diff options
Diffstat (limited to '')
117 files changed, 320 insertions, 1982 deletions
diff --git a/src/lib/libcrypto/Symbols.namespace b/src/lib/libcrypto/Symbols.namespace index c266ee0aab..fbd8757bb0 100644 --- a/src/lib/libcrypto/Symbols.namespace +++ b/src/lib/libcrypto/Symbols.namespace | |||
| @@ -950,7 +950,6 @@ _libre_ASN1_UTCTIME_check | |||
| 950 | _libre_ASN1_UTCTIME_set | 950 | _libre_ASN1_UTCTIME_set |
| 951 | _libre_ASN1_UTCTIME_adj | 951 | _libre_ASN1_UTCTIME_adj |
| 952 | _libre_ASN1_UTCTIME_set_string | 952 | _libre_ASN1_UTCTIME_set_string |
| 953 | _libre_ASN1_UTCTIME_cmp_time_t | ||
| 954 | _libre_ASN1_GENERALIZEDTIME_check | 953 | _libre_ASN1_GENERALIZEDTIME_check |
| 955 | _libre_ASN1_GENERALIZEDTIME_set | 954 | _libre_ASN1_GENERALIZEDTIME_set |
| 956 | _libre_ASN1_GENERALIZEDTIME_adj | 955 | _libre_ASN1_GENERALIZEDTIME_adj |
| @@ -1064,7 +1063,6 @@ _libre_ASN1_put_object | |||
| 1064 | _libre_ASN1_put_eoc | 1063 | _libre_ASN1_put_eoc |
| 1065 | _libre_ASN1_object_size | 1064 | _libre_ASN1_object_size |
| 1066 | _libre_ASN1_item_dup | 1065 | _libre_ASN1_item_dup |
| 1067 | _libre_ASN1_dup | ||
| 1068 | _libre_ASN1_d2i_fp | 1066 | _libre_ASN1_d2i_fp |
| 1069 | _libre_ASN1_item_d2i_fp | 1067 | _libre_ASN1_item_d2i_fp |
| 1070 | _libre_ASN1_i2d_fp | 1068 | _libre_ASN1_i2d_fp |
| @@ -1128,16 +1126,6 @@ _libre_SMIME_text | |||
| 1128 | _libre_ERR_load_ASN1_strings | 1126 | _libre_ERR_load_ASN1_strings |
| 1129 | _libre_ASN1_time_parse | 1127 | _libre_ASN1_time_parse |
| 1130 | _libre_ASN1_time_tm_cmp | 1128 | _libre_ASN1_time_tm_cmp |
| 1131 | _libre_ASN1_item_ex_new | ||
| 1132 | _libre_ASN1_item_ex_free | ||
| 1133 | _libre_ASN1_template_new | ||
| 1134 | _libre_ASN1_primitive_new | ||
| 1135 | _libre_ASN1_template_free | ||
| 1136 | _libre_ASN1_template_d2i | ||
| 1137 | _libre_ASN1_item_ex_d2i | ||
| 1138 | _libre_ASN1_item_ex_i2d | ||
| 1139 | _libre_ASN1_template_i2d | ||
| 1140 | _libre_ASN1_primitive_free | ||
| 1141 | _libre_BIO_set_flags | 1129 | _libre_BIO_set_flags |
| 1142 | _libre_BIO_test_flags | 1130 | _libre_BIO_test_flags |
| 1143 | _libre_BIO_clear_flags | 1131 | _libre_BIO_clear_flags |
| @@ -1263,30 +1251,206 @@ _libre_BIO_vprintf | |||
| 1263 | _libre_BIO_snprintf | 1251 | _libre_BIO_snprintf |
| 1264 | _libre_BIO_vsnprintf | 1252 | _libre_BIO_vsnprintf |
| 1265 | _libre_ERR_load_BIO_strings | 1253 | _libre_ERR_load_BIO_strings |
| 1266 | _libre_SM4_set_key | 1254 | _libre_ASN1_item_ex_new |
| 1267 | _libre_SM4_decrypt | 1255 | _libre_ASN1_item_ex_free |
| 1268 | _libre_SM4_encrypt | 1256 | _libre_ASN1_template_new |
| 1269 | _libre_SM3_Init | 1257 | _libre_ASN1_primitive_new |
| 1270 | _libre_SM3_Update | 1258 | _libre_ASN1_template_free |
| 1271 | _libre_SM3_Final | 1259 | _libre_ASN1_template_d2i |
| 1260 | _libre_ASN1_item_ex_d2i | ||
| 1261 | _libre_ASN1_item_ex_i2d | ||
| 1262 | _libre_ASN1_template_i2d | ||
| 1263 | _libre_ASN1_primitive_free | ||
| 1264 | _libre_EC_GFp_simple_method | ||
| 1265 | _libre_EC_GFp_mont_method | ||
| 1266 | _libre_EC_GROUP_new | ||
| 1267 | _libre_EC_GROUP_free | ||
| 1268 | _libre_EC_GROUP_copy | ||
| 1269 | _libre_EC_GROUP_dup | ||
| 1270 | _libre_EC_GROUP_method_of | ||
| 1271 | _libre_EC_METHOD_get_field_type | ||
| 1272 | _libre_EC_GROUP_set_generator | ||
| 1273 | _libre_EC_GROUP_get0_generator | ||
| 1274 | _libre_EC_GROUP_get_order | ||
| 1275 | _libre_EC_GROUP_order_bits | ||
| 1276 | _libre_EC_GROUP_get_cofactor | ||
| 1277 | _libre_EC_GROUP_set_curve_name | ||
| 1278 | _libre_EC_GROUP_get_curve_name | ||
| 1279 | _libre_EC_GROUP_set_asn1_flag | ||
| 1280 | _libre_EC_GROUP_get_asn1_flag | ||
| 1281 | _libre_EC_GROUP_set_point_conversion_form | ||
| 1282 | _libre_EC_GROUP_get_point_conversion_form | ||
| 1283 | _libre_EC_GROUP_get0_seed | ||
| 1284 | _libre_EC_GROUP_get_seed_len | ||
| 1285 | _libre_EC_GROUP_set_seed | ||
| 1286 | _libre_EC_GROUP_set_curve | ||
| 1287 | _libre_EC_GROUP_get_curve | ||
| 1288 | _libre_EC_GROUP_get_degree | ||
| 1289 | _libre_EC_GROUP_check | ||
| 1290 | _libre_EC_GROUP_check_discriminant | ||
| 1291 | _libre_EC_GROUP_cmp | ||
| 1292 | _libre_EC_GROUP_new_curve_GFp | ||
| 1293 | _libre_EC_GROUP_new_by_curve_name | ||
| 1294 | _libre_EC_get_builtin_curves | ||
| 1295 | _libre_EC_curve_nid2nist | ||
| 1296 | _libre_EC_curve_nist2nid | ||
| 1297 | _libre_EC_POINT_new | ||
| 1298 | _libre_EC_POINT_free | ||
| 1299 | _libre_EC_POINT_copy | ||
| 1300 | _libre_EC_POINT_dup | ||
| 1301 | _libre_EC_POINT_method_of | ||
| 1302 | _libre_EC_POINT_set_to_infinity | ||
| 1303 | _libre_EC_POINT_set_affine_coordinates | ||
| 1304 | _libre_EC_POINT_get_affine_coordinates | ||
| 1305 | _libre_EC_POINT_set_compressed_coordinates | ||
| 1306 | _libre_EC_POINT_point2oct | ||
| 1307 | _libre_EC_POINT_oct2point | ||
| 1308 | _libre_EC_POINT_point2bn | ||
| 1309 | _libre_EC_POINT_bn2point | ||
| 1310 | _libre_EC_POINT_point2hex | ||
| 1311 | _libre_EC_POINT_hex2point | ||
| 1312 | _libre_EC_POINT_add | ||
| 1313 | _libre_EC_POINT_dbl | ||
| 1314 | _libre_EC_POINT_invert | ||
| 1315 | _libre_EC_POINT_is_at_infinity | ||
| 1316 | _libre_EC_POINT_is_on_curve | ||
| 1317 | _libre_EC_POINT_cmp | ||
| 1318 | _libre_EC_POINT_make_affine | ||
| 1319 | _libre_EC_POINTs_make_affine | ||
| 1320 | _libre_EC_POINTs_mul | ||
| 1321 | _libre_EC_POINT_mul | ||
| 1322 | _libre_EC_GROUP_precompute_mult | ||
| 1323 | _libre_EC_GROUP_have_precompute_mult | ||
| 1324 | _libre_EC_GROUP_get_basis_type | ||
| 1325 | _libre_d2i_ECPKParameters | ||
| 1326 | _libre_i2d_ECPKParameters | ||
| 1327 | _libre_ECPKParameters_print | ||
| 1328 | _libre_ECPKParameters_print_fp | ||
| 1329 | _libre_EC_KEY_new | ||
| 1330 | _libre_EC_KEY_get_flags | ||
| 1331 | _libre_EC_KEY_set_flags | ||
| 1332 | _libre_EC_KEY_clear_flags | ||
| 1333 | _libre_EC_KEY_new_by_curve_name | ||
| 1334 | _libre_EC_KEY_free | ||
| 1335 | _libre_EC_KEY_copy | ||
| 1336 | _libre_EC_KEY_dup | ||
| 1337 | _libre_EC_KEY_up_ref | ||
| 1338 | _libre_EC_KEY_get0_group | ||
| 1339 | _libre_EC_KEY_set_group | ||
| 1340 | _libre_EC_KEY_get0_private_key | ||
| 1341 | _libre_EC_KEY_set_private_key | ||
| 1342 | _libre_EC_KEY_get0_public_key | ||
| 1343 | _libre_EC_KEY_set_public_key | ||
| 1344 | _libre_EC_KEY_get_enc_flags | ||
| 1345 | _libre_EC_KEY_set_enc_flags | ||
| 1346 | _libre_EC_KEY_get_conv_form | ||
| 1347 | _libre_EC_KEY_set_conv_form | ||
| 1348 | _libre_EC_KEY_set_asn1_flag | ||
| 1349 | _libre_EC_KEY_precompute_mult | ||
| 1350 | _libre_EC_KEY_generate_key | ||
| 1351 | _libre_EC_KEY_check_key | ||
| 1352 | _libre_EC_KEY_set_public_key_affine_coordinates | ||
| 1353 | _libre_d2i_ECPrivateKey | ||
| 1354 | _libre_i2d_ECPrivateKey | ||
| 1355 | _libre_d2i_ECParameters | ||
| 1356 | _libre_i2d_ECParameters | ||
| 1357 | _libre_o2i_ECPublicKey | ||
| 1358 | _libre_i2o_ECPublicKey | ||
| 1359 | _libre_ECParameters_print | ||
| 1360 | _libre_EC_KEY_print | ||
| 1361 | _libre_ECParameters_print_fp | ||
| 1362 | _libre_EC_KEY_print_fp | ||
| 1363 | _libre_EC_KEY_set_ex_data | ||
| 1364 | _libre_EC_KEY_get_ex_data | ||
| 1365 | _libre_EC_KEY_OpenSSL | ||
| 1366 | _libre_EC_KEY_get_default_method | ||
| 1367 | _libre_EC_KEY_set_default_method | ||
| 1368 | _libre_EC_KEY_get_method | ||
| 1369 | _libre_EC_KEY_set_method | ||
| 1370 | _libre_EC_KEY_new_method | ||
| 1371 | _libre_EC_KEY_METHOD_new | ||
| 1372 | _libre_EC_KEY_METHOD_free | ||
| 1373 | _libre_EC_KEY_METHOD_set_init | ||
| 1374 | _libre_EC_KEY_METHOD_set_keygen | ||
| 1375 | _libre_EC_KEY_METHOD_set_compute_key | ||
| 1376 | _libre_EC_KEY_METHOD_get_init | ||
| 1377 | _libre_EC_KEY_METHOD_get_keygen | ||
| 1378 | _libre_EC_KEY_METHOD_get_compute_key | ||
| 1379 | _libre_ECParameters_dup | ||
| 1380 | _libre_ERR_load_EC_strings | ||
| 1381 | _libre_ERR_put_error | ||
| 1382 | _libre_ERR_set_error_data | ||
| 1383 | _libre_ERR_get_error | ||
| 1384 | _libre_ERR_get_error_line | ||
| 1385 | _libre_ERR_get_error_line_data | ||
| 1386 | _libre_ERR_peek_error | ||
| 1387 | _libre_ERR_peek_error_line | ||
| 1388 | _libre_ERR_peek_error_line_data | ||
| 1389 | _libre_ERR_peek_last_error | ||
| 1390 | _libre_ERR_peek_last_error_line | ||
| 1391 | _libre_ERR_peek_last_error_line_data | ||
| 1392 | _libre_ERR_clear_error | ||
| 1393 | _libre_ERR_error_string | ||
| 1394 | _libre_ERR_error_string_n | ||
| 1395 | _libre_ERR_lib_error_string | ||
| 1396 | _libre_ERR_func_error_string | ||
| 1397 | _libre_ERR_reason_error_string | ||
| 1398 | _libre_ERR_print_errors_cb | ||
| 1399 | _libre_ERR_print_errors_fp | ||
| 1400 | _libre_ERR_print_errors | ||
| 1401 | _libre_ERR_asprintf_error_data | ||
| 1402 | _libre_ERR_load_strings | ||
| 1403 | _libre_ERR_unload_strings | ||
| 1404 | _libre_ERR_load_ERR_strings | ||
| 1405 | _libre_ERR_load_crypto_strings | ||
| 1406 | _libre_ERR_free_strings | ||
| 1407 | _libre_ERR_remove_thread_state | ||
| 1408 | _libre_ERR_remove_state | ||
| 1409 | _libre_ERR_get_state | ||
| 1410 | _libre_ERR_get_string_table | ||
| 1411 | _libre_ERR_get_err_state_table | ||
| 1412 | _libre_ERR_release_err_state_table | ||
| 1413 | _libre_ERR_get_next_error_library | ||
| 1414 | _libre_ERR_set_mark | ||
| 1415 | _libre_ERR_pop_to_mark | ||
| 1416 | _libre_ERR_get_implementation | ||
| 1417 | _libre_ERR_set_implementation | ||
| 1272 | _libre_RAND_set_rand_method | 1418 | _libre_RAND_set_rand_method |
| 1273 | _libre_RAND_get_rand_method | 1419 | _libre_RAND_get_rand_method |
| 1274 | _libre_RAND_set_rand_engine | 1420 | _libre_RAND_set_rand_engine |
| 1275 | _libre_RAND_SSLeay | 1421 | _libre_RAND_SSLeay |
| 1276 | _libre_RAND_cleanup | ||
| 1277 | _libre_RAND_bytes | ||
| 1278 | _libre_RAND_pseudo_bytes | ||
| 1279 | _libre_RAND_seed | ||
| 1280 | _libre_RAND_add | ||
| 1281 | _libre_RAND_load_file | ||
| 1282 | _libre_RAND_write_file | ||
| 1283 | _libre_RAND_file_name | ||
| 1284 | _libre_RAND_status | ||
| 1285 | _libre_RAND_poll | ||
| 1286 | _libre_ERR_load_RAND_strings | 1422 | _libre_ERR_load_RAND_strings |
| 1287 | _libre_CRYPTO_poly1305_init | 1423 | _libre_ECDSA_SIG_new |
| 1288 | _libre_CRYPTO_poly1305_update | 1424 | _libre_ECDSA_SIG_free |
| 1289 | _libre_CRYPTO_poly1305_finish | 1425 | _libre_i2d_ECDSA_SIG |
| 1426 | _libre_d2i_ECDSA_SIG | ||
| 1427 | _libre_ECDSA_SIG_get0 | ||
| 1428 | _libre_ECDSA_SIG_get0_r | ||
| 1429 | _libre_ECDSA_SIG_get0_s | ||
| 1430 | _libre_ECDSA_SIG_set0 | ||
| 1431 | _libre_ECDSA_do_sign | ||
| 1432 | _libre_ECDSA_do_sign_ex | ||
| 1433 | _libre_ECDSA_do_verify | ||
| 1434 | _libre_ECDSA_OpenSSL | ||
| 1435 | _libre_ECDSA_set_default_method | ||
| 1436 | _libre_ECDSA_get_default_method | ||
| 1437 | _libre_ECDSA_set_method | ||
| 1438 | _libre_ECDSA_size | ||
| 1439 | _libre_ECDSA_sign_setup | ||
| 1440 | _libre_ECDSA_sign | ||
| 1441 | _libre_ECDSA_sign_ex | ||
| 1442 | _libre_ECDSA_verify | ||
| 1443 | _libre_ECDSA_get_ex_new_index | ||
| 1444 | _libre_ECDSA_set_ex_data | ||
| 1445 | _libre_ECDSA_get_ex_data | ||
| 1446 | _libre_EC_KEY_METHOD_set_sign | ||
| 1447 | _libre_EC_KEY_METHOD_set_verify | ||
| 1448 | _libre_EC_KEY_METHOD_get_sign | ||
| 1449 | _libre_EC_KEY_METHOD_get_verify | ||
| 1450 | _libre_ERR_load_ECDSA_strings | ||
| 1451 | _libre_HKDF | ||
| 1452 | _libre_HKDF_extract | ||
| 1453 | _libre_HKDF_expand | ||
| 1290 | _libre_TS_REQ_new | 1454 | _libre_TS_REQ_new |
| 1291 | _libre_TS_REQ_free | 1455 | _libre_TS_REQ_free |
| 1292 | _libre_i2d_TS_REQ | 1456 | _libre_i2d_TS_REQ |
| @@ -1477,504 +1641,12 @@ _libre_TS_CONF_set_ordering | |||
| 1477 | _libre_TS_CONF_set_tsa_name | 1641 | _libre_TS_CONF_set_tsa_name |
| 1478 | _libre_TS_CONF_set_ess_cert_id_chain | 1642 | _libre_TS_CONF_set_ess_cert_id_chain |
| 1479 | _libre_ERR_load_TS_strings | 1643 | _libre_ERR_load_TS_strings |
| 1480 | _libre_HKDF | 1644 | _libre_SM4_set_key |
| 1481 | _libre_HKDF_extract | 1645 | _libre_SM4_decrypt |
| 1482 | _libre_HKDF_expand | 1646 | _libre_SM4_encrypt |
| 1483 | _libre_EVP_MD_type | 1647 | _libre_CRYPTO_poly1305_init |
| 1484 | _libre_EVP_MD_pkey_type | 1648 | _libre_CRYPTO_poly1305_update |
| 1485 | _libre_EVP_MD_size | 1649 | _libre_CRYPTO_poly1305_finish |
| 1486 | _libre_EVP_MD_block_size | ||
| 1487 | _libre_EVP_MD_flags | ||
| 1488 | _libre_EVP_MD_meth_new | ||
| 1489 | _libre_EVP_MD_meth_free | ||
| 1490 | _libre_EVP_MD_meth_dup | ||
| 1491 | _libre_EVP_MD_meth_set_input_blocksize | ||
| 1492 | _libre_EVP_MD_meth_set_result_size | ||
| 1493 | _libre_EVP_MD_meth_set_app_datasize | ||
| 1494 | _libre_EVP_MD_meth_set_flags | ||
| 1495 | _libre_EVP_MD_meth_set_init | ||
| 1496 | _libre_EVP_MD_meth_set_update | ||
| 1497 | _libre_EVP_MD_meth_set_final | ||
| 1498 | _libre_EVP_MD_meth_set_copy | ||
| 1499 | _libre_EVP_MD_meth_set_cleanup | ||
| 1500 | _libre_EVP_MD_meth_set_ctrl | ||
| 1501 | _libre_EVP_MD_CTX_md | ||
| 1502 | _libre_EVP_MD_CTX_md_data | ||
| 1503 | _libre_EVP_MD_CTX_pkey_ctx | ||
| 1504 | _libre_EVP_MD_CTX_set_pkey_ctx | ||
| 1505 | _libre_EVP_CIPHER_nid | ||
| 1506 | _libre_EVP_CIPHER_block_size | ||
| 1507 | _libre_EVP_CIPHER_key_length | ||
| 1508 | _libre_EVP_CIPHER_iv_length | ||
| 1509 | _libre_EVP_CIPHER_flags | ||
| 1510 | _libre_EVP_CIPHER_CTX_cipher | ||
| 1511 | _libre_EVP_CIPHER_CTX_encrypting | ||
| 1512 | _libre_EVP_CIPHER_CTX_nid | ||
| 1513 | _libre_EVP_CIPHER_CTX_block_size | ||
| 1514 | _libre_EVP_CIPHER_CTX_key_length | ||
| 1515 | _libre_EVP_CIPHER_CTX_iv_length | ||
| 1516 | _libre_EVP_CIPHER_CTX_get_iv | ||
| 1517 | _libre_EVP_CIPHER_CTX_set_iv | ||
| 1518 | _libre_EVP_CIPHER_CTX_copy | ||
| 1519 | _libre_EVP_CIPHER_CTX_get_app_data | ||
| 1520 | _libre_EVP_CIPHER_CTX_set_app_data | ||
| 1521 | _libre_EVP_CIPHER_CTX_get_cipher_data | ||
| 1522 | _libre_EVP_CIPHER_CTX_set_cipher_data | ||
| 1523 | _libre_EVP_CIPHER_CTX_buf_noconst | ||
| 1524 | _libre_EVP_CIPHER_CTX_flags | ||
| 1525 | _libre_EVP_CIPHER_meth_new | ||
| 1526 | _libre_EVP_CIPHER_meth_dup | ||
| 1527 | _libre_EVP_CIPHER_meth_free | ||
| 1528 | _libre_EVP_CIPHER_meth_set_iv_length | ||
| 1529 | _libre_EVP_CIPHER_meth_set_flags | ||
| 1530 | _libre_EVP_CIPHER_meth_set_impl_ctx_size | ||
| 1531 | _libre_EVP_CIPHER_meth_set_init | ||
| 1532 | _libre_EVP_CIPHER_meth_set_do_cipher | ||
| 1533 | _libre_EVP_CIPHER_meth_set_cleanup | ||
| 1534 | _libre_EVP_CIPHER_meth_set_set_asn1_params | ||
| 1535 | _libre_EVP_CIPHER_meth_set_get_asn1_params | ||
| 1536 | _libre_EVP_CIPHER_meth_set_ctrl | ||
| 1537 | _libre_EVP_PKEY_new_raw_private_key | ||
| 1538 | _libre_EVP_PKEY_new_raw_public_key | ||
| 1539 | _libre_EVP_PKEY_get_raw_private_key | ||
| 1540 | _libre_EVP_PKEY_get_raw_public_key | ||
| 1541 | _libre_EVP_Cipher | ||
| 1542 | _libre_EVP_MD_CTX_new | ||
| 1543 | _libre_EVP_MD_CTX_free | ||
| 1544 | _libre_EVP_MD_CTX_init | ||
| 1545 | _libre_EVP_MD_CTX_reset | ||
| 1546 | _libre_EVP_MD_CTX_create | ||
| 1547 | _libre_EVP_MD_CTX_destroy | ||
| 1548 | _libre_EVP_MD_CTX_cleanup | ||
| 1549 | _libre_EVP_MD_CTX_copy_ex | ||
| 1550 | _libre_EVP_MD_CTX_set_flags | ||
| 1551 | _libre_EVP_MD_CTX_clear_flags | ||
| 1552 | _libre_EVP_MD_CTX_ctrl | ||
| 1553 | _libre_EVP_MD_CTX_test_flags | ||
| 1554 | _libre_EVP_DigestInit_ex | ||
| 1555 | _libre_EVP_DigestUpdate | ||
| 1556 | _libre_EVP_DigestFinal_ex | ||
| 1557 | _libre_EVP_Digest | ||
| 1558 | _libre_EVP_MD_CTX_copy | ||
| 1559 | _libre_EVP_DigestInit | ||
| 1560 | _libre_EVP_DigestFinal | ||
| 1561 | _libre_EVP_read_pw_string | ||
| 1562 | _libre_EVP_read_pw_string_min | ||
| 1563 | _libre_EVP_set_pw_prompt | ||
| 1564 | _libre_EVP_get_pw_prompt | ||
| 1565 | _libre_EVP_BytesToKey | ||
| 1566 | _libre_EVP_CIPHER_CTX_set_flags | ||
| 1567 | _libre_EVP_CIPHER_CTX_clear_flags | ||
| 1568 | _libre_EVP_CIPHER_CTX_test_flags | ||
| 1569 | _libre_EVP_EncryptInit | ||
| 1570 | _libre_EVP_EncryptInit_ex | ||
| 1571 | _libre_EVP_EncryptUpdate | ||
| 1572 | _libre_EVP_EncryptFinal_ex | ||
| 1573 | _libre_EVP_EncryptFinal | ||
| 1574 | _libre_EVP_DecryptInit | ||
| 1575 | _libre_EVP_DecryptInit_ex | ||
| 1576 | _libre_EVP_DecryptUpdate | ||
| 1577 | _libre_EVP_DecryptFinal_ex | ||
| 1578 | _libre_EVP_DecryptFinal | ||
| 1579 | _libre_EVP_CipherInit | ||
| 1580 | _libre_EVP_CipherInit_ex | ||
| 1581 | _libre_EVP_CipherUpdate | ||
| 1582 | _libre_EVP_CipherFinal_ex | ||
| 1583 | _libre_EVP_CipherFinal | ||
| 1584 | _libre_EVP_SignFinal | ||
| 1585 | _libre_EVP_VerifyFinal | ||
| 1586 | _libre_EVP_DigestSignInit | ||
| 1587 | _libre_EVP_DigestSignFinal | ||
| 1588 | _libre_EVP_DigestSign | ||
| 1589 | _libre_EVP_DigestVerifyInit | ||
| 1590 | _libre_EVP_DigestVerifyFinal | ||
| 1591 | _libre_EVP_DigestVerify | ||
| 1592 | _libre_EVP_OpenInit | ||
| 1593 | _libre_EVP_OpenFinal | ||
| 1594 | _libre_EVP_SealInit | ||
| 1595 | _libre_EVP_SealFinal | ||
| 1596 | _libre_EVP_ENCODE_CTX_new | ||
| 1597 | _libre_EVP_ENCODE_CTX_free | ||
| 1598 | _libre_EVP_EncodeInit | ||
| 1599 | _libre_EVP_EncodeUpdate | ||
| 1600 | _libre_EVP_EncodeFinal | ||
| 1601 | _libre_EVP_EncodeBlock | ||
| 1602 | _libre_EVP_DecodeInit | ||
| 1603 | _libre_EVP_DecodeUpdate | ||
| 1604 | _libre_EVP_DecodeFinal | ||
| 1605 | _libre_EVP_DecodeBlock | ||
| 1606 | _libre_EVP_CIPHER_CTX_init | ||
| 1607 | _libre_EVP_CIPHER_CTX_cleanup | ||
| 1608 | _libre_EVP_CIPHER_CTX_new | ||
| 1609 | _libre_EVP_CIPHER_CTX_free | ||
| 1610 | _libre_EVP_CIPHER_CTX_reset | ||
| 1611 | _libre_EVP_CIPHER_CTX_set_key_length | ||
| 1612 | _libre_EVP_CIPHER_CTX_set_padding | ||
| 1613 | _libre_EVP_CIPHER_CTX_ctrl | ||
| 1614 | _libre_EVP_CIPHER_CTX_rand_key | ||
| 1615 | _libre_BIO_f_md | ||
| 1616 | _libre_BIO_f_base64 | ||
| 1617 | _libre_BIO_f_cipher | ||
| 1618 | _libre_BIO_set_cipher | ||
| 1619 | _libre_EVP_md_null | ||
| 1620 | _libre_EVP_md4 | ||
| 1621 | _libre_EVP_md5 | ||
| 1622 | _libre_EVP_md5_sha1 | ||
| 1623 | _libre_EVP_sha1 | ||
| 1624 | _libre_EVP_sha224 | ||
| 1625 | _libre_EVP_sha256 | ||
| 1626 | _libre_EVP_sha384 | ||
| 1627 | _libre_EVP_sha512 | ||
| 1628 | _libre_EVP_sha512_224 | ||
| 1629 | _libre_EVP_sha512_256 | ||
| 1630 | _libre_EVP_sha3_224 | ||
| 1631 | _libre_EVP_sha3_256 | ||
| 1632 | _libre_EVP_sha3_384 | ||
| 1633 | _libre_EVP_sha3_512 | ||
| 1634 | _libre_EVP_sm3 | ||
| 1635 | _libre_EVP_ripemd160 | ||
| 1636 | _libre_EVP_whirlpool | ||
| 1637 | _libre_EVP_gostr341194 | ||
| 1638 | _libre_EVP_gost2814789imit | ||
| 1639 | _libre_EVP_streebog256 | ||
| 1640 | _libre_EVP_streebog512 | ||
| 1641 | _libre_EVP_enc_null | ||
| 1642 | _libre_EVP_des_ecb | ||
| 1643 | _libre_EVP_des_ede | ||
| 1644 | _libre_EVP_des_ede3 | ||
| 1645 | _libre_EVP_des_ede_ecb | ||
| 1646 | _libre_EVP_des_ede3_ecb | ||
| 1647 | _libre_EVP_des_cfb64 | ||
| 1648 | _libre_EVP_des_cfb1 | ||
| 1649 | _libre_EVP_des_cfb8 | ||
| 1650 | _libre_EVP_des_ede_cfb64 | ||
| 1651 | _libre_EVP_des_ede3_cfb64 | ||
| 1652 | _libre_EVP_des_ede3_cfb1 | ||
| 1653 | _libre_EVP_des_ede3_cfb8 | ||
| 1654 | _libre_EVP_des_ofb | ||
| 1655 | _libre_EVP_des_ede_ofb | ||
| 1656 | _libre_EVP_des_ede3_ofb | ||
| 1657 | _libre_EVP_des_cbc | ||
| 1658 | _libre_EVP_des_ede_cbc | ||
| 1659 | _libre_EVP_des_ede3_cbc | ||
| 1660 | _libre_EVP_desx_cbc | ||
| 1661 | _libre_EVP_rc4 | ||
| 1662 | _libre_EVP_rc4_40 | ||
| 1663 | _libre_EVP_rc4_hmac_md5 | ||
| 1664 | _libre_EVP_idea_ecb | ||
| 1665 | _libre_EVP_idea_cfb64 | ||
| 1666 | _libre_EVP_idea_ofb | ||
| 1667 | _libre_EVP_idea_cbc | ||
| 1668 | _libre_EVP_rc2_ecb | ||
| 1669 | _libre_EVP_rc2_cbc | ||
| 1670 | _libre_EVP_rc2_40_cbc | ||
| 1671 | _libre_EVP_rc2_64_cbc | ||
| 1672 | _libre_EVP_rc2_cfb64 | ||
| 1673 | _libre_EVP_rc2_ofb | ||
| 1674 | _libre_EVP_bf_ecb | ||
| 1675 | _libre_EVP_bf_cbc | ||
| 1676 | _libre_EVP_bf_cfb64 | ||
| 1677 | _libre_EVP_bf_ofb | ||
| 1678 | _libre_EVP_cast5_ecb | ||
| 1679 | _libre_EVP_cast5_cbc | ||
| 1680 | _libre_EVP_cast5_cfb64 | ||
| 1681 | _libre_EVP_cast5_ofb | ||
| 1682 | _libre_EVP_aes_128_ecb | ||
| 1683 | _libre_EVP_aes_128_cbc | ||
| 1684 | _libre_EVP_aes_128_cfb1 | ||
| 1685 | _libre_EVP_aes_128_cfb8 | ||
| 1686 | _libre_EVP_aes_128_cfb128 | ||
| 1687 | _libre_EVP_aes_128_ofb | ||
| 1688 | _libre_EVP_aes_128_ctr | ||
| 1689 | _libre_EVP_aes_128_ccm | ||
| 1690 | _libre_EVP_aes_128_gcm | ||
| 1691 | _libre_EVP_aes_128_wrap | ||
| 1692 | _libre_EVP_aes_128_xts | ||
| 1693 | _libre_EVP_aes_192_ecb | ||
| 1694 | _libre_EVP_aes_192_cbc | ||
| 1695 | _libre_EVP_aes_192_cfb1 | ||
| 1696 | _libre_EVP_aes_192_cfb8 | ||
| 1697 | _libre_EVP_aes_192_cfb128 | ||
| 1698 | _libre_EVP_aes_192_ofb | ||
| 1699 | _libre_EVP_aes_192_ctr | ||
| 1700 | _libre_EVP_aes_192_ccm | ||
| 1701 | _libre_EVP_aes_192_gcm | ||
| 1702 | _libre_EVP_aes_192_wrap | ||
| 1703 | _libre_EVP_aes_256_ecb | ||
| 1704 | _libre_EVP_aes_256_cbc | ||
| 1705 | _libre_EVP_aes_256_cfb1 | ||
| 1706 | _libre_EVP_aes_256_cfb8 | ||
| 1707 | _libre_EVP_aes_256_cfb128 | ||
| 1708 | _libre_EVP_aes_256_ofb | ||
| 1709 | _libre_EVP_aes_256_ctr | ||
| 1710 | _libre_EVP_aes_256_ccm | ||
| 1711 | _libre_EVP_aes_256_gcm | ||
| 1712 | _libre_EVP_aes_256_wrap | ||
| 1713 | _libre_EVP_aes_256_xts | ||
| 1714 | _libre_EVP_chacha20_poly1305 | ||
| 1715 | _libre_EVP_aes_128_cbc_hmac_sha1 | ||
| 1716 | _libre_EVP_aes_256_cbc_hmac_sha1 | ||
| 1717 | _libre_EVP_camellia_128_ecb | ||
| 1718 | _libre_EVP_camellia_128_cbc | ||
| 1719 | _libre_EVP_camellia_128_cfb1 | ||
| 1720 | _libre_EVP_camellia_128_cfb8 | ||
| 1721 | _libre_EVP_camellia_128_cfb128 | ||
| 1722 | _libre_EVP_camellia_128_ofb | ||
| 1723 | _libre_EVP_camellia_192_ecb | ||
| 1724 | _libre_EVP_camellia_192_cbc | ||
| 1725 | _libre_EVP_camellia_192_cfb1 | ||
| 1726 | _libre_EVP_camellia_192_cfb8 | ||
| 1727 | _libre_EVP_camellia_192_cfb128 | ||
| 1728 | _libre_EVP_camellia_192_ofb | ||
| 1729 | _libre_EVP_camellia_256_ecb | ||
| 1730 | _libre_EVP_camellia_256_cbc | ||
| 1731 | _libre_EVP_camellia_256_cfb1 | ||
| 1732 | _libre_EVP_camellia_256_cfb8 | ||
| 1733 | _libre_EVP_camellia_256_cfb128 | ||
| 1734 | _libre_EVP_camellia_256_ofb | ||
| 1735 | _libre_EVP_chacha20 | ||
| 1736 | _libre_EVP_gost2814789_ecb | ||
| 1737 | _libre_EVP_gost2814789_cfb64 | ||
| 1738 | _libre_EVP_gost2814789_cnt | ||
| 1739 | _libre_EVP_sm4_ecb | ||
| 1740 | _libre_EVP_sm4_cbc | ||
| 1741 | _libre_EVP_sm4_cfb128 | ||
| 1742 | _libre_EVP_sm4_ofb | ||
| 1743 | _libre_EVP_sm4_ctr | ||
| 1744 | _libre_OPENSSL_add_all_algorithms_noconf | ||
| 1745 | _libre_OPENSSL_add_all_algorithms_conf | ||
| 1746 | _libre_OpenSSL_add_all_ciphers | ||
| 1747 | _libre_OpenSSL_add_all_digests | ||
| 1748 | _libre_EVP_add_cipher | ||
| 1749 | _libre_EVP_add_digest | ||
| 1750 | _libre_EVP_get_cipherbyname | ||
| 1751 | _libre_EVP_get_digestbyname | ||
| 1752 | _libre_EVP_cleanup | ||
| 1753 | _libre_EVP_CIPHER_do_all | ||
| 1754 | _libre_EVP_CIPHER_do_all_sorted | ||
| 1755 | _libre_EVP_MD_do_all | ||
| 1756 | _libre_EVP_MD_do_all_sorted | ||
| 1757 | _libre_EVP_PKEY_decrypt_old | ||
| 1758 | _libre_EVP_PKEY_encrypt_old | ||
| 1759 | _libre_EVP_PKEY_type | ||
| 1760 | _libre_EVP_PKEY_id | ||
| 1761 | _libre_EVP_PKEY_base_id | ||
| 1762 | _libre_EVP_PKEY_bits | ||
| 1763 | _libre_EVP_PKEY_security_bits | ||
| 1764 | _libre_EVP_PKEY_size | ||
| 1765 | _libre_EVP_PKEY_set_type | ||
| 1766 | _libre_EVP_PKEY_set_type_str | ||
| 1767 | _libre_EVP_PKEY_assign | ||
| 1768 | _libre_EVP_PKEY_get0 | ||
| 1769 | _libre_EVP_PKEY_get0_hmac | ||
| 1770 | _libre_EVP_PKEY_get0_RSA | ||
| 1771 | _libre_EVP_PKEY_get1_RSA | ||
| 1772 | _libre_EVP_PKEY_set1_RSA | ||
| 1773 | _libre_EVP_PKEY_get0_DSA | ||
| 1774 | _libre_EVP_PKEY_get1_DSA | ||
| 1775 | _libre_EVP_PKEY_set1_DSA | ||
| 1776 | _libre_EVP_PKEY_get0_DH | ||
| 1777 | _libre_EVP_PKEY_get1_DH | ||
| 1778 | _libre_EVP_PKEY_set1_DH | ||
| 1779 | _libre_EVP_PKEY_get0_EC_KEY | ||
| 1780 | _libre_EVP_PKEY_get1_EC_KEY | ||
| 1781 | _libre_EVP_PKEY_set1_EC_KEY | ||
| 1782 | _libre_EVP_PKEY_new | ||
| 1783 | _libre_EVP_PKEY_free | ||
| 1784 | _libre_EVP_PKEY_up_ref | ||
| 1785 | _libre_d2i_PublicKey | ||
| 1786 | _libre_i2d_PublicKey | ||
| 1787 | _libre_d2i_PrivateKey | ||
| 1788 | _libre_d2i_AutoPrivateKey | ||
| 1789 | _libre_i2d_PrivateKey | ||
| 1790 | _libre_EVP_PKEY_copy_parameters | ||
| 1791 | _libre_EVP_PKEY_missing_parameters | ||
| 1792 | _libre_EVP_PKEY_save_parameters | ||
| 1793 | _libre_EVP_PKEY_cmp_parameters | ||
| 1794 | _libre_EVP_PKEY_cmp | ||
| 1795 | _libre_EVP_PKEY_print_public | ||
| 1796 | _libre_EVP_PKEY_print_private | ||
| 1797 | _libre_EVP_PKEY_print_params | ||
| 1798 | _libre_EVP_PKEY_get_default_digest_nid | ||
| 1799 | _libre_EVP_CIPHER_type | ||
| 1800 | _libre_EVP_CIPHER_param_to_asn1 | ||
| 1801 | _libre_EVP_CIPHER_asn1_to_param | ||
| 1802 | _libre_EVP_CIPHER_set_asn1_iv | ||
| 1803 | _libre_EVP_CIPHER_get_asn1_iv | ||
| 1804 | _libre_PKCS5_PBE_keyivgen | ||
| 1805 | _libre_PKCS5_PBKDF2_HMAC_SHA1 | ||
| 1806 | _libre_PKCS5_PBKDF2_HMAC | ||
| 1807 | _libre_PKCS5_v2_PBE_keyivgen | ||
| 1808 | _libre_PKCS5_PBE_add | ||
| 1809 | _libre_EVP_PBE_CipherInit | ||
| 1810 | _libre_EVP_PBE_alg_add_type | ||
| 1811 | _libre_EVP_PBE_alg_add | ||
| 1812 | _libre_EVP_PBE_find | ||
| 1813 | _libre_EVP_PBE_cleanup | ||
| 1814 | _libre_EVP_PKEY_asn1_get_count | ||
| 1815 | _libre_EVP_PKEY_asn1_get0 | ||
| 1816 | _libre_EVP_PKEY_asn1_find | ||
| 1817 | _libre_EVP_PKEY_asn1_find_str | ||
| 1818 | _libre_EVP_PKEY_asn1_add0 | ||
| 1819 | _libre_EVP_PKEY_asn1_add_alias | ||
| 1820 | _libre_EVP_PKEY_asn1_get0_info | ||
| 1821 | _libre_EVP_PKEY_get0_asn1 | ||
| 1822 | _libre_EVP_PKEY_asn1_new | ||
| 1823 | _libre_EVP_PKEY_asn1_copy | ||
| 1824 | _libre_EVP_PKEY_asn1_free | ||
| 1825 | _libre_EVP_PKEY_asn1_set_public | ||
| 1826 | _libre_EVP_PKEY_asn1_set_private | ||
| 1827 | _libre_EVP_PKEY_asn1_set_param | ||
| 1828 | _libre_EVP_PKEY_asn1_set_free | ||
| 1829 | _libre_EVP_PKEY_asn1_set_ctrl | ||
| 1830 | _libre_EVP_PKEY_asn1_set_security_bits | ||
| 1831 | _libre_EVP_PKEY_asn1_set_check | ||
| 1832 | _libre_EVP_PKEY_asn1_set_public_check | ||
| 1833 | _libre_EVP_PKEY_asn1_set_param_check | ||
| 1834 | _libre_EVP_PKEY_meth_find | ||
| 1835 | _libre_EVP_PKEY_meth_new | ||
| 1836 | _libre_EVP_PKEY_meth_get0_info | ||
| 1837 | _libre_EVP_PKEY_meth_copy | ||
| 1838 | _libre_EVP_PKEY_meth_free | ||
| 1839 | _libre_EVP_PKEY_meth_add0 | ||
| 1840 | _libre_EVP_PKEY_CTX_new | ||
| 1841 | _libre_EVP_PKEY_CTX_new_id | ||
| 1842 | _libre_EVP_PKEY_CTX_dup | ||
| 1843 | _libre_EVP_PKEY_CTX_free | ||
| 1844 | _libre_EVP_PKEY_CTX_ctrl | ||
| 1845 | _libre_EVP_PKEY_CTX_ctrl_str | ||
| 1846 | _libre_EVP_PKEY_CTX_get_operation | ||
| 1847 | _libre_EVP_PKEY_CTX_set0_keygen_info | ||
| 1848 | _libre_EVP_PKEY_new_mac_key | ||
| 1849 | _libre_EVP_PKEY_new_CMAC_key | ||
| 1850 | _libre_EVP_PKEY_CTX_set_data | ||
| 1851 | _libre_EVP_PKEY_CTX_get_data | ||
| 1852 | _libre_EVP_PKEY_CTX_get0_pkey | ||
| 1853 | _libre_EVP_PKEY_CTX_get0_peerkey | ||
| 1854 | _libre_EVP_PKEY_CTX_set_app_data | ||
| 1855 | _libre_EVP_PKEY_CTX_get_app_data | ||
| 1856 | _libre_EVP_PKEY_sign_init | ||
| 1857 | _libre_EVP_PKEY_sign | ||
| 1858 | _libre_EVP_PKEY_verify_init | ||
| 1859 | _libre_EVP_PKEY_verify | ||
| 1860 | _libre_EVP_PKEY_verify_recover_init | ||
| 1861 | _libre_EVP_PKEY_verify_recover | ||
| 1862 | _libre_EVP_PKEY_encrypt_init | ||
| 1863 | _libre_EVP_PKEY_encrypt | ||
| 1864 | _libre_EVP_PKEY_decrypt_init | ||
| 1865 | _libre_EVP_PKEY_decrypt | ||
| 1866 | _libre_EVP_PKEY_derive_init | ||
| 1867 | _libre_EVP_PKEY_derive_set_peer | ||
| 1868 | _libre_EVP_PKEY_derive | ||
| 1869 | _libre_EVP_PKEY_paramgen_init | ||
| 1870 | _libre_EVP_PKEY_paramgen | ||
| 1871 | _libre_EVP_PKEY_keygen_init | ||
| 1872 | _libre_EVP_PKEY_keygen | ||
| 1873 | _libre_EVP_PKEY_check | ||
| 1874 | _libre_EVP_PKEY_public_check | ||
| 1875 | _libre_EVP_PKEY_param_check | ||
| 1876 | _libre_EVP_PKEY_CTX_set_cb | ||
| 1877 | _libre_EVP_PKEY_CTX_get_cb | ||
| 1878 | _libre_EVP_PKEY_CTX_get_keygen_info | ||
| 1879 | _libre_EVP_PKEY_meth_set_init | ||
| 1880 | _libre_EVP_PKEY_meth_set_copy | ||
| 1881 | _libre_EVP_PKEY_meth_set_cleanup | ||
| 1882 | _libre_EVP_PKEY_meth_set_paramgen | ||
| 1883 | _libre_EVP_PKEY_meth_set_keygen | ||
| 1884 | _libre_EVP_PKEY_meth_set_sign | ||
| 1885 | _libre_EVP_PKEY_meth_set_verify | ||
| 1886 | _libre_EVP_PKEY_meth_set_verify_recover | ||
| 1887 | _libre_EVP_PKEY_meth_set_signctx | ||
| 1888 | _libre_EVP_PKEY_meth_set_verifyctx | ||
| 1889 | _libre_EVP_PKEY_meth_set_encrypt | ||
| 1890 | _libre_EVP_PKEY_meth_set_decrypt | ||
| 1891 | _libre_EVP_PKEY_meth_set_derive | ||
| 1892 | _libre_EVP_PKEY_meth_set_ctrl | ||
| 1893 | _libre_EVP_PKEY_meth_set_check | ||
| 1894 | _libre_EVP_PKEY_meth_set_public_check | ||
| 1895 | _libre_EVP_PKEY_meth_set_param_check | ||
| 1896 | _libre_EVP_aead_aes_128_gcm | ||
| 1897 | _libre_EVP_aead_aes_256_gcm | ||
| 1898 | _libre_EVP_aead_chacha20_poly1305 | ||
| 1899 | _libre_EVP_aead_xchacha20_poly1305 | ||
| 1900 | _libre_EVP_AEAD_key_length | ||
| 1901 | _libre_EVP_AEAD_nonce_length | ||
| 1902 | _libre_EVP_AEAD_max_overhead | ||
| 1903 | _libre_EVP_AEAD_max_tag_len | ||
| 1904 | _libre_EVP_AEAD_CTX_new | ||
| 1905 | _libre_EVP_AEAD_CTX_free | ||
| 1906 | _libre_EVP_AEAD_CTX_init | ||
| 1907 | _libre_EVP_AEAD_CTX_cleanup | ||
| 1908 | _libre_EVP_AEAD_CTX_seal | ||
| 1909 | _libre_EVP_AEAD_CTX_open | ||
| 1910 | _libre_ERR_load_EVP_strings | ||
| 1911 | _libre_ERR_put_error | ||
| 1912 | _libre_ERR_set_error_data | ||
| 1913 | _libre_ERR_get_error | ||
