rand(3)|openssl_rand(3)>, |
716 |
|
L<EVP_EncryptInit(3)|EVP_EncryptInit(3)>, |
717 |
|
L<EVP_OpenInit(3)|EVP_OpenInit(3)> |
718 |
|
|
719 |
|
--- doc/crypto/EVP_SignInit.pod 2006-07-12 14:31:29.000000000 +0200 |
720 |
|
+++ doc/crypto/EVP_SignInit.pod 2010-04-01 00:45:00.919661935 +0200 |
721 |
|
@@ -89,7 +89,7 @@ |
722 |
|
=head1 SEE ALSO |
723 |
|
|
724 |
|
L<EVP_VerifyInit(3)|EVP_VerifyInit(3)>, |
725 |
|
-L<EVP_DigestInit(3)|EVP_DigestInit(3)>, L<err(3)|err(3)>, |
726 |
|
+L<EVP_DigestInit(3)|EVP_DigestInit(3)>, L<openssl_err(3)|openssl_err(3)>, |
727 |
|
L<evp(3)|evp(3)>, L<hmac(3)|hmac(3)>, L<md2(3)|md2(3)>, |
728 |
|
L<md5(3)|md5(3)>, L<mdc2(3)|mdc2(3)>, L<ripemd(3)|ripemd(3)>, |
729 |
|
L<sha(3)|sha(3)>, L<dgst(1)|dgst(1)> |
730 |
|
--- doc/crypto/EVP_VerifyInit.pod 2006-07-12 14:31:30.000000000 +0200 |
731 |
|
+++ doc/crypto/EVP_VerifyInit.pod 2010-04-01 00:45:00.926327388 +0200 |
732 |
|
@@ -80,7 +80,7 @@ |
733 |
|
|
734 |
|
L<evp(3)|evp(3)>, |
735 |
|
L<EVP_SignInit(3)|EVP_SignInit(3)>, |
736 |
|
-L<EVP_DigestInit(3)|EVP_DigestInit(3)>, L<err(3)|err(3)>, |
737 |
|
+L<EVP_DigestInit(3)|EVP_DigestInit(3)>, L<openssl_err(3)|openssl_err(3)>, |
738 |
|
L<evp(3)|evp(3)>, L<hmac(3)|hmac(3)>, L<md2(3)|md2(3)>, |
739 |
|
L<md5(3)|md5(3)>, L<mdc2(3)|mdc2(3)>, L<ripemd(3)|ripemd(3)>, |
740 |
|
L<sha(3)|sha(3)>, L<dgst(1)|dgst(1)> |
741 |
|
--- doc/crypto/OPENSSL_config.pod 2005-06-03 01:19:56.000000000 +0200 |
742 |
|
+++ doc/crypto/OPENSSL_config.pod 2010-04-01 00:45:00.932995118 +0200 |
743 |
|
@@ -73,7 +73,7 @@ |
744 |
|
=head1 SEE ALSO |
745 |
|
|
746 |
|
L<conf(5)|conf(5)>, L<CONF_load_modules_file(3)|CONF_load_modules_file(3)>, |
747 |
|
-L<CONF_modules_free(3),CONF_modules_free(3)> |
748 |
|
+L<CONF_modules_free(3)|CONF_modules_free(3)> |
749 |
|
|
750 |
|
=head1 HISTORY |
751 |
|
|
752 |
|
--- doc/crypto/openssl_err.pod 1970-01-01 01:00:00.000000000 +0100 |
753 |
|
+++ doc/crypto/openssl_err.pod 2010-04-01 00:45:01.059660101 +0200 |
754 |
@@ -0,0 +1,187 @@ |
@@ -0,0 +1,187 @@ |
755 |
+=pod |
+=pod |
756 |
+ |
+ |
939 |
+L<SSL_get_error(3)|SSL_get_error(3)> |
+L<SSL_get_error(3)|SSL_get_error(3)> |
940 |
+ |
+ |
941 |
+=cut |
+=cut |
942 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/openssl_rand.pod openssl-0.9.8a/doc/crypto/openssl_rand.pod |
--- doc/crypto/openssl_rand.pod 1970-01-01 01:00:00.000000000 +0100 |
943 |
--- openssl-0.9.8a.orig/doc/crypto/openssl_rand.pod 1970-01-01 00:00:00.000000000 +0000 |
+++ doc/crypto/openssl_rand.pod 2010-04-01 00:45:01.059660101 +0200 |
|
+++ openssl-0.9.8a/doc/crypto/openssl_rand.pod 2005-11-14 03:59:59.000000000 +0000 |
|
944 |
@@ -0,0 +1,175 @@ |
@@ -0,0 +1,175 @@ |
945 |
+=pod |
+=pod |
946 |
+ |
+ |
1117 |
+L<RAND_cleanup(3)|RAND_cleanup(3)> |
+L<RAND_cleanup(3)|RAND_cleanup(3)> |
1118 |
+ |
+ |
1119 |
+=cut |
+=cut |
1120 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/openssl_threads.pod openssl-0.9.8a/doc/crypto/openssl_threads.pod |
--- doc/crypto/openssl_threads.pod 1970-01-01 01:00:00.000000000 +0100 |
1121 |
--- openssl-0.9.8a.orig/doc/crypto/openssl_threads.pod 1970-01-01 00:00:00.000000000 +0000 |
+++ doc/crypto/openssl_threads.pod 2009-10-01 01:40:52.000000000 +0200 |
1122 |
+++ openssl-0.9.8a/doc/crypto/openssl_threads.pod 2005-11-14 03:59:59.000000000 +0000 |
@@ -0,0 +1,210 @@ |
|
@@ -0,0 +1,175 @@ |
|
1123 |
+=pod |
+=pod |
1124 |
+ |
+ |
1125 |
+=head1 NAME |
+=head1 NAME |
1126 |
+ |
+ |
1127 |
+CRYPTO_set_locking_callback, CRYPTO_set_id_callback, CRYPTO_num_locks, |
+CRYPTO_THREADID_set_callback, CRYPTO_THREADID_get_callback, |
1128 |
|
+CRYPTO_THREADID_current, CRYPTO_THREADID_cmp, CRYPTO_THREADID_cpy, |
1129 |
|
+CRYPTO_THREADID_hash, CRYPTO_set_locking_callback, CRYPTO_num_locks, |
1130 |
+CRYPTO_set_dynlock_create_callback, CRYPTO_set_dynlock_lock_callback, |
