Looks like only app_verify_callback in ssl_st is missing a prototype.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List
Lutz Jaenicke via RT wrote:
>>We will probably not apply your change to the 0.9.6 line of
>>development, because it's a rather big change, and we try to avoid
>>that within the same line of development (for now, 0.9.x is a line of
>>development, so 0.9.7 is a different one, as is 0.9.8 (in develop
[[EMAIL PROTECTED] - Sat Aug 17 15:51:29 2002]:
...
> You should take a closer look at 0.9.7 (currently in beta), where a
> some of the stricter type handling has already been applied.
>
> We will probably not apply your change to the 0.9.6 line of
> development, because it's a rather big chang
Richard Levitte - VMS Whacker writes:
> Have you looked at lhash.h, and the DECLARE_LHASH*/IMPLEMENT_LHASH*
> macros? That's how we have started to solve the type problems. Yes,
> the generated functions contain some internal casting, but in such a
> way that they don't affect the code that use
> Do you think this is appropriate for the 0.9.7 branch, or should I rather
> try it on the CVS mainline (to become 0.9.8) instead?
Für die CVS mainline ist es auf jeden Fall wichtiger. 0.9.7 wäre auch nett,
aber langfristig gesehen nicht so wichtig.
Ulf
Richard Levitte - VMS Whacker writes:
> You should take a closer look at 0.9.7 (currently in beta), where a
> some of the stricter type handling has already been applied.
I think I had a quick look at the CVS mainline, and the problems were still
present there. Unless there are patches in the 0
Ben Laurie <[EMAIL PROTECTED]> writes:
[Please keep me on the Cc:, since I'm not subscribed to openssl-dev. Thanks.]
> This patch removes typesafety by using casts with gay abandon. Why is
> this necessary? More to the point, IMO it should not be necessary. I'm
> not keen on introducing a pat
Ulf Möller writes:
> Thats is a very useful patch, however there will be no more releases on the
> 0.9.6 branch unless major problems are found. Probably much of the patch
> also applies to the main development branch, but it can't be applied
> directly.
Do you think this is appropriate for the
In message <[EMAIL PROTECTED]> on Mon, 19 Aug
2002 15:08:03 +0200 (MEST), Rainer Orth <[EMAIL PROTECTED]> said:
ro> Richard Levitte - VMS Whacker writes:
ro>
ro> > You should take a closer look at 0.9.7 (currently in beta), where a
ro> > some of the stricter type handling has already been appli
Rainer Orth wrote:
> With the introduction of public key cryptography into the Network Time
> Protocol (NTP v4, cf. http://www.ntp.org/), the current version of NTP
> became a heavy user of OpenSSL.
>
> NTP developers strive to keep the sources warning-free with gcc (using
> -Wall -Wcast-qual -Wm
In message <[EMAIL PROTECTED]> on Fri, 16 Aug
2002 23:32:19 +0200 (MEST), Rainer Orth <[EMAIL PROTECTED]> said:
ro> With the introduction of public key cryptography into the Network Time
ro> Protocol (NTP v4, cf. http://www.ntp.org/), the current version of NTP
ro> became a heavy user of OpenSS
With the introduction of public key cryptography into the Network Time
Protocol (NTP v4, cf. http://www.ntp.org/), the current version of NTP
became a heavy user of OpenSSL.
NTP developers strive to keep the sources warning-free with gcc (using
-Wall -Wcast-qual -Wmissing-prototypes -Wpointer-ar
Thats is a very useful patch, however there will be no more releases on the
0.9.6 branch unless major problems are found. Probably much of the patch
also applies to the main development branch, but it can't be applied
directly.
_
In message <[EMAIL PROTECTED]> on Fri, 16 Aug
2002 23:32:19 +0200 (MEST), Rainer Orth <[EMAIL PROTECTED]> said:
ro> With the introduction of public key cryptography into the Network Time
ro> Protocol (NTP v4, cf. http://www.ntp.org/), the current version of NTP
ro> became a heavy user of OpenSSL
With the introduction of public key cryptography into the Network Time
Protocol (NTP v4, cf. http://www.ntp.org/), the current version of NTP
became a heavy user of OpenSSL.
NTP developers strive to keep the sources warning-free with gcc (using
-Wall -Wcast-qual -Wmissing-prototypes -Wpointer-ari
15 matches
Mail list logo