| 1914 | _libre_ERR_get_error_line | ||
| 1915 | _libre_ERR_get_error_line_data | ||
| 1916 | _libre_ERR_peek_error | ||
| 1917 | _libre_ERR_peek_error_line | ||
| 1918 | _libre_ERR_peek_error_line_data | ||
| 1919 | _libre_ERR_peek_last_error | ||
| 1920 | _libre_ERR_peek_last_error_line | ||
| 1921 | _libre_ERR_peek_last_error_line_data | ||
| 1922 | _libre_ERR_clear_error | ||
| 1923 | _libre_ERR_error_string | ||
| 1924 | _libre_ERR_error_string_n | ||
| 1925 | _libre_ERR_lib_error_string | ||
| 1926 | _libre_ERR_func_error_string | ||
| 1927 | _libre_ERR_reason_error_string | ||
| 1928 | _libre_ERR_print_errors_cb | ||
| 1929 | _libre_ERR_print_errors_fp | ||
| 1930 | _libre_ERR_print_errors | ||
| 1931 | _libre_ERR_asprintf_error_data | ||
| 1932 | _libre_ERR_add_error_data | ||
| 1933 | _libre_ERR_add_error_vdata | ||
| 1934 | _libre_ERR_load_strings | ||
| 1935 | _libre_ERR_unload_strings | ||
| 1936 | _libre_ERR_load_ERR_strings | ||
| 1937 | _libre_ERR_load_crypto_strings | ||
| 1938 | _libre_ERR_free_strings | ||
| 1939 | _libre_ERR_remove_thread_state | ||
| 1940 | _libre_ERR_remove_state | ||
| 1941 | _libre_ERR_get_state | ||
| 1942 | _libre_ERR_get_string_table | ||
| 1943 | _libre_ERR_get_err_state_table | ||
| 1944 | _libre_ERR_release_err_state_table | ||
| 1945 | _libre_ERR_get_next_error_library | ||
| 1946 | _libre_ERR_set_mark | ||
| 1947 | _libre_ERR_pop_to_mark | ||
| 1948 | _libre_ERR_get_implementation | ||
| 1949 | _libre_ERR_set_implementation | ||
| 1950 | _libre_ECDSA_SIG_new | ||
| 1951 | _libre_ECDSA_SIG_free | ||
| 1952 | _libre_i2d_ECDSA_SIG | ||
| 1953 | _libre_d2i_ECDSA_SIG | ||
| 1954 | _libre_ECDSA_SIG_get0 | ||
| 1955 | _libre_ECDSA_SIG_get0_r | ||
| 1956 | _libre_ECDSA_SIG_get0_s | ||
| 1957 | _libre_ECDSA_SIG_set0 | ||
| 1958 | _libre_ECDSA_do_sign | ||
| 1959 | _libre_ECDSA_do_sign_ex | ||
| 1960 | _libre_ECDSA_do_verify | ||
| 1961 | _libre_ECDSA_OpenSSL | ||
| 1962 | _libre_ECDSA_set_default_method | ||
| 1963 | _libre_ECDSA_get_default_method | ||
| 1964 | _libre_ECDSA_set_method | ||
| 1965 | _libre_ECDSA_size | ||
| 1966 | _libre_ECDSA_sign_setup | ||
| 1967 | _libre_ECDSA_sign | ||
| 1968 | _libre_ECDSA_sign_ex | ||
| 1969 | _libre_ECDSA_verify | ||
| 1970 | _libre_ECDSA_get_ex_new_index | ||
| 1971 | _libre_ECDSA_set_ex_data | ||
| 1972 | _libre_ECDSA_get_ex_data | ||
| 1973 | _libre_EC_KEY_METHOD_set_sign | ||
| 1974 | _libre_EC_KEY_METHOD_set_verify | ||
| 1975 | _libre_EC_KEY_METHOD_get_sign | ||
| 1976 | _libre_EC_KEY_METHOD_get_verify | ||
| 1977 | _libre_ERR_load_ECDSA_strings | ||
| 1978 | _libre_ECDH_OpenSSL | 1650 | _libre_ECDH_OpenSSL |
| 1979 | _libre_ECDH_set_default_method | 1651 | _libre_ECDH_set_default_method |
| 1980 | _libre_ECDH_get_default_method | 1652 | _libre_ECDH_get_default_method |
| @@ -1985,139 +1657,6 @@ _libre_ECDH_get_ex_new_index | |||
| 1985 | _libre_ECDH_set_ex_data | 1657 | _libre_ECDH_set_ex_data |
| 1986 | _libre_ECDH_get_ex_data | 1658 | _libre_ECDH_get_ex_data |
| 1987 | _libre_ERR_load_ECDH_strings | 1659 | _libre_ERR_load_ECDH_strings |
| 1988 | _libre_EC_GFp_simple_method | ||
| 1989 | _libre_EC_GFp_mont_method | ||
| 1990 | _libre_EC_GROUP_new | ||
| 1991 | _libre_EC_GROUP_free | ||
| 1992 | _libre_EC_GROUP_clear_free | ||
| 1993 | _libre_EC_GROUP_copy | ||
| 1994 | _libre_EC_GROUP_dup | ||
| 1995 | _libre_EC_GROUP_method_of | ||
| 1996 | _libre_EC_METHOD_get_field_type | ||
| 1997 | _libre_EC_GROUP_set_generator | ||
| 1998 | _libre_EC_GROUP_get0_generator | ||
| 1999 | _libre_EC_GROUP_get_order | ||
| 2000 | _libre_EC_GROUP_order_bits | ||
| 2001 | _libre_EC_GROUP_get_cofactor | ||
| 2002 | _libre_EC_GROUP_set_curve_name | ||
| 2003 | _libre_EC_GROUP_get_curve_name | ||
| 2004 | _libre_EC_GROUP_set_asn1_flag | ||
| 2005 | _libre_EC_GROUP_get_asn1_flag | ||
| 2006 | _libre_EC_GROUP_set_point_conversion_form | ||
| 2007 | _libre_EC_GROUP_get_point_conversion_form | ||
| 2008 | _libre_EC_GROUP_get0_seed | ||
| 2009 | _libre_EC_GROUP_get_seed_len | ||
| 2010 | _libre_EC_GROUP_set_seed | ||
| 2011 | _libre_EC_GROUP_set_curve | ||
| 2012 | _libre_EC_GROUP_get_curve | ||
| 2013 | _libre_EC_GROUP_set_curve_GFp | ||
| 2014 | _libre_EC_GROUP_get_curve_GFp | ||
| 2015 | _libre_EC_GROUP_get_degree | ||
| 2016 | _libre_EC_GROUP_check | ||
| 2017 | _libre_EC_GROUP_check_discriminant | ||
| 2018 | _libre_EC_GROUP_cmp | ||
| 2019 | _libre_EC_GROUP_new_curve_GFp | ||
| 2020 | _libre_EC_GROUP_new_by_curve_name | ||
| 2021 | _libre_EC_get_builtin_curves | ||
| 2022 | _libre_EC_curve_nid2nist | ||
| 2023 | _libre_EC_curve_nist2nid | ||
| 2024 | _libre_EC_POINT_new | ||
| 2025 | _libre_EC_POINT_free | ||
| 2026 | _libre_EC_POINT_clear_free | ||
| 2027 | _libre_EC_POINT_copy | ||
| 2028 | _libre_EC_POINT_dup | ||
| 2029 | _libre_EC_POINT_method_of | ||
| 2030 | _libre_EC_POINT_set_to_infinity | ||
| 2031 | _libre_EC_POINT_set_affine_coordinates | ||
| 2032 | _libre_EC_POINT_get_affine_coordinates | ||
| 2033 | _libre_EC_POINT_set_compressed_coordinates | ||
| 2034 | _libre_EC_POINT_set_Jprojective_coordinates_GFp | ||
| 2035 | _libre_EC_POINT_get_Jprojective_coordinates_GFp | ||
| 2036 | _libre_EC_POINT_set_affine_coordinates_GFp | ||
| 2037 | _libre_EC_POINT_get_affine_coordinates_GFp | ||
| 2038 | _libre_EC_POINT_set_compressed_coordinates_GFp | ||
| 2039 | _libre_EC_POINT_point2oct | ||
| 2040 | _libre_EC_POINT_oct2point | ||
| 2041 | _libre_EC_POINT_point2bn | ||
| 2042 | _libre_EC_POINT_bn2point | ||
| 2043 | _libre_EC_POINT_point2hex | ||
| 2044 | _libre_EC_POINT_hex2point | ||
| 2045 | _libre_EC_POINT_add | ||
| 2046 | _libre_EC_POINT_dbl | ||
| 2047 | _libre_EC_POINT_invert | ||
| 2048 | _libre_EC_POINT_is_at_infinity | ||
| 2049 | _libre_EC_POINT_is_on_curve | ||
| 2050 | _libre_EC_POINT_cmp | ||
| 2051 | _libre_EC_POINT_make_affine | ||
| 2052 | _libre_EC_POINTs_make_affine | ||
| 2053 | _libre_EC_POINTs_mul | ||
| 2054 | _libre_EC_POINT_mul | ||
| 2055 | _libre_EC_GROUP_precompute_mult | ||
| 2056 | _libre_EC_GROUP_have_precompute_mult | ||
| 2057 | _libre_EC_GROUP_get_basis_type | ||
| 2058 | _libre_d2i_ECPKParameters | ||
| 2059 | _libre_i2d_ECPKParameters | ||
| 2060 | _libre_ECPKParameters_print | ||
| 2061 | _libre_ECPKParameters_print_fp | ||
| 2062 | _libre_EC_KEY_new | ||
| 2063 | _libre_EC_KEY_get_flags | ||
| 2064 | _libre_EC_KEY_set_flags | ||
| 2065 | _libre_EC_KEY_clear_flags | ||
| 2066 | _libre_EC_KEY_new_by_curve_name | ||
| 2067 | _libre_EC_KEY_free | ||
| 2068 | _libre_EC_KEY_copy | ||
| 2069 | _libre_EC_KEY_dup | ||
| 2070 | _libre_EC_KEY_up_ref | ||
| 2071 | _libre_EC_KEY_get0_group | ||
| 2072 | _libre_EC_KEY_set_group | ||
| 2073 | _libre_EC_KEY_get0_private_key | ||
| 2074 | _libre_EC_KEY_set_private_key | ||
| 2075 | _libre_EC_KEY_get0_public_key | ||
| 2076 | _libre_EC_KEY_set_public_key | ||
| 2077 | _libre_EC_KEY_get_enc_flags | ||
| 2078 | _libre_EC_KEY_set_enc_flags | ||
| 2079 | _libre_EC_KEY_get_conv_form | ||
| 2080 | _libre_EC_KEY_set_conv_form | ||
| 2081 | _libre_EC_KEY_set_asn1_flag | ||
| 2082 | _libre_EC_KEY_precompute_mult | ||
| 2083 | _libre_EC_KEY_generate_key | ||
| 2084 | _libre_EC_KEY_check_key | ||
| 2085 | _libre_EC_KEY_set_public_key_affine_coordinates | ||
| 2086 | _libre_d2i_ECPrivateKey | ||
| 2087 | _libre_i2d_ECPrivateKey | ||
| 2088 | _libre_d2i_ECParameters | ||
| 2089 | _libre_i2d_ECParameters | ||
| 2090 | _libre_o2i_ECPublicKey | ||
| 2091 | _libre_i2o_ECPublicKey | ||
| 2092 | _libre_ECParameters_print | ||
| 2093 | _libre_EC_KEY_print | ||
| 2094 | _libre_ECParameters_print_fp | ||
| 2095 | _libre_EC_KEY_print_fp | ||
| 2096 | _libre_EC_KEY_set_ex_data | ||
| 2097 | _libre_EC_KEY_get_ex_data | ||
| 2098 | _libre_EC_KEY_OpenSSL | ||
| 2099 | _libre_EC_KEY_get_default_method | ||
| 2100 | _libre_EC_KEY_set_default_method | ||
| 2101 | _libre_EC_KEY_get_method | ||
| 2102 | _libre_EC_KEY_set_method | ||
| 2103 | _libre_EC_KEY_new_method | ||
| 2104 | _libre_EC_KEY_METHOD_new | ||
| 2105 | _libre_EC_KEY_METHOD_free | ||
| 2106 | _libre_EC_KEY_METHOD_set_init | ||
| 2107 | _libre_EC_KEY_METHOD_set_keygen | ||
| 2108 | _libre_EC_KEY_METHOD_set_compute_key | ||
| 2109 | _libre_EC_KEY_METHOD_get_init | ||
| 2110 | _libre_EC_KEY_METHOD_get_keygen | ||
| 2111 | _libre_EC_KEY_METHOD_get_compute_key | ||
| 2112 | _libre_ECParameters_dup | ||
| 2113 | _libre_ERR_load_EC_strings | ||
| 2114 | _libre_RC2_set_key | ||
| 2115 | _libre_RC2_ecb_encrypt | ||
| 2116 | _libre_RC2_encrypt | ||
| 2117 | _libre_RC2_decrypt | ||
| 2118 | _libre_RC2_cbc_encrypt | ||
| 2119 | _libre_RC2_cfb64_encrypt | ||
| 2120 | _libre_RC2_ofb64_encrypt | ||
| 2121 | _libre_PEM_get_EVP_CIPHER_INFO | 1660 | _libre_PEM_get_EVP_CIPHER_INFO |
| 2122 | _libre_PEM_do_header | 1661 | _libre_PEM_do_header |
| 2123 | _libre_PEM_read_bio | 1662 | _libre_PEM_read_bio |
diff --git a/src/lib/libcrypto/asn1/a_pkey.c b/src/lib/libcrypto/asn1/a_pkey.c index 595b226051..6e715d4f9e 100644 --- a/src/lib/libcrypto/asn1/a_pkey.c +++ b/src/lib/libcrypto/asn1/a_pkey.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: a_pkey.c,v 1.5 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: a_pkey.c,v 1.6 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -123,7 +123,6 @@ d2i_PrivateKey(int type, EVP_PKEY **a, const unsigned char **pp, long length) | |||
| 123 | EVP_PKEY_free(ret); | 123 | EVP_PKEY_free(ret); |
| 124 | return (NULL); | 124 | return (NULL); |
| 125 | } | 125 | } |
| 126 | LCRYPTO_ALIAS(d2i_PrivateKey); | ||
| 127 | 126 | ||
| 128 | int | 127 | int |
| 129 | i2d_PrivateKey(EVP_PKEY *a, unsigned char **pp) | 128 | i2d_PrivateKey(EVP_PKEY *a, unsigned char **pp) |
| @@ -140,7 +139,6 @@ i2d_PrivateKey(EVP_PKEY *a, unsigned char **pp) | |||
| 140 | ASN1error(ASN1_R_UNSUPPORTED_PUBLIC_KEY_TYPE); | 139 | ASN1error(ASN1_R_UNSUPPORTED_PUBLIC_KEY_TYPE); |
| 141 | return (-1); | 140 | return (-1); |
| 142 | } | 141 | } |
| 143 | LCRYPTO_ALIAS(i2d_PrivateKey); | ||
| 144 | 142 | ||
| 145 | /* This works like d2i_PrivateKey() except it automatically works out the type */ | 143 | /* This works like d2i_PrivateKey() except it automatically works out the type */ |
| 146 | 144 | ||
| @@ -186,4 +184,3 @@ d2i_AutoPrivateKey(EVP_PKEY **a, const unsigned char **pp, long length) | |||
| 186 | sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); | 184 | sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); |
| 187 | return d2i_PrivateKey(keytype, a, pp, length); | 185 | return d2i_PrivateKey(keytype, a, pp, length); |
| 188 | } | 186 | } |
| 189 | LCRYPTO_ALIAS(d2i_AutoPrivateKey); | ||
diff --git a/src/lib/libcrypto/asn1/a_pubkey.c b/src/lib/libcrypto/asn1/a_pubkey.c index 09a739fde8..5e022d34ec 100644 --- a/src/lib/libcrypto/asn1/a_pubkey.c +++ b/src/lib/libcrypto/asn1/a_pubkey.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: a_pubkey.c,v 1.5 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: a_pubkey.c,v 1.6 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -136,7 +136,6 @@ d2i_PublicKey(int type, EVP_PKEY **a, const unsigned char **pp, long length) | |||
| 136 | EVP_PKEY_free(ret); | 136 | EVP_PKEY_free(ret); |
| 137 | return (NULL); | 137 | return (NULL); |
| 138 | } | 138 | } |
| 139 | LCRYPTO_ALIAS(d2i_PublicKey); | ||
| 140 | 139 | ||
| 141 | int | 140 | int |
| 142 | i2d_PublicKey(EVP_PKEY *a, unsigned char **pp) | 141 | i2d_PublicKey(EVP_PKEY *a, unsigned char **pp) |
| @@ -159,4 +158,3 @@ i2d_PublicKey(EVP_PKEY *a, unsigned char **pp) | |||
| 159 | return (-1); | 158 | return (-1); |
| 160 | } | 159 | } |
| 161 | } | 160 | } |
| 162 | LCRYPTO_ALIAS(i2d_PublicKey); | ||
diff --git a/src/lib/libcrypto/asn1/a_strex.c b/src/lib/libcrypto/asn1/a_strex.c index c40a13d013..17213cbd3a 100644 --- a/src/lib/libcrypto/asn1/a_strex.c +++ b/src/lib/libcrypto/asn1/a_strex.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: a_strex.c,v 1.33 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: a_strex.c,v 1.34 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 2000. | 3 | * project 2000. |
| 4 | */ | 4 | */ |
| @@ -570,7 +570,6 @@ X509_NAME_print_ex(BIO *out, const X509_NAME *nm, int indent, | |||
| 570 | return X509_NAME_print(out, nm, indent); | 570 | return X509_NAME_print(out, nm, indent); |
| 571 | return do_name_ex(send_bio_chars, out, nm, indent, flags); | 571 | return do_name_ex(send_bio_chars, out, nm, indent, flags); |
| 572 | } | 572 | } |
| 573 | LCRYPTO_ALIAS(X509_NAME_print_ex); | ||
| 574 | 573 | ||
| 575 | int | 574 | int |
| 576 | X509_NAME_print_ex_fp(FILE *fp, const X509_NAME *nm, int indent, | 575 | X509_NAME_print_ex_fp(FILE *fp, const X509_NAME *nm, int indent, |
| @@ -588,7 +587,6 @@ X509_NAME_print_ex_fp(FILE *fp, const X509_NAME *nm, int indent, | |||
| 588 | } | 587 | } |
| 589 | return do_name_ex(send_fp_chars, fp, nm, indent, flags); | 588 | return do_name_ex(send_fp_chars, fp, nm, indent, flags); |
| 590 | } | 589 | } |
| 591 | LCRYPTO_ALIAS(X509_NAME_print_ex_fp); | ||
| 592 | 590 | ||
| 593 | int | 591 | int |
| 594 | ASN1_STRING_print_ex(BIO *out, const ASN1_STRING *str, unsigned long flags) | 592 | ASN1_STRING_print_ex(BIO *out, const ASN1_STRING *str, unsigned long flags) |
diff --git a/src/lib/libcrypto/asn1/a_time_tm.c b/src/lib/libcrypto/asn1/a_time_tm.c index c269d770b4..9cdac73ff0 100644 --- a/src/lib/libcrypto/asn1/a_time_tm.c +++ b/src/lib/libcrypto/asn1/a_time_tm.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: a_time_tm.c,v 1.28 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: a_time_tm.c,v 1.29 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2015 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2015 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
| @@ -77,7 +77,6 @@ ASN1_time_tm_clamp_notafter(struct tm *tm) | |||
| 77 | #endif | 77 | #endif |
| 78 | return 1; | 78 | return 1; |
| 79 | } | 79 | } |
| 80 | LCRYPTO_ALIAS(ASN1_time_tm_clamp_notafter); | ||
| 81 | 80 | ||
| 82 | /* Convert time to GeneralizedTime, X.690, 11.7. */ | 81 | /* Convert time to GeneralizedTime, X.690, 11.7. */ |
| 83 | ASN1_TIME * | 82 | ASN1_TIME * |
| @@ -567,7 +566,6 @@ ASN1_UTCTIME_cmp_time_t(const ASN1_UTCTIME *s, time_t t) | |||
| 567 | return ASN1_TIME_cmp_time_t_internal(s, t, V_ASN1_UTCTIME); | 566 | return ASN1_TIME_cmp_time_t_internal(s, t, V_ASN1_UTCTIME); |
| 568 | return -2; | 567 | return -2; |
| 569 | } | 568 | } |
| 570 | LCRYPTO_ALIAS(ASN1_UTCTIME_cmp_time_t); | ||
| 571 | 569 | ||
| 572 | /* | 570 | /* |
| 573 | * ASN1_GENERALIZEDTIME wrappers | 571 | * ASN1_GENERALIZEDTIME wrappers |
diff --git a/src/lib/libcrypto/asn1/ameth_lib.c b/src/lib/libcrypto/asn1/ameth_lib.c index 5a1dfd7ce3..153ad21a81 100644 --- a/src/lib/libcrypto/asn1/ameth_lib.c +++ b/src/lib/libcrypto/asn1/ameth_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ameth_lib.c,v 1.31 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: ameth_lib.c,v 1.32 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 2006. | 3 | * project 2006. |
| 4 | */ | 4 | */ |
| @@ -120,7 +120,6 @@ EVP_PKEY_asn1_get_count(void) | |||
| 120 | 120 | ||
| 121 | return num; | 121 | return num; |
| 122 | } | 122 | } |
| 123 | LCRYPTO_ALIAS(EVP_PKEY_asn1_get_count); | ||
| 124 | 123 | ||
| 125 | const EVP_PKEY_ASN1_METHOD * | 124 | const EVP_PKEY_ASN1_METHOD * |
| 126 | EVP_PKEY_asn1_get0(int idx) | 125 | EVP_PKEY_asn1_get0(int idx) |
| @@ -136,7 +135,6 @@ EVP_PKEY_asn1_get0(int idx) | |||
| 136 | 135 | ||
| 137 | return sk_EVP_PKEY_ASN1_METHOD_value(asn1_app_methods, idx); | 136 | return sk_EVP_PKEY_ASN1_METHOD_value(asn1_app_methods, idx); |
| 138 | } | 137 | } |
| 139 | LCRYPTO_ALIAS(EVP_PKEY_asn1_get0); | ||
| 140 | 138 | ||
| 141 | static const EVP_PKEY_ASN1_METHOD * | 139 | static const EVP_PKEY_ASN1_METHOD * |
| 142 | pkey_asn1_find(int pkey_id) | 140 | pkey_asn1_find(int pkey_id) |
| @@ -185,7 +183,6 @@ EVP_PKEY_asn1_find(ENGINE **pe, int type) | |||
| 185 | } | 183 | } |
| 186 | return mp; | 184 | return mp; |
| 187 | } | 185 | } |
| 188 | LCRYPTO_ALIAS(EVP_PKEY_asn1_find); | ||
| 189 | 186 | ||
| 190 | const EVP_PKEY_ASN1_METHOD * | 187 | const EVP_PKEY_ASN1_METHOD * |
| 191 | EVP_PKEY_asn1_find_str(ENGINE **pe, const char *str, int len) | 188 | EVP_PKEY_asn1_find_str(ENGINE **pe, const char *str, int len) |
| @@ -222,7 +219,6 @@ EVP_PKEY_asn1_find_str(ENGINE **pe, const char *str, int len) | |||
| 222 | } | 219 | } |
| 223 | return NULL; | 220 | return NULL; |
| 224 | } | 221 | } |
| 225 | LCRYPTO_ALIAS(EVP_PKEY_asn1_find_str); | ||
| 226 | 222 | ||
| 227 | int | 223 | int |
| 228 | EVP_PKEY_asn1_add0(const EVP_PKEY_ASN1_METHOD *ameth) | 224 | EVP_PKEY_asn1_add0(const EVP_PKEY_ASN1_METHOD *ameth) |
| @@ -238,7 +234,6 @@ EVP_PKEY_asn1_add0(const EVP_PKEY_ASN1_METHOD *ameth) | |||
| 238 | 234 | ||
| 239 | return 1; | 235 | return 1; |
| 240 | } | 236 | } |
| 241 | LCRYPTO_ALIAS(EVP_PKEY_asn1_add0); | ||
| 242 | 237 | ||
| 243 | int | 238 | int |
| 244 | EVP_PKEY_asn1_add_alias(int to, int from) | 239 | EVP_PKEY_asn1_add_alias(int to, int from) |
| @@ -256,7 +251,6 @@ EVP_PKEY_asn1_add_alias(int to, int from) | |||
| 256 | } | 251 | } |
| 257 | return 1; | 252 | return 1; |
| 258 | } | 253 | } |
| 259 | LCRYPTO_ALIAS(EVP_PKEY_asn1_add_alias); | ||
| 260 | 254 | ||
| 261 | int | 255 | int |
| 262 | EVP_PKEY_asn1_get0_info(int *ppkey_id, int *ppkey_base_id, int *ppkey_flags, | 256 | EVP_PKEY_asn1_get0_info(int *ppkey_id, int *ppkey_base_id, int *ppkey_flags, |
| @@ -277,14 +271,12 @@ EVP_PKEY_asn1_get0_info(int *ppkey_id, int *ppkey_base_id, int *ppkey_flags, | |||
| 277 | *ppem_str = ameth->pem_str; | 271 | *ppem_str = ameth->pem_str; |
| 278 | return 1; | 272 | return 1; |
| 279 | } | 273 | } |
| 280 | LCRYPTO_ALIAS(EVP_PKEY_asn1_get0_info); | ||
| 281 | 274 | ||
| 282 | const EVP_PKEY_ASN1_METHOD* | 275 | const EVP_PKEY_ASN1_METHOD* |
| 283 | EVP_PKEY_get0_asn1(const EVP_PKEY *pkey) | 276 | EVP_PKEY_get0_asn1(const EVP_PKEY *pkey) |
| 284 | { | 277 | { |
| 285 | return pkey->ameth; | 278 | return pkey->ameth; |
| 286 | } | 279 | } |
| 287 | LCRYPTO_ALIAS(EVP_PKEY_get0_asn1); | ||
| 288 | 280 | ||
| 289 | EVP_PKEY_ASN1_METHOD* | 281 | EVP_PKEY_ASN1_METHOD* |
| 290 | EVP_PKEY_asn1_new(int id, int flags, const char *pem_str, const char *info) | 282 | EVP_PKEY_asn1_new(int id, int flags, const char *pem_str, const char *info) |
| @@ -314,7 +306,6 @@ EVP_PKEY_asn1_new(int id, int flags, const char *pem_str, const char *info) | |||
| 314 | EVP_PKEY_asn1_free(ameth); | 306 | EVP_PKEY_asn1_free(ameth); |
| 315 | return NULL; | 307 | return NULL; |
| 316 | } | 308 | } |
| 317 | LCRYPTO_ALIAS(EVP_PKEY_asn1_new); | ||
| 318 | 309 | ||
| 319 | void | 310 | void |
| 320 | EVP_PKEY_asn1_copy(EVP_PKEY_ASN1_METHOD *dst, const EVP_PKEY_ASN1_METHOD *src) | 311 | EVP_PKEY_asn1_copy(EVP_PKEY_ASN1_METHOD *dst, const EVP_PKEY_ASN1_METHOD *src) |
| @@ -335,7 +326,6 @@ EVP_PKEY_asn1_copy(EVP_PKEY_ASN1_METHOD *dst, const EVP_PKEY_ASN1_METHOD *src) | |||
| 335 | dst->pem_str = preserve.pem_str; | 326 | dst->pem_str = preserve.pem_str; |
| 336 | dst->info = preserve.info; | 327 | dst->info = preserve.info; |
| 337 | } | 328 | } |
| 338 | LCRYPTO_ALIAS(EVP_PKEY_asn1_copy); | ||
| 339 | 329 | ||
| 340 | void | 330 | void |
| 341 | EVP_PKEY_asn1_free(EVP_PKEY_ASN1_METHOD *ameth) | 331 | EVP_PKEY_asn1_free(EVP_PKEY_ASN1_METHOD *ameth) |
| @@ -346,7 +336,6 @@ EVP_PKEY_asn1_free(EVP_PKEY_ASN1_METHOD *ameth) | |||
| 346 | free(ameth); | 336 | free(ameth); |
| 347 | } | 337 | } |
| 348 | } | 338 | } |
| 349 | LCRYPTO_ALIAS(EVP_PKEY_asn1_free); | ||
| 350 | 339 | ||
| 351 | void | 340 | void |
| 352 | EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, | 341 | EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, |
| @@ -365,7 +354,6 @@ EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, | |||
| 365 | ameth->pkey_size = pkey_size; | 354 | ameth->pkey_size = pkey_size; |
| 366 | ameth->pkey_bits = pkey_bits; | 355 | ameth->pkey_bits = pkey_bits; |
| 367 | } | 356 | } |
| 368 | LCRYPTO_ALIAS(EVP_PKEY_asn1_set_public); | ||
| 369 | 357 | ||
| 370 | void | 358 | void |
| 371 | EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth, | 359 | EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth, |
| @@ -378,7 +366,6 @@ EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth, | |||
| 378 | ameth->priv_encode = priv_encode; | 366 | ameth->priv_encode = priv_encode; |
| 379 | ameth->priv_print = priv_print; | 367 | ameth->priv_print = priv_print; |
| 380 | } | 368 | } |
| 381 | LCRYPTO_ALIAS(EVP_PKEY_asn1_set_private); | ||
| 382 | 369 | ||
| 383 | void | 370 | void |
| 384 | EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth, | 371 | EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth, |
| @@ -397,7 +384,6 @@ EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth, | |||
| 397 | ameth->param_cmp = param_cmp; | 384 | ameth->param_cmp = param_cmp; |
| 398 | ameth->param_print = param_print; | 385 | ameth->param_print = param_print; |
| 399 | } | 386 | } |
| 400 | LCRYPTO_ALIAS(EVP_PKEY_asn1_set_param); | ||
| 401 | 387 | ||
| 402 | void | 388 | void |
| 403 | EVP_PKEY_asn1_set_free(EVP_PKEY_ASN1_METHOD *ameth, | 389 | EVP_PKEY_asn1_set_free(EVP_PKEY_ASN1_METHOD *ameth, |
| @@ -405,7 +391,6 @@ EVP_PKEY_asn1_set_free(EVP_PKEY_ASN1_METHOD *ameth, | |||
| 405 | { | 391 | { |
| 406 | ameth->pkey_free = pkey_free; | 392 | ameth->pkey_free = pkey_free; |
| 407 | } | 393 | } |
| 408 | LCRYPTO_ALIAS(EVP_PKEY_asn1_set_free); | ||
| 409 | 394 | ||
| 410 | void | 395 | void |
| 411 | EVP_PKEY_asn1_set_ctrl(EVP_PKEY_ASN1_METHOD *ameth, | 396 | EVP_PKEY_asn1_set_ctrl(EVP_PKEY_ASN1_METHOD *ameth, |
| @@ -413,7 +398,6 @@ EVP_PKEY_asn1_set_ctrl(EVP_PKEY_ASN1_METHOD *ameth, | |||
| 413 | { | 398 | { |
| 414 | ameth->pkey_ctrl = pkey_ctrl; | 399 | ameth->pkey_ctrl = pkey_ctrl; |
| 415 | } | 400 | } |
| 416 | LCRYPTO_ALIAS(EVP_PKEY_asn1_set_ctrl); | ||
| 417 | 401 | ||
| 418 | void | 402 | void |
| 419 | EVP_PKEY_asn1_set_security_bits(EVP_PKEY_ASN1_METHOD *ameth, | 403 | EVP_PKEY_asn1_set_security_bits(EVP_PKEY_ASN1_METHOD *ameth, |
| @@ -421,7 +405,6 @@ EVP_PKEY_asn1_set_security_bits(EVP_PKEY_ASN1_METHOD *ameth, | |||
| 421 | { | 405 | { |
| 422 | ameth->pkey_security_bits = pkey_security_bits; | 406 | ameth->pkey_security_bits = pkey_security_bits; |
| 423 | } | 407 | } |
| 424 | LCRYPTO_ALIAS(EVP_PKEY_asn1_set_security_bits); | ||
| 425 | 408 | ||
| 426 | void | 409 | void |
| 427 | EVP_PKEY_asn1_set_check(EVP_PKEY_ASN1_METHOD *ameth, | 410 | EVP_PKEY_asn1_set_check(EVP_PKEY_ASN1_METHOD *ameth, |
| @@ -429,7 +412,6 @@ EVP_PKEY_asn1_set_check(EVP_PKEY_ASN1_METHOD *ameth, | |||
| 429 | { | 412 | { |
| 430 | ameth->pkey_check = pkey_check; | 413 | ameth->pkey_check = pkey_check; |
| 431 | } | 414 | } |
| 432 | LCRYPTO_ALIAS(EVP_PKEY_asn1_set_check); | ||
| 433 | 415 | ||
| 434 | void | 416 | void |
| 435 | EVP_PKEY_asn1_set_public_check(EVP_PKEY_ASN1_METHOD *ameth, | 417 | EVP_PKEY_asn1_set_public_check(EVP_PKEY_ASN1_METHOD *ameth, |
| @@ -437,7 +419,6 @@ EVP_PKEY_asn1_set_public_check(EVP_PKEY_ASN1_METHOD *ameth, | |||
| 437 | { | 419 | { |
| 438 | ameth->pkey_public_check = pkey_public_check; | 420 | ameth->pkey_public_check = pkey_public_check; |
| 439 | } | 421 | } |
| 440 | LCRYPTO_ALIAS(EVP_PKEY_asn1_set_public_check); | ||
| 441 | 422 | ||
| 442 | void | 423 | void |
| 443 | EVP_PKEY_asn1_set_param_check(EVP_PKEY_ASN1_METHOD *ameth, | 424 | EVP_PKEY_asn1_set_param_check(EVP_PKEY_ASN1_METHOD *ameth, |
| @@ -445,4 +426,3 @@ EVP_PKEY_asn1_set_param_check(EVP_PKEY_ASN1_METHOD *ameth, | |||
| 445 | { | 426 | { |
| 446 | ameth->pkey_param_check = pkey_param_check; | 427 | ameth->pkey_param_check = pkey_param_check; |
| 447 | } | 428 | } |
| 448 | LCRYPTO_ALIAS(EVP_PKEY_asn1_set_param_check); | ||
diff --git a/src/lib/libcrypto/asn1/asn1_item.c b/src/lib/libcrypto/asn1/asn1_item.c index ba2f015070..4458ceb866 100644 --- a/src/lib/libcrypto/asn1/asn1_item.c +++ b/src/lib/libcrypto/asn1/asn1_item.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: asn1_item.c,v 1.15 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: asn1_item.c,v 1.16 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -138,7 +138,6 @@ ASN1_item_digest(const ASN1_ITEM *it, const EVP_MD *type, void *asn, | |||
| 138 | free(str); | 138 | free(str); |
| 139 | return (1); | 139 | return (1); |
| 140 | } | 140 | } |
| 141 | LCRYPTO_ALIAS(ASN1_item_digest); | ||
| 142 | 141 | ||
| 143 | /* | 142 | /* |
| 144 | * ASN1_ITEM version of ASN1_dup(): follows the same model except there's no | 143 | * ASN1_ITEM version of ASN1_dup(): follows the same model except there's no |
| @@ -230,7 +229,6 @@ ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, | |||
| 230 | } | 229 | } |
| 231 | return ASN1_item_sign_ctx(it, algor1, algor2, signature, asn, &ctx); | 230 | return ASN1_item_sign_ctx(it, algor1, algor2, signature, asn, &ctx); |
| 232 | } | 231 | } |
| 233 | LCRYPTO_ALIAS(ASN1_item_sign); | ||
| 234 | 232 | ||
| 235 | int | 233 | int |
| 236 | ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, | 234 | ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, |
| @@ -340,7 +338,6 @@ ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, | |||
| 340 | 338 | ||
| 341 | return ret; | 339 | return ret; |
| 342 | } | 340 | } |
| 343 | LCRYPTO_ALIAS(ASN1_item_sign_ctx); | ||
| 344 | 341 | ||
| 345 | int | 342 | int |
| 346 | ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, | 343 | ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, |
| @@ -426,7 +423,6 @@ ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, | |||
| 426 | 423 | ||
| 427 | return ret; | 424 | return ret; |
| 428 | } | 425 | } |
| 429 | LCRYPTO_ALIAS(ASN1_item_verify); | ||
| 430 | 426 | ||
| 431 | #define HEADER_SIZE 8 | 427 | #define HEADER_SIZE 8 |
| 432 | #define ASN1_CHUNK_INITIAL_SIZE (16 * 1024) | 428 | #define ASN1_CHUNK_INITIAL_SIZE (16 * 1024) |
diff --git a/src/lib/libcrypto/asn1/asn1_old.c b/src/lib/libcrypto/asn1/asn1_old.c index a1d4aa2573..a9aeeb823e 100644 --- a/src/lib/libcrypto/asn1/asn1_old.c +++ b/src/lib/libcrypto/asn1/asn1_old.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: asn1_old.c,v 1.4 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: asn1_old.c,v 1.5 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -91,7 +91,6 @@ ASN1_dup(i2d_of_void *i2d, d2i_of_void *d2i, void *x) | |||
| 91 | free(b); | 91 | free(b); |
| 92 | return (ret); | 92 | return (ret); |
| 93 | } | 93 | } |
| 94 | LCRYPTO_ALIAS(ASN1_dup); | ||
| 95 | 94 | ||
| 96 | void * | 95 | void * |
| 97 | ASN1_d2i_fp(void *(*xnew)(void), d2i_of_void *d2i, FILE *in, void **x) | 96 | ASN1_d2i_fp(void *(*xnew)(void), d2i_of_void *d2i, FILE *in, void **x) |
diff --git a/src/lib/libcrypto/asn1/p5_pbe.c b/src/lib/libcrypto/asn1/p5_pbe.c index a7fc9aa19f..204e818286 100644 --- a/src/lib/libcrypto/asn1/p5_pbe.c +++ b/src/lib/libcrypto/asn1/p5_pbe.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: p5_pbe.c,v 1.24 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: p5_pbe.c,v 1.25 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 1999. | 3 | * project 1999. |
| 4 | */ | 4 | */ |
| @@ -95,28 +95,24 @@ d2i_PBEPARAM(PBEPARAM **a, const unsigned char **in, long len) | |||
| 95 | return (PBEPARAM *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 95 | return (PBEPARAM *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 96 | &PBEPARAM_it); | 96 | &PBEPARAM_it); |
| 97 | } | 97 | } |
| 98 | LCRYPTO_ALIAS(d2i_PBEPARAM); | ||
| 99 | 98 | ||
| 100 | int | 99 | int |
| 101 | i2d_PBEPARAM(PBEPARAM *a, unsigned char **out) | 100 | i2d_PBEPARAM(PBEPARAM *a, unsigned char **out) |
| 102 | { | 101 | { |
| 103 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PBEPARAM_it); | 102 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PBEPARAM_it); |
| 104 | } | 103 | } |
| 105 | LCRYPTO_ALIAS(i2d_PBEPARAM); | ||
| 106 | 104 | ||
| 107 | PBEPARAM * | 105 | PBEPARAM * |
| 108 | PBEPARAM_new(void) | 106 | PBEPARAM_new(void) |
| 109 | { | 107 | { |
| 110 | return (PBEPARAM *)ASN1_item_new(&PBEPARAM_it); | 108 | return (PBEPARAM *)ASN1_item_new(&PBEPARAM_it); |
| 111 | } | 109 | } |
| 112 | LCRYPTO_ALIAS(PBEPARAM_new); | ||
| 113 | 110 | ||
| 114 | void | 111 | void |
| 115 | PBEPARAM_free(PBEPARAM *a) | 112 | PBEPARAM_free(PBEPARAM *a) |
| 116 | { | 113 | { |
| 117 | ASN1_item_free((ASN1_VALUE *)a, &PBEPARAM_it); | 114 | ASN1_item_free((ASN1_VALUE *)a, &PBEPARAM_it); |
| 118 | } | 115 | } |
| 119 | LCRYPTO_ALIAS(PBEPARAM_free); | ||
| 120 | 116 | ||
| 121 | 117 | ||
| 122 | /* Set an algorithm identifier for a PKCS#5 PBE algorithm */ | 118 | /* Set an algorithm identifier for a PKCS#5 PBE algorithm */ |
| @@ -169,7 +165,6 @@ PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, | |||
| 169 | ASN1_STRING_free(pbe_str); | 165 | ASN1_STRING_free(pbe_str); |
| 170 | return 0; | 166 | return 0; |
| 171 | } | 167 | } |
| 172 | LCRYPTO_ALIAS(PKCS5_pbe_set0_algor); | ||
| 173 | 168 | ||
| 174 | /* Return an algorithm identifier for a PKCS#5 PBE algorithm */ | 169 | /* Return an algorithm identifier for a PKCS#5 PBE algorithm */ |
| 175 | 170 | ||
| @@ -189,4 +184,3 @@ PKCS5_pbe_set(int alg, int iter, const unsigned char *salt, int saltlen) | |||
| 189 | X509_ALGOR_free(ret); | 184 | X509_ALGOR_free(ret); |
| 190 | return NULL; | 185 | return NULL; |
| 191 | } | 186 | } |
| 192 | LCRYPTO_ALIAS(PKCS5_pbe_set); | ||