+CRYPTO_set_dynlock_create_callback, CRYPTO_set_dynlock_lock_callback, |
1131 |
+CRYPTO_set_dynlock_destroy_callback, CRYPTO_get_new_dynlockid, |
+CRYPTO_set_dynlock_destroy_callback, CRYPTO_get_new_dynlockid, |
1132 |
+CRYPTO_destroy_dynlockid, CRYPTO_lock - OpenSSL thread support |
+CRYPTO_destroy_dynlockid, CRYPTO_lock - OpenSSL thread support |
1135 |
+ |
+ |
1136 |
+ #include <openssl/crypto.h> |
+ #include <openssl/crypto.h> |
1137 |
+ |
+ |
1138 |
+ void CRYPTO_set_locking_callback(void (*locking_function)(int mode, |
+ /* Don't use this structure directly. */ |
1139 |
+ int n, const char *file, int line)); |
+ typedef struct crypto_threadid_st |
1140 |
+ |
+ { |
1141 |
+ void CRYPTO_set_id_callback(unsigned long (*id_function)(void)); |
+ void *ptr; |
1142 |
|
+ unsigned long val; |
1143 |
|
+ } CRYPTO_THREADID; |
1144 |
|
+ /* Only use CRYPTO_THREADID_set_[numeric|pointer]() within callbacks */ |
1145 |
|
+ void CRYPTO_THREADID_set_numeric(CRYPTO_THREADID *id, unsigned long val); |
1146 |
|
+ void CRYPTO_THREADID_set_pointer(CRYPTO_THREADID *id, void *ptr); |
1147 |
|
+ int CRYPTO_THREADID_set_callback(void (*threadid_func)(CRYPTO_THREADID *)); |
1148 |
|
+ void (*CRYPTO_THREADID_get_callback(void))(CRYPTO_THREADID *); |
1149 |
|
+ void CRYPTO_THREADID_current(CRYPTO_THREADID *id); |
1150 |
|
+ int CRYPTO_THREADID_cmp(const CRYPTO_THREADID *a, |
1151 |
|
+ const CRYPTO_THREADID *b); |
1152 |
|
+ void CRYPTO_THREADID_cpy(CRYPTO_THREADID *dest, |
1153 |
|
+ const CRYPTO_THREADID *src); |
1154 |
|
+ unsigned long CRYPTO_THREADID_hash(const CRYPTO_THREADID *id); |
1155 |
+ |
+ |
1156 |
+ int CRYPTO_num_locks(void); |
+ int CRYPTO_num_locks(void); |
1157 |
+ |
+ |
|
+ |
|
1158 |
+ /* struct CRYPTO_dynlock_value needs to be defined by the user */ |
+ /* struct CRYPTO_dynlock_value needs to be defined by the user */ |
1159 |
+ struct CRYPTO_dynlock_value; |
+ struct CRYPTO_dynlock_value; |
1160 |
+ |
+ |
1186 |
+=head1 DESCRIPTION |
+=head1 DESCRIPTION |
1187 |
+ |
+ |
1188 |
+OpenSSL can safely be used in multi-threaded applications provided |
+OpenSSL can safely be used in multi-threaded applications provided |
1189 |
+that at least two callback functions are set. |
+that at least two callback functions are set, locking_function and |
1190 |
|
+threadid_func. |
1191 |
+ |
+ |
1192 |
+locking_function(int mode, int n, const char *file, int line) is |
+locking_function(int mode, int n, const char *file, int line) is |
1193 |
+needed to perform locking on shared data structures. |
+needed to perform locking on shared data structures. |
1202 |
+B<file> and B<line> are the file number of the function setting the |
+B<file> and B<line> are the file number of the function setting the |
1203 |
+lock. They can be useful for debugging. |
+lock. They can be useful for debugging. |
1204 |
+ |
+ |
1205 |
+id_function(void) is a function that returns a thread ID, for example |
+threadid_func(CRYPTO_THREADID *id) is needed to record the currently-executing |
1206 |
+pthread_self() if it returns an integer (see NOTES below). It isn't |
+thread's identifier into B<id>. The implementation of this callback should not |
1207 |
+needed on Windows nor on platforms where getpid() returns a different |
+fill in B<id> directly, but should use CRYPTO_THREADID_set_numeric() if thread |
1208 |
+ID for each thread (see NOTES below). |
+IDs are numeric, or CRYPTO_THREADID_set_pointer() if they are pointer-based. |
1209 |
|
+If the application does not register such a callback using |
1210 |
|
+CRYPTO_THREADID_set_callback(), then a default implementation is used - on |
1211 |
|
+Windows and BeOS this uses the system's default thread identifying APIs, and on |
1212 |
|
+all other platforms it uses the address of B<errno>. The latter is satisfactory |
