diff options
| author | beck <> | 2023-07-08 08:26:26 +0000 |
|---|---|---|
| committer | beck <> | 2023-07-08 08:26:26 +0000 |
| commit | cf9b236f0893157746f8b944e4f6cc8d8a6aca26 (patch) | |
| tree | fcfb051a056f2d002add550f13e8e12390dedcd6 /src/lib/libcrypto/cms/cms_kari.c | |
| parent | b73d110b33338f5dd55f8edf8a6c9a557c4c5d06 (diff) | |
| download | openbsd-cf9b236f0893157746f8b944e4f6cc8d8a6aca26.tar.gz openbsd-cf9b236f0893157746f8b944e4f6cc8d8a6aca26.tar.bz2 openbsd-cf9b236f0893157746f8b944e4f6cc8d8a6aca26.zip | |
Hide symbols in cms, comp, conf, and buffer
ok jsing@
Diffstat (limited to 'src/lib/libcrypto/cms/cms_kari.c')
| -rw-r--r-- | src/lib/libcrypto/cms/cms_kari.c | 11 |
1 files changed, 10 insertions, 1 deletions
diff --git a/src/lib/libcrypto/cms/cms_kari.c b/src/lib/libcrypto/cms/cms_kari.c index 0294007791..8ed54e7578 100644 --- a/src/lib/libcrypto/cms/cms_kari.c +++ b/src/lib/libcrypto/cms/cms_kari.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: cms_kari.c,v 1.14 2022/11/26 16:08:51 tb Exp $ */ | 1 | /* $OpenBSD: cms_kari.c,v 1.15 2023/07/08 08:26:26 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 3 | * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 4 | * project. | 4 | * project. |
| @@ -81,6 +81,7 @@ CMS_RecipientInfo_kari_get0_alg(CMS_RecipientInfo *ri, X509_ALGOR **palg, | |||
| 81 | 81 | ||
| 82 | return 1; | 82 | return 1; |
| 83 | } | 83 | } |
| 84 | LCRYPTO_ALIAS(CMS_RecipientInfo_kari_get0_alg); | ||
| 84 | 85 | ||
| 85 | /* Retrieve recipient encrypted keys from a kari */ | 86 | /* Retrieve recipient encrypted keys from a kari */ |
| 86 | 87 | ||
| @@ -93,6 +94,7 @@ CMS_RecipientInfo_kari_get0_reks(CMS_RecipientInfo *ri) | |||
| 93 | } | 94 | } |
| 94 | return ri->d.kari->recipientEncryptedKeys; | 95 | return ri->d.kari->recipientEncryptedKeys; |
| 95 | } | 96 | } |
| 97 | LCRYPTO_ALIAS(CMS_RecipientInfo_kari_get0_reks); | ||
| 96 | 98 | ||
| 97 | int | 99 | int |
| 98 | CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, | 100 | CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, |
| @@ -134,6 +136,7 @@ CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, | |||
| 134 | 136 | ||
| 135 | return 1; | 137 | return 1; |
| 136 | } | 138 | } |
| 139 | LCRYPTO_ALIAS(CMS_RecipientInfo_kari_get0_orig_id); | ||
| 137 | 140 | ||
| 138 | int | 141 | int |
| 139 | CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert) | 142 | CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert) |
| @@ -152,6 +155,7 @@ CMS_RecipientInfo_kari_orig_id_cmp(CMS_RecipientInfo *ri, X509 *cert) | |||
| 152 | 155 | ||
| 153 | return -1; | 156 | return -1; |
| 154 | } | 157 | } |
| 158 | LCRYPTO_ALIAS(CMS_RecipientInfo_kari_orig_id_cmp); | ||
| 155 | 159 | ||
| 156 | int | 160 | int |
| 157 | CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, | 161 | CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, |
| @@ -187,6 +191,7 @@ CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, | |||
| 187 | 191 | ||
| 188 | return 1; | 192 | return 1; |
| 189 | } | 193 | } |
| 194 | LCRYPTO_ALIAS(CMS_RecipientEncryptedKey_get0_id); | ||
| 190 | 195 | ||
| 191 | int | 196 | int |
| 192 | CMS_RecipientEncryptedKey_cert_cmp(CMS_RecipientEncryptedKey *rek, X509 *cert) | 197 | CMS_RecipientEncryptedKey_cert_cmp(CMS_RecipientEncryptedKey *rek, X509 *cert) |
| @@ -200,6 +205,7 @@ CMS_RecipientEncryptedKey_cert_cmp(CMS_RecipientEncryptedKey *rek, X509 *cert) | |||
| 200 | else | 205 | else |
| 201 | return -1; | 206 | return -1; |
| 202 | } | 207 | } |
| 208 | LCRYPTO_ALIAS(CMS_RecipientEncryptedKey_cert_cmp); | ||
| 203 | 209 | ||
| 204 | int | 210 | int |
| 205 | CMS_RecipientInfo_kari_set0_pkey(CMS_RecipientInfo *ri, EVP_PKEY *pk) | 211 | CMS_RecipientInfo_kari_set0_pkey(CMS_RecipientInfo *ri, EVP_PKEY *pk) |
| @@ -221,6 +227,7 @@ CMS_RecipientInfo_kari_set0_pkey(CMS_RecipientInfo *ri, EVP_PKEY *pk) | |||
| 221 | EVP_PKEY_CTX_free(pctx); | 227 | EVP_PKEY_CTX_free(pctx); |
| 222 | return 0; | 228 | return 0; |
| 223 | } | 229 | } |
| 230 | LCRYPTO_ALIAS(CMS_RecipientInfo_kari_set0_pkey); | ||
| 224 | 231 | ||
| 225 | EVP_CIPHER_CTX * | 232 | EVP_CIPHER_CTX * |
| 226 | CMS_RecipientInfo_kari_get0_ctx(CMS_RecipientInfo *ri) | 233 | CMS_RecipientInfo_kari_get0_ctx(CMS_RecipientInfo *ri) |
| @@ -229,6 +236,7 @@ CMS_RecipientInfo_kari_get0_ctx(CMS_RecipientInfo *ri) | |||
| 229 | return ri->d.kari->ctx; | 236 | return ri->d.kari->ctx; |
| 230 | return NULL; | 237 | return NULL; |
| 231 | } | 238 | } |
| 239 | LCRYPTO_ALIAS(CMS_RecipientInfo_kari_get0_ctx); | ||
| 232 | 240 | ||
| 233 | /* | 241 | /* |
| 234 | * Derive KEK and decrypt/encrypt with it to produce either the original CEK | 242 | * Derive KEK and decrypt/encrypt with it to produce either the original CEK |
| @@ -309,6 +317,7 @@ CMS_RecipientInfo_kari_decrypt(CMS_ContentInfo *cms, CMS_RecipientInfo *ri, | |||
| 309 | 317 | ||
| 310 | return rv; | 318 | return rv; |
| 311 | } | 319 | } |
| 320 | LCRYPTO_ALIAS(CMS_RecipientInfo_kari_decrypt); | ||
| 312 | 321 | ||
| 313 | /* Create ephemeral key and initialise context based on it */ | 322 | /* Create ephemeral key and initialise context based on it */ |
| 314 | static int | 323 | static int |