diff --git a/src/lib/libcrypto/asn1/p5_pbev2.c b/src/lib/libcrypto/asn1/p5_pbev2.c index 0fab422da9..8b6d1929b3 100644 --- a/src/lib/libcrypto/asn1/p5_pbev2.c +++ b/src/lib/libcrypto/asn1/p5_pbev2.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: p5_pbev2.c,v 1.29 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: p5_pbev2.c,v 1.30 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 1999-2004. | 3 | * project 1999-2004. |
| 4 | */ | 4 | */ |
| @@ -97,28 +97,24 @@ d2i_PBE2PARAM(PBE2PARAM **a, const unsigned char **in, long len) | |||
| 97 | return (PBE2PARAM *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 97 | return (PBE2PARAM *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 98 | &PBE2PARAM_it); | 98 | &PBE2PARAM_it); |
| 99 | } | 99 | } |
| 100 | LCRYPTO_ALIAS(d2i_PBE2PARAM); | ||
| 101 | 100 | ||
| 102 | int | 101 | int |
| 103 | i2d_PBE2PARAM(PBE2PARAM *a, unsigned char **out) | 102 | i2d_PBE2PARAM(PBE2PARAM *a, unsigned char **out) |
| 104 | { | 103 | { |
| 105 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PBE2PARAM_it); | 104 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PBE2PARAM_it); |
| 106 | } | 105 | } |
| 107 | LCRYPTO_ALIAS(i2d_PBE2PARAM); | ||
| 108 | 106 | ||
| 109 | PBE2PARAM * | 107 | PBE2PARAM * |
| 110 | PBE2PARAM_new(void) | 108 | PBE2PARAM_new(void) |
| 111 | { | 109 | { |
| 112 | return (PBE2PARAM *)ASN1_item_new(&PBE2PARAM_it); | 110 | return (PBE2PARAM *)ASN1_item_new(&PBE2PARAM_it); |
| 113 | } | 111 | } |
| 114 | LCRYPTO_ALIAS(PBE2PARAM_new); | ||
| 115 | 112 | ||
| 116 | void | 113 | void |
| 117 | PBE2PARAM_free(PBE2PARAM *a) | 114 | PBE2PARAM_free(PBE2PARAM *a) |
| 118 | { | 115 | { |
| 119 | ASN1_item_free((ASN1_VALUE *)a, &PBE2PARAM_it); | 116 | ASN1_item_free((ASN1_VALUE *)a, &PBE2PARAM_it); |
| 120 | } | 117 | } |
| 121 | LCRYPTO_ALIAS(PBE2PARAM_free); | ||
| 122 | 118 | ||
| 123 | static const ASN1_TEMPLATE PBKDF2PARAM_seq_tt[] = { | 119 | static const ASN1_TEMPLATE PBKDF2PARAM_seq_tt[] = { |
| 124 | { | 120 | { |
| @@ -161,28 +157,24 @@ d2i_PBKDF2PARAM(PBKDF2PARAM **a, const unsigned char **in, long len) | |||
| 161 | return (PBKDF2PARAM *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 157 | return (PBKDF2PARAM *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 162 | &PBKDF2PARAM_it); | 158 | &PBKDF2PARAM_it); |
| 163 | } | 159 | } |
| 164 | LCRYPTO_ALIAS(d2i_PBKDF2PARAM); | ||
| 165 | 160 | ||
| 166 | int | 161 | int |
| 167 | i2d_PBKDF2PARAM(PBKDF2PARAM *a, unsigned char **out) | 162 | i2d_PBKDF2PARAM(PBKDF2PARAM *a, unsigned char **out) |
| 168 | { | 163 | { |
| 169 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PBKDF2PARAM_it); | 164 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PBKDF2PARAM_it); |
| 170 | } | 165 | } |
| 171 | LCRYPTO_ALIAS(i2d_PBKDF2PARAM); | ||
| 172 | 166 | ||
| 173 | PBKDF2PARAM * | 167 | PBKDF2PARAM * |
| 174 | PBKDF2PARAM_new(void) | 168 | PBKDF2PARAM_new(void) |
| 175 | { | 169 | { |
| 176 | return (PBKDF2PARAM *)ASN1_item_new(&PBKDF2PARAM_it); | 170 | return (PBKDF2PARAM *)ASN1_item_new(&PBKDF2PARAM_it); |
| 177 | } | 171 | } |
| 178 | LCRYPTO_ALIAS(PBKDF2PARAM_new); | ||
| 179 | 172 | ||
| 180 | void | 173 | void |
| 181 | PBKDF2PARAM_free(PBKDF2PARAM *a) | 174 | PBKDF2PARAM_free(PBKDF2PARAM *a) |
| 182 | { | 175 | { |
| 183 | ASN1_item_free((ASN1_VALUE *)a, &PBKDF2PARAM_it); | 176 | ASN1_item_free((ASN1_VALUE *)a, &PBKDF2PARAM_it); |
| 184 | } | 177 | } |
| 185 | LCRYPTO_ALIAS(PBKDF2PARAM_free); | ||
| 186 | 178 | ||
| 187 | /* Return an algorithm identifier for a PKCS#5 v2.0 PBE algorithm: | 179 | /* Return an algorithm identifier for a PKCS#5 v2.0 PBE algorithm: |
| 188 | * yes I know this is horrible! | 180 | * yes I know this is horrible! |
| @@ -293,7 +285,6 @@ PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, unsigned char *salt, | |||
| 293 | 285 | ||
| 294 | return NULL; | 286 | return NULL; |
| 295 | } | 287 | } |
| 296 | LCRYPTO_ALIAS(PKCS5_pbe2_set_iv); | ||
| 297 | 288 | ||
| 298 | X509_ALGOR * | 289 | X509_ALGOR * |
| 299 | PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, unsigned char *salt, | 290 | PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, unsigned char *salt, |
| @@ -301,7 +292,6 @@ PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, unsigned char *salt, | |||
| 301 | { | 292 | { |
| 302 | return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1); | 293 | return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1); |
| 303 | } | 294 | } |
| 304 | LCRYPTO_ALIAS(PKCS5_pbe2_set); | ||
| 305 | 295 | ||
| 306 | X509_ALGOR * | 296 | X509_ALGOR * |
| 307 | PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, int prf_nid, | 297 | PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, int prf_nid, |
| @@ -382,4 +372,3 @@ PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, int prf_nid, | |||
| 382 | X509_ALGOR_free(keyfunc); | 372 | X509_ALGOR_free(keyfunc); |
| 383 | return NULL; | 373 | return NULL; |
| 384 | } | 374 | } |
| 385 | LCRYPTO_ALIAS(PKCS5_pbkdf2_set); | ||
diff --git a/src/lib/libcrypto/asn1/p8_pkey.c b/src/lib/libcrypto/asn1/p8_pkey.c index a757c95d6d..9e0cfc41da 100644 --- a/src/lib/libcrypto/asn1/p8_pkey.c +++ b/src/lib/libcrypto/asn1/p8_pkey.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: p8_pkey.c,v 1.22 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: p8_pkey.c,v 1.23 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 1999. | 3 | * project 1999. |
| 4 | */ | 4 | */ |
| @@ -121,28 +121,24 @@ d2i_PKCS8_PRIV_KEY_INFO(PKCS8_PRIV_KEY_INFO **a, const unsigned char **in, long | |||
| 121 | return (PKCS8_PRIV_KEY_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 121 | return (PKCS8_PRIV_KEY_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 122 | &PKCS8_PRIV_KEY_INFO_it); | 122 | &PKCS8_PRIV_KEY_INFO_it); |
| 123 | } | 123 | } |
| 124 | LCRYPTO_ALIAS(d2i_PKCS8_PRIV_KEY_INFO); | ||
| 125 | 124 | ||
| 126 | int | 125 | int |
| 127 | i2d_PKCS8_PRIV_KEY_INFO(PKCS8_PRIV_KEY_INFO *a, unsigned char **out) | 126 | i2d_PKCS8_PRIV_KEY_INFO(PKCS8_PRIV_KEY_INFO *a, unsigned char **out) |
| 128 | { | 127 | { |
| 129 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS8_PRIV_KEY_INFO_it); | 128 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS8_PRIV_KEY_INFO_it); |
| 130 | } | 129 | } |
| 131 | LCRYPTO_ALIAS(i2d_PKCS8_PRIV_KEY_INFO); | ||
| 132 | 130 | ||
| 133 | PKCS8_PRIV_KEY_INFO * | 131 | PKCS8_PRIV_KEY_INFO * |
| 134 | PKCS8_PRIV_KEY_INFO_new(void) | 132 | PKCS8_PRIV_KEY_INFO_new(void) |
| 135 | { | 133 | { |
| 136 | return (PKCS8_PRIV_KEY_INFO *)ASN1_item_new(&PKCS8_PRIV_KEY_INFO_it); | 134 | return (PKCS8_PRIV_KEY_INFO *)ASN1_item_new(&PKCS8_PRIV_KEY_INFO_it); |
| 137 | } | 135 | } |
| 138 | LCRYPTO_ALIAS(PKCS8_PRIV_KEY_INFO_new); | ||
| 139 | 136 | ||
| 140 | void | 137 | void |
| 141 | PKCS8_PRIV_KEY_INFO_free(PKCS8_PRIV_KEY_INFO *a) | 138 | PKCS8_PRIV_KEY_INFO_free(PKCS8_PRIV_KEY_INFO *a) |
| 142 | { | 139 | { |
| 143 | ASN1_item_free((ASN1_VALUE *)a, &PKCS8_PRIV_KEY_INFO_it); | 140 | ASN1_item_free((ASN1_VALUE *)a, &PKCS8_PRIV_KEY_INFO_it); |
| 144 | } | 141 | } |
| 145 | LCRYPTO_ALIAS(PKCS8_PRIV_KEY_INFO_free); | ||
| 146 | 142 | ||
| 147 | int | 143 | int |
| 148 | PKCS8_pkey_set0(PKCS8_PRIV_KEY_INFO *priv, ASN1_OBJECT *aobj, int version, | 144 | PKCS8_pkey_set0(PKCS8_PRIV_KEY_INFO *priv, ASN1_OBJECT *aobj, int version, |
| @@ -158,7 +154,6 @@ PKCS8_pkey_set0(PKCS8_PRIV_KEY_INFO *priv, ASN1_OBJECT *aobj, int version, | |||
| 158 | ASN1_STRING_set0(priv->pkey, penc, penclen); | 154 | ASN1_STRING_set0(priv->pkey, penc, penclen); |
| 159 | return 1; | 155 | return 1; |
| 160 | } | 156 | } |
| 161 | LCRYPTO_ALIAS(PKCS8_pkey_set0); | ||
| 162 | 157 | ||
| 163 | int | 158 | int |
| 164 | PKCS8_pkey_get0(const ASN1_OBJECT **ppkalg, const unsigned char **pk, | 159 | PKCS8_pkey_get0(const ASN1_OBJECT **ppkalg, const unsigned char **pk, |
| @@ -174,14 +169,12 @@ PKCS8_pkey_get0(const ASN1_OBJECT **ppkalg, const unsigned char **pk, | |||
| 174 | *pa = p8->pkeyalg; | 169 | *pa = p8->pkeyalg; |
| 175 | return 1; | 170 | return 1; |
| 176 | } | 171 | } |
| 177 | LCRYPTO_ALIAS(PKCS8_pkey_get0); | ||
| 178 | 172 | ||
| 179 | const STACK_OF(X509_ATTRIBUTE) * | 173 | const STACK_OF(X509_ATTRIBUTE) * |
| 180 | PKCS8_pkey_get0_attrs(const PKCS8_PRIV_KEY_INFO *p8) | 174 | PKCS8_pkey_get0_attrs(const PKCS8_PRIV_KEY_INFO *p8) |
| 181 | { | 175 | { |
| 182 | return p8->attributes; | 176 | return p8->attributes; |
| 183 | } | 177 | } |
| 184 | LCRYPTO_ALIAS(PKCS8_pkey_get0_attrs); | ||
| 185 | 178 | ||
| 186 | int | 179 | int |
| 187 | PKCS8_pkey_add1_attr_by_NID(PKCS8_PRIV_KEY_INFO *p8, int nid, int type, | 180 | PKCS8_pkey_add1_attr_by_NID(PKCS8_PRIV_KEY_INFO *p8, int nid, int type, |
| @@ -192,4 +185,3 @@ PKCS8_pkey_add1_attr_by_NID(PKCS8_PRIV_KEY_INFO *p8, int nid, int type, | |||
| 192 | return 1; | 185 | return 1; |
| 193 | return 0; | 186 | return 0; |
| 194 | } | 187 | } |
| 195 | LCRYPTO_ALIAS(PKCS8_pkey_add1_attr_by_NID); | ||
diff --git a/src/lib/libcrypto/asn1/t_crl.c b/src/lib/libcrypto/asn1/t_crl.c index 1bbff98a58..d662d99ec5 100644 --- a/src/lib/libcrypto/asn1/t_crl.c +++ b/src/lib/libcrypto/asn1/t_crl.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: t_crl.c,v 1.22 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: t_crl.c,v 1.23 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 1999. | 3 | * project 1999. |
| 4 | */ | 4 | */ |
| @@ -83,7 +83,6 @@ X509_CRL_print_fp(FILE *fp, X509_CRL *x) | |||
| 83 | BIO_free(b); | 83 | BIO_free(b); |
| 84 | return (ret); | 84 | return (ret); |
| 85 | } | 85 | } |
| 86 | LCRYPTO_ALIAS(X509_CRL_print_fp); | ||
| 87 | 86 | ||
| 88 | int | 87 | int |
| 89 | X509_CRL_print(BIO *out, X509_CRL *x) | 88 | X509_CRL_print(BIO *out, X509_CRL *x) |
| @@ -144,4 +143,3 @@ X509_CRL_print(BIO *out, X509_CRL *x) | |||
| 144 | err: | 143 | err: |
| 145 | return 0; | 144 | return 0; |
| 146 | } | 145 | } |
| 147 | LCRYPTO_ALIAS(X509_CRL_print); | ||
diff --git a/src/lib/libcrypto/asn1/t_req.c b/src/lib/libcrypto/asn1/t_req.c index 0fb46c286f..2fd9842434 100644 --- a/src/lib/libcrypto/asn1/t_req.c +++ b/src/lib/libcrypto/asn1/t_req.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: t_req.c,v 1.25 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: t_req.c,v 1.26 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -91,7 +91,6 @@ X509_REQ_print_fp(FILE *fp, X509_REQ *x) | |||
| 91 | BIO_free(b); | 91 | BIO_free(b); |
| 92 | return (ret); | 92 | return (ret); |
| 93 | } | 93 | } |
| 94 | LCRYPTO_ALIAS(X509_REQ_print_fp); | ||
| 95 | 94 | ||
| 96 | int | 95 | int |
| 97 | X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long nmflags, | 96 | X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long nmflags, |
| @@ -255,11 +254,9 @@ X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long nmflags, | |||
| 255 | X509error(ERR_R_BUF_LIB); | 254 | X509error(ERR_R_BUF_LIB); |
| 256 | return (0); | 255 | return (0); |
| 257 | } | 256 | } |
| 258 | LCRYPTO_ALIAS(X509_REQ_print_ex); | ||
| 259 | 257 | ||
| 260 | int | 258 | int |
| 261 | X509_REQ_print(BIO *bp, X509_REQ *x) | 259 | X509_REQ_print(BIO *bp, X509_REQ *x) |
| 262 | { | 260 | { |
| 263 | return X509_REQ_print_ex(bp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT); | 261 | return X509_REQ_print_ex(bp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT); |
| 264 | } | 262 | } |
| 265 | LCRYPTO_ALIAS(X509_REQ_print); | ||
diff --git a/src/lib/libcrypto/asn1/t_spki.c b/src/lib/libcrypto/asn1/t_spki.c index 7e33bc77af..73996b66f6 100644 --- a/src/lib/libcrypto/asn1/t_spki.c +++ b/src/lib/libcrypto/asn1/t_spki.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: t_spki.c,v 1.15 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: t_spki.c,v 1.16 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 1999. | 3 | * project 1999. |
| 4 | */ | 4 | */ |
| @@ -113,4 +113,3 @@ NETSCAPE_SPKI_print(BIO *out, NETSCAPE_SPKI *spki) | |||
| 113 | BIO_write(out, "\n", 1); | 113 | BIO_write(out, "\n", 1); |
| 114 | return 1; | 114 | return 1; |
| 115 | } | 115 | } |
| 116 | LCRYPTO_ALIAS(NETSCAPE_SPKI_print); | ||
diff --git a/src/lib/libcrypto/asn1/t_x509.c b/src/lib/libcrypto/asn1/t_x509.c index 7db4ff7dbf..cd98997f6a 100644 --- a/src/lib/libcrypto/asn1/t_x509.c +++ b/src/lib/libcrypto/asn1/t_x509.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: t_x509.c,v 1.42 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: t_x509.c,v 1.43 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -85,7 +85,6 @@ X509_print_fp(FILE *fp, X509 *x) | |||
| 85 | { | 85 | { |
| 86 | return X509_print_ex_fp(fp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT); | 86 | return X509_print_ex_fp(fp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT); |
| 87 | } | 87 | } |
| 88 | LCRYPTO_ALIAS(X509_print_fp); | ||
| 89 | 88 | ||
| 90 | int | 89 | int |
| 91 | X509_print_ex_fp(FILE *fp, X509 *x, unsigned long nmflag, unsigned long cflag) | 90 | X509_print_ex_fp(FILE *fp, X509 *x, unsigned long nmflag, unsigned long cflag) |
| @@ -102,14 +101,12 @@ X509_print_ex_fp(FILE *fp, X509 *x, unsigned long nmflag, unsigned long cflag) | |||
| 102 | BIO_free(b); | 101 | BIO_free(b); |
| 103 | return (ret); | 102 | return (ret); |
| 104 | } | 103 | } |
| 105 | LCRYPTO_ALIAS(X509_print_ex_fp); | ||
| 106 | 104 | ||
| 107 | int | 105 | int |
| 108 | X509_print(BIO *bp, X509 *x) | 106 | X509_print(BIO *bp, X509 *x) |
| 109 | { | 107 | { |
| 110 | return X509_print_ex(bp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT); | 108 | return X509_print_ex(bp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT); |
| 111 | } | 109 | } |
| 112 | LCRYPTO_ALIAS(X509_print); | ||
| 113 | 110 | ||
| 114 | int | 111 | int |
| 115 | X509_print_ex(BIO *bp, X509 *x, unsigned long nmflags, unsigned long cflag) | 112 | X509_print_ex(BIO *bp, X509 *x, unsigned long nmflags, unsigned long cflag) |
| @@ -253,7 +250,6 @@ X509_print_ex(BIO *bp, X509 *x, unsigned long nmflags, unsigned long cflag) | |||
| 253 | free(m); | 250 | free(m); |
| 254 | return (ret); | 251 | return (ret); |
| 255 | } | 252 | } |
| 256 | LCRYPTO_ALIAS(X509_print_ex); | ||
| 257 | 253 | ||
| 258 | int | 254 | int |
| 259 | X509_ocspid_print(BIO *bp, X509 *x) | 255 | X509_ocspid_print(BIO *bp, X509 *x) |
| @@ -305,7 +301,6 @@ X509_ocspid_print(BIO *bp, X509 *x) | |||
| 305 | free(der); | 301 | free(der); |
| 306 | return (0); | 302 | return (0); |
| 307 | } | 303 | } |
| 308 | LCRYPTO_ALIAS(X509_ocspid_print); | ||
| 309 | 304 | ||
| 310 | int | 305 | int |
| 311 | X509_signature_dump(BIO *bp, const ASN1_STRING *sig, int indent) | 306 | X509_signature_dump(BIO *bp, const ASN1_STRING *sig, int indent) |
| @@ -331,7 +326,6 @@ X509_signature_dump(BIO *bp, const ASN1_STRING *sig, int indent) | |||
| 331 | 326 | ||
| 332 | return 1; | 327 | return 1; |
| 333 | } | 328 | } |
| 334 | LCRYPTO_ALIAS(X509_signature_dump); | ||
| 335 | 329 | ||
| 336 | int | 330 | int |
| 337 | X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, const ASN1_STRING *sig) | 331 | X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, const ASN1_STRING *sig) |
| @@ -358,7 +352,6 @@ X509_signature_print(BIO *bp, const X509_ALGOR *sigalg, const ASN1_STRING *sig) | |||
| 358 | return 0; | 352 | return 0; |
| 359 | return 1; | 353 | return 1; |
| 360 | } | 354 | } |
| 361 | LCRYPTO_ALIAS(X509_signature_print); | ||
| 362 | 355 | ||
| 363 | int | 356 | int |
| 364 | ASN1_TIME_print(BIO *bp, const ASN1_TIME *tm) | 357 | ASN1_TIME_print(BIO *bp, const ASN1_TIME *tm) |
| @@ -520,4 +513,3 @@ X509_NAME_print(BIO *bp, const X509_NAME *name, int obase) | |||
| 520 | free(b); | 513 | free(b); |
| 521 | return (ret); | 514 | return (ret); |
| 522 | } | 515 | } |
| 523 | LCRYPTO_ALIAS(X509_NAME_print); | ||
diff --git a/src/lib/libcrypto/asn1/t_x509a.c b/src/lib/libcrypto/asn1/t_x509a.c index bbab9962d5..7dbf844cc7 100644 --- a/src/lib/libcrypto/asn1/t_x509a.c +++ b/src/lib/libcrypto/asn1/t_x509a.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: t_x509a.c,v 1.12 2023/07/05 21:23:36 beck Exp $ */ | 1 | /* $OpenBSD: t_x509a.c,v 1.13 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 1999. | 3 | * project 1999. |
| 4 | */ | 4 | */ |
| @@ -117,4 +117,3 @@ X509_CERT_AUX_print(BIO *out, X509_CERT_AUX *aux, int indent) | |||
| 117 | } | 117 | } |
| 118 | return 1; | 118 | return 1; |
| 119 | } | 119 | } |
| 120 | LCRYPTO_ALIAS(X509_CERT_AUX_print); | ||
diff --git a/src/lib/libcrypto/asn1/x_algor.c b/src/lib/libcrypto/asn1/x_algor.c index 8d9f9c4752..0f1cd9cb65 100644 --- a/src/lib/libcrypto/asn1/x_algor.c +++ b/src/lib/libcrypto/asn1/x_algor.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_algor.c,v 1.24 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_algor.c,v 1.25 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 2000. | 3 | * project 2000. |
| 4 | */ | 4 | */ |
| @@ -109,28 +109,24 @@ d2i_X509_ALGOR(X509_ALGOR **a, const unsigned char **in, long len) | |||
| 109 | return (X509_ALGOR *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 109 | return (X509_ALGOR *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 110 | &X509_ALGOR_it); | 110 | &X509_ALGOR_it); |
| 111 | } | 111 | } |
| 112 | LCRYPTO_ALIAS(d2i_X509_ALGOR); | ||
| 113 | 112 | ||
| 114 | int | 113 | int |
| 115 | i2d_X509_ALGOR(X509_ALGOR *a, unsigned char **out) | 114 | i2d_X509_ALGOR(X509_ALGOR *a, unsigned char **out) |
| 116 | { | 115 | { |
| 117 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_ALGOR_it); | 116 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_ALGOR_it); |
| 118 | } | 117 | } |
| 119 | LCRYPTO_ALIAS(i2d_X509_ALGOR); | ||
| 120 | 118 | ||
| 121 | X509_ALGOR * | 119 | X509_ALGOR * |
| 122 | X509_ALGOR_new(void) | 120 | X509_ALGOR_new(void) |
| 123 | { | 121 | { |
| 124 | return (X509_ALGOR *)ASN1_item_new(&X509_ALGOR_it); | 122 | return (X509_ALGOR *)ASN1_item_new(&X509_ALGOR_it); |
| 125 | } | 123 | } |
| 126 | LCRYPTO_ALIAS(X509_ALGOR_new); | ||
| 127 | 124 | ||
| 128 | void | 125 | void |
| 129 | X509_ALGOR_free(X509_ALGOR *a) | 126 | X509_ALGOR_free(X509_ALGOR *a) |
| 130 | { | 127 | { |
| 131 | ASN1_item_free((ASN1_VALUE *)a, &X509_ALGOR_it); | 128 | ASN1_item_free((ASN1_VALUE *)a, &X509_ALGOR_it); |
| 132 | } | 129 | } |
| 133 | LCRYPTO_ALIAS(X509_ALGOR_free); | ||
| 134 | 130 | ||
| 135 | X509_ALGORS * | 131 | X509_ALGORS * |
| 136 | d2i_X509_ALGORS(X509_ALGORS **a, const unsigned char **in, long len) | 132 | d2i_X509_ALGORS(X509_ALGORS **a, const unsigned char **in, long len) |
| @@ -138,21 +134,18 @@ d2i_X509_ALGORS(X509_ALGORS **a, const unsigned char **in, long len) | |||
| 138 | return (X509_ALGORS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 134 | return (X509_ALGORS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 139 | &X509_ALGORS_it); | 135 | &X509_ALGORS_it); |
| 140 | } | 136 | } |
| 141 | LCRYPTO_ALIAS(d2i_X509_ALGORS); | ||
| 142 | 137 | ||
| 143 | int | 138 | int |
| 144 | i2d_X509_ALGORS(X509_ALGORS *a, unsigned char **out) | 139 | i2d_X509_ALGORS(X509_ALGORS *a, unsigned char **out) |
| 145 | { | 140 | { |
| 146 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_ALGORS_it); | 141 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_ALGORS_it); |
| 147 | } | 142 | } |
| 148 | LCRYPTO_ALIAS(i2d_X509_ALGORS); | ||
| 149 | 143 | ||
| 150 | X509_ALGOR * | 144 | X509_ALGOR * |
| 151 | X509_ALGOR_dup(X509_ALGOR *x) | 145 | X509_ALGOR_dup(X509_ALGOR *x) |
| 152 | { | 146 | { |
| 153 | return ASN1_item_dup(&X509_ALGOR_it, x); | 147 | return ASN1_item_dup(&X509_ALGOR_it, x); |
| 154 | } | 148 | } |
| 155 | LCRYPTO_ALIAS(X509_ALGOR_dup); | ||
| 156 | 149 | ||
| 157 | int | 150 | int |
| 158 | X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval) | 151 | X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval) |
| @@ -181,7 +174,6 @@ X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval) | |||
| 181 | ASN1_TYPE_set(alg->parameter, ptype, pval); | 174 | ASN1_TYPE_set(alg->parameter, ptype, pval); |
| 182 | return 1; | 175 | return 1; |
| 183 | } | 176 | } |
| 184 | LCRYPTO_ALIAS(X509_ALGOR_set0); | ||
| 185 | 177 | ||
| 186 | void | 178 | void |
| 187 | X509_ALGOR_get0(const ASN1_OBJECT **paobj, int *pptype, const void **ppval, | 179 | X509_ALGOR_get0(const ASN1_OBJECT **paobj, int *pptype, const void **ppval, |
| @@ -199,7 +191,6 @@ X509_ALGOR_get0(const ASN1_OBJECT **paobj, int *pptype, const void **ppval, | |||
| 199 | *ppval = algor->parameter->value.ptr; | 191 | *ppval = algor->parameter->value.ptr; |
| 200 | } | 192 | } |
| 201 | } | 193 | } |
| 202 | LCRYPTO_ALIAS(X509_ALGOR_get0); | ||
| 203 | 194 | ||
| 204 | /* Set up an X509_ALGOR DigestAlgorithmIdentifier from an EVP_MD */ | 195 | /* Set up an X509_ALGOR DigestAlgorithmIdentifier from an EVP_MD */ |
| 205 | 196 | ||
| @@ -213,7 +204,6 @@ X509_ALGOR_set_md(X509_ALGOR *alg, const EVP_MD *md) | |||
| 213 | 204 | ||
| 214 | X509_ALGOR_set0(alg, OBJ_nid2obj(EVP_MD_type(md)), param_type, NULL); | 205 | X509_ALGOR_set0(alg, OBJ_nid2obj(EVP_MD_type(md)), param_type, NULL); |
| 215 | } | 206 | } |
| 216 | LCRYPTO_ALIAS(X509_ALGOR_set_md); | ||
| 217 | 207 | ||
| 218 | /* Returns 0 if they are equal, != 0 otherwise. */ | 208 | /* Returns 0 if they are equal, != 0 otherwise. */ |
| 219 | int | 209 | int |
| @@ -228,4 +218,3 @@ X509_ALGOR_cmp(const X509_ALGOR *a, const X509_ALGOR *b) | |||
| 228 | } | 218 | } |
| 229 | return(rv); | 219 | return(rv); |
| 230 | } | 220 | } |
| 231 | LCRYPTO_ALIAS(X509_ALGOR_cmp); | ||
diff --git a/src/lib/libcrypto/asn1/x_attrib.c b/src/lib/libcrypto/asn1/x_attrib.c index 1ed9f67f2e..eb72d046c1 100644 --- a/src/lib/libcrypto/asn1/x_attrib.c +++ b/src/lib/libcrypto/asn1/x_attrib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_attrib.c,v 1.19 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_attrib.c,v 1.20 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -111,35 +111,30 @@ d2i_X509_ATTRIBUTE(X509_ATTRIBUTE **a, const unsigned char **in, long len) | |||
| 111 | return (X509_ATTRIBUTE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 111 | return (X509_ATTRIBUTE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 112 | &X509_ATTRIBUTE_it); | 112 | &X509_ATTRIBUTE_it); |
| 113 | } | 113 | } |
| 114 | LCRYPTO_ALIAS(d2i_X509_ATTRIBUTE); | ||
| 115 | 114 | ||
| 116 | int | 115 | int |
| 117 | i2d_X509_ATTRIBUTE(X509_ATTRIBUTE *a, unsigned char **out) | 116 | i2d_X509_ATTRIBUTE(X509_ATTRIBUTE *a, unsigned char **out) |
| 118 | { | 117 | { |
| 119 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_ATTRIBUTE_it); | 118 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_ATTRIBUTE_it); |
| 120 | } | 119 | } |
| 121 | LCRYPTO_ALIAS(i2d_X509_ATTRIBUTE); | ||
| 122 | 120 | ||
| 123 | X509_ATTRIBUTE * | 121 | X509_ATTRIBUTE * |
| 124 | X509_ATTRIBUTE_new(void) | 122 | X509_ATTRIBUTE_new(void) |
| 125 | { | 123 | { |
| 126 | return (X509_ATTRIBUTE *)ASN1_item_new(&X509_ATTRIBUTE_it); | 124 | return (X509_ATTRIBUTE *)ASN1_item_new(&X509_ATTRIBUTE_it); |
| 127 | } | 125 | } |
| 128 | LCRYPTO_ALIAS(X509_ATTRIBUTE_new); | ||
| 129 | 126 | ||
| 130 | void | 127 | void |
| 131 | X509_ATTRIBUTE_free(X509_ATTRIBUTE *a) | 128 | X509_ATTRIBUTE_free(X509_ATTRIBUTE *a) |
| 132 | { | 129 | { |
| 133 | ASN1_item_free((ASN1_VALUE *)a, &X509_ATTRIBUTE_it); | 130 | ASN1_item_free((ASN1_VALUE *)a, &X509_ATTRIBUTE_it); |
| 134 | } | 131 | } |
| 135 | LCRYPTO_ALIAS(X509_ATTRIBUTE_free); | ||
| 136 | 132 | ||
| 137 | X509_ATTRIBUTE * | 133 | X509_ATTRIBUTE * |
| 138 | X509_ATTRIBUTE_dup(X509_ATTRIBUTE *x) | 134 | X509_ATTRIBUTE_dup(X509_ATTRIBUTE *x) |
| 139 | { | 135 | { |
| 140 | return ASN1_item_dup(&X509_ATTRIBUTE_it, x); | 136 | return ASN1_item_dup(&X509_ATTRIBUTE_it, x); |
| 141 | } | 137 | } |
| 142 | LCRYPTO_ALIAS(X509_ATTRIBUTE_dup); | ||
| 143 | 138 | ||
| 144 | X509_ATTRIBUTE * | 139 | X509_ATTRIBUTE * |
| 145 | X509_ATTRIBUTE_create(int nid, int atrtype, void *value) | 140 | X509_ATTRIBUTE_create(int nid, int atrtype, void *value) |
| @@ -168,4 +163,3 @@ X509_ATTRIBUTE_create(int nid, int atrtype, void *value) | |||
| 168 | ASN1_TYPE_free(val); | 163 | ASN1_TYPE_free(val); |
| 169 | return (NULL); | 164 | return (NULL); |
| 170 | } | 165 | } |
| 171 | LCRYPTO_ALIAS(X509_ATTRIBUTE_create); | ||
diff --git a/src/lib/libcrypto/asn1/x_crl.c b/src/lib/libcrypto/asn1/x_crl.c index 74e07da3b5..b33ae6e032 100644 --- a/src/lib/libcrypto/asn1/x_crl.c +++ b/src/lib/libcrypto/asn1/x_crl.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_crl.c,v 1.40 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_crl.c,v 1.41 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -442,35 +442,30 @@ d2i_X509_REVOKED(X509_REVOKED **a, const unsigned char **in, long len) | |||
| 442 | return (X509_REVOKED *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 442 | return (X509_REVOKED *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 443 | &X509_REVOKED_it); | 443 | &X509_REVOKED_it); |
| 444 | } | 444 | } |
| 445 | LCRYPTO_ALIAS(d2i_X509_REVOKED); | ||
| 446 | 445 | ||
| 447 | int | 446 | int |
| 448 | i2d_X509_REVOKED(X509_REVOKED *a, unsigned char **out) | 447 | i2d_X509_REVOKED(X509_REVOKED *a, unsigned char **out) |
| 449 | { | 448 | { |
| 450 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_REVOKED_it); | 449 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_REVOKED_it); |
| 451 | } | 450 | } |
| 452 | LCRYPTO_ALIAS(i2d_X509_REVOKED); | ||
| 453 | 451 | ||
| 454 | X509_REVOKED * | 452 | X509_REVOKED * |
| 455 | X509_REVOKED_new(void) | 453 | X509_REVOKED_new(void) |
| 456 | { | 454 | { |
| 457 | return (X509_REVOKED *)ASN1_item_new(&X509_REVOKED_it); | 455 | return (X509_REVOKED *)ASN1_item_new(&X509_REVOKED_it); |
| 458 | } | 456 | } |
| 459 | LCRYPTO_ALIAS(X509_REVOKED_new); | ||
| 460 | 457 | ||
| 461 | void | 458 | void |
| 462 | X509_REVOKED_free(X509_REVOKED *a) | 459 | X509_REVOKED_free(X509_REVOKED *a) |
| 463 | { | 460 | { |
| 464 | ASN1_item_free((ASN1_VALUE *)a, &X509_REVOKED_it); | 461 | ASN1_item_free((ASN1_VALUE *)a, &X509_REVOKED_it); |
| 465 | } | 462 | } |
| 466 | LCRYPTO_ALIAS(X509_REVOKED_free); | ||
| 467 | 463 | ||
| 468 | X509_REVOKED * | 464 | X509_REVOKED * |
| 469 | X509_REVOKED_dup(X509_REVOKED *a) | 465 | X509_REVOKED_dup(X509_REVOKED *a) |
| 470 | { | 466 | { |
| 471 | return ASN1_item_dup(&X509_REVOKED_it, a); | 467 | return ASN1_item_dup(&X509_REVOKED_it, a); |
| 472 | } | 468 | } |
| 473 | LCRYPTO_ALIAS(X509_REVOKED_dup); | ||
| 474 | 469 | ||
| 475 | X509_CRL_INFO * | 470 | X509_CRL_INFO * |
| 476 | d2i_X509_CRL_INFO(X509_CRL_INFO **a, const unsigned char **in, long len) | 471 | d2i_X509_CRL_INFO(X509_CRL_INFO **a, const unsigned char **in, long len) |
| @@ -478,28 +473,24 @@ d2i_X509_CRL_INFO(X509_CRL_INFO **a, const unsigned char **in, long len) | |||
| 478 | return (X509_CRL_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 473 | return (X509_CRL_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 479 | &X509_CRL_INFO_it); | 474 | &X509_CRL_INFO_it); |
| 480 | } | 475 | } |
| 481 | LCRYPTO_ALIAS(d2i_X509_CRL_INFO); | ||
| 482 | 476 | ||
| 483 | int | 477 | int |
| 484 | i2d_X509_CRL_INFO(X509_CRL_INFO *a, unsigned char **out) | 478 | i2d_X509_CRL_INFO(X509_CRL_INFO *a, unsigned char **out) |
| 485 | { | 479 | { |
| 486 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_CRL_INFO_it); | 480 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_CRL_INFO_it); |
| 487 | } | 481 | } |
| 488 | LCRYPTO_ALIAS(i2d_X509_CRL_INFO); | ||
| 489 | 482 | ||
| 490 | X509_CRL_INFO * | 483 | X509_CRL_INFO * |
| 491 | X509_CRL_INFO_new(void) | 484 | X509_CRL_INFO_new(void) |
| 492 | { | 485 | { |
| 493 | return (X509_CRL_INFO *)ASN1_item_new(&X509_CRL_INFO_it); | 486 | return (X509_CRL_INFO *)ASN1_item_new(&X509_CRL_INFO_it); |
| 494 | } | 487 | } |
| 495 | LCRYPTO_ALIAS(X509_CRL_INFO_new); | ||
| 496 | 488 | ||
| 497 | void | 489 | void |
| 498 | X509_CRL_INFO_free(X509_CRL_INFO *a) | 490 | X509_CRL_INFO_free(X509_CRL_INFO *a) |
| 499 | { | 491 | { |
| 500 | ASN1_item_free((ASN1_VALUE *)a, &X509_CRL_INFO_it); | 492 | ASN1_item_free((ASN1_VALUE *)a, &X509_CRL_INFO_it); |
| 501 | } | 493 | } |
| 502 | LCRYPTO_ALIAS(X509_CRL_INFO_free); | ||
| 503 | 494 | ||
| 504 | X509_CRL * | 495 | X509_CRL * |
| 505 | d2i_X509_CRL(X509_CRL **a, const unsigned char **in, long len) | 496 | d2i_X509_CRL(X509_CRL **a, const unsigned char **in, long len) |
| @@ -507,35 +498,30 @@ d2i_X509_CRL(X509_CRL **a, const unsigned char **in, long len) | |||
| 507 | return (X509_CRL *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 498 | return (X509_CRL *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 508 | &X509_CRL_it); | 499 | &X509_CRL_it); |
| 509 | } | 500 | } |
| 510 | LCRYPTO_ALIAS(d2i_X509_CRL); | ||
| 511 | 501 | ||
| 512 | int | 502 | int |
| 513 | i2d_X509_CRL(X509_CRL *a, unsigned char **out) | 503 | i2d_X509_CRL(X509_CRL *a, unsigned char **out) |
| 514 | { | 504 | { |
| 515 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_CRL_it); | 505 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_CRL_it); |
| 516 | } | 506 | } |
| 517 | LCRYPTO_ALIAS(i2d_X509_CRL); | ||
| 518 | 507 | ||
| 519 | X509_CRL * | 508 | X509_CRL * |
| 520 | X509_CRL_new(void) | 509 | X509_CRL_new(void) |
| 521 | { | 510 | { |
| 522 | return (X509_CRL *)ASN1_item_new(&X509_CRL_it); | 511 | return (X509_CRL *)ASN1_item_new(&X509_CRL_it); |
| 523 | } | 512 | } |