1213 |
|
+for thread-safety if and only if the platform has a thread-local error number |
1214 |
|
+facility. |
1215 |
|
+ |
1216 |
|
+Once threadid_func() is registered, or if the built-in default implementation is |
1217 |
|
+to be used; |
1218 |
|
+ |
1219 |
|
+=over 4 |
1220 |
|
+ |
1221 |
|
+=item * |
1222 |
|
+CRYPTO_THREADID_current() records the currently-executing thread ID into the |
1223 |
|
+given B<id> object. |
1224 |
|
+ |
1225 |
|
+=item * |
1226 |
|
+CRYPTO_THREADID_cmp() compares two thread IDs (returning zero for equality, ie. |
1227 |
|
+the same semantics as memcmp()). |
1228 |
|
+ |
1229 |
|
+=item * |
1230 |
|
+CRYPTO_THREADID_cpy() duplicates a thread ID value, |
1231 |
|
+ |
1232 |
|
+=item * |
1233 |
|
+CRYPTO_THREADID_hash() returns a numeric value usable as a hash-table key. This |
1234 |
|
+is usually the exact numeric or pointer-based thread ID used internally, however |
1235 |
|
+this also handles the unusual case where pointers are larger than 'long' |
1236 |
|
+variables and the platform's thread IDs are pointer-based - in this case, mixing |
1237 |
|
+is done to attempt to produce a unique numeric value even though it is not as |
1238 |
|
+wide as the platform's true thread IDs. |
1239 |
|
+ |
1240 |
|
+=back |
1241 |
+ |
+ |
1242 |
+Additionally, OpenSSL supports dynamic locks, and sometimes, some parts |
+Additionally, OpenSSL supports dynamic locks, and sometimes, some parts |
1243 |
+of OpenSSL need it for better performance. To enable this, the following |
+of OpenSSL need it for better performance. To enable this, the following |
1309 |
+Also, dynamic locks are currently not used internally by OpenSSL, but |
+Also, dynamic locks are currently not used internally by OpenSSL, but |
1310 |
+may do so in the future. |
+may do so in the future. |
1311 |
+ |
+ |
|
+Defining id_function(void) has it's own issues. Generally speaking, |
|
|
+pthread_self() should be used, even on platforms where getpid() gives |
|
|
+different answers in each thread, since that may depend on the machine |
|
|
+the program is run on, not the machine where the program is being |
|
|
+compiled. For instance, Red Hat 8 Linux and earlier used |
|
|
+LinuxThreads, whose getpid() returns a different value for each |
|
|
+thread. Red Hat 9 Linux and later use NPTL, which is |
|
|
+Posix-conformant, and has a getpid() that returns the same value for |
|
|
+all threads in a process. A program compiled on Red Hat 8 and run on |
|
|
+Red Hat 9 will therefore see getpid() returning the same value for |
|
|
+all threads. |
|
|
+ |
|
|
+There is still the issue of platforms where pthread_self() returns |
|
|
+something other than an integer. This is a bit unusual, and this |
|
|
+manual has no cookbook solution for that case. |
|
|
+ |
|
1312 |
+=head1 EXAMPLES |
+=head1 EXAMPLES |
1313 |
+ |
+ |
1314 |
+B<crypto/threads/mttest.c> shows examples of the callback functions on |
+B<crypto/threads/mttest.c> shows examples of the callback functions on |
1316 |
+ |
+ |
1317 |
+=head1 HISTORY |
+=head1 HISTORY |
1318 |
+ |
+ |
1319 |
+CRYPTO_set_locking_callback() and CRYPTO_set_id_callback() are |
+CRYPTO_set_locking_callback() is |
1320 |
+available in all versions of SSLeay and OpenSSL. |
+available in all versions of SSLeay and OpenSSL. |
1321 |
+CRYPTO_num_locks() was added in OpenSSL 0.9.4. |
+CRYPTO_num_locks() was added in OpenSSL 0.9.4. |
1322 |
+All functions dealing with dynamic locks were added in OpenSSL 0.9.5b-dev. |
+All functions dealing with dynamic locks were added in OpenSSL 0.9.5b-dev. |
1323 |
|
+B<CRYPTO_THREADID> and associated functions were introduced in OpenSSL 1.0.0 |
1324 |
|
+to replace (actually, deprecate) the previous CRYPTO_set_id_callback(), |
1325 |
|
+CRYPTO_get_id_callback(), and CRYPTO_thread_id() functions which assumed |
