Hmm. You did this with a different name from me (idx instead of index_)
- isn't that going to be irritating?

[EMAIL PROTECTED] wrote:
> 
> steve       14-Feb-2002 19:46:16
> 
>   Modified:    crypto/engine Tag: OpenSSL_0_9_7-stable hw_sureware.c
>   Log:
>   Fix warnings:
> 
>   #if out some unused function.
> 
>   "index" is a global function on some platforms.
> 
>   Revision  Changes    Path
>   No                   revision
>   No                   revision
>   1.2.2.1   +8 -4      openssl/crypto/engine/hw_sureware.c
> 
>   Index: hw_sureware.c
>   ===================================================================
>   RCS file: /e/openssl/cvs/openssl/crypto/engine/hw_sureware.c,v
>   retrieving revision 1.2
>   retrieving revision 1.2.2.1
>   diff -u -r1.2 -r1.2.2.1
>   --- hw_sureware.c     2002/02/07 20:44:07     1.2
>   +++ hw_sureware.c     2002/02/14 18:46:12     1.2.2.1
>   @@ -95,9 +95,11 @@
>    static EVP_PKEY *surewarehk_load_pubkey(ENGINE *e, const char *key_id,
>         UI_METHOD *ui_method, void *callback_data);
>    static void surewarehk_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad,
>   -     int index,long argl, void *argp);
>   +     int idx,long argl, void *argp);
>   +#if 0
>    static void surewarehk_dh_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad,
>   -     int index,long argl, void *argp);
>   +     int idx,long argl, void *argp);
>   +#endif
> 
>    /* This function is aliased to mod_exp (with the mont stuff dropped). */
>    static int surewarehk_mod_exp_mont(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
>   @@ -759,7 +761,7 @@
>    /* This cleans up an RSA/DSA KM key(do not destroy the key into the hardware)
>    , called when ex_data is freed */
>    static void surewarehk_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad,
>   -     int index,long argl, void *argp)
>   +     int idx,long argl, void *argp)
>    {
>         if(!p_surewarehk_Free)
>         {
>   @@ -768,10 +770,11 @@
>         else
>                 p_surewarehk_Free((char *)item,0);
>    }
>   +#if 0
>    /* This cleans up an DH KM key (destroys the key into hardware),
>    called when ex_data is freed */
>    static void surewarehk_dh_ex_free(void *obj, void *item, CRYPTO_EX_DATA *ad,
>   -     int index,long argl, void *argp)
>   +     int idx,long argl, void *argp)
>    {
>         if(!p_surewarehk_Free)
>         {
>   @@ -780,6 +783,7 @@
>         else
>                 p_surewarehk_Free((char *)item,1);
>    }
>   +#endif
>    /*
>    * return number of decrypted bytes
>    */
> 
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> CVS Repository Commit List                     [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]

--
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to