| 524 | LCRYPTO_ALIAS(X509_CRL_new); | ||
| 525 | 513 | ||
| 526 | void | 514 | void |
| 527 | X509_CRL_free(X509_CRL *a) | 515 | X509_CRL_free(X509_CRL *a) |
| 528 | { | 516 | { |
| 529 | ASN1_item_free((ASN1_VALUE *)a, &X509_CRL_it); | 517 | ASN1_item_free((ASN1_VALUE *)a, &X509_CRL_it); |
| 530 | } | 518 | } |
| 531 | LCRYPTO_ALIAS(X509_CRL_free); | ||
| 532 | 519 | ||
| 533 | X509_CRL * | 520 | X509_CRL * |
| 534 | X509_CRL_dup(X509_CRL *x) | 521 | X509_CRL_dup(X509_CRL *x) |
| 535 | { | 522 | { |
| 536 | return ASN1_item_dup(&X509_CRL_it, x); | 523 | return ASN1_item_dup(&X509_CRL_it, x); |
| 537 | } | 524 | } |
| 538 | LCRYPTO_ALIAS(X509_CRL_dup); | ||
| 539 | 525 | ||
| 540 | static int | 526 | static int |
| 541 | X509_REVOKED_cmp(const X509_REVOKED * const *a, const X509_REVOKED * const *b) | 527 | X509_REVOKED_cmp(const X509_REVOKED * const *a, const X509_REVOKED * const *b) |
| @@ -558,7 +544,6 @@ X509_CRL_add0_revoked(X509_CRL *crl, X509_REVOKED *rev) | |||
| 558 | inf->enc.modified = 1; | 544 | inf->enc.modified = 1; |
| 559 | return 1; | 545 | return 1; |
| 560 | } | 546 | } |
| 561 | LCRYPTO_ALIAS(X509_CRL_add0_revoked); | ||
| 562 | 547 | ||
| 563 | int | 548 | int |
| 564 | X509_CRL_verify(X509_CRL *crl, EVP_PKEY *r) | 549 | X509_CRL_verify(X509_CRL *crl, EVP_PKEY *r) |
| @@ -567,7 +552,6 @@ X509_CRL_verify(X509_CRL *crl, EVP_PKEY *r) | |||
| 567 | return crl->meth->crl_verify(crl, r); | 552 | return crl->meth->crl_verify(crl, r); |
| 568 | return 0; | 553 | return 0; |
| 569 | } | 554 | } |
| 570 | LCRYPTO_ALIAS(X509_CRL_verify); | ||
| 571 | 555 | ||
| 572 | int | 556 | int |
| 573 | X509_CRL_get0_by_serial(X509_CRL *crl, X509_REVOKED **ret, | 557 | X509_CRL_get0_by_serial(X509_CRL *crl, X509_REVOKED **ret, |
| @@ -577,7 +561,6 @@ X509_CRL_get0_by_serial(X509_CRL *crl, X509_REVOKED **ret, | |||
| 577 | return crl->meth->crl_lookup(crl, ret, serial, NULL); | 561 | return crl->meth->crl_lookup(crl, ret, serial, NULL); |
| 578 | return 0; | 562 | return 0; |
| 579 | } | 563 | } |
| 580 | LCRYPTO_ALIAS(X509_CRL_get0_by_serial); | ||
| 581 | 564 | ||
| 582 | int | 565 | int |
| 583 | X509_CRL_get0_by_cert(X509_CRL *crl, X509_REVOKED **ret, X509 *x) | 566 | X509_CRL_get0_by_cert(X509_CRL *crl, X509_REVOKED **ret, X509 *x) |
| @@ -587,7 +570,6 @@ X509_CRL_get0_by_cert(X509_CRL *crl, X509_REVOKED **ret, X509 *x) | |||
| 587 | X509_get_serialNumber(x), X509_get_issuer_name(x)); | 570 | X509_get_serialNumber(x), X509_get_issuer_name(x)); |
| 588 | return 0; | 571 | return 0; |
| 589 | } | 572 | } |
| 590 | LCRYPTO_ALIAS(X509_CRL_get0_by_cert); | ||
| 591 | 573 | ||
| 592 | static int | 574 | static int |
| 593 | def_crl_verify(X509_CRL *crl, EVP_PKEY *r) | 575 | def_crl_verify(X509_CRL *crl, EVP_PKEY *r) |
| @@ -666,7 +648,6 @@ X509_CRL_set_default_method(const X509_CRL_METHOD *meth) | |||
| 666 | else | 648 | else |
| 667 | default_crl_method = meth; | 649 | default_crl_method = meth; |
| 668 | } | 650 | } |
| 669 | LCRYPTO_ALIAS(X509_CRL_set_default_method); | ||
| 670 | 651 | ||
| 671 | X509_CRL_METHOD * | 652 | X509_CRL_METHOD * |
| 672 | X509_CRL_METHOD_new(int (*crl_init)(X509_CRL *crl), | 653 | X509_CRL_METHOD_new(int (*crl_init)(X509_CRL *crl), |
| @@ -688,7 +669,6 @@ X509_CRL_METHOD_new(int (*crl_init)(X509_CRL *crl), | |||
| 688 | 669 | ||
| 689 | return m; | 670 | return m; |
| 690 | } | 671 | } |
| 691 | LCRYPTO_ALIAS(X509_CRL_METHOD_new); | ||
| 692 | 672 | ||
| 693 | void | 673 | void |
| 694 | X509_CRL_METHOD_free(X509_CRL_METHOD *m) | 674 | X509_CRL_METHOD_free(X509_CRL_METHOD *m) |
| @@ -699,84 +679,72 @@ X509_CRL_METHOD_free(X509_CRL_METHOD *m) | |||
| 699 | return; | 679 | return; |
| 700 | free(m); | 680 | free(m); |
| 701 | } | 681 | } |
| 702 | LCRYPTO_ALIAS(X509_CRL_METHOD_free); | ||
| 703 | 682 | ||
| 704 | void | 683 | void |
| 705 | X509_CRL_set_meth_data(X509_CRL *crl, void *dat) | 684 | X509_CRL_set_meth_data(X509_CRL *crl, void *dat) |
| 706 | { | 685 | { |
| 707 | crl->meth_data = dat; | 686 | crl->meth_data = dat; |
| 708 | } | 687 | } |
| 709 | LCRYPTO_ALIAS(X509_CRL_set_meth_data); | ||
| 710 | 688 | ||
| 711 | void * | 689 | void * |
| 712 | X509_CRL_get_meth_data(X509_CRL *crl) | 690 | X509_CRL_get_meth_data(X509_CRL *crl) |
| 713 | { | 691 | { |
| 714 | return crl->meth_data; | 692 | return crl->meth_data; |
| 715 | } | 693 | } |
| 716 | LCRYPTO_ALIAS(X509_CRL_get_meth_data); | ||
| 717 | 694 | ||
| 718 | int | 695 | int |
| 719 | X509_CRL_get_signature_nid(const X509_CRL *crl) | 696 | X509_CRL_get_signature_nid(const X509_CRL *crl) |
| 720 | { | 697 | { |
| 721 | return OBJ_obj2nid(crl->sig_alg->algorithm); | 698 | return OBJ_obj2nid(crl->sig_alg->algorithm); |
| 722 | } | 699 | } |
| 723 | LCRYPTO_ALIAS(X509_CRL_get_signature_nid); | ||
| 724 | 700 | ||
| 725 | const STACK_OF(X509_EXTENSION) * | 701 | const STACK_OF(X509_EXTENSION) * |
| 726 | X509_CRL_get0_extensions(const X509_CRL *crl) | 702 | X509_CRL_get0_extensions(const X509_CRL *crl) |
| 727 | { | 703 | { |
| 728 | return crl->crl->extensions; | 704 | return crl->crl->extensions; |
| 729 | } | 705 | } |
| 730 | LCRYPTO_ALIAS(X509_CRL_get0_extensions); | ||
| 731 | 706 | ||
| 732 | long | 707 | long |
| 733 | X509_CRL_get_version(const X509_CRL *crl) | 708 | X509_CRL_get_version(const X509_CRL *crl) |
| 734 | { | 709 | { |
| 735 | return ASN1_INTEGER_get(crl->crl->version); | 710 | return ASN1_INTEGER_get(crl->crl->version); |
| 736 | } | 711 | } |
| 737 | LCRYPTO_ALIAS(X509_CRL_get_version); | ||
| 738 | 712 | ||
| 739 | const ASN1_TIME * | 713 | const ASN1_TIME * |
| 740 | X509_CRL_get0_lastUpdate(const X509_CRL *crl) | 714 | X509_CRL_get0_lastUpdate(const X509_CRL *crl) |
| 741 | { | 715 | { |
| 742 | return crl->crl->lastUpdate; | 716 | return crl->crl->lastUpdate; |
| 743 | } | 717 | } |
| 744 | LCRYPTO_ALIAS(X509_CRL_get0_lastUpdate); | ||
| 745 | 718 | ||
| 746 | ASN1_TIME * | 719 | ASN1_TIME * |
| 747 | X509_CRL_get_lastUpdate(X509_CRL *crl) | 720 | X509_CRL_get_lastUpdate(X509_CRL *crl) |
| 748 | { | 721 | { |
| 749 | return crl->crl->lastUpdate; | 722 | return crl->crl->lastUpdate; |
| 750 | } | 723 | } |
| 751 | LCRYPTO_ALIAS(X509_CRL_get_lastUpdate); | ||
| 752 | 724 | ||
| 753 | const ASN1_TIME * | 725 | const ASN1_TIME * |
| 754 | X509_CRL_get0_nextUpdate(const X509_CRL *crl) | 726 | X509_CRL_get0_nextUpdate(const X509_CRL *crl) |
| 755 | { | 727 | { |
| 756 | return crl->crl->nextUpdate; | 728 | return crl->crl->nextUpdate; |
| 757 | } | 729 | } |
| 758 | LCRYPTO_ALIAS(X509_CRL_get0_nextUpdate); | ||
| 759 | 730 | ||
| 760 | ASN1_TIME * | 731 | ASN1_TIME * |
| 761 | X509_CRL_get_nextUpdate(X509_CRL *crl) | 732 | X509_CRL_get_nextUpdate(X509_CRL *crl) |
| 762 | { | 733 | { |
| 763 | return crl->crl->nextUpdate; | 734 | return crl->crl->nextUpdate; |
| 764 | } | 735 | } |
| 765 | LCRYPTO_ALIAS(X509_CRL_get_nextUpdate); | ||
| 766 | 736 | ||
| 767 | X509_NAME * | 737 | X509_NAME * |
| 768 | X509_CRL_get_issuer(const X509_CRL *crl) | 738 | X509_CRL_get_issuer(const X509_CRL *crl) |
| 769 | { | 739 | { |
| 770 | return crl->crl->issuer; | 740 | return crl->crl->issuer; |
| 771 | } | 741 | } |
| 772 | LCRYPTO_ALIAS(X509_CRL_get_issuer); | ||
| 773 | 742 | ||
| 774 | STACK_OF(X509_REVOKED) * | 743 | STACK_OF(X509_REVOKED) * |
| 775 | X509_CRL_get_REVOKED(X509_CRL *crl) | 744 | X509_CRL_get_REVOKED(X509_CRL *crl) |
| 776 | { | 745 | { |
| 777 | return crl->crl->revoked; | 746 | return crl->crl->revoked; |
| 778 | } | 747 | } |
| 779 | LCRYPTO_ALIAS(X509_CRL_get_REVOKED); | ||
| 780 | 748 | ||
| 781 | void | 749 | void |
| 782 | X509_CRL_get0_signature(const X509_CRL *crl, const ASN1_BIT_STRING **psig, | 750 | X509_CRL_get0_signature(const X509_CRL *crl, const ASN1_BIT_STRING **psig, |
| @@ -787,11 +755,9 @@ X509_CRL_get0_signature(const X509_CRL *crl, const ASN1_BIT_STRING **psig, | |||
| 787 | if (palg != NULL) | 755 | if (palg != NULL) |
| 788 | *palg = crl->sig_alg; | 756 | *palg = crl->sig_alg; |
| 789 | } | 757 | } |
| 790 | LCRYPTO_ALIAS(X509_CRL_get0_signature); | ||
| 791 | 758 | ||
| 792 | const X509_ALGOR * | 759 | const X509_ALGOR * |
| 793 | X509_CRL_get0_tbs_sigalg(const X509_CRL *crl) | 760 | X509_CRL_get0_tbs_sigalg(const X509_CRL *crl) |
| 794 | { | 761 | { |
| 795 | return crl->crl->sig_alg; | 762 | return crl->crl->sig_alg; |
| 796 | } | 763 | } |
| 797 | LCRYPTO_ALIAS(X509_CRL_get0_tbs_sigalg); | ||
diff --git a/src/lib/libcrypto/asn1/x_exten.c b/src/lib/libcrypto/asn1/x_exten.c index 4bf81a9da2..6ff33d5865 100644 --- a/src/lib/libcrypto/asn1/x_exten.c +++ b/src/lib/libcrypto/asn1/x_exten.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_exten.c,v 1.19 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_exten.c,v 1.20 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 2000. | 3 | * project 2000. |
| 4 | */ | 4 | */ |
| @@ -116,28 +116,24 @@ d2i_X509_EXTENSION(X509_EXTENSION **a, const unsigned char **in, long len) | |||
| 116 | return (X509_EXTENSION *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 116 | return (X509_EXTENSION *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 117 | &X509_EXTENSION_it); | 117 | &X509_EXTENSION_it); |
| 118 | } | 118 | } |
| 119 | LCRYPTO_ALIAS(d2i_X509_EXTENSION); | ||
| 120 | 119 | ||
| 121 | int | 120 | int |
| 122 | i2d_X509_EXTENSION(X509_EXTENSION *a, unsigned char **out) | 121 | i2d_X509_EXTENSION(X509_EXTENSION *a, unsigned char **out) |
| 123 | { | 122 | { |
| 124 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_EXTENSION_it); | 123 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_EXTENSION_it); |
| 125 | } | 124 | } |
| 126 | LCRYPTO_ALIAS(i2d_X509_EXTENSION); | ||
| 127 | 125 | ||
| 128 | X509_EXTENSION * | 126 | X509_EXTENSION * |
| 129 | X509_EXTENSION_new(void) | 127 | X509_EXTENSION_new(void) |
| 130 | { | 128 | { |
| 131 | return (X509_EXTENSION *)ASN1_item_new(&X509_EXTENSION_it); | 129 | return (X509_EXTENSION *)ASN1_item_new(&X509_EXTENSION_it); |
| 132 | } | 130 | } |
| 133 | LCRYPTO_ALIAS(X509_EXTENSION_new); | ||
| 134 | 131 | ||
| 135 | void | 132 | void |
| 136 | X509_EXTENSION_free(X509_EXTENSION *a) | 133 | X509_EXTENSION_free(X509_EXTENSION *a) |
| 137 | { | 134 | { |
| 138 | ASN1_item_free((ASN1_VALUE *)a, &X509_EXTENSION_it); | 135 | ASN1_item_free((ASN1_VALUE *)a, &X509_EXTENSION_it); |
| 139 | } | 136 | } |
| 140 | LCRYPTO_ALIAS(X509_EXTENSION_free); | ||
| 141 | 137 | ||
| 142 | X509_EXTENSIONS * | 138 | X509_EXTENSIONS * |
| 143 | d2i_X509_EXTENSIONS(X509_EXTENSIONS **a, const unsigned char **in, long len) | 139 | d2i_X509_EXTENSIONS(X509_EXTENSIONS **a, const unsigned char **in, long len) |
| @@ -145,18 +141,15 @@ d2i_X509_EXTENSIONS(X509_EXTENSIONS **a, const unsigned char **in, long len) | |||
| 145 | return (X509_EXTENSIONS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 141 | return (X509_EXTENSIONS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 146 | &X509_EXTENSIONS_it); | 142 | &X509_EXTENSIONS_it); |
| 147 | } | 143 | } |
| 148 | LCRYPTO_ALIAS(d2i_X509_EXTENSIONS); | ||
| 149 | 144 | ||
| 150 | int | 145 | int |
| 151 | i2d_X509_EXTENSIONS(X509_EXTENSIONS *a, unsigned char **out) | 146 | i2d_X509_EXTENSIONS(X509_EXTENSIONS *a, unsigned char **out) |
| 152 | { | 147 | { |
| 153 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_EXTENSIONS_it); | 148 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_EXTENSIONS_it); |
| 154 | } | 149 | } |
| 155 | LCRYPTO_ALIAS(i2d_X509_EXTENSIONS); | ||
| 156 | 150 | ||
| 157 | X509_EXTENSION * | 151 | X509_EXTENSION * |
| 158 | X509_EXTENSION_dup(X509_EXTENSION *x) | 152 | X509_EXTENSION_dup(X509_EXTENSION *x) |
| 159 | { | 153 | { |
| 160 | return ASN1_item_dup(&X509_EXTENSION_it, x); | 154 | return ASN1_item_dup(&X509_EXTENSION_it, x); |
| 161 | } | 155 | } |
| 162 | LCRYPTO_ALIAS(X509_EXTENSION_dup); | ||
diff --git a/src/lib/libcrypto/asn1/x_info.c b/src/lib/libcrypto/asn1/x_info.c index c3fa1288cc..3d2d5bad64 100644 --- a/src/lib/libcrypto/asn1/x_info.c +++ b/src/lib/libcrypto/asn1/x_info.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_info.c,v 1.19 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_info.c,v 1.20 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -75,7 +75,6 @@ X509_INFO_new(void) | |||
| 75 | 75 | ||
| 76 | return ret; | 76 | return ret; |
| 77 | } | 77 | } |
| 78 | LCRYPTO_ALIAS(X509_INFO_new); | ||
| 79 | 78 | ||
| 80 | void | 79 | void |
| 81 | X509_INFO_free(X509_INFO *x) | 80 | X509_INFO_free(X509_INFO *x) |
| @@ -93,4 +92,3 @@ X509_INFO_free(X509_INFO *x) | |||
| 93 | 92 | ||
| 94 | free(x); | 93 | free(x); |
| 95 | } | 94 | } |
| 96 | LCRYPTO_ALIAS(X509_INFO_free); | ||
diff --git a/src/lib/libcrypto/asn1/x_name.c b/src/lib/libcrypto/asn1/x_name.c index fa511d3993..eb544596a2 100644 --- a/src/lib/libcrypto/asn1/x_name.c +++ b/src/lib/libcrypto/asn1/x_name.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_name.c,v 1.39 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_name.c,v 1.40 2023/07/07 19:37:52 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -117,35 +117,30 @@ d2i_X509_NAME_ENTRY(X509_NAME_ENTRY **a, const unsigned char **in, long len) | |||
| 117 | return (X509_NAME_ENTRY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 117 | return (X509_NAME_ENTRY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 118 | &X509_NAME_ENTRY_it); | 118 | &X509_NAME_ENTRY_it); |
| 119 | } | 119 | } |
| 120 | LCRYPTO_ALIAS(d2i_X509_NAME_ENTRY); | ||
| 121 | 120 | ||
| 122 | int | 121 | int |
| 123 | i2d_X509_NAME_ENTRY(X509_NAME_ENTRY *a, unsigned char **out) | 122 | i2d_X509_NAME_ENTRY(X509_NAME_ENTRY *a, unsigned char **out) |
| 124 | { | 123 | { |
| 125 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_NAME_ENTRY_it); | 124 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_NAME_ENTRY_it); |
| 126 | } | 125 | } |
| 127 | LCRYPTO_ALIAS(i2d_X509_NAME_ENTRY); | ||
| 128 | 126 | ||
| 129 | X509_NAME_ENTRY * | 127 | X509_NAME_ENTRY * |
| 130 | X509_NAME_ENTRY_new(void) | 128 | X509_NAME_ENTRY_new(void) |
| 131 | { | 129 | { |
| 132 | return (X509_NAME_ENTRY *)ASN1_item_new(&X509_NAME_ENTRY_it); | 130 | return (X509_NAME_ENTRY *)ASN1_item_new(&X509_NAME_ENTRY_it); |
| 133 | } | 131 | } |
| 134 | LCRYPTO_ALIAS(X509_NAME_ENTRY_new); | ||
| 135 | 132 | ||
| 136 | void | 133 | void |
| 137 | X509_NAME_ENTRY_free(X509_NAME_ENTRY *a) | 134 | X509_NAME_ENTRY_free(X509_NAME_ENTRY *a) |
| 138 | { | 135 | { |
| 139 | ASN1_item_free((ASN1_VALUE *)a, &X509_NAME_ENTRY_it); | 136 | ASN1_item_free((ASN1_VALUE *)a, &X509_NAME_ENTRY_it); |
| 140 | } | 137 | } |
| 141 | LCRYPTO_ALIAS(X509_NAME_ENTRY_free); | ||
| 142 | 138 | ||
| 143 | X509_NAME_ENTRY * | 139 | X509_NAME_ENTRY * |
| 144 | X509_NAME_ENTRY_dup(X509_NAME_ENTRY *x) | 140 | X509_NAME_ENTRY_dup(X509_NAME_ENTRY *x) |
| 145 | { | 141 | { |
| 146 | return ASN1_item_dup(&X509_NAME_ENTRY_it, x); | 142 | return ASN1_item_dup(&X509_NAME_ENTRY_it, x); |
| 147 | } | 143 | } |
| 148 | LCRYPTO_ALIAS(X509_NAME_ENTRY_dup); | ||
| 149 | 144 | ||
| 150 | /* For the "Name" type we need a SEQUENCE OF { SET OF X509_NAME_ENTRY } | 145 | /* For the "Name" type we need a SEQUENCE OF { SET OF X509_NAME_ENTRY } |
| 151 | * so declare two template wrappers for this | 146 | * so declare two template wrappers for this |
| @@ -219,35 +214,30 @@ d2i_X509_NAME(X509_NAME **a, const unsigned char **in, long len) | |||
| 219 | return (X509_NAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 214 | return (X509_NAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 220 | &X509_NAME_it); | 215 | &X509_NAME_it); |
| 221 | } | 216 | } |
| 222 | LCRYPTO_ALIAS(d2i_X509_NAME); | ||
| 223 | 217 | ||
| 224 | int | 218 | int |
| 225 | i2d_X509_NAME(X509_NAME *a, unsigned char **out) | 219 | i2d_X509_NAME(X509_NAME *a, unsigned char **out) |
| 226 | { | 220 | { |
| 227 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_NAME_it); | 221 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_NAME_it); |
| 228 | } | 222 | } |
| 229 | LCRYPTO_ALIAS(i2d_X509_NAME); | ||
| 230 | 223 | ||
| 231 | X509_NAME * | 224 | X509_NAME * |
| 232 | X509_NAME_new(void) | 225 | X509_NAME_new(void) |
| 233 | { | 226 | { |
| 234 | return (X509_NAME *)ASN1_item_new(&X509_NAME_it); | 227 | return (X509_NAME *)ASN1_item_new(&X509_NAME_it); |
| 235 | } | 228 | } |
| 236 | LCRYPTO_ALIAS(X509_NAME_new); | ||
| 237 | 229 | ||
| 238 | void | 230 | void |
| 239 | X509_NAME_free(X509_NAME *a) | 231 | X509_NAME_free(X509_NAME *a) |
| 240 | { | 232 | { |
| 241 | ASN1_item_free((ASN1_VALUE *)a, &X509_NAME_it); | 233 | ASN1_item_free((ASN1_VALUE *)a, &X509_NAME_it); |
| 242 | } | 234 | } |
| 243 | LCRYPTO_ALIAS(X509_NAME_free); | ||
| 244 | 235 | ||
| 245 | X509_NAME * | 236 | X509_NAME * |
| 246 | X509_NAME_dup(X509_NAME *x) | 237 | X509_NAME_dup(X509_NAME *x) |
| 247 | { | 238 | { |
| 248 | return ASN1_item_dup(&X509_NAME_it, x); | 239 | return ASN1_item_dup(&X509_NAME_it, x); |
| 249 | } | 240 | } |
| 250 | LCRYPTO_ALIAS(X509_NAME_dup); | ||
| 251 | 241 | ||
| 252 | static int | 242 | static int |
| 253 | x509_name_ex_new(ASN1_VALUE **val, const ASN1_ITEM *it) | 243 | x509_name_ex_new(ASN1_VALUE **val, const ASN1_ITEM *it) |
| @@ -645,7 +635,6 @@ X509_NAME_set(X509_NAME **xn, X509_NAME *name) | |||
| 645 | *xn = name; | 635 | *xn = name; |
| 646 | return 1; | 636 | return 1; |
| 647 | } | 637 | } |
| 648 | LCRYPTO_ALIAS(X509_NAME_set); | ||
| 649 | 638 | ||
| 650 | int | 639 | int |
| 651 | X509_NAME_get0_der(X509_NAME *nm, const unsigned char **pder, size_t *pderlen) | 640 | X509_NAME_get0_der(X509_NAME *nm, const unsigned char **pder, size_t *pderlen) |
| @@ -659,4 +648,3 @@ X509_NAME_get0_der(X509_NAME *nm, const unsigned char **pder, size_t *pderlen) | |||
| 659 | *pderlen = nm->bytes->length; | 648 | *pderlen = nm->bytes->length; |
| 660 | return 1; | 649 | return 1; |
| 661 | } | 650 | } |
| 662 | LCRYPTO_ALIAS(X509_NAME_get0_der); | ||
diff --git a/src/lib/libcrypto/asn1/x_pkey.c b/src/lib/libcrypto/asn1/x_pkey.c index a71d1fdd7e..c4964fcd64 100644 --- a/src/lib/libcrypto/asn1/x_pkey.c +++ b/src/lib/libcrypto/asn1/x_pkey.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_pkey.c,v 1.22 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_pkey.c,v 1.23 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -98,7 +98,6 @@ X509_PKEY_new(void) | |||
| 98 | } | 98 | } |
| 99 | return NULL; | 99 | return NULL; |
| 100 | } | 100 | } |
| 101 | LCRYPTO_ALIAS(X509_PKEY_new); | ||
| 102 | 101 | ||
| 103 | void | 102 | void |
| 104 | X509_PKEY_free(X509_PKEY *x) | 103 | X509_PKEY_free(X509_PKEY *x) |
| @@ -120,4 +119,3 @@ X509_PKEY_free(X509_PKEY *x) | |||
| 120 | free(x->key_data); | 119 | free(x->key_data); |
| 121 | free(x); | 120 | free(x); |
| 122 | } | 121 | } |
| 123 | LCRYPTO_ALIAS(X509_PKEY_free); | ||
diff --git a/src/lib/libcrypto/asn1/x_pubkey.c b/src/lib/libcrypto/asn1/x_pubkey.c index 29211b3190..0534edcad0 100644 --- a/src/lib/libcrypto/asn1/x_pubkey.c +++ b/src/lib/libcrypto/asn1/x_pubkey.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_pubkey.c,v 1.34 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_pubkey.c,v 1.35 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -118,28 +118,24 @@ d2i_X509_PUBKEY(X509_PUBKEY **a, const unsigned char **in, long len) | |||
| 118 | return (X509_PUBKEY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 118 | return (X509_PUBKEY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 119 | &X509_PUBKEY_it); | 119 | &X509_PUBKEY_it); |
| 120 | } | 120 | } |
| 121 | LCRYPTO_ALIAS(d2i_X509_PUBKEY); | ||
| 122 | 121 | ||
| 123 | int | 122 | int |
| 124 | i2d_X509_PUBKEY(X509_PUBKEY *a, unsigned char **out) | 123 | i2d_X509_PUBKEY(X509_PUBKEY *a, unsigned char **out) |
| 125 | { | 124 | { |
| 126 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_PUBKEY_it); | 125 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_PUBKEY_it); |
| 127 | } | 126 | } |
| 128 | LCRYPTO_ALIAS(i2d_X509_PUBKEY); | ||
| 129 | 127 | ||
| 130 | X509_PUBKEY * | 128 | X509_PUBKEY * |
| 131 | X509_PUBKEY_new(void) | 129 | X509_PUBKEY_new(void) |
| 132 | { | 130 | { |
| 133 | return (X509_PUBKEY *)ASN1_item_new(&X509_PUBKEY_it); | 131 | return (X509_PUBKEY *)ASN1_item_new(&X509_PUBKEY_it); |
| 134 | } | 132 | } |
| 135 | LCRYPTO_ALIAS(X509_PUBKEY_new); | ||
| 136 | 133 | ||
| 137 | void | 134 | void |
| 138 | X509_PUBKEY_free(X509_PUBKEY *a) | 135 | X509_PUBKEY_free(X509_PUBKEY *a) |
| 139 | { | 136 | { |
| 140 | ASN1_item_free((ASN1_VALUE *)a, &X509_PUBKEY_it); | 137 | ASN1_item_free((ASN1_VALUE *)a, &X509_PUBKEY_it); |
| 141 | } | 138 | } |
| 142 | LCRYPTO_ALIAS(X509_PUBKEY_free); | ||
| 143 | 139 | ||
| 144 | int | 140 | int |
| 145 | X509_PUBKEY_set(X509_PUBKEY **x, EVP_PKEY *pkey) | 141 | X509_PUBKEY_set(X509_PUBKEY **x, EVP_PKEY *pkey) |
| @@ -178,7 +174,6 @@ X509_PUBKEY_set(X509_PUBKEY **x, EVP_PKEY *pkey) | |||
| 178 | X509_PUBKEY_free(pk); | 174 | X509_PUBKEY_free(pk); |
| 179 | return 0; | 175 | return 0; |
| 180 | } | 176 | } |
| 181 | LCRYPTO_ALIAS(X509_PUBKEY_set); | ||
| 182 | 177 | ||
| 183 | EVP_PKEY * | 178 | EVP_PKEY * |
| 184 | X509_PUBKEY_get0(X509_PUBKEY *key) | 179 | X509_PUBKEY_get0(X509_PUBKEY *key) |
| @@ -231,7 +226,6 @@ X509_PUBKEY_get0(X509_PUBKEY *key) | |||
| 231 | EVP_PKEY_free(ret); | 226 | EVP_PKEY_free(ret); |
| 232 | return (NULL); | 227 | return (NULL); |
| 233 | } | 228 | } |
| 234 | LCRYPTO_ALIAS(X509_PUBKEY_get0); | ||
| 235 | 229 | ||
| 236 | EVP_PKEY * | 230 | EVP_PKEY * |
| 237 | X509_PUBKEY_get(X509_PUBKEY *key) | 231 | X509_PUBKEY_get(X509_PUBKEY *key) |
| @@ -245,7 +239,6 @@ X509_PUBKEY_get(X509_PUBKEY *key) | |||
| 245 | 239 | ||
| 246 | return pkey; | 240 | return pkey; |
| 247 | } | 241 | } |
| 248 | LCRYPTO_ALIAS(X509_PUBKEY_get); | ||
| 249 | 242 | ||
| 250 | /* | 243 | /* |
| 251 | * Decode an X509_PUBKEY into the specified key type. | 244 | * Decode an X509_PUBKEY into the specified key type. |
| @@ -410,14 +403,12 @@ d2i_PUBKEY(EVP_PKEY **pkey, const unsigned char **in, long len) | |||
| 410 | return (EVP_PKEY *)ASN1_item_d2i((ASN1_VALUE **)pkey, in, len, | 403 | return (EVP_PKEY *)ASN1_item_d2i((ASN1_VALUE **)pkey, in, len, |
| 411 | &EVP_PKEY_PUBKEY_it); | 404 | &EVP_PKEY_PUBKEY_it); |
| 412 | } | 405 | } |
| 413 | LCRYPTO_ALIAS(d2i_PUBKEY); | ||
| 414 | 406 | ||
| 415 | int | 407 | int |
| 416 | i2d_PUBKEY(EVP_PKEY *pkey, unsigned char **out) | 408 | i2d_PUBKEY(EVP_PKEY *pkey, unsigned char **out) |
| 417 | { | 409 | { |
| 418 | return ASN1_item_i2d((ASN1_VALUE *)pkey, out, &EVP_PKEY_PUBKEY_it); | 410 | return ASN1_item_i2d((ASN1_VALUE *)pkey, out, &EVP_PKEY_PUBKEY_it); |
| 419 | } | 411 | } |
| 420 | LCRYPTO_ALIAS(i2d_PUBKEY); | ||
| 421 | 412 | ||
| 422 | EVP_PKEY * | 413 | EVP_PKEY * |
| 423 | d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **pkey) | 414 | d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **pkey) |
| @@ -425,14 +416,12 @@ d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **pkey) | |||
| 425 | return (EVP_PKEY *)ASN1_item_d2i_bio(&EVP_PKEY_PUBKEY_it, bp, | 416 | return (EVP_PKEY *)ASN1_item_d2i_bio(&EVP_PKEY_PUBKEY_it, bp, |
| 426 | (ASN1_VALUE **)pkey); | 417 | (ASN1_VALUE **)pkey); |
| 427 | } | 418 | } |
| 428 | LCRYPTO_ALIAS(d2i_PUBKEY_bio); | ||
| 429 | 419 | ||
| 430 | int | 420 | int |
| 431 | i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey) | 421 | i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey) |
| 432 | { | 422 | { |
| 433 | return ASN1_item_i2d_bio(&EVP_PKEY_PUBKEY_it, bp, (ASN1_VALUE *)pkey); | 423 | return ASN1_item_i2d_bio(&EVP_PKEY_PUBKEY_it, bp, (ASN1_VALUE *)pkey); |
| 434 | } | 424 | } |
| 435 | LCRYPTO_ALIAS(i2d_PUBKEY_bio); | ||
| 436 | 425 | ||
| 437 | EVP_PKEY * | 426 | EVP_PKEY * |
| 438 | d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **pkey) | 427 | d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **pkey) |
| @@ -440,14 +429,12 @@ d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **pkey) | |||
| 440 | return (EVP_PKEY *)ASN1_item_d2i_fp(&EVP_PKEY_PUBKEY_it, fp, | 429 | return (EVP_PKEY *)ASN1_item_d2i_fp(&EVP_PKEY_PUBKEY_it, fp, |
| 441 | (ASN1_VALUE **)pkey); | 430 | (ASN1_VALUE **)pkey); |
| 442 | } | 431 | } |
| 443 | LCRYPTO_ALIAS(d2i_PUBKEY_fp); | ||
| 444 | 432 | ||
| 445 | int | 433 | int |
| 446 | i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey) | 434 | i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey) |
| 447 | { | 435 | { |
| 448 | return ASN1_item_i2d_fp(&EVP_PKEY_PUBKEY_it, fp, (ASN1_VALUE *)pkey); | 436 | return ASN1_item_i2d_fp(&EVP_PKEY_PUBKEY_it, fp, (ASN1_VALUE *)pkey); |
| 449 | } | 437 | } |
| 450 | LCRYPTO_ALIAS(i2d_PUBKEY_fp); | ||
| 451 | 438 | ||
| 452 | /* | 439 | /* |
| 453 | * The following are equivalents but which return RSA and DSA keys. | 440 | * The following are equivalents but which return RSA and DSA keys. |
| @@ -510,42 +497,36 @@ d2i_RSA_PUBKEY(RSA **rsa, const unsigned char **in, long len) | |||
| 510 | return (RSA *)ASN1_item_d2i((ASN1_VALUE **)rsa, in, len, | 497 | return (RSA *)ASN1_item_d2i((ASN1_VALUE **)rsa, in, len, |
| 511 | &RSA_PUBKEY_it); | 498 | &RSA_PUBKEY_it); |
| 512 | } | 499 | } |
| 513 | LCRYPTO_ALIAS(d2i_RSA_PUBKEY); | ||
| 514 | 500 | ||
| 515 | int | 501 | int |
| 516 | i2d_RSA_PUBKEY(RSA *rsa, unsigned char **out) | 502 | i2d_RSA_PUBKEY(RSA *rsa, unsigned char **out) |
| 517 | { | 503 | { |
| 518 | return ASN1_item_i2d((ASN1_VALUE *)rsa, out, &RSA_PUBKEY_it); | 504 | return ASN1_item_i2d((ASN1_VALUE *)rsa, out, &RSA_PUBKEY_it); |
| 519 | } | 505 | } |
| 520 | LCRYPTO_ALIAS(i2d_RSA_PUBKEY); | ||
| 521 | 506 | ||
| 522 | RSA * | 507 | RSA * |
| 523 | d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa) | 508 | d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa) |
| 524 | { | 509 | { |
| 525 | return (RSA *)ASN1_item_d2i_bio(&RSA_PUBKEY_it, bp, (ASN1_VALUE **)rsa); | 510 | return (RSA *)ASN1_item_d2i_bio(&RSA_PUBKEY_it, bp, (ASN1_VALUE **)rsa); |
| 526 | } | 511 | } |
| 527 | LCRYPTO_ALIAS(d2i_RSA_PUBKEY_bio); | ||
| 528 | 512 | ||
| 529 | int | 513 | int |
| 530 | i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa) | 514 | i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa) |
| 531 | { | 515 | { |
| 532 | return ASN1_item_i2d_bio(&RSA_PUBKEY_it, bp, (ASN1_VALUE *)rsa); | 516 | return ASN1_item_i2d_bio(&RSA_PUBKEY_it, bp, (ASN1_VALUE *)rsa); |
| 533 | } | 517 | } |
| 534 | LCRYPTO_ALIAS(i2d_RSA_PUBKEY_bio); | ||
| 535 | 518 | ||
| 536 | RSA * | 519 | RSA * |
| 537 | d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) | 520 | d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) |
| 538 | { | 521 | { |
| 539 | return (RSA *)ASN1_item_d2i_fp(&RSA_PUBKEY_it, fp, (ASN1_VALUE **)rsa); | 522 | return (RSA *)ASN1_item_d2i_fp(&RSA_PUBKEY_it, fp, (ASN1_VALUE **)rsa); |
| 540 | } | 523 | } |
| 541 | LCRYPTO_ALIAS(d2i_RSA_PUBKEY_fp); | ||
| 542 | 524 | ||
| 543 | int | 525 | int |
| 544 | i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) | 526 | i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) |
| 545 | { | 527 | { |
| 546 | return ASN1_item_i2d_fp(&RSA_PUBKEY_it, fp, (ASN1_VALUE *)rsa); | 528 | return ASN1_item_i2d_fp(&RSA_PUBKEY_it, fp, (ASN1_VALUE *)rsa); |
| 547 | } | 529 | } |
| 548 | LCRYPTO_ALIAS(i2d_RSA_PUBKEY_fp); | ||
| 549 | #endif | 530 | #endif |
| 550 | 531 | ||
| 551 | #ifndef OPENSSL_NO_DSA | 532 | #ifndef OPENSSL_NO_DSA |
| @@ -606,42 +587,36 @@ d2i_DSA_PUBKEY(DSA **dsa, const unsigned char **in, long len) | |||
| 606 | return (DSA *)ASN1_item_d2i((ASN1_VALUE **)dsa, in, len, | 587 | return (DSA *)ASN1_item_d2i((ASN1_VALUE **)dsa, in, len, |
| 607 | &DSA_PUBKEY_it); | 588 | &DSA_PUBKEY_it); |
| 608 | } | 589 | } |
| 609 | LCRYPTO_ALIAS(d2i_DSA_PUBKEY); | ||
| 610 | 590 | ||
| 611 | int | 591 | int |
| 612 | i2d_DSA_PUBKEY(DSA *dsa, unsigned char **out) | 592 | i2d_DSA_PUBKEY(DSA *dsa, unsigned char **out) |
| 613 | { | 593 | { |
| 614 | return ASN1_item_i2d((ASN1_VALUE *)dsa, out, &DSA_PUBKEY_it); | 594 | return ASN1_item_i2d((ASN1_VALUE *)dsa, out, &DSA_PUBKEY_it); |
| 615 | } | 595 | } |
| 616 | LCRYPTO_ALIAS(i2d_DSA_PUBKEY); | ||
| 617 | 596 | ||
| 618 | DSA * | 597 | DSA * |
| 619 | d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa) | 598 | d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa) |
| 620 | { | 599 | { |
| 621 | return (DSA *)ASN1_item_d2i_bio(&DSA_PUBKEY_it, bp, (ASN1_VALUE **)dsa); | 600 | return (DSA *)ASN1_item_d2i_bio(&DSA_PUBKEY_it, bp, (ASN1_VALUE **)dsa); |
| 622 | } | 601 | } |
| 623 | LCRYPTO_ALIAS(d2i_DSA_PUBKEY_bio); | ||
| 624 | 602 | ||
| 625 | int | 603 | int |
| 626 | i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa) | 604 | i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa) |
| 627 | { | 605 | { |
| 628 | return ASN1_item_i2d_bio(&DSA_PUBKEY_it, bp, (ASN1_VALUE *)dsa); | 606 | return ASN1_item_i2d_bio(&DSA_PUBKEY_it, bp, (ASN1_VALUE *)dsa); |
| 629 | } | 607 | } |
| 630 | LCRYPTO_ALIAS(i2d_DSA_PUBKEY_bio); | ||
| 631 | 608 | ||
| 632 | DSA * | 609 | DSA * |
| 633 | d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa) | 610 | d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa) |
| 634 | { | 611 | { |
| 635 | return (DSA *)ASN1_item_d2i_fp(&DSA_PUBKEY_it, fp, (ASN1_VALUE **)dsa); | 612 | return (DSA *)ASN1_item_d2i_fp(&DSA_PUBKEY_it, fp, (ASN1_VALUE **)dsa); |
| 636 | } | 613 | } |
| 637 | LCRYPTO_ALIAS(d2i_DSA_PUBKEY_fp); | ||
| 638 | 614 | ||
| 639 | int | 615 | int |