1326 |
|
+thread IDs to always be represented by 'unsigned long'. |
1327 |
+ |
+ |
1328 |
+=head1 SEE ALSO |
+=head1 SEE ALSO |
1329 |
+ |
+ |
1330 |
+L<crypto(3)|crypto(3)> |
+L<crypto(3)|crypto(3)> |
1331 |
+ |
+ |
1332 |
+=cut |
+=cut |
1333 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/rand.pod openssl-0.9.8a/doc/crypto/rand.pod |
--- doc/crypto/RAND_add.pod 2000-03-22 16:30:03.000000000 +0100 |
1334 |
--- openssl-0.9.8a.orig/doc/crypto/rand.pod 2002-08-05 16:27:01.000000000 +0000 |
+++ doc/crypto/RAND_add.pod 2010-04-01 00:45:00.939660251 +0200 |
1335 |
+++ openssl-0.9.8a/doc/crypto/rand.pod 1970-01-01 00:00:00.000000000 +0000 |
@@ -65,7 +65,7 @@ |
1336 |
|
|
1337 |
|
=head1 SEE ALSO |
1338 |
|
|
1339 |
|
-L<rand(3)|rand(3)>, L<RAND_egd(3)|RAND_egd(3)>, |
1340 |
|
+L<openssl_rand(3)|openssl_rand(3)>, L<RAND_egd(3)|RAND_egd(3)>, |
1341 |
|
L<RAND_load_file(3)|RAND_load_file(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> |
1342 |
|
|
1343 |
|
=head1 HISTORY |
1344 |
|
--- doc/crypto/RAND_bytes.pod 2007-09-24 13:01:18.000000000 +0200 |
1345 |
|
+++ doc/crypto/RAND_bytes.pod 2010-04-01 00:45:00.946326823 +0200 |
1346 |
|
@@ -38,7 +38,7 @@ |
1347 |
|
|
1348 |
|
=head1 SEE ALSO |
1349 |
|
|
1350 |
|
-L<rand(3)|rand(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, |
1351 |
|
+L<openssl_rand(3)|openssl_rand(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, |
1352 |
|
L<RAND_add(3)|RAND_add(3)> |
1353 |
|
|
1354 |
|
=head1 HISTORY |
1355 |
|
--- doc/crypto/RAND_cleanup.pod 2000-01-27 02:25:06.000000000 +0100 |
1356 |
|
+++ doc/crypto/RAND_cleanup.pod 2010-04-01 00:45:00.952993593 +0200 |
1357 |
|
@@ -20,7 +20,7 @@ |
1358 |
|
|
1359 |
|
=head1 SEE ALSO |
1360 |
|
|
1361 |
|
-L<rand(3)|rand(3)> |
1362 |
|
+L<openssl_rand(3)|openssl_rand(3)> |
1363 |
|
|
1364 |
|
=head1 HISTORY |
1365 |
|
|
1366 |
|
--- doc/crypto/RAND_egd.pod 2008-11-10 12:26:44.000000000 +0100 |
1367 |
|
+++ doc/crypto/RAND_egd.pod 2010-04-01 00:45:00.959660646 +0200 |
1368 |
|
@@ -72,7 +72,7 @@ |
1369 |
|
|
1370 |
|
=head1 SEE ALSO |
1371 |
|
|
1372 |
|
-L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, |
1373 |
|
+L<openssl_rand(3)|openssl_rand(3)>, L<RAND_add(3)|RAND_add(3)>, |
1374 |
|
L<RAND_cleanup(3)|RAND_cleanup(3)> |
1375 |
|
|
1376 |
|
=head1 HISTORY |
1377 |
|
--- doc/crypto/RAND_load_file.pod 2001-03-21 16:25:56.000000000 +0100 |
1378 |
|
+++ doc/crypto/RAND_load_file.pod 2010-04-01 00:45:00.976327494 +0200 |
1379 |
|
@@ -43,7 +43,7 @@ |
1380 |
|
|
1381 |
|
=head1 SEE ALSO |
1382 |
|
|
1383 |
|
-L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> |
1384 |
|
+L<openssl_rand(3)|openssl_rand(3)>, L<RAND_add(3)|RAND_add(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> |
1385 |
|
|
1386 |
|
=head1 HISTORY |
1387 |
|
|
1388 |
|
--- doc/crypto/rand.pod 2002-08-05 18:27:01.000000000 +0200 |
1389 |
|
+++ doc/crypto/rand.pod 1970-01-01 01:00:00.000000000 +0100 |
1390 |
@@ -1,175 +0,0 @@ |
@@ -1,175 +0,0 @@ |
1391 |
-=pod |
-=pod |
1392 |
- |
- |
1563 |
-L<RAND_cleanup(3)|RAND_cleanup(3)> |
-L<RAND_cleanup(3)|RAND_cleanup(3)> |
1564 |
- |
- |
1565 |
-=cut |
-=cut |
1566 |
diff -Naur openssl-0.9.8a.orig/doc/crypto/rsa.pod openssl-0.9.8a/doc/crypto/rsa.pod |
--- doc/crypto/RAND_set_rand_method.pod 2007-11-19 10:18:03.000000000 +0100 |
1567 |
--- openssl-0.9.8a.orig/doc/crypto/rsa.pod 2002-08-04 21:08:36.000000000 +0000 |
+++ doc/crypto/RAND_set_rand_method.pod 2010-04-01 00:45:00.982994946 +0200 |
1568 |
+++ openssl-0.9.8a/doc/crypto/rsa.pod 2005-11-14 03:59:59.000000000 +0000 |
@@ -67,7 +67,7 @@ |
1569 |
|
|
1570 |
|
=head1 SEE ALSO |
1571 |
|
|
1572 |
|
-L<rand(3)|rand(3)>, L<engine(3)|engine(3)> |
1573 |
|
+L<openssl_rand(3)|openssl_rand(3)>, L<engine(3)|engine(3)> |
1574 |
|
|
1575 |
|
=head1 HISTORY |
