summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509/x509_akeya.c
diff options
context:
space:
mode:
authortb <>2023-02-16 08:38:17 +0000
committertb <>2023-02-16 08:38:17 +0000
commitb1fbdd21532891fac5b0f128e57331894bd69d84 (patch)
tree689defafde66dbfa38a7854af566bd9a05f191b7 /src/lib/libcrypto/x509/x509_akeya.c
parentee0f647faa09f91cb79b628dcb818adaa381af90 (diff)
downloadopenbsd-b1fbdd21532891fac5b0f128e57331894bd69d84.tar.gz
openbsd-b1fbdd21532891fac5b0f128e57331894bd69d84.tar.bz2
openbsd-b1fbdd21532891fac5b0f128e57331894bd69d84.zip
libressl *_namespace.h: adjust *_ALIAS() to require a semicolon
LCRYPTO_ALIAS() and LSSL_ALIAS() contained a trailing semicolon. This does not conform to style(9), breaks editors and ctags and (most importantly) my workflow. Fix this by neutering them with asm("") so that -Wpedantic doesn't complain. There's precedent in libc's namespace.h fix suggested by & ok jsing
Diffstat (limited to 'src/lib/libcrypto/x509/x509_akeya.c')
-rw-r--r--src/lib/libcrypto/x509/x509_akeya.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/lib/libcrypto/x509/x509_akeya.c b/src/lib/libcrypto/x509/x509_akeya.c
index 969cad1c3e..52eca42cff 100644
--- a/src/lib/libcrypto/x509/x509_akeya.c
+++ b/src/lib/libcrypto/x509/x509_akeya.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: x509_akeya.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ 1/* $OpenBSD: x509_akeya.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */
2/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL 2/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3 * project 1999. 3 * project 1999.
4 */ 4 */
@@ -104,25 +104,25 @@ d2i_AUTHORITY_KEYID(AUTHORITY_KEYID **a, const unsigned char **in, long len)
104 return (AUTHORITY_KEYID *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, 104 return (AUTHORITY_KEYID *)ASN1_item_d2i((ASN1_VALUE **)a, in, len,
105 &AUTHORITY_KEYID_it); 105 &AUTHORITY_KEYID_it);
106} 106}
107LCRYPTO_ALIAS(d2i_AUTHORITY_KEYID) 107LCRYPTO_ALIAS(d2i_AUTHORITY_KEYID);
108 108
109int 109int
110i2d_AUTHORITY_KEYID(AUTHORITY_KEYID *a, unsigned char **out) 110i2d_AUTHORITY_KEYID(AUTHORITY_KEYID *a, unsigned char **out)
111{ 111{
112 return ASN1_item_i2d((ASN1_VALUE *)a, out, &AUTHORITY_KEYID_it); 112 return ASN1_item_i2d((ASN1_VALUE *)a, out, &AUTHORITY_KEYID_it);
113} 113}
114LCRYPTO_ALIAS(i2d_AUTHORITY_KEYID) 114LCRYPTO_ALIAS(i2d_AUTHORITY_KEYID);
115 115
116AUTHORITY_KEYID * 116AUTHORITY_KEYID *
117AUTHORITY_KEYID_new(void) 117AUTHORITY_KEYID_new(void)
118{ 118{
119 return (AUTHORITY_KEYID *)ASN1_item_new(&AUTHORITY_KEYID_it); 119 return (AUTHORITY_KEYID *)ASN1_item_new(&AUTHORITY_KEYID_it);
120} 120}
121LCRYPTO_ALIAS(AUTHORITY_KEYID_new) 121LCRYPTO_ALIAS(AUTHORITY_KEYID_new);
122 122
123void 123void
124AUTHORITY_KEYID_free(AUTHORITY_KEYID *a) 124AUTHORITY_KEYID_free(AUTHORITY_KEYID *a)
125{ 125{
126 ASN1_item_free((ASN1_VALUE *)a, &AUTHORITY_KEYID_it); 126 ASN1_item_free((ASN1_VALUE *)a, &AUTHORITY_KEYID_it);
127} 127}
128LCRYPTO_ALIAS(AUTHORITY_KEYID_free) 128LCRYPTO_ALIAS(AUTHORITY_KEYID_free);