| 640 | i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa) | 616 | i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa) |
| 641 | { | 617 | { |
| 642 | return ASN1_item_i2d_fp(&DSA_PUBKEY_it, fp, (ASN1_VALUE *)dsa); | 618 | return ASN1_item_i2d_fp(&DSA_PUBKEY_it, fp, (ASN1_VALUE *)dsa); |
| 643 | } | 619 | } |
| 644 | LCRYPTO_ALIAS(i2d_DSA_PUBKEY_fp); | ||
| 645 | 620 | ||
| 646 | #endif | 621 | #endif |
| 647 | 622 | ||
| @@ -703,42 +678,36 @@ d2i_EC_PUBKEY(EC_KEY **ec, const unsigned char **in, long len) | |||
| 703 | return (EC_KEY *)ASN1_item_d2i((ASN1_VALUE **)ec, in, len, | 678 | return (EC_KEY *)ASN1_item_d2i((ASN1_VALUE **)ec, in, len, |
| 704 | &EC_PUBKEY_it); | 679 | &EC_PUBKEY_it); |
| 705 | } | 680 | } |
| 706 | LCRYPTO_ALIAS(d2i_EC_PUBKEY); | ||
| 707 | 681 | ||
| 708 | int | 682 | int |
| 709 | i2d_EC_PUBKEY(EC_KEY *ec, unsigned char **out) | 683 | i2d_EC_PUBKEY(EC_KEY *ec, unsigned char **out) |
| 710 | { | 684 | { |
| 711 | return ASN1_item_i2d((ASN1_VALUE *)ec, out, &EC_PUBKEY_it); | 685 | return ASN1_item_i2d((ASN1_VALUE *)ec, out, &EC_PUBKEY_it); |
| 712 | } | 686 | } |
| 713 | LCRYPTO_ALIAS(i2d_EC_PUBKEY); | ||
| 714 | 687 | ||
| 715 | EC_KEY * | 688 | EC_KEY * |
| 716 | d2i_EC_PUBKEY_bio(BIO *bp, EC_KEY **ec) | 689 | d2i_EC_PUBKEY_bio(BIO *bp, EC_KEY **ec) |
| 717 | { | 690 | { |
| 718 | return (EC_KEY *)ASN1_item_d2i_bio(&EC_PUBKEY_it, bp, (ASN1_VALUE **)ec); | 691 | return (EC_KEY *)ASN1_item_d2i_bio(&EC_PUBKEY_it, bp, (ASN1_VALUE **)ec); |
| 719 | } | 692 | } |
| 720 | LCRYPTO_ALIAS(d2i_EC_PUBKEY_bio); | ||
| 721 | 693 | ||
| 722 | int | 694 | int |
| 723 | i2d_EC_PUBKEY_bio(BIO *bp, EC_KEY *ec) | 695 | i2d_EC_PUBKEY_bio(BIO *bp, EC_KEY *ec) |
| 724 | { | 696 | { |
| 725 | return ASN1_item_i2d_bio(&EC_PUBKEY_it, bp, (ASN1_VALUE *)ec); | 697 | return ASN1_item_i2d_bio(&EC_PUBKEY_it, bp, (ASN1_VALUE *)ec); |
| 726 | } | 698 | } |
| 727 | LCRYPTO_ALIAS(i2d_EC_PUBKEY_bio); | ||
| 728 | 699 | ||
| 729 | EC_KEY * | 700 | EC_KEY * |
| 730 | d2i_EC_PUBKEY_fp(FILE *fp, EC_KEY **ec) | 701 | d2i_EC_PUBKEY_fp(FILE *fp, EC_KEY **ec) |
| 731 | { | 702 | { |
| 732 | return (EC_KEY *)ASN1_item_d2i_fp(&EC_PUBKEY_it, fp, (ASN1_VALUE **)ec); | 703 | return (EC_KEY *)ASN1_item_d2i_fp(&EC_PUBKEY_it, fp, (ASN1_VALUE **)ec); |
| 733 | } | 704 | } |
| 734 | LCRYPTO_ALIAS(d2i_EC_PUBKEY_fp); | ||
| 735 | 705 | ||
| 736 | int | 706 | int |
| 737 | i2d_EC_PUBKEY_fp(FILE *fp, EC_KEY *ec) | 707 | i2d_EC_PUBKEY_fp(FILE *fp, EC_KEY *ec) |
| 738 | { | 708 | { |
| 739 | return ASN1_item_i2d_fp(&EC_PUBKEY_it, fp, (ASN1_VALUE *)ec); | 709 | return ASN1_item_i2d_fp(&EC_PUBKEY_it, fp, (ASN1_VALUE *)ec); |
| 740 | } | 710 | } |
| 741 | LCRYPTO_ALIAS(i2d_EC_PUBKEY_fp); | ||
| 742 | #endif | 711 | #endif |
| 743 | 712 | ||
| 744 | int | 713 | int |
| @@ -755,7 +724,6 @@ X509_PUBKEY_set0_param(X509_PUBKEY *pub, ASN1_OBJECT *aobj, int ptype, | |||
| 755 | 724 | ||
| 756 | return asn1_abs_set_unused_bits(pub->public_key, 0); | 725 | return asn1_abs_set_unused_bits(pub->public_key, 0); |
| 757 | } | 726 | } |
| 758 | LCRYPTO_ALIAS(X509_PUBKEY_set0_param); | ||
| 759 | 727 | ||
| 760 | int | 728 | int |
| 761 | X509_PUBKEY_get0_param(ASN1_OBJECT **ppkalg, const unsigned char **pk, | 729 | X509_PUBKEY_get0_param(ASN1_OBJECT **ppkalg, const unsigned char **pk, |
| @@ -771,4 +739,3 @@ X509_PUBKEY_get0_param(ASN1_OBJECT **ppkalg, const unsigned char **pk, | |||
| 771 | *pa = pub->algor; | 739 | *pa = pub->algor; |
| 772 | return 1; | 740 | return 1; |
| 773 | } | 741 | } |
| 774 | LCRYPTO_ALIAS(X509_PUBKEY_get0_param); | ||
diff --git a/src/lib/libcrypto/asn1/x_req.c b/src/lib/libcrypto/asn1/x_req.c index 9323f65071..9a6f0c7b08 100644 --- a/src/lib/libcrypto/asn1/x_req.c +++ b/src/lib/libcrypto/asn1/x_req.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_req.c,v 1.20 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_req.c,v 1.21 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -143,28 +143,24 @@ d2i_X509_REQ_INFO(X509_REQ_INFO **a, const unsigned char **in, long len) | |||
| 143 | return (X509_REQ_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 143 | return (X509_REQ_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 144 | &X509_REQ_INFO_it); | 144 | &X509_REQ_INFO_it); |
| 145 | } | 145 | } |
| 146 | LCRYPTO_ALIAS(d2i_X509_REQ_INFO); | ||
| 147 | 146 | ||
| 148 | int | 147 | int |
| 149 | i2d_X509_REQ_INFO(X509_REQ_INFO *a, unsigned char **out) | 148 | i2d_X509_REQ_INFO(X509_REQ_INFO *a, unsigned char **out) |
| 150 | { | 149 | { |
| 151 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_REQ_INFO_it); | 150 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_REQ_INFO_it); |
| 152 | } | 151 | } |
| 153 | LCRYPTO_ALIAS(i2d_X509_REQ_INFO); | ||
| 154 | 152 | ||
| 155 | X509_REQ_INFO * | 153 | X509_REQ_INFO * |
| 156 | X509_REQ_INFO_new(void) | 154 | X509_REQ_INFO_new(void) |
| 157 | { | 155 | { |
| 158 | return (X509_REQ_INFO *)ASN1_item_new(&X509_REQ_INFO_it); | 156 | return (X509_REQ_INFO *)ASN1_item_new(&X509_REQ_INFO_it); |
| 159 | } | 157 | } |
| 160 | LCRYPTO_ALIAS(X509_REQ_INFO_new); | ||
| 161 | 158 | ||
| 162 | void | 159 | void |
| 163 | X509_REQ_INFO_free(X509_REQ_INFO *a) | 160 | X509_REQ_INFO_free(X509_REQ_INFO *a) |
| 164 | { | 161 | { |
| 165 | ASN1_item_free((ASN1_VALUE *)a, &X509_REQ_INFO_it); | 162 | ASN1_item_free((ASN1_VALUE *)a, &X509_REQ_INFO_it); |
| 166 | } | 163 | } |
| 167 | LCRYPTO_ALIAS(X509_REQ_INFO_free); | ||
| 168 | 164 | ||
| 169 | static const ASN1_AUX X509_REQ_aux = { | 165 | static const ASN1_AUX X509_REQ_aux = { |
| 170 | .app_data = NULL, | 166 | .app_data = NULL, |
| @@ -207,42 +203,36 @@ d2i_X509_REQ(X509_REQ **a, const unsigned char **in, long len) | |||
| 207 | return (X509_REQ *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 203 | return (X509_REQ *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 208 | &X509_REQ_it); | 204 | &X509_REQ_it); |
| 209 | } | 205 | } |
| 210 | LCRYPTO_ALIAS(d2i_X509_REQ); | ||
| 211 | 206 | ||
| 212 | int | 207 | int |
| 213 | i2d_X509_REQ(X509_REQ *a, unsigned char **out) | 208 | i2d_X509_REQ(X509_REQ *a, unsigned char **out) |
| 214 | { | 209 | { |
| 215 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_REQ_it); | 210 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_REQ_it); |
| 216 | } | 211 | } |
| 217 | LCRYPTO_ALIAS(i2d_X509_REQ); | ||
| 218 | 212 | ||
| 219 | X509_REQ * | 213 | X509_REQ * |
| 220 | X509_REQ_new(void) | 214 | X509_REQ_new(void) |
| 221 | { | 215 | { |
| 222 | return (X509_REQ *)ASN1_item_new(&X509_REQ_it); | 216 | return (X509_REQ *)ASN1_item_new(&X509_REQ_it); |
| 223 | } | 217 | } |
| 224 | LCRYPTO_ALIAS(X509_REQ_new); | ||
| 225 | 218 | ||
| 226 | void | 219 | void |
| 227 | X509_REQ_free(X509_REQ *a) | 220 | X509_REQ_free(X509_REQ *a) |
| 228 | { | 221 | { |
| 229 | ASN1_item_free((ASN1_VALUE *)a, &X509_REQ_it); | 222 | ASN1_item_free((ASN1_VALUE *)a, &X509_REQ_it); |
| 230 | } | 223 | } |
| 231 | LCRYPTO_ALIAS(X509_REQ_free); | ||
| 232 | 224 | ||
| 233 | X509_REQ * | 225 | X509_REQ * |
| 234 | X509_REQ_dup(X509_REQ *x) | 226 | X509_REQ_dup(X509_REQ *x) |
| 235 | { | 227 | { |
| 236 | return ASN1_item_dup(&X509_REQ_it, x); | 228 | return ASN1_item_dup(&X509_REQ_it, x); |
| 237 | } | 229 | } |
| 238 | LCRYPTO_ALIAS(X509_REQ_dup); | ||
| 239 | 230 | ||
| 240 | int | 231 | int |
| 241 | X509_REQ_get_signature_nid(const X509_REQ *req) | 232 | X509_REQ_get_signature_nid(const X509_REQ *req) |
| 242 | { | 233 | { |
| 243 | return OBJ_obj2nid(req->sig_alg->algorithm); | 234 | return OBJ_obj2nid(req->sig_alg->algorithm); |
| 244 | } | 235 | } |
| 245 | LCRYPTO_ALIAS(X509_REQ_get_signature_nid); | ||
| 246 | 236 | ||
| 247 | void | 237 | void |
| 248 | X509_REQ_get0_signature(const X509_REQ *req, const ASN1_BIT_STRING **psig, | 238 | X509_REQ_get0_signature(const X509_REQ *req, const ASN1_BIT_STRING **psig, |
| @@ -253,4 +243,3 @@ X509_REQ_get0_signature(const X509_REQ *req, const ASN1_BIT_STRING **psig, | |||
| 253 | if (palg != NULL) | 243 | if (palg != NULL) |
| 254 | *palg = req->sig_alg; | 244 | *palg = req->sig_alg; |
| 255 | } | 245 | } |
| 256 | LCRYPTO_ALIAS(X509_REQ_get0_signature); | ||
diff --git a/src/lib/libcrypto/asn1/x_sig.c b/src/lib/libcrypto/asn1/x_sig.c index 9e1ed75d01..c55de71416 100644 --- a/src/lib/libcrypto/asn1/x_sig.c +++ b/src/lib/libcrypto/asn1/x_sig.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_sig.c,v 1.15 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_sig.c,v 1.16 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -92,28 +92,24 @@ d2i_X509_SIG(X509_SIG **a, const unsigned char **in, long len) | |||
| 92 | return (X509_SIG *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 92 | return (X509_SIG *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 93 | &X509_SIG_it); | 93 | &X509_SIG_it); |
| 94 | } | 94 | } |
| 95 | LCRYPTO_ALIAS(d2i_X509_SIG); | ||
| 96 | 95 | ||
| 97 | int | 96 | int |
| 98 | i2d_X509_SIG(X509_SIG *a, unsigned char **out) | 97 | i2d_X509_SIG(X509_SIG *a, unsigned char **out) |
| 99 | { | 98 | { |
| 100 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_SIG_it); | 99 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_SIG_it); |
| 101 | } | 100 | } |
| 102 | LCRYPTO_ALIAS(i2d_X509_SIG); | ||
| 103 | 101 | ||
| 104 | X509_SIG * | 102 | X509_SIG * |
| 105 | X509_SIG_new(void) | 103 | X509_SIG_new(void) |
| 106 | { | 104 | { |
| 107 | return (X509_SIG *)ASN1_item_new(&X509_SIG_it); | 105 | return (X509_SIG *)ASN1_item_new(&X509_SIG_it); |
| 108 | } | 106 | } |
| 109 | LCRYPTO_ALIAS(X509_SIG_new); | ||
| 110 | 107 | ||
| 111 | void | 108 | void |
| 112 | X509_SIG_free(X509_SIG *a) | 109 | X509_SIG_free(X509_SIG *a) |
| 113 | { | 110 | { |
| 114 | ASN1_item_free((ASN1_VALUE *)a, &X509_SIG_it); | 111 | ASN1_item_free((ASN1_VALUE *)a, &X509_SIG_it); |
| 115 | } | 112 | } |
| 116 | LCRYPTO_ALIAS(X509_SIG_free); | ||
| 117 | 113 | ||
| 118 | void | 114 | void |
| 119 | X509_SIG_get0(const X509_SIG *sig, const X509_ALGOR **palg, | 115 | X509_SIG_get0(const X509_SIG *sig, const X509_ALGOR **palg, |
| @@ -124,7 +120,6 @@ X509_SIG_get0(const X509_SIG *sig, const X509_ALGOR **palg, | |||
| 124 | if (pdigest != NULL) | 120 | if (pdigest != NULL) |
| 125 | *pdigest = sig->digest; | 121 | *pdigest = sig->digest; |
| 126 | } | 122 | } |
| 127 | LCRYPTO_ALIAS(X509_SIG_get0); | ||
| 128 | 123 | ||
| 129 | void | 124 | void |
| 130 | X509_SIG_getm(X509_SIG *sig, X509_ALGOR **palg, ASN1_OCTET_STRING **pdigest) | 125 | X509_SIG_getm(X509_SIG *sig, X509_ALGOR **palg, ASN1_OCTET_STRING **pdigest) |
| @@ -134,4 +129,3 @@ X509_SIG_getm(X509_SIG *sig, X509_ALGOR **palg, ASN1_OCTET_STRING **pdigest) | |||
| 134 | if (pdigest != NULL) | 129 | if (pdigest != NULL) |
| 135 | *pdigest = sig->digest; | 130 | *pdigest = sig->digest; |
| 136 | } | 131 | } |
| 137 | LCRYPTO_ALIAS(X509_SIG_getm); | ||
diff --git a/src/lib/libcrypto/asn1/x_spki.c b/src/lib/libcrypto/asn1/x_spki.c index 534fc7ac5c..ef6053339b 100644 --- a/src/lib/libcrypto/asn1/x_spki.c +++ b/src/lib/libcrypto/asn1/x_spki.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_spki.c,v 1.12 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_spki.c,v 1.13 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -94,28 +94,24 @@ d2i_NETSCAPE_SPKAC(NETSCAPE_SPKAC **a, const unsigned char **in, long len) | |||
| 94 | return (NETSCAPE_SPKAC *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 94 | return (NETSCAPE_SPKAC *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 95 | &NETSCAPE_SPKAC_it); | 95 | &NETSCAPE_SPKAC_it); |
| 96 | } | 96 | } |
| 97 | LCRYPTO_ALIAS(d2i_NETSCAPE_SPKAC); | ||
| 98 | 97 | ||
| 99 | int | 98 | int |
| 100 | i2d_NETSCAPE_SPKAC(NETSCAPE_SPKAC *a, unsigned char **out) | 99 | i2d_NETSCAPE_SPKAC(NETSCAPE_SPKAC *a, unsigned char **out) |
| 101 | { | 100 | { |
| 102 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &NETSCAPE_SPKAC_it); | 101 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &NETSCAPE_SPKAC_it); |
| 103 | } | 102 | } |
| 104 | LCRYPTO_ALIAS(i2d_NETSCAPE_SPKAC); | ||
| 105 | 103 | ||
| 106 | NETSCAPE_SPKAC * | 104 | NETSCAPE_SPKAC * |
| 107 | NETSCAPE_SPKAC_new(void) | 105 | NETSCAPE_SPKAC_new(void) |
| 108 | { | 106 | { |
| 109 | return (NETSCAPE_SPKAC *)ASN1_item_new(&NETSCAPE_SPKAC_it); | 107 | return (NETSCAPE_SPKAC *)ASN1_item_new(&NETSCAPE_SPKAC_it); |
| 110 | } | 108 | } |
| 111 | LCRYPTO_ALIAS(NETSCAPE_SPKAC_new); | ||
| 112 | 109 | ||
| 113 | void | 110 | void |
| 114 | NETSCAPE_SPKAC_free(NETSCAPE_SPKAC *a) | 111 | NETSCAPE_SPKAC_free(NETSCAPE_SPKAC *a) |
| 115 | { | 112 | { |
| 116 | ASN1_item_free((ASN1_VALUE *)a, &NETSCAPE_SPKAC_it); | 113 | ASN1_item_free((ASN1_VALUE *)a, &NETSCAPE_SPKAC_it); |
| 117 | } | 114 | } |
| 118 | LCRYPTO_ALIAS(NETSCAPE_SPKAC_free); | ||
| 119 | 115 | ||
| 120 | static const ASN1_TEMPLATE NETSCAPE_SPKI_seq_tt[] = { | 116 | static const ASN1_TEMPLATE NETSCAPE_SPKI_seq_tt[] = { |
| 121 | { | 117 | { |
| @@ -158,25 +154,21 @@ d2i_NETSCAPE_SPKI(NETSCAPE_SPKI **a, const unsigned char **in, long len) | |||
| 158 | return (NETSCAPE_SPKI *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 154 | return (NETSCAPE_SPKI *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 159 | &NETSCAPE_SPKI_it); | 155 | &NETSCAPE_SPKI_it); |
| 160 | } | 156 | } |
| 161 | LCRYPTO_ALIAS(d2i_NETSCAPE_SPKI); | ||
| 162 | 157 | ||
| 163 | int | 158 | int |
| 164 | i2d_NETSCAPE_SPKI(NETSCAPE_SPKI *a, unsigned char **out) | 159 | i2d_NETSCAPE_SPKI(NETSCAPE_SPKI *a, unsigned char **out) |
| 165 | { | 160 | { |
| 166 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &NETSCAPE_SPKI_it); | 161 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &NETSCAPE_SPKI_it); |
| 167 | } | 162 | } |
| 168 | LCRYPTO_ALIAS(i2d_NETSCAPE_SPKI); | ||
| 169 | 163 | ||
| 170 | NETSCAPE_SPKI * | 164 | NETSCAPE_SPKI * |
| 171 | NETSCAPE_SPKI_new(void) | 165 | NETSCAPE_SPKI_new(void) |
| 172 | { | 166 | { |
| 173 | return (NETSCAPE_SPKI *)ASN1_item_new(&NETSCAPE_SPKI_it); | 167 | return (NETSCAPE_SPKI *)ASN1_item_new(&NETSCAPE_SPKI_it); |
| 174 | } | 168 | } |
| 175 | LCRYPTO_ALIAS(NETSCAPE_SPKI_new); | ||
| 176 | 169 | ||
| 177 | void | 170 | void |
| 178 | NETSCAPE_SPKI_free(NETSCAPE_SPKI *a) | 171 | NETSCAPE_SPKI_free(NETSCAPE_SPKI *a) |
| 179 | { | 172 | { |
| 180 | ASN1_item_free((ASN1_VALUE *)a, &NETSCAPE_SPKI_it); | 173 | ASN1_item_free((ASN1_VALUE *)a, &NETSCAPE_SPKI_it); |
| 181 | } | 174 | } |
| 182 | LCRYPTO_ALIAS(NETSCAPE_SPKI_free); | ||
diff --git a/src/lib/libcrypto/asn1/x_val.c b/src/lib/libcrypto/asn1/x_val.c index 83c4823e26..a9c9c481e0 100644 --- a/src/lib/libcrypto/asn1/x_val.c +++ b/src/lib/libcrypto/asn1/x_val.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_val.c,v 1.12 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_val.c,v 1.13 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -90,25 +90,21 @@ d2i_X509_VAL(X509_VAL **a, const unsigned char **in, long len) | |||
| 90 | return (X509_VAL *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 90 | return (X509_VAL *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 91 | &X509_VAL_it); | 91 | &X509_VAL_it); |
| 92 | } | 92 | } |
| 93 | LCRYPTO_ALIAS(d2i_X509_VAL); | ||
| 94 | 93 | ||
| 95 | int | 94 | int |
| 96 | i2d_X509_VAL(X509_VAL *a, unsigned char **out) | 95 | i2d_X509_VAL(X509_VAL *a, unsigned char **out) |
| 97 | { | 96 | { |
| 98 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_VAL_it); | 97 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_VAL_it); |
| 99 | } | 98 | } |
| 100 | LCRYPTO_ALIAS(i2d_X509_VAL); | ||
| 101 | 99 | ||
| 102 | X509_VAL * | 100 | X509_VAL * |
| 103 | X509_VAL_new(void) | 101 | X509_VAL_new(void) |
| 104 | { | 102 | { |
| 105 | return (X509_VAL *)ASN1_item_new(&X509_VAL_it); | 103 | return (X509_VAL *)ASN1_item_new(&X509_VAL_it); |
| 106 | } | 104 | } |
| 107 | LCRYPTO_ALIAS(X509_VAL_new); | ||
| 108 | 105 | ||
| 109 | void | 106 | void |
| 110 | X509_VAL_free(X509_VAL *a) | 107 | X509_VAL_free(X509_VAL *a) |
| 111 | { | 108 | { |
| 112 | ASN1_item_free((ASN1_VALUE *)a, &X509_VAL_it); | 109 | ASN1_item_free((ASN1_VALUE *)a, &X509_VAL_it); |
| 113 | } | 110 | } |
| 114 | LCRYPTO_ALIAS(X509_VAL_free); | ||
diff --git a/src/lib/libcrypto/asn1/x_x509.c b/src/lib/libcrypto/asn1/x_x509.c index 5aa7147548..08e4dba9e8 100644 --- a/src/lib/libcrypto/asn1/x_x509.c +++ b/src/lib/libcrypto/asn1/x_x509.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_x509.c,v 1.36 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_x509.c,v 1.37 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -149,28 +149,24 @@ d2i_X509_CINF(X509_CINF **a, const unsigned char **in, long len) | |||
| 149 | return (X509_CINF *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 149 | return (X509_CINF *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 150 | &X509_CINF_it); | 150 | &X509_CINF_it); |
| 151 | } | 151 | } |
| 152 | LCRYPTO_ALIAS(d2i_X509_CINF); | ||
| 153 | 152 | ||
| 154 | int | 153 | int |
| 155 | i2d_X509_CINF(X509_CINF *a, unsigned char **out) | 154 | i2d_X509_CINF(X509_CINF *a, unsigned char **out) |
| 156 | { | 155 | { |
| 157 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_CINF_it); | 156 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_CINF_it); |
| 158 | } | 157 | } |
| 159 | LCRYPTO_ALIAS(i2d_X509_CINF); | ||
| 160 | 158 | ||
| 161 | X509_CINF * | 159 | X509_CINF * |
| 162 | X509_CINF_new(void) | 160 | X509_CINF_new(void) |
| 163 | { | 161 | { |
| 164 | return (X509_CINF *)ASN1_item_new(&X509_CINF_it); | 162 | return (X509_CINF *)ASN1_item_new(&X509_CINF_it); |
| 165 | } | 163 | } |
| 166 | LCRYPTO_ALIAS(X509_CINF_new); | ||
| 167 | 164 | ||
| 168 | void | 165 | void |
| 169 | X509_CINF_free(X509_CINF *a) | 166 | X509_CINF_free(X509_CINF *a) |
| 170 | { | 167 | { |
| 171 | ASN1_item_free((ASN1_VALUE *)a, &X509_CINF_it); | 168 | ASN1_item_free((ASN1_VALUE *)a, &X509_CINF_it); |
| 172 | } | 169 | } |
| 173 | LCRYPTO_ALIAS(X509_CINF_free); | ||
| 174 | /* X509 top level structure needs a bit of customisation */ | 170 | /* X509 top level structure needs a bit of customisation */ |
| 175 | 171 | ||
| 176 | static int | 172 | static int |
| @@ -263,35 +259,30 @@ d2i_X509(X509 **a, const unsigned char **in, long len) | |||
| 263 | return (X509 *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 259 | return (X509 *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 264 | &X509_it); | 260 | &X509_it); |
| 265 | } | 261 | } |
| 266 | LCRYPTO_ALIAS(d2i_X509); | ||
| 267 | 262 | ||
| 268 | int | 263 | int |
| 269 | i2d_X509(X509 *a, unsigned char **out) | 264 | i2d_X509(X509 *a, unsigned char **out) |
| 270 | { | 265 | { |
| 271 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_it); | 266 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_it); |
| 272 | } | 267 | } |
| 273 | LCRYPTO_ALIAS(i2d_X509); | ||
| 274 | 268 | ||
| 275 | X509 * | 269 | X509 * |
| 276 | X509_new(void) | 270 | X509_new(void) |
| 277 | { | 271 | { |
| 278 | return (X509 *)ASN1_item_new(&X509_it); | 272 | return (X509 *)ASN1_item_new(&X509_it); |
| 279 | } | 273 | } |
| 280 | LCRYPTO_ALIAS(X509_new); | ||
| 281 | 274 | ||
| 282 | void | 275 | void |
| 283 | X509_free(X509 *a) | 276 | X509_free(X509 *a) |
| 284 | { | 277 | { |
| 285 | ASN1_item_free((ASN1_VALUE *)a, &X509_it); | 278 | ASN1_item_free((ASN1_VALUE *)a, &X509_it); |
| 286 | } | 279 | } |
| 287 | LCRYPTO_ALIAS(X509_free); | ||
| 288 | 280 | ||
| 289 | X509 * | 281 | X509 * |
| 290 | X509_dup(X509 *x) | 282 | X509_dup(X509 *x) |
| 291 | { | 283 | { |
| 292 | return ASN1_item_dup(&X509_it, x); | 284 | return ASN1_item_dup(&X509_it, x); |
| 293 | } | 285 | } |
| 294 | LCRYPTO_ALIAS(X509_dup); | ||
| 295 | 286 | ||
| 296 | int | 287 | int |
| 297 | X509_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | 288 | X509_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, |
| @@ -300,21 +291,18 @@ X509_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | |||
| 300 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_X509, argl, argp, | 291 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_X509, argl, argp, |
| 301 | new_func, dup_func, free_func); | 292 | new_func, dup_func, free_func); |
| 302 | } | 293 | } |
| 303 | LCRYPTO_ALIAS(X509_get_ex_new_index); | ||
| 304 | 294 | ||
| 305 | int | 295 | int |
| 306 | X509_set_ex_data(X509 *r, int idx, void *arg) | 296 | X509_set_ex_data(X509 *r, int idx, void *arg) |
| 307 | { | 297 | { |
| 308 | return (CRYPTO_set_ex_data(&r->ex_data, idx, arg)); | 298 | return (CRYPTO_set_ex_data(&r->ex_data, idx, arg)); |
| 309 | } | 299 | } |
| 310 | LCRYPTO_ALIAS(X509_set_ex_data); | ||
| 311 | 300 | ||
| 312 | void * | 301 | void * |
| 313 | X509_get_ex_data(X509 *r, int idx) | 302 | X509_get_ex_data(X509 *r, int idx) |
| 314 | { | 303 | { |
| 315 | return (CRYPTO_get_ex_data(&r->ex_data, idx)); | 304 | return (CRYPTO_get_ex_data(&r->ex_data, idx)); |
| 316 | } | 305 | } |
| 317 | LCRYPTO_ALIAS(X509_get_ex_data); | ||
| 318 | 306 | ||
| 319 | /* X509_AUX ASN1 routines. X509_AUX is the name given to | 307 | /* X509_AUX ASN1 routines. X509_AUX is the name given to |
| 320 | * a certificate with extra info tagged on the end. Since these | 308 | * a certificate with extra info tagged on the end. Since these |
| @@ -352,7 +340,6 @@ d2i_X509_AUX(X509 **a, const unsigned char **pp, long length) | |||
| 352 | X509_free(ret); | 340 | X509_free(ret); |
| 353 | return NULL; | 341 | return NULL; |
| 354 | } | 342 | } |
| 355 | LCRYPTO_ALIAS(d2i_X509_AUX); | ||
| 356 | 343 | ||
| 357 | int | 344 | int |
| 358 | i2d_X509_AUX(X509 *a, unsigned char **pp) | 345 | i2d_X509_AUX(X509 *a, unsigned char **pp) |
| @@ -364,7 +351,6 @@ i2d_X509_AUX(X509 *a, unsigned char **pp) | |||
| 364 | length += i2d_X509_CERT_AUX(a->aux, pp); | 351 | length += i2d_X509_CERT_AUX(a->aux, pp); |
| 365 | return length; | 352 | return length; |
| 366 | } | 353 | } |
| 367 | LCRYPTO_ALIAS(i2d_X509_AUX); | ||
| 368 | 354 | ||
| 369 | int | 355 | int |
| 370 | i2d_re_X509_tbs(X509 *x, unsigned char **pp) | 356 | i2d_re_X509_tbs(X509 *x, unsigned char **pp) |
| @@ -372,7 +358,6 @@ i2d_re_X509_tbs(X509 *x, unsigned char **pp) | |||
| 372 | x->cert_info->enc.modified = 1; | 358 | x->cert_info->enc.modified = 1; |
| 373 | return i2d_X509_CINF(x->cert_info, pp); | 359 | return i2d_X509_CINF(x->cert_info, pp); |
| 374 | } | 360 | } |
| 375 | LCRYPTO_ALIAS(i2d_re_X509_tbs); | ||
| 376 | 361 | ||
| 377 | void | 362 | void |
| 378 | X509_get0_signature(const ASN1_BIT_STRING **psig, const X509_ALGOR **palg, | 363 | X509_get0_signature(const ASN1_BIT_STRING **psig, const X509_ALGOR **palg, |
| @@ -383,11 +368,9 @@ X509_get0_signature(const ASN1_BIT_STRING **psig, const X509_ALGOR **palg, | |||
| 383 | if (palg != NULL) | 368 | if (palg != NULL) |
| 384 | *palg = x->sig_alg; | 369 | *palg = x->sig_alg; |
| 385 | } | 370 | } |
| 386 | LCRYPTO_ALIAS(X509_get0_signature); | ||
| 387 | 371 | ||
| 388 | int | 372 | int |
| 389 | X509_get_signature_nid(const X509 *x) | 373 | X509_get_signature_nid(const X509 *x) |
| 390 | { | 374 | { |
| 391 | return OBJ_obj2nid(x->sig_alg->algorithm); | 375 | return OBJ_obj2nid(x->sig_alg->algorithm); |
| 392 | } | 376 | } |
| 393 | LCRYPTO_ALIAS(X509_get_signature_nid); | ||
diff --git a/src/lib/libcrypto/asn1/x_x509a.c b/src/lib/libcrypto/asn1/x_x509a.c index 36c7599bc6..2b6fe7fcec 100644 --- a/src/lib/libcrypto/asn1/x_x509a.c +++ b/src/lib/libcrypto/asn1/x_x509a.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x_x509a.c,v 1.20 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: x_x509a.c,v 1.21 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 1999. | 3 | * project 1999. |
| 4 | */ | 4 | */ |
| @@ -126,28 +126,24 @@ d2i_X509_CERT_AUX(X509_CERT_AUX **a, const unsigned char **in, long len) | |||
| 126 | return (X509_CERT_AUX *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 126 | return (X509_CERT_AUX *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 127 | &X509_CERT_AUX_it); | 127 | &X509_CERT_AUX_it); |
| 128 | } | 128 | } |
| 129 | LCRYPTO_ALIAS(d2i_X509_CERT_AUX); | ||
| 130 | 129 | ||
| 131 | int | 130 | int |
| 132 | i2d_X509_CERT_AUX(X509_CERT_AUX *a, unsigned char **out) | 131 | i2d_X509_CERT_AUX(X509_CERT_AUX *a, unsigned char **out) |
| 133 | { | 132 | { |
| 134 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_CERT_AUX_it); | 133 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &X509_CERT_AUX_it); |
| 135 | } | 134 | } |
| 136 | LCRYPTO_ALIAS(i2d_X509_CERT_AUX); | ||
| 137 | 135 | ||
| 138 | X509_CERT_AUX * | 136 | X509_CERT_AUX * |
| 139 | X509_CERT_AUX_new(void) | 137 | X509_CERT_AUX_new(void) |
| 140 | { | 138 | { |
| 141 | return (X509_CERT_AUX *)ASN1_item_new(&X509_CERT_AUX_it); | 139 | return (X509_CERT_AUX *)ASN1_item_new(&X509_CERT_AUX_it); |
| 142 | } | 140 | } |
| 143 | LCRYPTO_ALIAS(X509_CERT_AUX_new); | ||
| 144 | 141 | ||
| 145 | void | 142 | void |
| 146 | X509_CERT_AUX_free(X509_CERT_AUX *a) | 143 | X509_CERT_AUX_free(X509_CERT_AUX *a) |
| 147 | { | 144 | { |
| 148 | ASN1_item_free((ASN1_VALUE *)a, &X509_CERT_AUX_it); | 145 | ASN1_item_free((ASN1_VALUE *)a, &X509_CERT_AUX_it); |
| 149 | } | 146 | } |
| 150 | LCRYPTO_ALIAS(X509_CERT_AUX_free); | ||
| 151 | 147 | ||
| 152 | static X509_CERT_AUX * | 148 | static X509_CERT_AUX * |
| 153 | aux_get(X509 *x) | 149 | aux_get(X509 *x) |
| @@ -176,7 +172,6 @@ X509_alias_set1(X509 *x, const unsigned char *name, int len) | |||
| 176 | return 0; | 172 | return 0; |
| 177 | return ASN1_STRING_set(aux->alias, name, len); | 173 | return ASN1_STRING_set(aux->alias, name, len); |
| 178 | } | 174 | } |
| 179 | LCRYPTO_ALIAS(X509_alias_set1); | ||
| 180 | 175 | ||
| 181 | int | 176 | int |
| 182 | X509_keyid_set1(X509 *x, const unsigned char *id, int len) | 177 | X509_keyid_set1(X509 *x, const unsigned char *id, int len) |
| @@ -195,7 +190,6 @@ X509_keyid_set1(X509 *x, const unsigned char *id, int len) | |||
| 195 | return 0; | 190 | return 0; |
| 196 | return ASN1_STRING_set(aux->keyid, id, len); | 191 | return ASN1_STRING_set(aux->keyid, id, len); |
| 197 | } | 192 | } |
| 198 | LCRYPTO_ALIAS(X509_keyid_set1); | ||
| 199 | 193 | ||
| 200 | unsigned char * | 194 | unsigned char * |
| 201 | X509_alias_get0(X509 *x, int *len) | 195 | X509_alias_get0(X509 *x, int *len) |
| @@ -206,7 +200,6 @@ X509_alias_get0(X509 *x, int *len) | |||
| 206 | *len = x->aux->alias->length; | 200 | *len = x->aux->alias->length; |
| 207 | return x->aux->alias->data; | 201 | return x->aux->alias->data; |
| 208 | } | 202 | } |
| 209 | LCRYPTO_ALIAS(X509_alias_get0); | ||
| 210 | 203 | ||
| 211 | unsigned char * | 204 | unsigned char * |
| 212 | X509_keyid_get0(X509 *x, int *len) | 205 | X509_keyid_get0(X509 *x, int *len) |
| @@ -217,7 +210,6 @@ X509_keyid_get0(X509 *x, int *len) | |||
| 217 | *len = x->aux->keyid->length; | 210 | *len = x->aux->keyid->length; |
| 218 | return x->aux->keyid->data; | 211 | return x->aux->keyid->data; |
| 219 | } | 212 | } |
| 220 | LCRYPTO_ALIAS(X509_keyid_get0); | ||
| 221 | 213 | ||
| 222 | int | 214 | int |
| 223 | X509_add1_trust_object(X509 *x, const ASN1_OBJECT *obj) | 215 | X509_add1_trust_object(X509 *x, const ASN1_OBJECT *obj) |
| @@ -240,7 +232,6 @@ X509_add1_trust_object(X509 *x, const ASN1_OBJECT *obj) | |||
| 240 | ASN1_OBJECT_free(objtmp); | 232 | ASN1_OBJECT_free(objtmp); |
| 241 | return 0; | 233 | return 0; |
| 242 | } | 234 | } |
| 243 | LCRYPTO_ALIAS(X509_add1_trust_object); | ||
| 244 | 235 | ||
| 245 | int | 236 | int |
| 246 | X509_add1_reject_object(X509 *x, const ASN1_OBJECT *obj) | 237 | X509_add1_reject_object(X509 *x, const ASN1_OBJECT *obj) |
| @@ -263,7 +254,6 @@ X509_add1_reject_object(X509 *x, const ASN1_OBJECT *obj) | |||
| 263 | ASN1_OBJECT_free(objtmp); | 254 | ASN1_OBJECT_free(objtmp); |
| 264 | return 0; | 255 | return 0; |
| 265 | } | 256 | } |
| 266 | LCRYPTO_ALIAS(X509_add1_reject_object); | ||
| 267 | 257 | ||
| 268 | void | 258 | void |
| 269 | X509_trust_clear(X509 *x) | 259 | X509_trust_clear(X509 *x) |
| @@ -273,7 +263,6 @@ X509_trust_clear(X509 *x) | |||
| 273 | x->aux->trust = NULL; | 263 | x->aux->trust = NULL; |
| 274 | } | 264 | } |
| 275 | } | 265 | } |
| 276 | LCRYPTO_ALIAS(X509_trust_clear); | ||
| 277 | 266 | ||
| 278 | void | 267 | void |
| 279 | X509_reject_clear(X509 *x) | 268 | X509_reject_clear(X509 *x) |
| @@ -283,4 +272,3 @@ X509_reject_clear(X509 *x) | |||
| 283 | x->aux->reject = NULL; | 272 | x->aux->reject = NULL; |
| 284 | } | 273 | } |
| 285 | } | 274 | } |
| 286 | LCRYPTO_ALIAS(X509_reject_clear); | ||
diff --git a/src/lib/libcrypto/bio/b_dump.c b/src/lib/libcrypto/bio/b_dump.c index 70bb9882f3..6a87ebd3a3 100644 --- a/src/lib/libcrypto/bio/b_dump.c +++ b/src/lib/libcrypto/bio/b_dump.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: b_dump.c,v 1.24 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: b_dump.c,v 1.25 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -75,7 +75,6 @@ BIO_dump_cb(int (*cb)(const void *data, size_t len, void *u), | |||
| 75 | { | 75 | { |
| 76 | return BIO_dump_indent_cb(cb, u, s, len, 0); | 76 | return BIO_dump_indent_cb(cb, u, s, len, 0); |
| 77 | } | 77 | } |
| 78 | LCRYPTO_ALIAS(BIO_dump_cb); | ||
| 79 | 78 | ||
| 80 | int | 79 | int |
| 81 | BIO_dump_indent_cb(int (*cb)(const void *data, size_t len, void *u), | 80 | BIO_dump_indent_cb(int (*cb)(const void *data, size_t len, void *u), |