1576 |
|
|
1577 |
|
--- doc/crypto/RSA_blinding_on.pod 2000-02-24 12:55:10.000000000 +0100 |
1578 |
|
+++ doc/crypto/RSA_blinding_on.pod 2010-04-01 00:45:00.989661318 +0200 |
1579 |
|
@@ -34,7 +34,7 @@ |
1580 |
|
|
1581 |
|
=head1 SEE ALSO |
1582 |
|
|
1583 |
|
-L<rsa(3)|rsa(3)>, L<rand(3)|rand(3)> |
1584 |
|
+L<rsa(3)|rsa(3)>, L<openssl_rand(3)|openssl_rand(3)> |
1585 |
|
|
1586 |
|
=head1 HISTORY |
1587 |
|
|
1588 |
|
--- doc/crypto/RSA_generate_key.pod 2002-09-25 15:33:27.000000000 +0200 |
1589 |
|
+++ doc/crypto/RSA_generate_key.pod 2010-04-01 00:45:00.996327969 +0200 |
1590 |
|
@@ -59,7 +59,7 @@ |
1591 |
|
|
1592 |
|
=head1 SEE ALSO |
1593 |
|
|
1594 |
|
-L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, |
1595 |
|
+L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl_rand(3)|openssl_rand(3)>, L<rsa(3)|rsa(3)>, |
1596 |
|
L<RSA_free(3)|RSA_free(3)> |
1597 |
|
|
1598 |
|
=head1 HISTORY |
1599 |
|
--- doc/crypto/rsa.pod 2002-08-04 23:08:36.000000000 +0200 |
1600 |
|
+++ doc/crypto/rsa.pod 2010-04-01 00:45:01.062995006 +0200 |
1601 |
@@ -108,7 +108,7 @@ |
@@ -108,7 +108,7 @@ |
1602 |
=head1 SEE ALSO |
=head1 SEE ALSO |
1603 |
|
|
1607 |
L<RSA_public_encrypt(3)|RSA_public_encrypt(3)>, |
L<RSA_public_encrypt(3)|RSA_public_encrypt(3)>, |
1608 |
L<RSA_sign(3)|RSA_sign(3)>, L<RSA_size(3)|RSA_size(3)>, |
L<RSA_sign(3)|RSA_sign(3)>, L<RSA_size(3)|RSA_size(3)>, |
1609 |
L<RSA_generate_key(3)|RSA_generate_key(3)>, |
L<RSA_generate_key(3)|RSA_generate_key(3)>, |
1610 |
diff -Naur openssl-0.9.8a.orig/doc/ssl/SSL_get_error.pod openssl-0.9.8a/doc/ssl/SSL_get_error.pod |
--- doc/crypto/RSA_public_encrypt.pod 2004-03-23 22:01:34.000000000 +0100 |
1611 |
--- openssl-0.9.8a.orig/doc/ssl/SSL_get_error.pod 2005-03-30 11:50:14.000000000 +0000 |
+++ doc/crypto/RSA_public_encrypt.pod 2010-04-01 00:45:01.002994781 +0200 |
1612 |
+++ openssl-0.9.8a/doc/ssl/SSL_get_error.pod 2005-11-14 03:59:59.000000000 +0000 |
@@ -73,7 +73,7 @@ |
1613 |
|
|
1614 |
|
=head1 SEE ALSO |
1615 |
|
|
1616 |
|
-L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, |
1617 |
|
+L<ERR_get_error(3)|ERR_get_error(3)>, L<openssl_rand(3)|openssl_rand(3)>, L<rsa(3)|rsa(3)>, |
1618 |
|
L<RSA_size(3)|RSA_size(3)> |
1619 |
|
|
1620 |
|
=head1 HISTORY |
1621 |
|
--- doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod 2002-09-25 15:33:28.000000000 +0200 |
1622 |
|
+++ doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod 2010-04-01 00:45:01.009660553 +0200 |
1623 |
|
@@ -48,7 +48,7 @@ |
1624 |
|
=head1 SEE ALSO |
1625 |
|
|
1626 |
|
L<ERR_get_error(3)|ERR_get_error(3)>, L<objects(3)|objects(3)>, |
1627 |
|
-L<rand(3)|rand(3)>, L<rsa(3)|rsa(3)>, L<RSA_sign(3)|RSA_sign(3)>, |
1628 |
|
+L<openssl_rand(3)|openssl_rand(3)>, L<rsa(3)|rsa(3)>, L<RSA_sign(3)|RSA_sign(3)>, |
1629 |
|
L<RSA_verify(3)|RSA_verify(3)> |
1630 |
|
|
1631 |
|
=head1 HISTORY |
1632 |
|
--- doc/crypto/threads.pod 2009-10-01 01:40:52.000000000 +0200 |
1633 |
|
+++ doc/crypto/threads.pod 1970-01-01 01:00:00.000000000 +0100 |
1634 |
|
@@ -1,210 +0,0 @@ |
1635 |
|
-=pod |
1636 |
|
- |
1637 |
|
-=head1 NAME |
1638 |
|
- |
1639 |
|
-CRYPTO_THREADID_set_callback, CRYPTO_THREADID_get_callback, |
1640 |
|
-CRYPTO_THREADID_current, CRYPTO_THREADID_cmp, CRYPTO_THREADID_cpy, |
1641 |
|
-CRYPTO_THREADID_hash, CRYPTO_set_locking_callback, CRYPTO_num_locks, |
1642 |
|
-CRYPTO_set_dynlock_create_callback, CRYPTO_set_dynlock_lock_callback, |
1643 |
|
-CRYPTO_set_dynlock_destroy_callback, CRYPTO_get_new_dynlockid, |
1644 |
|
-CRYPTO_destroy_dynlockid, CRYPTO_lock - OpenSSL thread support |
1645 |
|
- |
1646 |
|
-=head1 SYNOPSIS |
1647 |
|
- |
1648 |
|
- #include <openssl/crypto.h> |
1649 |
|
- |
1650 |
|
- /* Don't use this structure directly. */ |
1651 |
|
- typedef struct crypto_threadid_st |
1652 |
|
- { |
1653 |
|