| @@ -149,7 +148,6 @@ BIO_dump_indent_cb(int (*cb)(const void *data, size_t len, void *u), | |||
| 149 | #endif | 148 | #endif |
| 150 | return (ret); | 149 | return (ret); |
| 151 | } | 150 | } |
| 152 | LCRYPTO_ALIAS(BIO_dump_indent_cb); | ||
| 153 | 151 | ||
| 154 | static int | 152 | static int |
| 155 | write_fp(const void *data, size_t len, void *fp) | 153 | write_fp(const void *data, size_t len, void *fp) |
diff --git a/src/lib/libcrypto/bio/bio_lib.c b/src/lib/libcrypto/bio/bio_lib.c index 31127cb444..3dd5e17ed3 100644 --- a/src/lib/libcrypto/bio/bio_lib.c +++ b/src/lib/libcrypto/bio/bio_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: bio_lib.c,v 1.45 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: bio_lib.c,v 1.46 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -873,7 +873,6 @@ BIO_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | |||
| 873 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_BIO, argl, argp, | 873 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_BIO, argl, argp, |
| 874 | new_func, dup_func, free_func); | 874 | new_func, dup_func, free_func); |
| 875 | } | 875 | } |
| 876 | LCRYPTO_ALIAS(BIO_get_ex_new_index); | ||
| 877 | 876 | ||
| 878 | int | 877 | int |
| 879 | BIO_set_ex_data(BIO *bio, int idx, void *data) | 878 | BIO_set_ex_data(BIO *bio, int idx, void *data) |
diff --git a/src/lib/libcrypto/bio/bss_bio.c b/src/lib/libcrypto/bio/bss_bio.c index 0de0b604b3..d4c03abda2 100644 --- a/src/lib/libcrypto/bio/bss_bio.c +++ b/src/lib/libcrypto/bio/bss_bio.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: bss_bio.c,v 1.26 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: bss_bio.c,v 1.27 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* ==================================================================== | 2 | /* ==================================================================== |
| 3 | * Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved. |
| 4 | * | 4 | * |
| @@ -796,7 +796,6 @@ BIO_new_bio_pair(BIO **bio1_p, size_t writebuf1, BIO **bio2_p, size_t writebuf2) | |||
| 796 | *bio2_p = bio2; | 796 | *bio2_p = bio2; |
| 797 | return ret; | 797 | return ret; |
| 798 | } | 798 | } |
| 799 | LCRYPTO_ALIAS(BIO_new_bio_pair); | ||
| 800 | 799 | ||
| 801 | size_t | 800 | size_t |
| 802 | BIO_ctrl_get_write_guarantee(BIO *bio) | 801 | BIO_ctrl_get_write_guarantee(BIO *bio) |
diff --git a/src/lib/libcrypto/bio/bss_conn.c b/src/lib/libcrypto/bio/bss_conn.c index ded9c0be6d..427bd4b9ed 100644 --- a/src/lib/libcrypto/bio/bss_conn.c +++ b/src/lib/libcrypto/bio/bss_conn.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: bss_conn.c,v 1.38 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: bss_conn.c,v 1.39 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -309,7 +309,6 @@ BIO_CONNECT_new(void) | |||
| 309 | memset((char *)&ret->them, 0, sizeof(ret->them)); | 309 | memset((char *)&ret->them, 0, sizeof(ret->them)); |
| 310 | return (ret); | 310 | return (ret); |
| 311 | } | 311 | } |
| 312 | LCRYPTO_ALIAS(BIO_CONNECT_new); | ||
| 313 | 312 | ||
| 314 | void | 313 | void |
| 315 | BIO_CONNECT_free(BIO_CONNECT *a) | 314 | BIO_CONNECT_free(BIO_CONNECT *a) |
| @@ -321,7 +320,6 @@ BIO_CONNECT_free(BIO_CONNECT *a) | |||
| 321 | free(a->param_port); | 320 | free(a->param_port); |
| 322 | free(a); | 321 | free(a); |
| 323 | } | 322 | } |
| 324 | LCRYPTO_ALIAS(BIO_CONNECT_free); | ||
| 325 | 323 | ||
| 326 | const BIO_METHOD * | 324 | const BIO_METHOD * |
| 327 | BIO_s_connect(void) | 325 | BIO_s_connect(void) |
diff --git a/src/lib/libcrypto/chacha/chacha-merged.c b/src/lib/libcrypto/chacha/chacha-merged.c index d24912daaa..b405af84ee 100644 --- a/src/lib/libcrypto/chacha/chacha-merged.c +++ b/src/lib/libcrypto/chacha/chacha-merged.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: chacha-merged.c,v 1.10 2021/10/22 17:43:00 tb Exp $ */ | 1 | /* $OpenBSD: chacha-merged.c,v 1.11 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | chacha-merged.c version 20080118 | 3 | chacha-merged.c version 20080118 |
| 4 | D. J. Bernstein | 4 | D. J. Bernstein |
| @@ -320,3 +320,4 @@ CRYPTO_hchacha_20(unsigned char subkey[32], const unsigned char key[32], | |||
| 320 | U32TO8_LITTLE(subkey + 24, x[14]); | 320 | U32TO8_LITTLE(subkey + 24, x[14]); |
| 321 | U32TO8_LITTLE(subkey + 28, x[15]); | 321 | U32TO8_LITTLE(subkey + 28, x[15]); |
| 322 | } | 322 | } |
| 323 | LCRYPTO_ALIAS(CRYPTO_hchacha_20); | ||
diff --git a/src/lib/libcrypto/ec/ec_asn1.c b/src/lib/libcrypto/ec/ec_asn1.c index 0435f0a75f..683ca17417 100644 --- a/src/lib/libcrypto/ec/ec_asn1.c +++ b/src/lib/libcrypto/ec/ec_asn1.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ec_asn1.c,v 1.47 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: ec_asn1.c,v 1.48 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Written by Nils Larsch for the OpenSSL project. | 3 | * Written by Nils Larsch for the OpenSSL project. |
| 4 | */ | 4 | */ |
| @@ -185,14 +185,12 @@ X9_62_PENTANOMIAL_new(void) | |||
| 185 | { | 185 | { |
| 186 | return (X9_62_PENTANOMIAL*)ASN1_item_new(&X9_62_PENTANOMIAL_it); | 186 | return (X9_62_PENTANOMIAL*)ASN1_item_new(&X9_62_PENTANOMIAL_it); |
| 187 | } | 187 | } |
| 188 | LCRYPTO_ALIAS(X9_62_PENTANOMIAL_new); | ||
| 189 | 188 | ||
| 190 | void | 189 | void |
| 191 | X9_62_PENTANOMIAL_free(X9_62_PENTANOMIAL *a) | 190 | X9_62_PENTANOMIAL_free(X9_62_PENTANOMIAL *a) |
| 192 | { | 191 | { |
| 193 | ASN1_item_free((ASN1_VALUE *)a, &X9_62_PENTANOMIAL_it); | 192 | ASN1_item_free((ASN1_VALUE *)a, &X9_62_PENTANOMIAL_it); |
| 194 | } | 193 | } |
| 195 | LCRYPTO_ALIAS(X9_62_PENTANOMIAL_free); | ||
| 196 | 194 | ||
| 197 | static const ASN1_TEMPLATE char_two_def_tt = { | 195 | static const ASN1_TEMPLATE char_two_def_tt = { |
| 198 | .flags = 0, | 196 | .flags = 0, |
| @@ -287,14 +285,12 @@ X9_62_CHARACTERISTIC_TWO_new(void) | |||
| 287 | { | 285 | { |
| 288 | return (X9_62_CHARACTERISTIC_TWO*)ASN1_item_new(&X9_62_CHARACTERISTIC_TWO_it); | 286 | return (X9_62_CHARACTERISTIC_TWO*)ASN1_item_new(&X9_62_CHARACTERISTIC_TWO_it); |
| 289 | } | 287 | } |
| 290 | LCRYPTO_ALIAS(X9_62_CHARACTERISTIC_TWO_new); | ||
| 291 | 288 | ||
| 292 | void | 289 | void |
| 293 | X9_62_CHARACTERISTIC_TWO_free(X9_62_CHARACTERISTIC_TWO *a) | 290 | X9_62_CHARACTERISTIC_TWO_free(X9_62_CHARACTERISTIC_TWO *a) |
| 294 | { | 291 | { |
| 295 | ASN1_item_free((ASN1_VALUE *)a, &X9_62_CHARACTERISTIC_TWO_it); | 292 | ASN1_item_free((ASN1_VALUE *)a, &X9_62_CHARACTERISTIC_TWO_it); |
| 296 | } | 293 | } |
| 297 | LCRYPTO_ALIAS(X9_62_CHARACTERISTIC_TWO_free); | ||
| 298 | 294 | ||
| 299 | static const ASN1_TEMPLATE fieldID_def_tt = { | 295 | static const ASN1_TEMPLATE fieldID_def_tt = { |
| 300 | .flags = 0, | 296 | .flags = 0, |
| @@ -460,14 +456,12 @@ ECPARAMETERS_new(void) | |||
| 460 | { | 456 | { |
| 461 | return (ECPARAMETERS*)ASN1_item_new(&ECPARAMETERS_it); | 457 | return (ECPARAMETERS*)ASN1_item_new(&ECPARAMETERS_it); |
| 462 | } | 458 | } |
| 463 | LCRYPTO_ALIAS(ECPARAMETERS_new); | ||
| 464 | 459 | ||
| 465 | void | 460 | void |
| 466 | ECPARAMETERS_free(ECPARAMETERS *a) | 461 | ECPARAMETERS_free(ECPARAMETERS *a) |
| 467 | { | 462 | { |
| 468 | ASN1_item_free((ASN1_VALUE *)a, &ECPARAMETERS_it); | 463 | ASN1_item_free((ASN1_VALUE *)a, &ECPARAMETERS_it); |
| 469 | } | 464 | } |
| 470 | LCRYPTO_ALIAS(ECPARAMETERS_free); | ||
| 471 | 465 | ||
| 472 | static const ASN1_TEMPLATE ECPKPARAMETERS_ch_tt[] = { | 466 | static const ASN1_TEMPLATE ECPKPARAMETERS_ch_tt[] = { |
| 473 | { | 467 | { |
| @@ -514,28 +508,24 @@ d2i_ECPKPARAMETERS(ECPKPARAMETERS **a, const unsigned char **in, long len) | |||
| 514 | return (ECPKPARAMETERS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 508 | return (ECPKPARAMETERS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 515 | &ECPKPARAMETERS_it); | 509 | &ECPKPARAMETERS_it); |
| 516 | } | 510 | } |
| 517 | LCRYPTO_ALIAS(d2i_ECPKPARAMETERS); | ||
| 518 | 511 | ||
| 519 | int | 512 | int |
| 520 | i2d_ECPKPARAMETERS(const ECPKPARAMETERS *a, unsigned char **out) | 513 | i2d_ECPKPARAMETERS(const ECPKPARAMETERS *a, unsigned char **out) |
| 521 | { | 514 | { |
| 522 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ECPKPARAMETERS_it); | 515 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ECPKPARAMETERS_it); |
| 523 | } | 516 | } |
| 524 | LCRYPTO_ALIAS(i2d_ECPKPARAMETERS); | ||
| 525 | 517 | ||
| 526 | ECPKPARAMETERS * | 518 | ECPKPARAMETERS * |
| 527 | ECPKPARAMETERS_new(void) | 519 | ECPKPARAMETERS_new(void) |
| 528 | { | 520 | { |
| 529 | return (ECPKPARAMETERS *)ASN1_item_new(&ECPKPARAMETERS_it); | 521 | return (ECPKPARAMETERS *)ASN1_item_new(&ECPKPARAMETERS_it); |
| 530 | } | 522 | } |
| 531 | LCRYPTO_ALIAS(ECPKPARAMETERS_new); | ||
| 532 | 523 | ||
| 533 | void | 524 | void |
| 534 | ECPKPARAMETERS_free(ECPKPARAMETERS *a) | 525 | ECPKPARAMETERS_free(ECPKPARAMETERS *a) |
| 535 | { | 526 | { |
| 536 | ASN1_item_free((ASN1_VALUE *)a, &ECPKPARAMETERS_it); | 527 | ASN1_item_free((ASN1_VALUE *)a, &ECPKPARAMETERS_it); |
| 537 | } | 528 | } |
| 538 | LCRYPTO_ALIAS(ECPKPARAMETERS_free); | ||
| 539 | 529 | ||
| 540 | static const ASN1_TEMPLATE EC_PRIVATEKEY_seq_tt[] = { | 530 | static const ASN1_TEMPLATE EC_PRIVATEKEY_seq_tt[] = { |
| 541 | { | 531 | { |
| @@ -589,28 +579,24 @@ d2i_EC_PRIVATEKEY(EC_PRIVATEKEY **a, const unsigned char **in, long len) | |||
| 589 | return (EC_PRIVATEKEY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 579 | return (EC_PRIVATEKEY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
| 590 | &EC_PRIVATEKEY_it); | 580 | &EC_PRIVATEKEY_it); |
| 591 | } | 581 | } |
| 592 | LCRYPTO_ALIAS(d2i_EC_PRIVATEKEY); | ||
| 593 | 582 | ||
| 594 | int | 583 | int |
| 595 | i2d_EC_PRIVATEKEY(const EC_PRIVATEKEY *a, unsigned char **out) | 584 | i2d_EC_PRIVATEKEY(const EC_PRIVATEKEY *a, unsigned char **out) |
| 596 | { | 585 | { |
| 597 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &EC_PRIVATEKEY_it); | 586 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &EC_PRIVATEKEY_it); |
| 598 | } | 587 | } |
| 599 | LCRYPTO_ALIAS(i2d_EC_PRIVATEKEY); | ||
| 600 | 588 | ||
| 601 | EC_PRIVATEKEY * | 589 | EC_PRIVATEKEY * |
| 602 | EC_PRIVATEKEY_new(void) | 590 | EC_PRIVATEKEY_new(void) |
| 603 | { | 591 | { |
| 604 | return (EC_PRIVATEKEY *)ASN1_item_new(&EC_PRIVATEKEY_it); | 592 | return (EC_PRIVATEKEY *)ASN1_item_new(&EC_PRIVATEKEY_it); |
| 605 | } | 593 | } |
| 606 | LCRYPTO_ALIAS(EC_PRIVATEKEY_new); | ||
| 607 | 594 | ||
| 608 | void | 595 | void |
| 609 | EC_PRIVATEKEY_free(EC_PRIVATEKEY *a) | 596 | EC_PRIVATEKEY_free(EC_PRIVATEKEY *a) |
| 610 | { | 597 | { |
| 611 | ASN1_item_free((ASN1_VALUE *)a, &EC_PRIVATEKEY_it); | 598 | ASN1_item_free((ASN1_VALUE *)a, &EC_PRIVATEKEY_it); |
| 612 | } | 599 | } |
| 613 | LCRYPTO_ALIAS(EC_PRIVATEKEY_free); | ||
| 614 | 600 | ||
| 615 | /* some declarations of internal function */ | 601 | /* some declarations of internal function */ |
| 616 | 602 | ||
diff --git a/src/lib/libcrypto/ec/ec_lib.c b/src/lib/libcrypto/ec/ec_lib.c index 3db1ca2f07..b5788492cc 100644 --- a/src/lib/libcrypto/ec/ec_lib.c +++ b/src/lib/libcrypto/ec/ec_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ec_lib.c,v 1.63 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: ec_lib.c,v 1.64 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Originally written by Bodo Moeller for the OpenSSL project. | 3 | * Originally written by Bodo Moeller for the OpenSSL project. |
| 4 | */ | 4 | */ |
| @@ -136,7 +136,6 @@ EC_GROUP_clear_free(EC_GROUP *group) | |||
| 136 | { | 136 | { |
| 137 | EC_GROUP_free(group); | 137 | EC_GROUP_free(group); |
| 138 | } | 138 | } |
| 139 | LCRYPTO_ALIAS(EC_GROUP_clear_free); | ||
| 140 | 139 | ||
| 141 | int | 140 | int |
| 142 | EC_GROUP_copy(EC_GROUP *dest, const EC_GROUP *src) | 141 | EC_GROUP_copy(EC_GROUP *dest, const EC_GROUP *src) |
| @@ -543,7 +542,6 @@ EC_GROUP_set_curve_GFp(EC_GROUP *group, const BIGNUM *p, const BIGNUM *a, | |||
| 543 | { | 542 | { |
| 544 | return EC_GROUP_set_curve(group, p, a, b, ctx); | 543 | return EC_GROUP_set_curve(group, p, a, b, ctx); |
| 545 | } | 544 | } |
| 546 | LCRYPTO_ALIAS(EC_GROUP_set_curve_GFp); | ||
| 547 | 545 | ||
| 548 | int | 546 | int |
| 549 | EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, | 547 | EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, |
| @@ -551,7 +549,6 @@ EC_GROUP_get_curve_GFp(const EC_GROUP *group, BIGNUM *p, BIGNUM *a, BIGNUM *b, | |||
| 551 | { | 549 | { |
| 552 | return EC_GROUP_get_curve(group, p, a, b, ctx); | 550 | return EC_GROUP_get_curve(group, p, a, b, ctx); |
| 553 | } | 551 | } |
| 554 | LCRYPTO_ALIAS(EC_GROUP_get_curve_GFp); | ||
| 555 | 552 | ||
| 556 | int | 553 | int |
| 557 | EC_GROUP_get_degree(const EC_GROUP *group) | 554 | EC_GROUP_get_degree(const EC_GROUP *group) |
| @@ -730,7 +727,6 @@ EC_POINT_clear_free(EC_POINT *point) | |||
| 730 | { | 727 | { |
| 731 | EC_POINT_free(point); | 728 | EC_POINT_free(point); |
| 732 | } | 729 | } |
| 733 | LCRYPTO_ALIAS(EC_POINT_clear_free); | ||
| 734 | 730 | ||
| 735 | int | 731 | int |
| 736 | EC_POINT_copy(EC_POINT *dest, const EC_POINT *src) | 732 | EC_POINT_copy(EC_POINT *dest, const EC_POINT *src) |
| @@ -866,7 +862,6 @@ EC_POINT_set_Jprojective_coordinates_GFp(const EC_GROUP *group, EC_POINT *point, | |||
| 866 | { | 862 | { |
| 867 | return EC_POINT_set_Jprojective_coordinates(group, point, x, y, z, ctx); | 863 | return EC_POINT_set_Jprojective_coordinates(group, point, x, y, z, ctx); |
| 868 | } | 864 | } |
| 869 | LCRYPTO_ALIAS(EC_POINT_set_Jprojective_coordinates_GFp); | ||
| 870 | 865 | ||
| 871 | int | 866 | int |
| 872 | EC_POINT_get_Jprojective_coordinates_GFp(const EC_GROUP *group, | 867 | EC_POINT_get_Jprojective_coordinates_GFp(const EC_GROUP *group, |
| @@ -874,7 +869,6 @@ EC_POINT_get_Jprojective_coordinates_GFp(const EC_GROUP *group, | |||
| 874 | { | 869 | { |
| 875 | return EC_POINT_get_Jprojective_coordinates(group, point, x, y, z, ctx); | 870 | return EC_POINT_get_Jprojective_coordinates(group, point, x, y, z, ctx); |
| 876 | } | 871 | } |
| 877 | LCRYPTO_ALIAS(EC_POINT_get_Jprojective_coordinates_GFp); | ||
| 878 | 872 | ||
| 879 | int | 873 | int |
| 880 | EC_POINT_set_affine_coordinates(const EC_GROUP *group, EC_POINT *point, | 874 | EC_POINT_set_affine_coordinates(const EC_GROUP *group, EC_POINT *point, |
| @@ -920,7 +914,6 @@ EC_POINT_set_affine_coordinates_GFp(const EC_GROUP *group, EC_POINT *point, | |||
| 920 | { | 914 | { |
| 921 | return EC_POINT_set_affine_coordinates(group, point, x, y, ctx); | 915 | return EC_POINT_set_affine_coordinates(group, point, x, y, ctx); |
| 922 | } | 916 | } |
| 923 | LCRYPTO_ALIAS(EC_POINT_set_affine_coordinates_GFp); | ||
| 924 | 917 | ||
| 925 | int | 918 | int |
| 926 | EC_POINT_get_affine_coordinates(const EC_GROUP *group, const EC_POINT *point, | 919 | EC_POINT_get_affine_coordinates(const EC_GROUP *group, const EC_POINT *point, |
| @@ -958,7 +951,6 @@ EC_POINT_get_affine_coordinates_GFp(const EC_GROUP *group, const EC_POINT *point | |||
| 958 | { | 951 | { |
| 959 | return EC_POINT_get_affine_coordinates(group, point, x, y, ctx); | 952 | return EC_POINT_get_affine_coordinates(group, point, x, y, ctx); |
| 960 | } | 953 | } |
| 961 | LCRYPTO_ALIAS(EC_POINT_get_affine_coordinates_GFp); | ||
| 962 | 954 | ||
| 963 | int | 955 | int |
| 964 | EC_POINT_add(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, | 956 | EC_POINT_add(const EC_GROUP *group, EC_POINT *r, const EC_POINT *a, |
diff --git a/src/lib/libcrypto/ec/ec_oct.c b/src/lib/libcrypto/ec/ec_oct.c index b9bc62a4e3..9308d409c2 100644 --- a/src/lib/libcrypto/ec/ec_oct.c +++ b/src/lib/libcrypto/ec/ec_oct.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ec_oct.c,v 1.15 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: ec_oct.c,v 1.16 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Originally written by Bodo Moeller for the OpenSSL project. | 3 | * Originally written by Bodo Moeller for the OpenSSL project. |
| 4 | */ | 4 | */ |
| @@ -107,7 +107,6 @@ EC_POINT_set_compressed_coordinates_GFp(const EC_GROUP *group, EC_POINT *point, | |||
| 107 | { | 107 | { |
| 108 | return EC_POINT_set_compressed_coordinates(group, point, x, y_bit, ctx); | 108 | return EC_POINT_set_compressed_coordinates(group, point, x, y_bit, ctx); |
| 109 | } | 109 | } |
| 110 | LCRYPTO_ALIAS(EC_POINT_set_compressed_coordinates_GFp); | ||
| 111 | 110 | ||
| 112 | size_t | 111 | size_t |
| 113 | EC_POINT_point2oct(const EC_GROUP *group, const EC_POINT *point, | 112 | EC_POINT_point2oct(const EC_GROUP *group, const EC_POINT *point, |
diff --git a/src/lib/libcrypto/err/err.c b/src/lib/libcrypto/err/err.c index c513e45f9b..8fbeea715e 100644 --- a/src/lib/libcrypto/err/err.c +++ b/src/lib/libcrypto/err/err.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: err.c,v 1.53 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: err.c,v 1.54 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -982,12 +982,14 @@ LHASH_OF(ERR_STRING_DATA) *ERR_get_string_table(void) | |||
| 982 | err_fns_check(); | 982 | err_fns_check(); |
| 983 | return ERRFN(err_get)(0); | 983 | return ERRFN(err_get)(0); |
| 984 | } | 984 | } |
| 985 | LCRYPTO_ALIAS(ERR_get_string_table); | ||
| 985 | 986 | ||
| 986 | LHASH_OF(ERR_STATE) *ERR_get_err_state_table(void) | 987 | LHASH_OF(ERR_STATE) *ERR_get_err_state_table(void) |
| 987 | { | 988 | { |
| 988 | err_fns_check(); | 989 | err_fns_check(); |
| 989 | return ERRFN(thread_get)(0); | 990 | return ERRFN(thread_get)(0); |
| 990 | } | 991 | } |
| 992 | LCRYPTO_ALIAS(ERR_get_err_state_table); | ||
| 991 | 993 | ||
| 992 | void | 994 | void |
| 993 | ERR_release_err_state_table(LHASH_OF(ERR_STATE) **hash) | 995 | ERR_release_err_state_table(LHASH_OF(ERR_STATE) **hash) |
| @@ -1173,7 +1175,6 @@ ERR_add_error_vdata(int num, va_list args) | |||
| 1173 | else | 1175 | else |
| 1174 | ERR_set_error_data(errbuf, ERR_TXT_MALLOCED|ERR_TXT_STRING); | 1176 | ERR_set_error_data(errbuf, ERR_TXT_MALLOCED|ERR_TXT_STRING); |
| 1175 | } | 1177 | } |
| 1176 | LCRYPTO_ALIAS(ERR_add_error_vdata); | ||
| 1177 | 1178 | ||
| 1178 | void | 1179 | void |
| 1179 | ERR_add_error_data(int num, ...) | 1180 | ERR_add_error_data(int num, ...) |
| @@ -1183,7 +1184,6 @@ ERR_add_error_data(int num, ...) | |||
| 1183 | ERR_add_error_vdata(num, args); | 1184 | ERR_add_error_vdata(num, args); |
| 1184 | va_end(args); | 1185 | va_end(args); |
| 1185 | } | 1186 | } |
| 1186 | LCRYPTO_ALIAS(ERR_add_error_data); | ||
| 1187 | 1187 | ||
| 1188 | int | 1188 | int |
| 1189 | ERR_set_mark(void) | 1189 | ERR_set_mark(void) |
diff --git a/src/lib/libcrypto/evp/bio_b64.c b/src/lib/libcrypto/evp/bio_b64.c index 5eceda0993..3c47628f54 100644 --- a/src/lib/libcrypto/evp/bio_b64.c +++ b/src/lib/libcrypto/evp/bio_b64.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: bio_b64.c,v 1.27 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: bio_b64.c,v 1.28 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -111,7 +111,6 @@ BIO_f_base64(void) | |||
| 111 | { | 111 | { |
| 112 | return (&methods_b64); | 112 | return (&methods_b64); |
| 113 | } | 113 | } |
| 114 | LCRYPTO_ALIAS(BIO_f_base64); | ||
| 115 | 114 | ||
| 116 | static int | 115 | static int |
| 117 | b64_new(BIO *bi) | 116 | b64_new(BIO *bi) |
diff --git a/src/lib/libcrypto/evp/bio_enc.c b/src/lib/libcrypto/evp/bio_enc.c index 747e64ed7f..d2132adb4e 100644 --- a/src/lib/libcrypto/evp/bio_enc.c +++ b/src/lib/libcrypto/evp/bio_enc.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: bio_enc.c,v 1.28 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: bio_enc.c,v 1.29 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -106,7 +106,6 @@ BIO_f_cipher(void) | |||
| 106 | { | 106 | { |
| 107 | return (&methods_enc); | 107 | return (&methods_enc); |
| 108 | } | 108 | } |
| 109 | LCRYPTO_ALIAS(BIO_f_cipher); | ||
| 110 | 109 | ||
| 111 | static int | 110 | static int |
| 112 | enc_new(BIO *bi) | 111 | enc_new(BIO *bi) |
| @@ -417,4 +416,3 @@ BIO_set_cipher(BIO *b, const EVP_CIPHER *c, const unsigned char *k, | |||
| 417 | 416 | ||
| 418 | return 1; | 417 | return 1; |
| 419 | } | 418 | } |
| 420 | LCRYPTO_ALIAS(BIO_set_cipher); | ||
diff --git a/src/lib/libcrypto/evp/bio_md.c b/src/lib/libcrypto/evp/bio_md.c index 83d6c3732c..ccfcd1ea1d 100644 --- a/src/lib/libcrypto/evp/bio_md.c +++ b/src/lib/libcrypto/evp/bio_md.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: bio_md.c,v 1.20 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: bio_md.c,v 1.21 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -94,7 +94,6 @@ BIO_f_md(void) | |||
| 94 | { | 94 | { |
| 95 | return (&methods_md); | 95 | return (&methods_md); |
| 96 | } | 96 | } |
| 97 | LCRYPTO_ALIAS(BIO_f_md); | ||
| 98 | 97 | ||
| 99 | static int | 98 | static int |
| 100 | md_new(BIO *bi) | 99 | md_new(BIO *bi) |
diff --git a/src/lib/libcrypto/evp/c_all.c b/src/lib/libcrypto/evp/c_all.c index 5efcd5f237..10e35dd7ab 100644 --- a/src/lib/libcrypto/evp/c_all.c +++ b/src/lib/libcrypto/evp/c_all.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: c_all.c,v 1.30 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: c_all.c,v 1.31 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -251,7 +251,6 @@ OpenSSL_add_all_ciphers(void) | |||
| 251 | static pthread_once_t add_all_ciphers_once = PTHREAD_ONCE_INIT; | 251 | static pthread_once_t add_all_ciphers_once = PTHREAD_ONCE_INIT; |
| 252 | (void) pthread_once(&add_all_ciphers_once, OpenSSL_add_all_ciphers_internal); | 252 | (void) pthread_once(&add_all_ciphers_once, OpenSSL_add_all_ciphers_internal); |
| 253 | } | 253 | } |
| 254 | LCRYPTO_ALIAS(OpenSSL_add_all_ciphers); | ||
| 255 | 254 | ||
| 256 | static void | 255 | static void |
| 257 | OpenSSL_add_all_digests_internal(void) | 256 | OpenSSL_add_all_digests_internal(void) |
| @@ -314,7 +313,6 @@ OpenSSL_add_all_digests(void) | |||
| 314 | static pthread_once_t add_all_digests_once = PTHREAD_ONCE_INIT; | 313 | static pthread_once_t add_all_digests_once = PTHREAD_ONCE_INIT; |
| 315 | (void) pthread_once(&add_all_digests_once, OpenSSL_add_all_digests_internal); | 314 | (void) pthread_once(&add_all_digests_once, OpenSSL_add_all_digests_internal); |
| 316 | } | 315 | } |
| 317 | LCRYPTO_ALIAS(OpenSSL_add_all_digests); | ||
| 318 | 316 | ||
| 319 | void | 317 | void |
| 320 | OPENSSL_add_all_algorithms_noconf(void) | 318 | OPENSSL_add_all_algorithms_noconf(void) |
| @@ -323,7 +321,6 @@ OPENSSL_add_all_algorithms_noconf(void) | |||
| 323 | OpenSSL_add_all_ciphers(); | 321 | OpenSSL_add_all_ciphers(); |
| 324 | OpenSSL_add_all_digests(); | 322 | OpenSSL_add_all_digests(); |
| 325 | } | 323 | } |
| 326 | LCRYPTO_ALIAS(OPENSSL_add_all_algorithms_noconf); | ||
| 327 | 324 | ||
| 328 | void | 325 | void |
| 329 | OPENSSL_add_all_algorithms_conf(void) | 326 | OPENSSL_add_all_algorithms_conf(void) |
| @@ -331,4 +328,3 @@ OPENSSL_add_all_algorithms_conf(void) | |||
| 331 | OPENSSL_add_all_algorithms_noconf(); | 328 | OPENSSL_add_all_algorithms_noconf(); |
| 332 | OPENSSL_config(NULL); | 329 | OPENSSL_config(NULL); |
| 333 | } | 330 | } |
| 334 | LCRYPTO_ALIAS(OPENSSL_add_all_algorithms_conf); | ||
diff --git a/src/lib/libcrypto/evp/cipher_method_lib.c b/src/lib/libcrypto/evp/cipher_method_lib.c index 9e4fd483a3..c3f510fcc7 100644 --- a/src/lib/libcrypto/evp/cipher_method_lib.c +++ b/src/lib/libcrypto/evp/cipher_method_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: cipher_method_lib.c,v 1.9 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: cipher_method_lib.c,v 1.10 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Written by Richard Levitte (levitte@openssl.org) for the OpenSSL project | 3 | * Written by Richard Levitte (levitte@openssl.org) for the OpenSSL project |
| 4 | * 2015. | 4 | * 2015. |
| @@ -77,7 +77,6 @@ EVP_CIPHER_meth_new(int cipher_type, int block_size, int key_len) | |||
| 77 | 77 | ||
| 78 | return cipher; | 78 | return cipher; |
| 79 | } | 79 | } |
| 80 | LCRYPTO_ALIAS(EVP_CIPHER_meth_new); | ||
| 81 | 80 | ||
| 82 | EVP_CIPHER * | 81 | EVP_CIPHER * |
| 83 | EVP_CIPHER_meth_dup(const EVP_CIPHER *cipher) | 82 | EVP_CIPHER_meth_dup(const EVP_CIPHER *cipher) |
| @@ -91,14 +90,12 @@ EVP_CIPHER_meth_dup(const EVP_CIPHER *cipher) | |||
| 91 | 90 | ||
| 92 | return copy; | 91 | return copy; |
| 93 | } | 92 | } |
| 94 | LCRYPTO_ALIAS(EVP_CIPHER_meth_dup); | ||
| 95 | 93 | ||
| 96 | void | 94 | void |
| 97 | EVP_CIPHER_meth_free(EVP_CIPHER *cipher) | 95 | EVP_CIPHER_meth_free(EVP_CIPHER *cipher) |
| 98 | { | 96 | { |
| 99 | free(cipher); | 97 | free(cipher); |
| 100 | } | 98 | } |
| 101 | LCRYPTO_ALIAS(EVP_CIPHER_meth_free); | ||
| 102 | 99 | ||
| 103 | int | 100 | int |
| 104 | EVP_CIPHER_meth_set_iv_length(EVP_CIPHER *cipher, int iv_len) | 101 | EVP_CIPHER_meth_set_iv_length(EVP_CIPHER *cipher, int iv_len) |
| @@ -107,7 +104,6 @@ EVP_CIPHER_meth_set_iv_length(EVP_CIPHER *cipher, int iv_len) | |||
| 107 | 104 | ||
| 108 | return 1; | 105 | return 1; |
| 109 | } | 106 | } |
| 110 | LCRYPTO_ALIAS(EVP_CIPHER_meth_set_iv_length); | ||
| 111 | 107 | ||
| 112 | int | 108 | int |
| 113 | EVP_CIPHER_meth_set_flags(EVP_CIPHER *cipher, unsigned long flags) | 109 | EVP_CIPHER_meth_set_flags(EVP_CIPHER *cipher, unsigned long flags) |
| @@ -116,7 +112,6 @@ EVP_CIPHER_meth_set_flags(EVP_CIPHER *cipher, unsigned long flags) | |||
| 116 | 112 | ||
| 117 | return 1; | 113 | return 1; |
| 118 | } | 114 | } |
| 119 | LCRYPTO_ALIAS(EVP_CIPHER_meth_set_flags); | ||
| 120 | 115 | ||
| 121 | int | 116 | int |
| 122 | EVP_CIPHER_meth_set_impl_ctx_size(EVP_CIPHER *cipher, int ctx_size) | 117 | EVP_CIPHER_meth_set_impl_ctx_size(EVP_CIPHER *cipher, int ctx_size) |
| @@ -125,7 +120,6 @@ EVP_CIPHER_meth_set_impl_ctx_size(EVP_CIPHER *cipher, int ctx_size) | |||
| 125 | 120 | ||
| 126 | return 1; | 121 | return 1; |
| 127 | } | 122 | } |
| 128 | LCRYPTO_ALIAS(EVP_CIPHER_meth_set_impl_ctx_size); | ||
| 129 | 123 | ||
| 130 | int | 124 | int |
| 131 | EVP_CIPHER_meth_set_init(EVP_CIPHER *cipher, | 125 | EVP_CIPHER_meth_set_init(EVP_CIPHER *cipher, |
| @@ -136,7 +130,6 @@ EVP_CIPHER_meth_set_init(EVP_CIPHER *cipher, | |||
| 136 | 130 | ||
| 137 | return 1; | 131 | return 1; |
| 138 | } | 132 | } |
| 139 | LCRYPTO_ALIAS(EVP_CIPHER_meth_set_init); | ||
| 140 | 133 | ||
| 141 | int | 134 | int |
| 142 | EVP_CIPHER_meth_set_do_cipher(EVP_CIPHER *cipher, | 135 | EVP_CIPHER_meth_set_do_cipher(EVP_CIPHER *cipher, |
| @@ -147,7 +140,6 @@ EVP_CIPHER_meth_set_do_cipher(EVP_CIPHER *cipher, | |||
| 147 | 140 | ||
| 148 | return 1; | 141 | return 1; |
| 149 | } | 142 | } |
| 150 | LCRYPTO_ALIAS(EVP_CIPHER_meth_set_do_cipher); | ||
| 151 | 143 | ||
| 152 | int | 144 | int |
| 153 | EVP_CIPHER_meth_set_cleanup(EVP_CIPHER *cipher, | 145 | EVP_CIPHER_meth_set_cleanup(EVP_CIPHER *cipher, |
| @@ -157,7 +149,6 @@ EVP_CIPHER_meth_set_cleanup(EVP_CIPHER *cipher, | |||
| 157 | 149 | ||
| 158 | return 1; | 150 | return 1; |
| 159 | } | 151 | } |
| 160 | LCRYPTO_ALIAS(EVP_CIPHER_meth_set_cleanup); | ||
| 161 | 152 | ||
| 162 | int | 153 | int |
| 163 | EVP_CIPHER_meth_set_set_asn1_params(EVP_CIPHER *cipher, | 154 | EVP_CIPHER_meth_set_set_asn1_params(EVP_CIPHER *cipher, |
| @@ -167,7 +158,6 @@ EVP_CIPHER_meth_set_set_asn1_params(EVP_CIPHER *cipher, | |||
| 167 | 158 | ||
| 168 | return 1; | 159 | return 1; |
| 169 | } | 160 | } |
| 170 | LCRYPTO_ALIAS(EVP_CIPHER_meth_set_set_asn1_params); | ||
| 171 | 161 | ||
| 172 | int | 162 | int |
| 173 | EVP_CIPHER_meth_set_get_asn1_params(EVP_CIPHER *cipher, | 163 | EVP_CIPHER_meth_set_get_asn1_params(EVP_CIPHER *cipher, |
| @@ -177,7 +167,6 @@ EVP_CIPHER_meth_set_get_asn1_params(EVP_CIPHER *cipher, | |||
| 177 | 167 | ||
| 178 | return 1; | 168 | return 1; |
| 179 | } | 169 | } |
| 180 | LCRYPTO_ALIAS(EVP_CIPHER_meth_set_get_asn1_params); | ||
| 181 | 170 | ||
| 182 | int | 171 | int |
| 183 | EVP_CIPHER_meth_set_ctrl(EVP_CIPHER *cipher, | 172 | EVP_CIPHER_meth_set_ctrl(EVP_CIPHER *cipher, |
| @@ -187,4 +176,3 @@ EVP_CIPHER_meth_set_ctrl(EVP_CIPHER *cipher, | |||
| 187 | 176 | ||
| 188 | return 1; | 177 | return 1; |
| 189 | } | 178 | } |
| 190 | LCRYPTO_ALIAS(EVP_CIPHER_meth_set_ctrl); | ||
diff --git a/src/lib/libcrypto/evp/digest.c b/src/lib/libcrypto/evp/digest.c index 6615aa4a35..ca3fb219cd 100644 --- a/src/lib/libcrypto/evp/digest.c +++ b/src/lib/libcrypto/evp/digest.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: digest.c,v 1.37 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: digest.c,v 1.38 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -130,7 +130,6 @@ EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *type) | |||
| 130 | EVP_MD_CTX_init(ctx); | 130 | EVP_MD_CTX_init(ctx); |
| 131 | return EVP_DigestInit_ex(ctx, type, NULL); | 131 | return EVP_DigestInit_ex(ctx, type, NULL); |
| 132 | } | 132 | } |
| 133 | LCRYPTO_ALIAS(EVP_DigestInit); | ||
| 134 | 133 | ||
| 135 | int | 134 | int |
| 136 | EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *impl) | 135 | EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *type, ENGINE *impl) |
| @@ -212,14 +211,12 @@ skip_to_init: | |||
| 212 | return 1; | 211 | return 1; |
| 213 | return ctx->digest->init(ctx); | 212 | return ctx->digest->init(ctx); |
| 214 | } | 213 | } |
| 215 | LCRYPTO_ALIAS(EVP_DigestInit_ex); | ||
| 216 | 214 | ||
| 217 | int | 215 | int |
| 218 | EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t count) | 216 | EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t count) |
| 219 | { | 217 | { |
| 220 | return ctx->update(ctx, data, count); | 218 | return ctx->update(ctx, data, count); |
| 221 | } | 219 | } |
| 222 | LCRYPTO_ALIAS(EVP_DigestUpdate); | ||
| 223 | 220 | ||
| 224 | /* The caller can assume that this removes any secret data from the context */ | 221 | /* The caller can assume that this removes any secret data from the context */ |
| 225 | int | 222 | int |
| @@ -231,7 +228,6 @@ EVP_DigestFinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) | |||
| 231 | EVP_MD_CTX_cleanup(ctx); | 228 | EVP_MD_CTX_cleanup(ctx); |
| 232 | return ret; | 229 | return ret; |
| 233 | } | 230 | } |
| 234 | LCRYPTO_ALIAS(EVP_DigestFinal); | ||
| 235 | 231 | ||
| 236 | /* The caller can assume that this removes any secret data from the context */ | 232 | /* The caller can assume that this removes any secret data from the context */ |
| 237 | int | 233 | int |
| @@ -253,7 +249,6 @@ EVP_DigestFinal_ex(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size) | |||
| 253 | memset(ctx->md_data, 0, ctx->digest->ctx_size); | 249 | memset(ctx->md_data, 0, ctx->digest->ctx_size); |
| 254 | return ret; | 250 | return ret; |
| 255 | } | 251 | } |
| 256 | LCRYPTO_ALIAS(EVP_DigestFinal_ex); | ||
| 257 | 252 | ||
| 258 | int | 253 | int |
| 259 | EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in) | 254 | EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in) |
| @@ -261,7 +256,6 @@ EVP_MD_CTX_copy(EVP_MD_CTX *out, const EVP_MD_CTX *in) | |||
| 261 | EVP_MD_CTX_init(out); | 256 | EVP_MD_CTX_init(out); |
| 262 | return EVP_MD_CTX_copy_ex(out, in); | 257 | return EVP_MD_CTX_copy_ex(out, in); |
| 263 | } | 258 | } |
| 264 | LCRYPTO_ALIAS(EVP_MD_CTX_copy); | ||
| 265 | 259 | ||
| 266 | int | 260 | int |
| 267 | EVP_MD_CTX_copy_ex(EVP_MD_CTX *out, const EVP_MD_CTX *in) | 261 | EVP_MD_CTX_copy_ex(EVP_MD_CTX *out, const EVP_MD_CTX *in) |
| @@ -324,7 +318,6 @@ EVP_MD_CTX_copy_ex(EVP_MD_CTX *out, const EVP_MD_CTX *in) | |||
| 324 | 318 | ||
| 325 | return 1; | 319 | return 1; |
| 326 | } | 320 | } |
| 327 | LCRYPTO_ALIAS(EVP_MD_CTX_copy_ex); | ||
| 328 | 321 | ||
| 329 | int | 322 | int |
| 330 | EVP_Digest(const void *data, size_t count, | 323 | EVP_Digest(const void *data, size_t count, |
| @@ -342,14 +335,12 @@ EVP_Digest(const void *data, size_t count, | |||
| 342 | 335 | ||
| 343 | return ret; | 336 | return ret; |
| 344 | } | 337 | } |
| 345 | LCRYPTO_ALIAS(EVP_Digest); | ||
| 346 | 338 | ||
| 347 | EVP_MD_CTX * | 339 | EVP_MD_CTX * |
| 348 | EVP_MD_CTX_new(void) | 340 | EVP_MD_CTX_new(void) |
| 349 | { | 341 | { |
| 350 | return calloc(1, sizeof(EVP_MD_CTX)); | 342 | return calloc(1, sizeof(EVP_MD_CTX)); |
| 351 | } | 343 | } |
| 352 | LCRYPTO_ALIAS(EVP_MD_CTX_new); | ||
| 353 | 344 | ||
| 354 | void | 345 | void |
| 355 | EVP_MD_CTX_free(EVP_MD_CTX *ctx) | 346 | EVP_MD_CTX_free(EVP_MD_CTX *ctx) |
| @@ -361,35 +352,30 @@ EVP_MD_CTX_free(EVP_MD_CTX *ctx) | |||
| 361 | 352 | ||
| 362 | free(ctx); | 353 | free(ctx); |
| 363 | } | 354 | } |
| 364 | LCRYPTO_ALIAS(EVP_MD_CTX_free); | ||
| 365 | 355 | ||
| 366 | void | 356 | void |
| 367 | EVP_MD_CTX_init(EVP_MD_CTX *ctx) | 357 | EVP_MD_CTX_init(EVP_MD_CTX *ctx) |
| 368 | { | 358 | { |
| 369 | memset(ctx, 0, sizeof(*ctx)); | 359 | memset(ctx, 0, sizeof(*ctx)); |
| 370 | } | 360 | } |
| 371 | LCRYPTO_ALIAS(EVP_MD_CTX_init); | ||
| 372 | 361 | ||
| 373 | int | 362 | int |
| 374 | EVP_MD_CTX_reset(EVP_MD_CTX *ctx) | 363 | EVP_MD_CTX_reset(EVP_MD_CTX *ctx) |
| 375 | { | 364 | { |
| 376 | return EVP_MD_CTX_cleanup(ctx); | 365 | return EVP_MD_CTX_cleanup(ctx); |
| 377 | } | 366 | } |
| 378 | LCRYPTO_ALIAS(EVP_MD_CTX_reset); | ||
| 379 | 367 | ||
| 380 | EVP_MD_CTX * | 368 | EVP_MD_CTX * |
| 381 | EVP_MD_CTX_create(void) | 369 | EVP_MD_CTX_create(void) |
| 382 | { | 370 | { |
| 383 | return EVP_MD_CTX_new(); | 371 | return EVP_MD_CTX_new(); |
| 384 | } | 372 | } |
| 385 | LCRYPTO_ALIAS(EVP_MD_CTX_create); | ||
| 386 | 373 | ||
| 387 | void | 374 | void |
| 388 | EVP_MD_CTX_destroy(EVP_MD_CTX *ctx) | 375 | EVP_MD_CTX_destroy(EVP_MD_CTX *ctx) |
| 389 | { | 376 | { |
| 390 | EVP_MD_CTX_free(ctx); | 377 | EVP_MD_CTX_free(ctx); |
| 391 | } | 378 | } |
| 392 | LCRYPTO_ALIAS(EVP_MD_CTX_destroy); | ||
| 393 | 379 | ||
| 394 | /* This call frees resources associated with the context */ | 380 | /* This call frees resources associated with the context */ |
| 395 | int | 381 | int |
| @@ -418,7 +404,6 @@ EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) | |||
| 418 | 404 | ||
| 419 | return 1; | 405 | return 1; |
| 420 | } | 406 | } |
| 421 | LCRYPTO_ALIAS(EVP_MD_CTX_cleanup); | ||
| 422 | 407 | ||
| 423 | int | 408 | int |
| 424 | EVP_MD_CTX_ctrl(EVP_MD_CTX *ctx, int type, int arg, void *ptr) | 409 | EVP_MD_CTX_ctrl(EVP_MD_CTX *ctx, int type, int arg, void *ptr) |
| @@ -442,4 +427,3 @@ EVP_MD_CTX_ctrl(EVP_MD_CTX *ctx, int type, int arg, void *ptr) | |||
| 442 | } | 427 | } |
| 443 | return ret; | 428 | return ret; |
| 444 | } | 429 | } |
| 445 | LCRYPTO_ALIAS(EVP_MD_CTX_ctrl); | ||
diff --git a/src/lib/libcrypto/evp/e_aes.c b/src/lib/libcrypto/evp/e_aes.c index 35c8d944ed..3d3b1a9d6c 100644 --- a/src/lib/libcrypto/evp/e_aes.c +++ b/src/lib/libcrypto/evp/e_aes.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_aes.c,v 1.52 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_aes.c,v 1.53 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* ==================================================================== | 2 | /* ==================================================================== |
| 3 | * Copyright (c) 2001-2011 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 2001-2011 The OpenSSL Project. All rights reserved. |
| 4 | * | 4 | * |
| @@ -572,7 +572,6 @@ EVP_aes_128_cbc(void) | |||
| 572 | return &aes_128_cbc; | 572 | return &aes_128_cbc; |
| 573 | #endif | 573 | #endif |
| 574 | } | 574 | } |
| 575 | LCRYPTO_ALIAS(EVP_aes_128_cbc); | ||
| 576 | 575 | ||
| 577 | #ifdef AESNI_CAPABLE | 576 | #ifdef AESNI_CAPABLE |
| 578 | static const EVP_CIPHER aesni_128_ecb = { | 577 | static const EVP_CIPHER aesni_128_ecb = { |
| @@ -607,7 +606,6 @@ EVP_aes_128_ecb(void) | |||
| 607 | return &aes_128_ecb; | 606 | return &aes_128_ecb; |
| 608 | #endif | 607 | #endif |
| 609 | } | 608 | } |
| 610 | LCRYPTO_ALIAS(EVP_aes_128_ecb); | ||
| 611 | 609 | ||
| 612 | #ifdef AESNI_CAPABLE | 610 | #ifdef AESNI_CAPABLE |
| 613 | static const EVP_CIPHER aesni_128_ofb = { | 611 | static const EVP_CIPHER aesni_128_ofb = { |
| @@ -642,7 +640,6 @@ EVP_aes_128_ofb(void) | |||
| 642 | return &aes_128_ofb; | 640 | return &aes_128_ofb; |
| 643 | #endif | 641 | #endif |
| 644 | } | 642 | } |
| 645 | LCRYPTO_ALIAS(EVP_aes_128_ofb); | ||
| 646 | 643 | ||
| 647 | #ifdef AESNI_CAPABLE | 644 | #ifdef AESNI_CAPABLE |
| 648 | static const EVP_CIPHER aesni_128_cfb = { | 645 | static const EVP_CIPHER aesni_128_cfb = { |
| @@ -711,7 +708,6 @@ EVP_aes_128_cfb1(void) | |||
| 711 | return &aes_128_cfb1; | 708 | return &aes_128_cfb1; |
| 712 | #endif | 709 | #endif |
| 713 | } | 710 | } |
| 714 | LCRYPTO_ALIAS(EVP_aes_128_cfb1); | ||
| 715 | 711 | ||
| 716 | #ifdef AESNI_CAPABLE | 712 | #ifdef AESNI_CAPABLE |
| 717 | static const EVP_CIPHER aesni_128_cfb8 = { | 713 | static const EVP_CIPHER aesni_128_cfb8 = { |
| @@ -746,7 +742,6 @@ EVP_aes_128_cfb8(void) | |||
| 746 | return &aes_128_cfb8; | 742 | return &aes_128_cfb8; |
| 747 | #endif | 743 | #endif |
| 748 | } | 744 | } |
| 749 | LCRYPTO_ALIAS(EVP_aes_128_cfb8); | ||
| 750 | 745 | ||
| 751 | #ifdef AESNI_CAPABLE | 746 | #ifdef AESNI_CAPABLE |
| 752 | static const EVP_CIPHER aesni_128_ctr = { | 747 | static const EVP_CIPHER aesni_128_ctr = { |
| @@ -781,7 +776,6 @@ EVP_aes_128_ctr(void) | |||
| 781 | return &aes_128_ctr; | 776 | return &aes_128_ctr; |
| 782 | #endif | 777 | #endif |
| 783 | } | 778 | } |
| 784 | LCRYPTO_ALIAS(EVP_aes_128_ctr); | ||
| 785 | 779 | ||
| 786 | 780 | ||
| 787 | #ifdef AESNI_CAPABLE | 781 | #ifdef AESNI_CAPABLE |
| @@ -817,7 +811,6 @@ EVP_aes_192_cbc(void) | |||
| 817 | return &aes_192_cbc; | 811 | return &aes_192_cbc; |
| 818 | #endif | 812 | #endif |
| 819 | } | 813 | } |
| 820 | LCRYPTO_ALIAS(EVP_aes_192_cbc); | ||
| 821 | 814 | ||
| 822 | #ifdef AESNI_CAPABLE | 815 | #ifdef AESNI_CAPABLE |
| 823 | static const EVP_CIPHER aesni_192_ecb = { | 816 | static const EVP_CIPHER aesni_192_ecb = { |
| @@ -852,7 +845,6 @@ EVP_aes_192_ecb(void) | |||
| 852 | return &aes_192_ecb; | 845 | return &aes_192_ecb; |
| 853 | #endif | 846 | #endif |
| 854 | } | 847 | } |
| 855 | LCRYPTO_ALIAS(EVP_aes_192_ecb); | ||
| 856 | 848 | ||
| 857 | #ifdef AESNI_CAPABLE | 849 | #ifdef AESNI_CAPABLE |
| 858 | static const EVP_CIPHER aesni_192_ofb = { | 850 | static const EVP_CIPHER aesni_192_ofb = { |
| @@ -887,7 +879,6 @@ EVP_aes_192_ofb(void) | |||
| 887 | return &aes_192_ofb; | 879 | return &aes_192_ofb; |
| 888 | #endif | 880 | #endif |
| 889 | } | 881 | } |
| 890 | LCRYPTO_ALIAS(EVP_aes_192_ofb); | ||
| 891 | 882 | ||
| 892 | #ifdef AESNI_CAPABLE | 883 | #ifdef AESNI_CAPABLE |
| 893 | static const EVP_CIPHER aesni_192_cfb = { | 884 | static const EVP_CIPHER aesni_192_cfb = { |
| @@ -956,7 +947,6 @@ EVP_aes_192_cfb1(void) | |||
| 956 | return &aes_192_cfb1; | 947 | return &aes_192_cfb1; |
| 957 | #endif | 948 | #endif |
| 958 | } | 949 | } |
| 959 | LCRYPTO_ALIAS(EVP_aes_192_cfb1); | ||
| 960 | 950 | ||
| 961 | #ifdef AESNI_CAPABLE | 951 | #ifdef AESNI_CAPABLE |
| 962 | static const EVP_CIPHER aesni_192_cfb8 = { | 952 | static const EVP_CIPHER aesni_192_cfb8 = { |
| @@ -991,7 +981,6 @@ EVP_aes_192_cfb8(void) | |||
| 991 | return &aes_192_cfb8; | 981 | return &aes_192_cfb8; |
| 992 | #endif | 982 | #endif |
| 993 | } | 983 | } |
| 994 | LCRYPTO_ALIAS(EVP_aes_192_cfb8); | ||
| 995 | 984 | ||
| 996 | #ifdef AESNI_CAPABLE | 985 | #ifdef AESNI_CAPABLE |
| 997 | static const EVP_CIPHER aesni_192_ctr = { | 986 | static const EVP_CIPHER aesni_192_ctr = { |
| @@ -1026,7 +1015,6 @@ EVP_aes_192_ctr(void) | |||
| 1026 | return &aes_192_ctr; | 1015 | return &aes_192_ctr; |
| 1027 | #endif | 1016 | #endif |
| 1028 | } | 1017 | } |
| 1029 | LCRYPTO_ALIAS(EVP_aes_192_ctr); | ||
| 1030 | 1018 | ||
| 1031 | 1019 | ||
| 1032 | #ifdef AESNI_CAPABLE | 1020 | #ifdef AESNI_CAPABLE |
| @@ -1062,7 +1050,6 @@ EVP_aes_256_cbc(void) | |||
| 1062 | return &aes_256_cbc; | 1050 | return &aes_256_cbc; |
| 1063 | #endif | 1051 | #endif |
| 1064 | } | 1052 | } |
| 1065 | LCRYPTO_ALIAS(EVP_aes_256_cbc); | ||
| 1066 | 1053 | ||
| 1067 | #ifdef AESNI_CAPABLE | 1054 | #ifdef AESNI_CAPABLE |
| 1068 | static const EVP_CIPHER aesni_256_ecb = { | 1055 | static const EVP_CIPHER aesni_256_ecb = { |
| @@ -1097,7 +1084,6 @@ EVP_aes_256_ecb(void) | |||
| 1097 | return &aes_256_ecb; | 1084 | return &aes_256_ecb; |
| 1098 | #endif | 1085 | #endif |
| 1099 | } | 1086 | } |
| 1100 | LCRYPTO_ALIAS(EVP_aes_256_ecb); | ||
| 1101 | 1087 | ||
| 1102 | #ifdef AESNI_CAPABLE | 1088 | #ifdef AESNI_CAPABLE |
| 1103 | static const EVP_CIPHER aesni_256_ofb = { | 1089 | static const EVP_CIPHER aesni_256_ofb = { |
| @@ -1132,7 +1118,6 @@ EVP_aes_256_ofb(void) | |||
| 1132 | return &aes_256_ofb; | 1118 | return &aes_256_ofb; |
| 1133 | #endif | 1119 | #endif |
| 1134 | } | 1120 | } |
| 1135 | LCRYPTO_ALIAS(EVP_aes_256_ofb); | ||
| 1136 | 1121 | ||
| 1137 | #ifdef AESNI_CAPABLE | 1122 | #ifdef AESNI_CAPABLE |
| 1138 | static const EVP_CIPHER aesni_256_cfb = { | 1123 | static const EVP_CIPHER aesni_256_cfb = { |
| @@ -1201,7 +1186,6 @@ EVP_aes_256_cfb1(void) | |||
| 1201 | return &aes_256_cfb1; | 1186 | return &aes_256_cfb1; |
| 1202 | #endif | 1187 | #endif |
| 1203 | } | 1188 | } |
| 1204 | LCRYPTO_ALIAS(EVP_aes_256_cfb1); | ||
| 1205 | 1189 | ||
| 1206 | #ifdef AESNI_CAPABLE | 1190 | #ifdef AESNI_CAPABLE |
| 1207 | static const EVP_CIPHER aesni_256_cfb8 = { | 1191 | static const EVP_CIPHER aesni_256_cfb8 = { |
| @@ -1236,7 +1220,6 @@ EVP_aes_256_cfb8(void) | |||
| 1236 | return &aes_256_cfb8; | 1220 | return &aes_256_cfb8; |
| 1237 | #endif | 1221 | #endif |
| 1238 | } | 1222 | } |
| 1239 | LCRYPTO_ALIAS(EVP_aes_256_cfb8); | ||
| 1240 | 1223 | ||
| 1241 | #ifdef AESNI_CAPABLE | 1224 | #ifdef AESNI_CAPABLE |
| 1242 | static const EVP_CIPHER aesni_256_ctr = { | 1225 | static const EVP_CIPHER aesni_256_ctr = { |
| @@ -1271,7 +1254,6 @@ EVP_aes_256_ctr(void) | |||
| 1271 | return &aes_256_ctr; | 1254 | return &aes_256_ctr; |
| 1272 | #endif | 1255 | #endif |
| 1273 | } | 1256 | } |
| 1274 | LCRYPTO_ALIAS(EVP_aes_256_ctr); | ||
| 1275 | 1257 | ||
| 1276 | static int | 1258 | static int |
| 1277 | aes_gcm_cleanup(EVP_CIPHER_CTX *c) | 1259 | aes_gcm_cleanup(EVP_CIPHER_CTX *c) |
| @@ -1690,7 +1672,6 @@ EVP_aes_128_gcm(void) | |||
| 1690 | return &aes_128_gcm; | 1672 | return &aes_128_gcm; |
| 1691 | #endif | 1673 | #endif |
| 1692 | } | 1674 | } |
| 1693 | LCRYPTO_ALIAS(EVP_aes_128_gcm); | ||
| 1694 | 1675 | ||
| 1695 | #ifdef AESNI_CAPABLE | 1676 | #ifdef AESNI_CAPABLE |
| 1696 | static const EVP_CIPHER aesni_192_gcm = { | 1677 | static const EVP_CIPHER aesni_192_gcm = { |
| @@ -1729,7 +1710,6 @@ EVP_aes_192_gcm(void) | |||
| 1729 | return &aes_192_gcm; | 1710 | return &aes_192_gcm; |
| 1730 | #endif | 1711 | #endif |
| 1731 | } | 1712 | } |
| 1732 | LCRYPTO_ALIAS(EVP_aes_192_gcm); | ||
| 1733 | 1713 | ||
| 1734 | #ifdef AESNI_CAPABLE | 1714 | #ifdef AESNI_CAPABLE |
| 1735 | static const EVP_CIPHER aesni_256_gcm = { | 1715 | static const EVP_CIPHER aesni_256_gcm = { |
| @@ -1768,7 +1748,6 @@ EVP_aes_256_gcm(void) | |||
| 1768 | return &aes_256_gcm; | 1748 | return &aes_256_gcm; |
| 1769 | #endif | 1749 | #endif |
| 1770 | } | 1750 | } |
| 1771 | LCRYPTO_ALIAS(EVP_aes_256_gcm); | ||
| 1772 | 1751 | ||
| 1773 | static int | 1752 | static int |
| 1774 | aes_xts_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 1753 | aes_xts_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| @@ -1935,7 +1914,6 @@ EVP_aes_128_xts(void) | |||
| 1935 | return &aes_128_xts; | 1914 | return &aes_128_xts; |
| 1936 | #endif | 1915 | #endif |
| 1937 | } | 1916 | } |
| 1938 | LCRYPTO_ALIAS(EVP_aes_128_xts); | ||
| 1939 | 1917 | ||
| 1940 | #ifdef AESNI_CAPABLE | 1918 | #ifdef AESNI_CAPABLE |
| 1941 | static const EVP_CIPHER aesni_256_xts = { | 1919 | static const EVP_CIPHER aesni_256_xts = { |
| @@ -1974,7 +1952,6 @@ EVP_aes_256_xts(void) | |||
| 1974 | return &aes_256_xts; | 1952 | return &aes_256_xts; |
| 1975 | #endif | 1953 | #endif |
| 1976 | } | 1954 | } |
| 1977 | LCRYPTO_ALIAS(EVP_aes_256_xts); | ||
| 1978 | 1955 | ||
| 1979 | static int | 1956 | static int |
| 1980 | aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) | 1957 | aes_ccm_ctrl(EVP_CIPHER_CTX *c, int type, int arg, void *ptr) |
| @@ -2171,7 +2148,6 @@ EVP_aes_128_ccm(void) | |||
| 2171 | return &aes_128_ccm; | 2148 | return &aes_128_ccm; |
| 2172 | #endif | 2149 | #endif |
| 2173 | } | 2150 | } |
| 2174 | LCRYPTO_ALIAS(EVP_aes_128_ccm); | ||
| 2175 | 2151 | ||
| 2176 | #ifdef AESNI_CAPABLE | 2152 | #ifdef AESNI_CAPABLE |
| 2177 | static const EVP_CIPHER aesni_192_ccm = { | 2153 | static const EVP_CIPHER aesni_192_ccm = { |
| @@ -2210,7 +2186,6 @@ EVP_aes_192_ccm(void) | |||
| 2210 | return &aes_192_ccm; | 2186 | return &aes_192_ccm; |
| 2211 | #endif | 2187 | #endif |
| 2212 | } | 2188 | } |
| 2213 | LCRYPTO_ALIAS(EVP_aes_192_ccm); | ||
| 2214 | 2189 | ||
| 2215 | #ifdef AESNI_CAPABLE | 2190 | #ifdef AESNI_CAPABLE |
| 2216 | static const EVP_CIPHER aesni_256_ccm = { | 2191 | static const EVP_CIPHER aesni_256_ccm = { |
| @@ -2249,7 +2224,6 @@ EVP_aes_256_ccm(void) | |||
| 2249 | return &aes_256_ccm; | 2224 | return &aes_256_ccm; |
| 2250 | #endif | 2225 | #endif |
| 2251 | } | 2226 | } |
| 2252 | LCRYPTO_ALIAS(EVP_aes_256_ccm); | ||
| 2253 | 2227 | ||
| 2254 | #define EVP_AEAD_AES_GCM_TAG_LEN 16 | 2228 | #define EVP_AEAD_AES_GCM_TAG_LEN 16 |
| 2255 | 2229 | ||
| @@ -2440,14 +2414,12 @@ EVP_aead_aes_128_gcm(void) | |||
| 2440 | { | 2414 | { |
| 2441 | return &aead_aes_128_gcm; | 2415 | return &aead_aes_128_gcm; |
| 2442 | } | 2416 | } |
| 2443 | LCRYPTO_ALIAS(EVP_aead_aes_128_gcm); | ||
| 2444 | 2417 | ||
| 2445 | const EVP_AEAD * | 2418 | const EVP_AEAD * |
| 2446 | EVP_aead_aes_256_gcm(void) | 2419 | EVP_aead_aes_256_gcm(void) |
| 2447 | { | 2420 | { |
| 2448 | return &aead_aes_256_gcm; | 2421 | return &aead_aes_256_gcm; |
| 2449 | } | 2422 | } |
| 2450 | LCRYPTO_ALIAS(EVP_aead_aes_256_gcm); | ||
| 2451 | 2423 | ||
| 2452 | typedef struct { | 2424 | typedef struct { |
| 2453 | union { | 2425 | union { |
| @@ -2573,7 +2545,6 @@ EVP_aes_128_wrap(void) | |||
| 2573 | { | 2545 | { |
| 2574 | return &aes_128_wrap; | 2546 | return &aes_128_wrap; |
| 2575 | } | 2547 | } |
| 2576 | LCRYPTO_ALIAS(EVP_aes_128_wrap); | ||
| 2577 | 2548 | ||
| 2578 | static const EVP_CIPHER aes_192_wrap = { | 2549 | static const EVP_CIPHER aes_192_wrap = { |
| 2579 | .nid = NID_id_aes192_wrap, | 2550 | .nid = NID_id_aes192_wrap, |
| @@ -2596,7 +2567,6 @@ EVP_aes_192_wrap(void) | |||
| 2596 | { | 2567 | { |
| 2597 | return &aes_192_wrap; | 2568 | return &aes_192_wrap; |
| 2598 | } | 2569 | } |
| 2599 | LCRYPTO_ALIAS(EVP_aes_192_wrap); | ||
| 2600 | 2570 | ||
| 2601 | static const EVP_CIPHER aes_256_wrap = { | 2571 | static const EVP_CIPHER aes_256_wrap = { |
| 2602 | .nid = NID_id_aes256_wrap, | 2572 | .nid = NID_id_aes256_wrap, |
| @@ -2619,6 +2589,5 @@ EVP_aes_256_wrap(void) | |||
| 2619 | { | 2589 | { |
| 2620 | return &aes_256_wrap; | 2590 | return &aes_256_wrap; |
| 2621 | } | 2591 | } |
| 2622 | LCRYPTO_ALIAS(EVP_aes_256_wrap); | ||
| 2623 | 2592 | ||
| 2624 | #endif | 2593 | #endif |
diff --git a/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c index b905b359c9..09a73da748 100644 --- a/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c +++ b/src/lib/libcrypto/evp/e_aes_cbc_hmac_sha1.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.18 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_aes_cbc_hmac_sha1.c,v 1.19 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* ==================================================================== | 2 | /* ==================================================================== |
| 3 | * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 2011-2013 The OpenSSL Project. All rights reserved. |
| 4 | * | 4 | * |
| @@ -581,7 +581,6 @@ EVP_aes_128_cbc_hmac_sha1(void) | |||
| 581 | return (OPENSSL_cpu_caps() & CPUCAP_MASK_AESNI) ? | 581 | return (OPENSSL_cpu_caps() & CPUCAP_MASK_AESNI) ? |
| 582 | &aesni_128_cbc_hmac_sha1_cipher : NULL; | 582 | &aesni_128_cbc_hmac_sha1_cipher : NULL; |
| 583 | } | 583 | } |
| 584 | LCRYPTO_ALIAS(EVP_aes_128_cbc_hmac_sha1); | ||
| 585 | 584 | ||
| 586 | const EVP_CIPHER * | 585 | const EVP_CIPHER * |
| 587 | EVP_aes_256_cbc_hmac_sha1(void) | 586 | EVP_aes_256_cbc_hmac_sha1(void) |
| @@ -589,20 +588,17 @@ EVP_aes_256_cbc_hmac_sha1(void) | |||
| 589 | return (OPENSSL_cpu_caps() & CPUCAP_MASK_AESNI) ? | 588 | return (OPENSSL_cpu_caps() & CPUCAP_MASK_AESNI) ? |
| 590 | &aesni_256_cbc_hmac_sha1_cipher : NULL; | 589 | &aesni_256_cbc_hmac_sha1_cipher : NULL; |
| 591 | } | 590 | } |
| 592 | LCRYPTO_ALIAS(EVP_aes_256_cbc_hmac_sha1); | ||
| 593 | #else | 591 | #else |
| 594 | const EVP_CIPHER * | 592 | const EVP_CIPHER * |
| 595 | EVP_aes_128_cbc_hmac_sha1(void) | 593 | EVP_aes_128_cbc_hmac_sha1(void) |
| 596 | { | 594 | { |
| 597 | return NULL; | 595 | return NULL; |
| 598 | } | 596 | } |
| 599 | LCRYPTO_ALIAS(EVP_aes_128_cbc_hmac_sha1); | ||
| 600 | 597 | ||
| 601 | const EVP_CIPHER * | 598 | const EVP_CIPHER * |
| 602 | EVP_aes_256_cbc_hmac_sha1(void) | 599 | EVP_aes_256_cbc_hmac_sha1(void) |
| 603 | { | 600 | { |
| 604 | return NULL; | 601 | return NULL; |
| 605 | } | 602 | } |
| 606 | LCRYPTO_ALIAS(EVP_aes_256_cbc_hmac_sha1); | ||
| 607 | #endif | 603 | #endif |
| 608 | #endif | 604 | #endif |
diff --git a/src/lib/libcrypto/evp/e_bf.c b/src/lib/libcrypto/evp/e_bf.c index 4e671fab3e..9146a531e4 100644 --- a/src/lib/libcrypto/evp/e_bf.c +++ b/src/lib/libcrypto/evp/e_bf.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_bf.c,v 1.16 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_bf.c,v 1.17 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -178,7 +178,6 @@ EVP_bf_cbc(void) | |||
| 178 | { | 178 | { |
| 179 | return &bf_cbc; | 179 | return &bf_cbc; |
| 180 | } | 180 | } |
| 181 | LCRYPTO_ALIAS(EVP_bf_cbc); | ||
| 182 | 181 | ||
| 183 | static const EVP_CIPHER bf_cfb64 = { | 182 | static const EVP_CIPHER bf_cfb64 = { |
| 184 | .nid = NID_bf_cfb64, | 183 | .nid = NID_bf_cfb64, |
| @@ -201,7 +200,6 @@ EVP_bf_cfb64(void) | |||
| 201 | { | 200 | { |
| 202 | return &bf_cfb64; | 201 | return &bf_cfb64; |
| 203 | } | 202 | } |
| 204 | LCRYPTO_ALIAS(EVP_bf_cfb64); | ||
| 205 | 203 | ||
| 206 | static const EVP_CIPHER bf_ofb = { | 204 | static const EVP_CIPHER bf_ofb = { |
| 207 | .nid = NID_bf_ofb64, | 205 | .nid = NID_bf_ofb64, |
| @@ -224,7 +222,6 @@ EVP_bf_ofb(void) | |||
| 224 | { | 222 | { |
| 225 | return &bf_ofb; | 223 | return &bf_ofb; |
| 226 | } | 224 | } |
| 227 | LCRYPTO_ALIAS(EVP_bf_ofb); | ||
| 228 | 225 | ||
| 229 | static const EVP_CIPHER bf_ecb = { | 226 | static const EVP_CIPHER bf_ecb = { |
| 230 | .nid = NID_bf_ecb, | 227 | .nid = NID_bf_ecb, |
| @@ -247,5 +244,4 @@ EVP_bf_ecb(void) | |||
| 247 | { | 244 | { |
| 248 | return &bf_ecb; | 245 | return &bf_ecb; |
| 249 | } | 246 | } |
| 250 | LCRYPTO_ALIAS(EVP_bf_ecb); | ||
| 251 | #endif | 247 | #endif |
diff --git a/src/lib/libcrypto/evp/e_camellia.c b/src/lib/libcrypto/evp/e_camellia.c index 0ab6e9ca60..cec7649e3f 100644 --- a/src/lib/libcrypto/evp/e_camellia.c +++ b/src/lib/libcrypto/evp/e_camellia.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_camellia.c,v 1.17 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_camellia.c,v 1.18 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* ==================================================================== | 2 | /* ==================================================================== |
| 3 | * Copyright (c) 2006 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 2006 The OpenSSL Project. All rights reserved. |
| 4 | * | 4 | * |
| @@ -179,7 +179,6 @@ EVP_camellia_128_cbc(void) | |||
| 179 | { | 179 | { |
| 180 | return &camellia_128_cbc; | 180 | return &camellia_128_cbc; |
| 181 | } | 181 | } |
| 182 | LCRYPTO_ALIAS(EVP_camellia_128_cbc); | ||
| 183 | 182 | ||
| 184 | static const EVP_CIPHER camellia_128_cfb128 = { | 183 | static const EVP_CIPHER camellia_128_cfb128 = { |
| 185 | .nid = NID_camellia_128_cfb128, | 184 | .nid = NID_camellia_128_cfb128, |
| @@ -202,7 +201,6 @@ EVP_camellia_128_cfb128(void) | |||
| 202 | { | 201 | { |
| 203 | return &camellia_128_cfb128; | 202 | return &camellia_128_cfb128; |
| 204 | } | 203 | } |
| 205 | LCRYPTO_ALIAS(EVP_camellia_128_cfb128); | ||
| 206 | 204 | ||
| 207 | static const EVP_CIPHER camellia_128_ofb = { | 205 | static const EVP_CIPHER camellia_128_ofb = { |
| 208 | .nid = NID_camellia_128_ofb128, | 206 | .nid = NID_camellia_128_ofb128, |
| @@ -225,7 +223,6 @@ EVP_camellia_128_ofb(void) | |||
| 225 | { | 223 | { |
| 226 | return &camellia_128_ofb; | 224 | return &camellia_128_ofb; |
| 227 | } | 225 | } |
| 228 | LCRYPTO_ALIAS(EVP_camellia_128_ofb); | ||
| 229 | 226 | ||
| 230 | static const EVP_CIPHER camellia_128_ecb = { | 227 | static const EVP_CIPHER camellia_128_ecb = { |
| 231 | .nid = NID_camellia_128_ecb, | 228 | .nid = NID_camellia_128_ecb, |
| @@ -248,7 +245,6 @@ EVP_camellia_128_ecb(void) | |||
| 248 | { | 245 | { |
| 249 | return &camellia_128_ecb; | 246 | return &camellia_128_ecb; |
| 250 | } | 247 | } |
| 251 | LCRYPTO_ALIAS(EVP_camellia_128_ecb); | ||
| 252 | 248 | ||
| 253 | static int | 249 | static int |
| 254 | camellia_192_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) | 250 | camellia_192_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) |
| @@ -341,7 +337,6 @@ EVP_camellia_192_cbc(void) | |||
| 341 | { | 337 | { |
| 342 | return &camellia_192_cbc; | 338 | return &camellia_192_cbc; |
| 343 | } | 339 | } |
| 344 | LCRYPTO_ALIAS(EVP_camellia_192_cbc); | ||
| 345 | 340 | ||
| 346 | static const EVP_CIPHER camellia_192_cfb128 = { | 341 | static const EVP_CIPHER camellia_192_cfb128 = { |
| 347 | .nid = NID_camellia_192_cfb128, | 342 | .nid = NID_camellia_192_cfb128, |
| @@ -364,7 +359,6 @@ EVP_camellia_192_cfb128(void) | |||
| 364 | { | 359 | { |
| 365 | return &camellia_192_cfb128; | 360 | return &camellia_192_cfb128; |
| 366 | } | 361 | } |
| 367 | LCRYPTO_ALIAS(EVP_camellia_192_cfb128); | ||
| 368 | 362 | ||
| 369 | static const EVP_CIPHER camellia_192_ofb = { | 363 | static const EVP_CIPHER camellia_192_ofb = { |
| 370 | .nid = NID_camellia_192_ofb128, | 364 | .nid = NID_camellia_192_ofb128, |
| @@ -387,7 +381,6 @@ EVP_camellia_192_ofb(void) | |||
| 387 | { | 381 | { |
| 388 | return &camellia_192_ofb; | 382 | return &camellia_192_ofb; |
| 389 | } | 383 | } |
| 390 | LCRYPTO_ALIAS(EVP_camellia_192_ofb); | ||
| 391 | 384 | ||
| 392 | static const EVP_CIPHER camellia_192_ecb = { | 385 | static const EVP_CIPHER camellia_192_ecb = { |
| 393 | .nid = NID_camellia_192_ecb, | 386 | .nid = NID_camellia_192_ecb, |
| @@ -410,7 +403,6 @@ EVP_camellia_192_ecb(void) | |||
| 410 | { | 403 | { |
| 411 | return &camellia_192_ecb; | 404 | return &camellia_192_ecb; |
| 412 | } | 405 | } |
| 413 | LCRYPTO_ALIAS(EVP_camellia_192_ecb); | ||
| 414 | 406 | ||
| 415 | static int | 407 | static int |
| 416 | camellia_256_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) | 408 | camellia_256_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) |
| @@ -503,7 +495,6 @@ EVP_camellia_256_cbc(void) | |||
| 503 | { | 495 | { |
| 504 | return &camellia_256_cbc; | 496 | return &camellia_256_cbc; |
| 505 | } | 497 | } |
| 506 | LCRYPTO_ALIAS(EVP_camellia_256_cbc); | ||
| 507 | 498 | ||
| 508 | static const EVP_CIPHER camellia_256_cfb128 = { | 499 | static const EVP_CIPHER camellia_256_cfb128 = { |
| 509 | .nid = NID_camellia_256_cfb128, | 500 | .nid = NID_camellia_256_cfb128, |
| @@ -526,7 +517,6 @@ EVP_camellia_256_cfb128(void) | |||
| 526 | { | 517 | { |
| 527 | return &camellia_256_cfb128; | 518 | return &camellia_256_cfb128; |
| 528 | } | 519 | } |
| 529 | LCRYPTO_ALIAS(EVP_camellia_256_cfb128); | ||
| 530 | 520 | ||
| 531 | static const EVP_CIPHER camellia_256_ofb = { | 521 | static const EVP_CIPHER camellia_256_ofb = { |
| 532 | .nid = NID_camellia_256_ofb128, | 522 | .nid = NID_camellia_256_ofb128, |
| @@ -549,7 +539,6 @@ EVP_camellia_256_ofb(void) | |||
| 549 | { | 539 | { |
| 550 | return &camellia_256_ofb; | 540 | return &camellia_256_ofb; |
| 551 | } | 541 | } |
| 552 | LCRYPTO_ALIAS(EVP_camellia_256_ofb); | ||
| 553 | 542 | ||
| 554 | static const EVP_CIPHER camellia_256_ecb = { | 543 | static const EVP_CIPHER camellia_256_ecb = { |
| 555 | .nid = NID_camellia_256_ecb, | 544 | .nid = NID_camellia_256_ecb, |
| @@ -572,7 +561,6 @@ EVP_camellia_256_ecb(void) | |||
| 572 | { | 561 | { |
| 573 | return &camellia_256_ecb; | 562 | return &camellia_256_ecb; |
| 574 | } | 563 | } |
| 575 | LCRYPTO_ALIAS(EVP_camellia_256_ecb); | ||
| 576 | 564 | ||
| 577 | static int | 565 | static int |
| 578 | camellia_128_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) | 566 | camellia_128_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) |
| @@ -617,7 +605,6 @@ EVP_camellia_128_cfb1(void) | |||
| 617 | { | 605 | { |
| 618 | return &camellia_128_cfb1; | 606 | return &camellia_128_cfb1; |
| 619 | } | 607 | } |
| 620 | LCRYPTO_ALIAS(EVP_camellia_128_cfb1); | ||
| 621 | 608 | ||
| 622 | static int | 609 | static int |
| 623 | camellia_192_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) | 610 | camellia_192_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) |
| @@ -662,7 +649,6 @@ EVP_camellia_192_cfb1(void) | |||
| 662 | { | 649 | { |
| 663 | return &camellia_192_cfb1; | 650 | return &camellia_192_cfb1; |
| 664 | } | 651 | } |
| 665 | LCRYPTO_ALIAS(EVP_camellia_192_cfb1); | ||
| 666 | 652 | ||
| 667 | static int | 653 | static int |
| 668 | camellia_256_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) | 654 | camellia_256_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) |
| @@ -707,7 +693,6 @@ EVP_camellia_256_cfb1(void) | |||
| 707 | { | 693 | { |
| 708 | return &camellia_256_cfb1; | 694 | return &camellia_256_cfb1; |
| 709 | } | 695 | } |
| 710 | LCRYPTO_ALIAS(EVP_camellia_256_cfb1); | ||
| 711 | 696 | ||
| 712 | 697 | ||
| 713 | static int | 698 | static int |
| @@ -751,7 +736,6 @@ EVP_camellia_128_cfb8(void) | |||
| 751 | { | 736 | { |
| 752 | return &camellia_128_cfb8; | 737 | return &camellia_128_cfb8; |
| 753 | } | 738 | } |
| 754 | LCRYPTO_ALIAS(EVP_camellia_128_cfb8); | ||
| 755 | 739 | ||
| 756 | static int | 740 | static int |
| 757 | camellia_192_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) | 741 | camellia_192_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) |
| @@ -794,7 +778,6 @@ EVP_camellia_192_cfb8(void) | |||
| 794 | { | 778 | { |
| 795 | return &camellia_192_cfb8; | 779 | return &camellia_192_cfb8; |
| 796 | } | 780 | } |
| 797 | LCRYPTO_ALIAS(EVP_camellia_192_cfb8); | ||
| 798 | 781 | ||
| 799 | static int | 782 | static int |
| 800 | camellia_256_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) | 783 | camellia_256_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) |
| @@ -837,5 +820,4 @@ EVP_camellia_256_cfb8(void) | |||
| 837 | { | 820 | { |