- void *ptr; |
1654 |
|
- unsigned long val; |
1655 |
|
- } CRYPTO_THREADID; |
1656 |
|
- /* Only use CRYPTO_THREADID_set_[numeric|pointer]() within callbacks */ |
1657 |
|
- void CRYPTO_THREADID_set_numeric(CRYPTO_THREADID *id, unsigned long val); |
1658 |
|
- void CRYPTO_THREADID_set_pointer(CRYPTO_THREADID *id, void *ptr); |
1659 |
|
- int CRYPTO_THREADID_set_callback(void (*threadid_func)(CRYPTO_THREADID *)); |
1660 |
|
- void (*CRYPTO_THREADID_get_callback(void))(CRYPTO_THREADID *); |
1661 |
|
- void CRYPTO_THREADID_current(CRYPTO_THREADID *id); |
1662 |
|
- int CRYPTO_THREADID_cmp(const CRYPTO_THREADID *a, |
1663 |
|
- const CRYPTO_THREADID *b); |
1664 |
|
- void CRYPTO_THREADID_cpy(CRYPTO_THREADID *dest, |
1665 |
|
- const CRYPTO_THREADID *src); |
1666 |
|
- unsigned long CRYPTO_THREADID_hash(const CRYPTO_THREADID *id); |
1667 |
|
- |
1668 |
|
- int CRYPTO_num_locks(void); |
1669 |
|
- |
1670 |
|
- /* struct CRYPTO_dynlock_value needs to be defined by the user */ |
1671 |
|
- struct CRYPTO_dynlock_value; |
1672 |
|
- |
1673 |
|
- void CRYPTO_set_dynlock_create_callback(struct CRYPTO_dynlock_value * |
1674 |
|
- (*dyn_create_function)(char *file, int line)); |
1675 |
|
- void CRYPTO_set_dynlock_lock_callback(void (*dyn_lock_function) |
1676 |
|
- (int mode, struct CRYPTO_dynlock_value *l, |
1677 |
|
- const char *file, int line)); |
1678 |
|
- void CRYPTO_set_dynlock_destroy_callback(void (*dyn_destroy_function) |
1679 |
|
- (struct CRYPTO_dynlock_value *l, const char *file, int line)); |
1680 |
|
- |
1681 |
|
- int CRYPTO_get_new_dynlockid(void); |
1682 |
|
- |
1683 |
|
- void CRYPTO_destroy_dynlockid(int i); |
1684 |
|
- |
1685 |
|
- void CRYPTO_lock(int mode, int n, const char *file, int line); |
1686 |
|
- |
1687 |
|
- #define CRYPTO_w_lock(type) \ |
1688 |
|
- CRYPTO_lock(CRYPTO_LOCK|CRYPTO_WRITE,type,__FILE__,__LINE__) |
1689 |
|
- #define CRYPTO_w_unlock(type) \ |
1690 |
|
- CRYPTO_lock(CRYPTO_UNLOCK|CRYPTO_WRITE,type,__FILE__,__LINE__) |
1691 |
|
- #define CRYPTO_r_lock(type) \ |
1692 |
|
- CRYPTO_lock(CRYPTO_LOCK|CRYPTO_READ,type,__FILE__,__LINE__) |
1693 |
|
- #define CRYPTO_r_unlock(type) \ |
1694 |
|
- CRYPTO_lock(CRYPTO_UNLOCK|CRYPTO_READ,type,__FILE__,__LINE__) |
1695 |
|
- #define CRYPTO_add(addr,amount,type) \ |
1696 |
|
- CRYPTO_add_lock(addr,amount,type,__FILE__,__LINE__) |
1697 |
|
- |
1698 |
|
-=head1 DESCRIPTION |
1699 |
|
- |
1700 |
|
-OpenSSL can safely be used in multi-threaded applications provided |
1701 |
|
-that at least two callback functions are set, locking_function and |
1702 |
|
-threadid_func. |
1703 |
|
- |
1704 |
|
-locking_function(int mode, int n, const char *file, int line) is |
1705 |
|
-needed to perform locking on shared data structures. |
1706 |
|
-(Note that OpenSSL uses a number of global data structures that |
1707 |
|
-will be implicitly shared whenever multiple threads use OpenSSL.) |
1708 |
|
-Multi-threaded applications will crash at random if it is not set. |
1709 |
|
- |
1710 |
|
-locking_function() must be able to handle up to CRYPTO_num_locks() |
1711 |
|
-different mutex locks. It sets the B<n>-th lock if B<mode> & |
1712 |
|
-B<CRYPTO_LOCK>, and releases it otherwise. |
1713 |
|
- |
1714 |
|
-B<file> and B<line> are the file number of the function setting the |
1715 |
|
-lock. They can be useful for debugging. |
1716 |
|
- |
1717 |
|
-threadid_func(CRYPTO_THREADID *id) is needed to record the currently-executing |
1718 |
|
-thread's identifier into B<id>. The implementation of this callback should not |
1719 |
|
-fill in B<id> directly, but should use CRYPTO_THREADID_set_numeric() if thread |
1720 |
|
-IDs are numeric, or CRYPTO_THREADID_set_pointer() if they are pointer-based. |
1721 |
|
-If the application does not register such a callback using |
1722 |
|
-CRYPTO_THREADID_set_callback(), then a default implementation is used - on |
1723 |
|
-Windows and BeOS this uses the system's default thread identifying APIs, and on |
1724 |
|
-all other platforms it uses the address of B<errno>. The latter is satisfactory |
1725 |
|
-for thread-safety if and only if the platform has a thread-local error number |
1726 |
|
-facility. |
1727 |
|
- |
1728 |
|
-Once threadid_func() is registered, or if the built-in default implementation is |
1729 |
|
-to be used; |
1730 |
|
- |
1731 |
|
-=over 4 |
1732 |
|
- |
1733 |
|
-=item * |
1734 |
|
-CRYPTO_THREADID_current() records the currently-executing thread ID into the |
1735 |
|
-given B<id> object. |
1736 |
|
- |
1737 |
|
-=item * |
1738 |
|
-CRYPTO_THREADID_cmp() compares two thread IDs (returning zero for equality, ie. |
1739 |
|
-the same semantics as memcmp()). |
1740 |
|
- |
1741 |
|
-=item * |
1742 |
|
-CRYPTO_THREADID_cpy() duplicates a thread ID value, |
1743 |
|
- |
1744 |
|
-=item * |
1745 |
|
-CRYPTO_THREADID_hash() returns a numeric value usable as a hash-table key. This |
1746 |
|
-is usually the exact numeric or pointer-based thread ID used internally, however |
1747 |
|
-this also handles the unusual case where pointers are larger than 'long' |
1748 |
|
-variables and the platform's thread IDs are pointer-based - in this case, mixing |
1749 |
|
-is done to attempt to produce a unique numeric value even though it is not as |
1750 |
|
-wide as the platform's true thread IDs. |
1751 |
|
- |
1752 |
|
-=back |
1753 |
|
- |
1754 |
|
-Additionally, OpenSSL supports dynamic locks, and sometimes, some parts |
1755 |
|
-of OpenSSL need it for better performance. To enable this, the following |
1756 |
|
-is required: |
1757 |
|
- |
1758 |
|
-=over 4 |
1759 |
|
- |
1760 |
|
-=item * |
1761 |
|
-Three additional callback function, dyn_create_function, dyn_lock_function |
1762 |
|
-and dyn_destroy_function. |
1763 |
|
- |
1764 |
|
-=item * |
1765 |
|
-A structure defined with the data that each lock needs to handle. |
1766 |
|
- |
1767 |
|
-=back |
1768 |
|
- |
1769 |
|
-struct CRYPTO_dynlock_value has to be defined to contain whatever structure |
1770 |
|
-is needed to handle locks. |
1771 |
|
- |
1772 |
|
-dyn_create_function(const char *file, int line) is needed to create a |
1773 |
|
-lock. Multi-threaded applications might crash at random if it is not set. |
1774 |
|
- |
1775 |
|
-dyn_lock_function(int mode, CRYPTO_dynlock *l, const char *file, int line) |
1776 |
|
-is needed to perform locking off dynamic lock numbered n. Multi-threaded |
1777 |
|
-applications might crash at random if it is not set. |
1778 |
|
- |
1779 |
|
-dyn_destroy_function(CRYPTO_dynlock *l, const char *file, int line) is |
1780 |
|
-needed to destroy the lock l. Multi-threaded applications might crash at |
1781 |
|
-random if it is not set. |
1782 |
|
- |
1783 |
|
-CRYPTO_get_new_dynlockid() is used to create locks. It will call |
1784 |
|
-dyn_create_function for the actual creation. |
1785 |
|
- |
1786 |
|
-CRYPTO_destroy_dynlockid() is used to destroy locks. It will call |
1787 |
|
-dyn_destroy_function for the actual destruction. |
1788 |
|
- |
1789 |
|
-CRYPTO_lock() is used to lock and unlock the locks. mode is a bitfield |
1790 |
|
-describing what should be done with the lock. n is the number of the |
1791 |
|
-lock as returned from CRYPTO_get_new_dynlockid(). mode can be combined |
1792 |
|
-from the following values. These values are pairwise exclusive, with |
1793 |
|
-undefined behaviour if misused (for example, CRYPTO_READ and CRYPTO_WRITE |
1794 |
|
-should not be used together): |
1795 |
|
- |
1796 |
|
- CRYPTO_LOCK 0x01 |
1797 |
|
- CRYPTO_UNLOCK 0x02 |
1798 |
|
- CRYPTO_READ 0x04 |
1799 |
|
- CRYPTO_WRITE 0x08 |
1800 |
|
- |
1801 |
|
-=head1 RETURN VALUES |
1802 |
|
- |
1803 |
|
-CRYPTO_num_locks() returns the required number of locks. |
1804 |
|
- |
1805 |
|
-CRYPTO_get_new_dynlockid() returns the index to the newly created lock. |
1806 |
|
- |
1807 |
|
-The other functions return no values. |
1808 |
|
- |
1809 |
|
-=head1 NOTES |
1810 |
|
- |
1811 |
|
-You can find out if OpenSSL was configured with thread support: |
1812 |
|
- |
1813 |
|
- #define OPENSSL_THREAD_DEFINES |
1814 |
|
- #include <openssl/opensslconf.h> |
1815 |
|
- #if defined(OPENSSL_THREADS) |
1816 |
|
- // thread support enabled |
1817 |
|
- #else |
1818 |
|
- // no thread support |
1819 |
|
- #endif |
1820 |
|
- |
1821 |
|
-Also, dynamic locks are currently not used internally by OpenSSL, but |
1822 |
|
-may do so in the future. |
1823 |
|
- |
1824 |
|
-=head1 EXAMPLES |
1825 |
|
- |
1826 |
|
-B<crypto/threads/mttest.c> shows examples of the callback functions on |
1827 |
|
-Solaris, Irix and Win32. |
1828 |
|
- |
1829 |
|
-=head1 HISTORY |
1830 |
|
- |
1831 |
|
-CRYPTO_set_locking_callback() is |
1832 |
|
-available in all versions of SSLeay and OpenSSL. |
1833 |
|
-CRYPTO_num_locks() was added in OpenSSL 0.9.4. |
1834 |
|
-All functions dealing with dynamic locks were added in OpenSSL 0.9.5b-dev. |
1835 |
|
-B<CRYPTO_THREADID> and associated functions were introduced in OpenSSL 1.0.0 |
1836 |
|
-to replace (actually, deprecate) the previous CRYPTO_set_id_callback(), |
1837 |
|
-CRYPTO_get_id_callback(), and CRYPTO_thread_id() functions which assumed |
1838 |
|
-thread IDs to always be represented by 'unsigned long'. |
1839 |
|
- |
1840 |
|
-=head1 SEE ALSO |
1841 |
|
- |
1842 |
|
-L<crypto(3)|crypto(3)> |
1843 |
|
- |
1844 |
|
-=cut |
1845 |
|
--- doc/crypto/X509_NAME_ENTRY_get_object.pod 2006-05-14 13:27:59.000000000 +0200 |
1846 |
|
+++ doc/crypto/X509_NAME_ENTRY_get_object.pod 2010-04-01 00:45:01.016327524 +0200 |
1847 |
|
@@ -65,7 +65,7 @@ |
1848 |
|
=head1 SEE ALSO |
1849 |
|
|
1850 |
|
L<ERR_get_error(3)|ERR_get_error(3)>, L<d2i_X509_NAME(3)|d2i_X509_NAME(3)>, |
1851 |
|
-L<OBJ_nid2obj(3),OBJ_nid2obj(3)> |
1852 |
|
+L<OBJ_nid2obj(3)|OBJ_nid2obj(3)> |
1853 |
|
|
1854 |
|
=head1 HISTORY |
1855 |
|
|
1856 |
|
--- doc/ssl/SSL_get_error.pod 2005-03-30 13:50:14.000000000 +0200 |
1857 |
|
+++ doc/ssl/SSL_get_error.pod 2010-04-01 00:45:03.069662282 +0200 |
1858 |
@@ -105,7 +105,7 @@ |
@@ -105,7 +105,7 @@ |
1859 |
|
|
1860 |
=head1 SEE ALSO |
=head1 SEE ALSO |
1864 |
|
|
1865 |
=head1 HISTORY |
=head1 HISTORY |
1866 |
|
|
1867 |
diff -Naur openssl-0.9.8a.orig/doc/ssl/SSL_want.pod openssl-0.9.8a/doc/ssl/SSL_want.pod |
--- doc/ssl/SSL_want.pod 2005-03-30 13:50:14.000000000 +0200 |
1868 |
--- openssl-0.9.8a.orig/doc/ssl/SSL_want.pod 2005-03-30 11:50:14.000000000 +0000 |
+++ doc/ssl/SSL_want.pod 2010-04-01 00:45:03.082993225 +0200 |
|
+++ openssl-0.9.8a/doc/ssl/SSL_want.pod 2005-11-14 03:59:59.000000000 +0000 |
|
1869 |
@@ -72,6 +72,6 @@ |
@@ -72,6 +72,6 @@ |
1870 |
|
|
1871 |
=head1 SEE ALSO |
=head1 SEE ALSO |
1874 |
+L<ssl(3)|ssl(3)>, L<openssl_err(3)|openssl_err(3)>, L<SSL_get_error(3)|SSL_get_error(3)> |
+L<ssl(3)|ssl(3)>, L<openssl_err(3)|openssl_err(3)>, L<SSL_get_error(3)|SSL_get_error(3)> |
1875 |
|
|
1876 |
=cut |
=cut |
1877 |
|
--- FAQ 2010-03-29 15:11:53.000000000 +0200 |
1878 |
|
+++ FAQ 2010-04-01 00:46:00.593821225 +0200 |
1879 |
|
@@ -724,7 +724,7 @@ |
1880 |
|
CRYPTO_set_id_callback(), for all versions of OpenSSL up to and |
1881 |
|
including 0.9.8[abc...]. As of version 0.9.9, CRYPTO_set_id_callback() |
1882 |
|
and associated APIs are deprecated by CRYPTO_THREADID_set_callback() |
1883 |
|
-and friends. This is described in the threads(3) manpage. |
1884 |
|
+and friends. This is described in the openssl_threads(3) manpage. |
1885 |
|
|
1886 |
|
* I've compiled a program under Windows and it crashes: why? |
1887 |
|
|