| 838 | return &camellia_256_cfb8; | 821 | return &camellia_256_cfb8; |
| 839 | } | 822 | } |
| 840 | LCRYPTO_ALIAS(EVP_camellia_256_cfb8); | ||
| 841 | #endif | 823 | #endif |
diff --git a/src/lib/libcrypto/evp/e_cast.c b/src/lib/libcrypto/evp/e_cast.c index 8f62ba6f29..a0e52dfdf4 100644 --- a/src/lib/libcrypto/evp/e_cast.c +++ b/src/lib/libcrypto/evp/e_cast.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_cast.c,v 1.15 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_cast.c,v 1.16 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -178,7 +178,6 @@ EVP_cast5_cbc(void) | |||
| 178 | { | 178 | { |
| 179 | return &cast5_cbc; | 179 | return &cast5_cbc; |
| 180 | } | 180 | } |
| 181 | LCRYPTO_ALIAS(EVP_cast5_cbc); | ||
| 182 | 181 | ||
| 183 | static const EVP_CIPHER cast5_cfb64 = { | 182 | static const EVP_CIPHER cast5_cfb64 = { |
| 184 | .nid = NID_cast5_cfb64, | 183 | .nid = NID_cast5_cfb64, |
| @@ -201,7 +200,6 @@ EVP_cast5_cfb64(void) | |||
| 201 | { | 200 | { |
| 202 | return &cast5_cfb64; | 201 | return &cast5_cfb64; |
| 203 | } | 202 | } |
| 204 | LCRYPTO_ALIAS(EVP_cast5_cfb64); | ||
| 205 | 203 | ||
| 206 | static const EVP_CIPHER cast5_ofb = { | 204 | static const EVP_CIPHER cast5_ofb = { |
| 207 | .nid = NID_cast5_ofb64, | 205 | .nid = NID_cast5_ofb64, |
| @@ -224,7 +222,6 @@ EVP_cast5_ofb(void) | |||
| 224 | { | 222 | { |
| 225 | return &cast5_ofb; | 223 | return &cast5_ofb; |
| 226 | } | 224 | } |
| 227 | LCRYPTO_ALIAS(EVP_cast5_ofb); | ||
| 228 | 225 | ||
| 229 | static const EVP_CIPHER cast5_ecb = { | 226 | static const EVP_CIPHER cast5_ecb = { |
| 230 | .nid = NID_cast5_ecb, | 227 | .nid = NID_cast5_ecb, |
| @@ -247,5 +244,4 @@ EVP_cast5_ecb(void) | |||
| 247 | { | 244 | { |
| 248 | return &cast5_ecb; | 245 | return &cast5_ecb; |
| 249 | } | 246 | } |
| 250 | LCRYPTO_ALIAS(EVP_cast5_ecb); | ||
| 251 | #endif | 247 | #endif |
diff --git a/src/lib/libcrypto/evp/e_chacha.c b/src/lib/libcrypto/evp/e_chacha.c index f781d66339..add0488477 100644 --- a/src/lib/libcrypto/evp/e_chacha.c +++ b/src/lib/libcrypto/evp/e_chacha.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_chacha.c,v 1.11 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_chacha.c,v 1.12 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -74,6 +74,5 @@ EVP_chacha20(void) | |||
| 74 | { | 74 | { |
| 75 | return (&chacha20_cipher); | 75 | return (&chacha20_cipher); |
| 76 | } | 76 | } |
| 77 | LCRYPTO_ALIAS(EVP_chacha20); | ||
| 78 | 77 | ||
| 79 | #endif | 78 | #endif |
diff --git a/src/lib/libcrypto/evp/e_chacha20poly1305.c b/src/lib/libcrypto/evp/e_chacha20poly1305.c index 4b8f47cefc..a17657899b 100644 --- a/src/lib/libcrypto/evp/e_chacha20poly1305.c +++ b/src/lib/libcrypto/evp/e_chacha20poly1305.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_chacha20poly1305.c,v 1.29 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_chacha20poly1305.c,v 1.30 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | 2 | ||
| 3 | /* | 3 | /* |
| 4 | * Copyright (c) 2022 Joel Sing <jsing@openbsd.org> | 4 | * Copyright (c) 2022 Joel Sing <jsing@openbsd.org> |
| @@ -348,7 +348,6 @@ EVP_aead_chacha20_poly1305() | |||
| 348 | { | 348 | { |
| 349 | return &aead_chacha20_poly1305; | 349 | return &aead_chacha20_poly1305; |
| 350 | } | 350 | } |
| 351 | LCRYPTO_ALIAS(EVP_aead_chacha20_poly1305); | ||
| 352 | 351 | ||
| 353 | static const EVP_AEAD aead_xchacha20_poly1305 = { | 352 | static const EVP_AEAD aead_xchacha20_poly1305 = { |
| 354 | .key_len = 32, | 353 | .key_len = 32, |
| @@ -367,7 +366,6 @@ EVP_aead_xchacha20_poly1305() | |||
| 367 | { | 366 | { |
| 368 | return &aead_xchacha20_poly1305; | 367 | return &aead_xchacha20_poly1305; |
| 369 | } | 368 | } |
| 370 | LCRYPTO_ALIAS(EVP_aead_xchacha20_poly1305); | ||
| 371 | 369 | ||
| 372 | struct chacha20_poly1305_ctx { | 370 | struct chacha20_poly1305_ctx { |
| 373 | ChaCha_ctx chacha; | 371 | ChaCha_ctx chacha; |
| @@ -608,6 +606,5 @@ EVP_chacha20_poly1305(void) | |||
| 608 | { | 606 | { |
| 609 | return &cipher_chacha20_poly1305; | 607 | return &cipher_chacha20_poly1305; |
| 610 | } | 608 | } |
| 611 | LCRYPTO_ALIAS(EVP_chacha20_poly1305); | ||
| 612 | 609 | ||
| 613 | #endif /* !OPENSSL_NO_CHACHA && !OPENSSL_NO_POLY1305 */ | 610 | #endif /* !OPENSSL_NO_CHACHA && !OPENSSL_NO_POLY1305 */ |
diff --git a/src/lib/libcrypto/evp/e_des.c b/src/lib/libcrypto/evp/e_des.c index c87de1a690..64d098ca14 100644 --- a/src/lib/libcrypto/evp/e_des.c +++ b/src/lib/libcrypto/evp/e_des.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_des.c,v 1.21 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_des.c,v 1.22 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -242,7 +242,6 @@ EVP_des_cbc(void) | |||
| 242 | { | 242 | { |
| 243 | return &des_cbc; | 243 | return &des_cbc; |
| 244 | } | 244 | } |
| 245 | LCRYPTO_ALIAS(EVP_des_cbc); | ||
| 246 | 245 | ||
| 247 | static const EVP_CIPHER des_cfb64 = { | 246 | static const EVP_CIPHER des_cfb64 = { |
| 248 | .nid = NID_des_cfb64, | 247 | .nid = NID_des_cfb64, |
| @@ -265,7 +264,6 @@ EVP_des_cfb64(void) | |||
| 265 | { | 264 | { |
| 266 | return &des_cfb64; | 265 | return &des_cfb64; |
| 267 | } | 266 | } |
| 268 | LCRYPTO_ALIAS(EVP_des_cfb64); | ||
| 269 | 267 | ||
| 270 | static const EVP_CIPHER des_ofb = { | 268 | static const EVP_CIPHER des_ofb = { |
| 271 | .nid = NID_des_ofb64, | 269 | .nid = NID_des_ofb64, |
| @@ -288,7 +286,6 @@ EVP_des_ofb(void) | |||
| 288 | { | 286 | { |
| 289 | return &des_ofb; | 287 | return &des_ofb; |
| 290 | } | 288 | } |
| 291 | LCRYPTO_ALIAS(EVP_des_ofb); | ||
| 292 | 289 | ||
| 293 | static const EVP_CIPHER des_ecb = { | 290 | static const EVP_CIPHER des_ecb = { |
| 294 | .nid = NID_des_ecb, | 291 | .nid = NID_des_ecb, |
| @@ -311,7 +308,6 @@ EVP_des_ecb(void) | |||
| 311 | { | 308 | { |
| 312 | return &des_ecb; | 309 | return &des_ecb; |
| 313 | } | 310 | } |
| 314 | LCRYPTO_ALIAS(EVP_des_ecb); | ||
| 315 | 311 | ||
| 316 | static const EVP_CIPHER des_cfb1 = { | 312 | static const EVP_CIPHER des_cfb1 = { |
| 317 | .nid = NID_des_cfb1, | 313 | .nid = NID_des_cfb1, |
| @@ -334,7 +330,6 @@ EVP_des_cfb1(void) | |||
| 334 | { | 330 | { |
| 335 | return &des_cfb1; | 331 | return &des_cfb1; |
| 336 | } | 332 | } |
| 337 | LCRYPTO_ALIAS(EVP_des_cfb1); | ||
| 338 | 333 | ||
| 339 | static const EVP_CIPHER des_cfb8 = { | 334 | static const EVP_CIPHER des_cfb8 = { |
| 340 | .nid = NID_des_cfb8, | 335 | .nid = NID_des_cfb8, |
| @@ -357,5 +352,4 @@ EVP_des_cfb8(void) | |||
| 357 | { | 352 | { |
| 358 | return &des_cfb8; | 353 | return &des_cfb8; |
| 359 | } | 354 | } |
| 360 | LCRYPTO_ALIAS(EVP_des_cfb8); | ||
| 361 | #endif | 355 | #endif |
diff --git a/src/lib/libcrypto/evp/e_des3.c b/src/lib/libcrypto/evp/e_des3.c index d345c354c0..3e6c5234cb 100644 --- a/src/lib/libcrypto/evp/e_des3.c +++ b/src/lib/libcrypto/evp/e_des3.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_des3.c,v 1.27 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_des3.c,v 1.28 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -274,7 +274,6 @@ EVP_des_ede_cbc(void) | |||
| 274 | { | 274 | { |
| 275 | return &des_ede_cbc; | 275 | return &des_ede_cbc; |
| 276 | } | 276 | } |
| 277 | LCRYPTO_ALIAS(EVP_des_ede_cbc); | ||
| 278 | 277 | ||
| 279 | static const EVP_CIPHER des_ede_cfb64 = { | 278 | static const EVP_CIPHER des_ede_cfb64 = { |
| 280 | .nid = NID_des_ede_cfb64, | 279 | .nid = NID_des_ede_cfb64, |
| @@ -297,7 +296,6 @@ EVP_des_ede_cfb64(void) | |||
| 297 | { | 296 | { |
| 298 | return &des_ede_cfb64; | 297 | return &des_ede_cfb64; |
| 299 | } | 298 | } |
| 300 | LCRYPTO_ALIAS(EVP_des_ede_cfb64); | ||
| 301 | 299 | ||
| 302 | static const EVP_CIPHER des_ede_ofb = { | 300 | static const EVP_CIPHER des_ede_ofb = { |
| 303 | .nid = NID_des_ede_ofb64, | 301 | .nid = NID_des_ede_ofb64, |
| @@ -320,7 +318,6 @@ EVP_des_ede_ofb(void) | |||
| 320 | { | 318 | { |
| 321 | return &des_ede_ofb; | 319 | return &des_ede_ofb; |
| 322 | } | 320 | } |
| 323 | LCRYPTO_ALIAS(EVP_des_ede_ofb); | ||
| 324 | 321 | ||
| 325 | static const EVP_CIPHER des_ede_ecb = { | 322 | static const EVP_CIPHER des_ede_ecb = { |
| 326 | .nid = NID_des_ede_ecb, | 323 | .nid = NID_des_ede_ecb, |
| @@ -343,7 +340,6 @@ EVP_des_ede_ecb(void) | |||
| 343 | { | 340 | { |
| 344 | return &des_ede_ecb; | 341 | return &des_ede_ecb; |
| 345 | } | 342 | } |
| 346 | LCRYPTO_ALIAS(EVP_des_ede_ecb); | ||
| 347 | 343 | ||
| 348 | 344 | ||
| 349 | #define des_ede3_cfb64_cipher des_ede_cfb64_cipher | 345 | #define des_ede3_cfb64_cipher des_ede_cfb64_cipher |
| @@ -372,7 +368,6 @@ EVP_des_ede3_cbc(void) | |||
| 372 | { | 368 | { |
| 373 | return &des_ede3_cbc; | 369 | return &des_ede3_cbc; |
| 374 | } | 370 | } |
| 375 | LCRYPTO_ALIAS(EVP_des_ede3_cbc); | ||
| 376 | 371 | ||
| 377 | static const EVP_CIPHER des_ede3_cfb64 = { | 372 | static const EVP_CIPHER des_ede3_cfb64 = { |
| 378 | .nid = NID_des_ede3_cfb64, | 373 | .nid = NID_des_ede3_cfb64, |
| @@ -395,7 +390,6 @@ EVP_des_ede3_cfb64(void) | |||
| 395 | { | 390 | { |
| 396 | return &des_ede3_cfb64; | 391 | return &des_ede3_cfb64; |
| 397 | } | 392 | } |
| 398 | LCRYPTO_ALIAS(EVP_des_ede3_cfb64); | ||
| 399 | 393 | ||
| 400 | static const EVP_CIPHER des_ede3_ofb = { | 394 | static const EVP_CIPHER des_ede3_ofb = { |
| 401 | .nid = NID_des_ede3_ofb64, | 395 | .nid = NID_des_ede3_ofb64, |
| @@ -418,7 +412,6 @@ EVP_des_ede3_ofb(void) | |||
| 418 | { | 412 | { |
| 419 | return &des_ede3_ofb; | 413 | return &des_ede3_ofb; |
| 420 | } | 414 | } |
| 421 | LCRYPTO_ALIAS(EVP_des_ede3_ofb); | ||
| 422 | 415 | ||
| 423 | static const EVP_CIPHER des_ede3_ecb = { | 416 | static const EVP_CIPHER des_ede3_ecb = { |
| 424 | .nid = NID_des_ede3_ecb, | 417 | .nid = NID_des_ede3_ecb, |
| @@ -441,7 +434,6 @@ EVP_des_ede3_ecb(void) | |||
| 441 | { | 434 | { |
| 442 | return &des_ede3_ecb; | 435 | return &des_ede3_ecb; |
| 443 | } | 436 | } |
| 444 | LCRYPTO_ALIAS(EVP_des_ede3_ecb); | ||
| 445 | 437 | ||
| 446 | 438 | ||
| 447 | static const EVP_CIPHER des_ede3_cfb1 = { | 439 | static const EVP_CIPHER des_ede3_cfb1 = { |
| @@ -465,7 +457,6 @@ EVP_des_ede3_cfb1(void) | |||
| 465 | { | 457 | { |
| 466 | return &des_ede3_cfb1; | 458 | return &des_ede3_cfb1; |
| 467 | } | 459 | } |
| 468 | LCRYPTO_ALIAS(EVP_des_ede3_cfb1); | ||
| 469 | 460 | ||
| 470 | 461 | ||
| 471 | static const EVP_CIPHER des_ede3_cfb8 = { | 462 | static const EVP_CIPHER des_ede3_cfb8 = { |
| @@ -489,19 +480,16 @@ EVP_des_ede3_cfb8(void) | |||
| 489 | { | 480 | { |
| 490 | return &des_ede3_cfb8; | 481 | return &des_ede3_cfb8; |
| 491 | } | 482 | } |
| 492 | LCRYPTO_ALIAS(EVP_des_ede3_cfb8); | ||
| 493 | 483 | ||
| 494 | const EVP_CIPHER * | 484 | const EVP_CIPHER * |
| 495 | EVP_des_ede(void) | 485 | EVP_des_ede(void) |
| 496 | { | 486 | { |
| 497 | return &des_ede_ecb; | 487 | return &des_ede_ecb; |
| 498 | } | 488 | } |
| 499 | LCRYPTO_ALIAS(EVP_des_ede); | ||
| 500 | 489 | ||
| 501 | const EVP_CIPHER * | 490 | const EVP_CIPHER * |
| 502 | EVP_des_ede3(void) | 491 | EVP_des_ede3(void) |
| 503 | { | 492 | { |
| 504 | return &des_ede3_ecb; | 493 | return &des_ede3_ecb; |
| 505 | } | 494 | } |
| 506 | LCRYPTO_ALIAS(EVP_des_ede3); | ||
| 507 | #endif | 495 | #endif |
diff --git a/src/lib/libcrypto/evp/e_gost2814789.c b/src/lib/libcrypto/evp/e_gost2814789.c index fdbc662810..359cf5e4ca 100644 --- a/src/lib/libcrypto/evp/e_gost2814789.c +++ b/src/lib/libcrypto/evp/e_gost2814789.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_gost2814789.c,v 1.12 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_gost2814789.c,v 1.13 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2014 Dmitry Eremin-Solenikov <dbaryshkov@gmail.com> | 3 | * Copyright (c) 2014 Dmitry Eremin-Solenikov <dbaryshkov@gmail.com> |
| 4 | * Copyright (c) 2005-2006 Cryptocom LTD | 4 | * Copyright (c) 2005-2006 Cryptocom LTD |
| @@ -268,7 +268,6 @@ EVP_gost2814789_ecb(void) | |||
| 268 | { | 268 | { |
| 269 | return &gost2814789_ecb; | 269 | return &gost2814789_ecb; |
| 270 | } | 270 | } |
| 271 | LCRYPTO_ALIAS(EVP_gost2814789_ecb); | ||
| 272 | 271 | ||
| 273 | static const EVP_CIPHER gost2814789_cfb64 = { | 272 | static const EVP_CIPHER gost2814789_cfb64 = { |
| 274 | .nid = NID_gost89_cfb64, | 273 | .nid = NID_gost89_cfb64, |
| @@ -291,7 +290,6 @@ EVP_gost2814789_cfb64(void) | |||
| 291 | { | 290 | { |
| 292 | return &gost2814789_cfb64; | 291 | return &gost2814789_cfb64; |
| 293 | } | 292 | } |
| 294 | LCRYPTO_ALIAS(EVP_gost2814789_cfb64); | ||
| 295 | 293 | ||
| 296 | static const EVP_CIPHER gost2814789_cnt = { | 294 | static const EVP_CIPHER gost2814789_cnt = { |
| 297 | .nid = NID_gost89_cnt, | 295 | .nid = NID_gost89_cnt, |
| @@ -314,5 +312,4 @@ EVP_gost2814789_cnt(void) | |||
| 314 | { | 312 | { |
| 315 | return &gost2814789_cnt; | 313 | return &gost2814789_cnt; |
| 316 | } | 314 | } |
| 317 | LCRYPTO_ALIAS(EVP_gost2814789_cnt); | ||
| 318 | #endif | 315 | #endif |
diff --git a/src/lib/libcrypto/evp/e_idea.c b/src/lib/libcrypto/evp/e_idea.c index e330888ba6..b2129dc990 100644 --- a/src/lib/libcrypto/evp/e_idea.c +++ b/src/lib/libcrypto/evp/e_idea.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_idea.c,v 1.19 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_idea.c,v 1.20 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -197,7 +197,6 @@ EVP_idea_cbc(void) | |||
| 197 | { | 197 | { |
| 198 | return &idea_cbc; | 198 | return &idea_cbc; |
| 199 | } | 199 | } |
| 200 | LCRYPTO_ALIAS(EVP_idea_cbc); | ||
| 201 | 200 | ||
| 202 | static const EVP_CIPHER idea_cfb64 = { | 201 | static const EVP_CIPHER idea_cfb64 = { |
| 203 | .nid = NID_idea_cfb64, | 202 | .nid = NID_idea_cfb64, |
| @@ -220,7 +219,6 @@ EVP_idea_cfb64(void) | |||
| 220 | { | 219 | { |
| 221 | return &idea_cfb64; | 220 | return &idea_cfb64; |
| 222 | } | 221 | } |
| 223 | LCRYPTO_ALIAS(EVP_idea_cfb64); | ||
| 224 | 222 | ||
| 225 | static const EVP_CIPHER idea_ofb = { | 223 | static const EVP_CIPHER idea_ofb = { |
| 226 | .nid = NID_idea_ofb64, | 224 | .nid = NID_idea_ofb64, |
| @@ -243,7 +241,6 @@ EVP_idea_ofb(void) | |||
| 243 | { | 241 | { |
| 244 | return &idea_ofb; | 242 | return &idea_ofb; |
| 245 | } | 243 | } |
| 246 | LCRYPTO_ALIAS(EVP_idea_ofb); | ||
| 247 | 244 | ||
| 248 | static const EVP_CIPHER idea_ecb = { | 245 | static const EVP_CIPHER idea_ecb = { |
| 249 | .nid = NID_idea_ecb, | 246 | .nid = NID_idea_ecb, |
| @@ -266,5 +263,4 @@ EVP_idea_ecb(void) | |||
| 266 | { | 263 | { |
| 267 | return &idea_ecb; | 264 | return &idea_ecb; |
| 268 | } | 265 | } |
| 269 | LCRYPTO_ALIAS(EVP_idea_ecb); | ||
| 270 | #endif | 266 | #endif |
diff --git a/src/lib/libcrypto/evp/e_null.c b/src/lib/libcrypto/evp/e_null.c index 3daadb1479..f30c207ff6 100644 --- a/src/lib/libcrypto/evp/e_null.c +++ b/src/lib/libcrypto/evp/e_null.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_null.c,v 1.17 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_null.c,v 1.18 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -88,7 +88,6 @@ EVP_enc_null(void) | |||
| 88 | { | 88 | { |
| 89 | return (&n_cipher); | 89 | return (&n_cipher); |
| 90 | } | 90 | } |
| 91 | LCRYPTO_ALIAS(EVP_enc_null); | ||
| 92 | 91 | ||
| 93 | static int | 92 | static int |
| 94 | null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 93 | null_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
diff --git a/src/lib/libcrypto/evp/e_rc2.c b/src/lib/libcrypto/evp/e_rc2.c index 540c94cdfd..32559e223f 100644 --- a/src/lib/libcrypto/evp/e_rc2.c +++ b/src/lib/libcrypto/evp/e_rc2.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_rc2.c,v 1.21 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_rc2.c,v 1.22 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -180,7 +180,6 @@ EVP_rc2_cbc(void) | |||
| 180 | { | 180 | { |
| 181 | return &rc2_cbc; | 181 | return &rc2_cbc; |
| 182 | } | 182 | } |
| 183 | LCRYPTO_ALIAS(EVP_rc2_cbc); | ||
| 184 | 183 | ||
| 185 | static const EVP_CIPHER rc2_cfb64 = { | 184 | static const EVP_CIPHER rc2_cfb64 = { |
| 186 | .nid = NID_rc2_cfb64, | 185 | .nid = NID_rc2_cfb64, |
| @@ -203,7 +202,6 @@ EVP_rc2_cfb64(void) | |||
| 203 | { | 202 | { |
| 204 | return &rc2_cfb64; | 203 | return &rc2_cfb64; |
| 205 | } | 204 | } |
| 206 | LCRYPTO_ALIAS(EVP_rc2_cfb64); | ||
| 207 | 205 | ||
| 208 | static const EVP_CIPHER rc2_ofb = { | 206 | static const EVP_CIPHER rc2_ofb = { |
| 209 | .nid = NID_rc2_ofb64, | 207 | .nid = NID_rc2_ofb64, |
| @@ -226,7 +224,6 @@ EVP_rc2_ofb(void) | |||
| 226 | { | 224 | { |
| 227 | return &rc2_ofb; | 225 | return &rc2_ofb; |
| 228 | } | 226 | } |
| 229 | LCRYPTO_ALIAS(EVP_rc2_ofb); | ||
| 230 | 227 | ||
| 231 | static const EVP_CIPHER rc2_ecb = { | 228 | static const EVP_CIPHER rc2_ecb = { |
| 232 | .nid = NID_rc2_ecb, | 229 | .nid = NID_rc2_ecb, |
| @@ -249,7 +246,6 @@ EVP_rc2_ecb(void) | |||
| 249 | { | 246 | { |
| 250 | return &rc2_ecb; | 247 | return &rc2_ecb; |
| 251 | } | 248 | } |
| 252 | LCRYPTO_ALIAS(EVP_rc2_ecb); | ||
| 253 | 249 | ||
| 254 | #define RC2_40_MAGIC 0xa0 | 250 | #define RC2_40_MAGIC 0xa0 |
| 255 | #define RC2_64_MAGIC 0x78 | 251 | #define RC2_64_MAGIC 0x78 |
| @@ -288,14 +284,12 @@ EVP_rc2_64_cbc(void) | |||
| 288 | { | 284 | { |
| 289 | return (&r2_64_cbc_cipher); | 285 | return (&r2_64_cbc_cipher); |
| 290 | } | 286 | } |
| 291 | LCRYPTO_ALIAS(EVP_rc2_64_cbc); | ||
| 292 | 287 | ||
| 293 | const EVP_CIPHER * | 288 | const EVP_CIPHER * |
| 294 | EVP_rc2_40_cbc(void) | 289 | EVP_rc2_40_cbc(void) |
| 295 | { | 290 | { |
| 296 | return (&r2_40_cbc_cipher); | 291 | return (&r2_40_cbc_cipher); |
| 297 | } | 292 | } |
| 298 | LCRYPTO_ALIAS(EVP_rc2_40_cbc); | ||
| 299 | 293 | ||
| 300 | static int | 294 | static int |
| 301 | rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 295 | rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
diff --git a/src/lib/libcrypto/evp/e_rc4.c b/src/lib/libcrypto/evp/e_rc4.c index d79bfa729a..2503d37049 100644 --- a/src/lib/libcrypto/evp/e_rc4.c +++ b/src/lib/libcrypto/evp/e_rc4.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_rc4.c,v 1.16 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_rc4.c,v 1.17 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -115,14 +115,12 @@ EVP_rc4(void) | |||
| 115 | { | 115 | { |
| 116 | return (&r4_cipher); | 116 | return (&r4_cipher); |
| 117 | } | 117 | } |
| 118 | LCRYPTO_ALIAS(EVP_rc4); | ||
| 119 | 118 | ||
| 120 | const EVP_CIPHER * | 119 | const EVP_CIPHER * |
| 121 | EVP_rc4_40(void) | 120 | EVP_rc4_40(void) |
| 122 | { | 121 | { |
| 123 | return (&r4_40_cipher); | 122 | return (&r4_40_cipher); |
| 124 | } | 123 | } |
| 125 | LCRYPTO_ALIAS(EVP_rc4_40); | ||
| 126 | 124 | ||
| 127 | static int | 125 | static int |
| 128 | rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 126 | rc4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
diff --git a/src/lib/libcrypto/evp/e_rc4_hmac_md5.c b/src/lib/libcrypto/evp/e_rc4_hmac_md5.c index 1d0bced2df..bcf8daea60 100644 --- a/src/lib/libcrypto/evp/e_rc4_hmac_md5.c +++ b/src/lib/libcrypto/evp/e_rc4_hmac_md5.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_rc4_hmac_md5.c,v 1.11 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_rc4_hmac_md5.c,v 1.12 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* ==================================================================== | 2 | /* ==================================================================== |
| 3 | * Copyright (c) 2011 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 2011 The OpenSSL Project. All rights reserved. |
| 4 | * | 4 | * |
| @@ -304,5 +304,4 @@ EVP_rc4_hmac_md5(void) | |||
| 304 | { | 304 | { |
| 305 | return (&r4_hmac_md5_cipher); | 305 | return (&r4_hmac_md5_cipher); |
| 306 | } | 306 | } |
| 307 | LCRYPTO_ALIAS(EVP_rc4_hmac_md5); | ||
| 308 | #endif | 307 | #endif |
diff --git a/src/lib/libcrypto/evp/e_sm4.c b/src/lib/libcrypto/evp/e_sm4.c index 705a914821..c1664db398 100644 --- a/src/lib/libcrypto/evp/e_sm4.c +++ b/src/lib/libcrypto/evp/e_sm4.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_sm4.c,v 1.8 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_sm4.c,v 1.9 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2017, 2019 Ribose Inc | 3 | * Copyright (c) 2017, 2019 Ribose Inc |
| 4 | * | 4 | * |
| @@ -165,7 +165,6 @@ EVP_sm4_cbc(void) | |||
| 165 | { | 165 | { |
| 166 | return &sm4_cbc; | 166 | return &sm4_cbc; |
| 167 | } | 167 | } |
| 168 | LCRYPTO_ALIAS(EVP_sm4_cbc); | ||
| 169 | 168 | ||
| 170 | static const EVP_CIPHER sm4_cfb128 = { | 169 | static const EVP_CIPHER sm4_cfb128 = { |
| 171 | .nid = NID_sm4_cfb128, | 170 | .nid = NID_sm4_cfb128, |
| @@ -188,7 +187,6 @@ EVP_sm4_cfb128(void) | |||
| 188 | { | 187 | { |
| 189 | return &sm4_cfb128; | 188 | return &sm4_cfb128; |
| 190 | } | 189 | } |
| 191 | LCRYPTO_ALIAS(EVP_sm4_cfb128); | ||
| 192 | 190 | ||
| 193 | static const EVP_CIPHER sm4_ofb = { | 191 | static const EVP_CIPHER sm4_ofb = { |
| 194 | .nid = NID_sm4_ofb128, | 192 | .nid = NID_sm4_ofb128, |
| @@ -211,7 +209,6 @@ EVP_sm4_ofb(void) | |||
| 211 | { | 209 | { |
| 212 | return &sm4_ofb; | 210 | return &sm4_ofb; |
| 213 | } | 211 | } |
| 214 | LCRYPTO_ALIAS(EVP_sm4_ofb); | ||
| 215 | 212 | ||
| 216 | static const EVP_CIPHER sm4_ecb = { | 213 | static const EVP_CIPHER sm4_ecb = { |
| 217 | .nid = NID_sm4_ecb, | 214 | .nid = NID_sm4_ecb, |
| @@ -234,7 +231,6 @@ EVP_sm4_ecb(void) | |||
| 234 | { | 231 | { |
| 235 | return &sm4_ecb; | 232 | return &sm4_ecb; |
| 236 | } | 233 | } |
| 237 | LCRYPTO_ALIAS(EVP_sm4_ecb); | ||
| 238 | 234 | ||
| 239 | static int | 235 | static int |
| 240 | sm4_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, | 236 | sm4_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, |
| @@ -268,5 +264,4 @@ EVP_sm4_ctr(void) | |||
| 268 | { | 264 | { |
| 269 | return &sm4_ctr_mode; | 265 | return &sm4_ctr_mode; |
| 270 | } | 266 | } |
| 271 | LCRYPTO_ALIAS(EVP_sm4_ctr); | ||
| 272 | #endif | 267 | #endif |
diff --git a/src/lib/libcrypto/evp/e_xcbc_d.c b/src/lib/libcrypto/evp/e_xcbc_d.c index c7810a2c22..32f9f2eaa8 100644 --- a/src/lib/libcrypto/evp/e_xcbc_d.c +++ b/src/lib/libcrypto/evp/e_xcbc_d.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: e_xcbc_d.c,v 1.14 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: e_xcbc_d.c,v 1.15 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -102,7 +102,6 @@ EVP_desx_cbc(void) | |||
| 102 | { | 102 | { |
| 103 | return (&d_xcbc_cipher); | 103 | return (&d_xcbc_cipher); |
| 104 | } | 104 | } |
| 105 | LCRYPTO_ALIAS(EVP_desx_cbc); | ||
| 106 | 105 | ||
| 107 | static int | 106 | static int |
| 108 | desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, | 107 | desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, |
diff --git a/src/lib/libcrypto/evp/encode.c b/src/lib/libcrypto/evp/encode.c index 10cb51217a..c62a1dea8f 100644 --- a/src/lib/libcrypto/evp/encode.c +++ b/src/lib/libcrypto/evp/encode.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: encode.c,v 1.31 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: encode.c,v 1.32 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -128,14 +128,12 @@ EVP_ENCODE_CTX_new(void) | |||
| 128 | { | 128 | { |
| 129 | return calloc(1, sizeof(EVP_ENCODE_CTX)); | 129 | return calloc(1, sizeof(EVP_ENCODE_CTX)); |
| 130 | } | 130 | } |
| 131 | LCRYPTO_ALIAS(EVP_ENCODE_CTX_new); | ||
| 132 | 131 | ||
| 133 | void | 132 | void |
| 134 | EVP_ENCODE_CTX_free(EVP_ENCODE_CTX *ctx) | 133 | EVP_ENCODE_CTX_free(EVP_ENCODE_CTX *ctx) |
| 135 | { | 134 | { |
| 136 | free(ctx); | 135 | free(ctx); |
| 137 | } | 136 | } |
| 138 | LCRYPTO_ALIAS(EVP_ENCODE_CTX_free); | ||
| 139 | 137 | ||
| 140 | void | 138 | void |
| 141 | EVP_EncodeInit(EVP_ENCODE_CTX *ctx) | 139 | EVP_EncodeInit(EVP_ENCODE_CTX *ctx) |
| @@ -144,7 +142,6 @@ EVP_EncodeInit(EVP_ENCODE_CTX *ctx) | |||
| 144 | ctx->num = 0; | 142 | ctx->num = 0; |
| 145 | ctx->line_num = 0; | 143 | ctx->line_num = 0; |
| 146 | } | 144 | } |
| 147 | LCRYPTO_ALIAS(EVP_EncodeInit); | ||
| 148 | 145 | ||
| 149 | int | 146 | int |
| 150 | EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, | 147 | EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, |
| @@ -195,7 +192,6 @@ EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, | |||
| 195 | 192 | ||
| 196 | return 1; | 193 | return 1; |
| 197 | } | 194 | } |
| 198 | LCRYPTO_ALIAS(EVP_EncodeUpdate); | ||
| 199 | 195 | ||
| 200 | void | 196 | void |
| 201 | EVP_EncodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl) | 197 | EVP_EncodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl) |
| @@ -210,7 +206,6 @@ EVP_EncodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl) | |||
| 210 | } | 206 | } |
| 211 | *outl = ret; | 207 | *outl = ret; |
| 212 | } | 208 | } |
| 213 | LCRYPTO_ALIAS(EVP_EncodeFinal); | ||
| 214 | 209 | ||
| 215 | int | 210 | int |
| 216 | EVP_EncodeBlock(unsigned char *t, const unsigned char *f, int dlen) | 211 | EVP_EncodeBlock(unsigned char *t, const unsigned char *f, int dlen) |
| @@ -243,7 +238,6 @@ EVP_EncodeBlock(unsigned char *t, const unsigned char *f, int dlen) | |||
| 243 | *t = '\0'; | 238 | *t = '\0'; |
| 244 | return (ret); | 239 | return (ret); |
| 245 | } | 240 | } |
| 246 | LCRYPTO_ALIAS(EVP_EncodeBlock); | ||
| 247 | 241 | ||
| 248 | void | 242 | void |
| 249 | EVP_DecodeInit(EVP_ENCODE_CTX *ctx) | 243 | EVP_DecodeInit(EVP_ENCODE_CTX *ctx) |
| @@ -253,7 +247,6 @@ EVP_DecodeInit(EVP_ENCODE_CTX *ctx) | |||
| 253 | ctx->line_num = 0; | 247 | ctx->line_num = 0; |
| 254 | ctx->expect_nl = 0; | 248 | ctx->expect_nl = 0; |
| 255 | } | 249 | } |
| 256 | LCRYPTO_ALIAS(EVP_DecodeInit); | ||
| 257 | 250 | ||
| 258 | int | 251 | int |
| 259 | EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, | 252 | EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, |
| @@ -362,7 +355,6 @@ EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, | |||
| 362 | ctx->num = n; | 355 | ctx->num = n; |
| 363 | return (rv); | 356 | return (rv); |
| 364 | } | 357 | } |
| 365 | LCRYPTO_ALIAS(EVP_DecodeUpdate); | ||
| 366 | 358 | ||
| 367 | int | 359 | int |
| 368 | EVP_DecodeBlock(unsigned char *t, const unsigned char *f, int n) | 360 | EVP_DecodeBlock(unsigned char *t, const unsigned char *f, int n) |
| @@ -403,7 +395,6 @@ EVP_DecodeBlock(unsigned char *t, const unsigned char *f, int n) | |||
| 403 | } | 395 | } |
| 404 | return (ret); | 396 | return (ret); |
| 405 | } | 397 | } |
| 406 | LCRYPTO_ALIAS(EVP_DecodeBlock); | ||
| 407 | 398 | ||
| 408 | int | 399 | int |
| 409 | EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl) | 400 | EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl) |
| @@ -421,4 +412,3 @@ EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl) | |||
| 421 | } else | 412 | } else |
| 422 | return (1); | 413 | return (1); |
| 423 | } | 414 | } |
| 424 | LCRYPTO_ALIAS(EVP_DecodeFinal); | ||
diff --git a/src/lib/libcrypto/evp/evp_aead.c b/src/lib/libcrypto/evp/evp_aead.c index 8b39c7f923..3579533e5b 100644 --- a/src/lib/libcrypto/evp/evp_aead.c +++ b/src/lib/libcrypto/evp/evp_aead.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: evp_aead.c,v 1.9 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: evp_aead.c,v 1.10 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2014, Google Inc. | 3 | * Copyright (c) 2014, Google Inc. |
| 4 | * | 4 | * |
| @@ -28,28 +28,24 @@ EVP_AEAD_key_length(const EVP_AEAD *aead) | |||
| 28 | { | 28 | { |
| 29 | return aead->key_len; | 29 | return aead->key_len; |
| 30 | } | 30 | } |
| 31 | LCRYPTO_ALIAS(EVP_AEAD_key_length); | ||
| 32 | 31 | ||
| 33 | size_t | 32 | size_t |
| 34 | EVP_AEAD_nonce_length(const EVP_AEAD *aead) | 33 | EVP_AEAD_nonce_length(const EVP_AEAD *aead) |
| 35 | { | 34 | { |
| 36 | return aead->nonce_len; | 35 | return aead->nonce_len; |
| 37 | } | 36 | } |
| 38 | LCRYPTO_ALIAS(EVP_AEAD_nonce_length); | ||
| 39 | 37 | ||
| 40 | size_t | 38 | size_t |
| 41 | EVP_AEAD_max_overhead(const EVP_AEAD *aead) | 39 | EVP_AEAD_max_overhead(const EVP_AEAD *aead) |
| 42 | { | 40 | { |
| 43 | return aead->overhead; | 41 | return aead->overhead; |
| 44 | } | 42 | } |
| 45 | LCRYPTO_ALIAS(EVP_AEAD_max_overhead); | ||
| 46 | 43 | ||
| 47 | size_t | 44 | size_t |
| 48 | EVP_AEAD_max_tag_len(const EVP_AEAD *aead) | 45 | EVP_AEAD_max_tag_len(const EVP_AEAD *aead) |
| 49 | { | 46 | { |
| 50 | return aead->max_tag_len; | 47 | return aead->max_tag_len; |
| 51 | } | 48 | } |
| 52 | LCRYPTO_ALIAS(EVP_AEAD_max_tag_len); | ||
| 53 | 49 | ||
| 54 | int | 50 | int |
| 55 | EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, | 51 | EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, |
| @@ -62,7 +58,6 @@ EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, | |||
| 62 | } | 58 | } |
| 63 | return aead->init(ctx, key, key_len, tag_len); | 59 | return aead->init(ctx, key, key_len, tag_len); |
| 64 | } | 60 | } |
| 65 | LCRYPTO_ALIAS(EVP_AEAD_CTX_init); | ||
| 66 | 61 | ||
| 67 | void | 62 | void |
| 68 | EVP_AEAD_CTX_cleanup(EVP_AEAD_CTX *ctx) | 63 | EVP_AEAD_CTX_cleanup(EVP_AEAD_CTX *ctx) |
| @@ -72,14 +67,12 @@ EVP_AEAD_CTX_cleanup(EVP_AEAD_CTX *ctx) | |||
| 72 | ctx->aead->cleanup(ctx); | 67 | ctx->aead->cleanup(ctx); |
| 73 | ctx->aead = NULL; | 68 | ctx->aead = NULL; |
| 74 | } | 69 | } |
| 75 | LCRYPTO_ALIAS(EVP_AEAD_CTX_cleanup); | ||
| 76 | 70 | ||
| 77 | EVP_AEAD_CTX * | 71 | EVP_AEAD_CTX * |
| 78 | EVP_AEAD_CTX_new(void) | 72 | EVP_AEAD_CTX_new(void) |
| 79 | { | 73 | { |
| 80 | return calloc(1, sizeof(EVP_AEAD_CTX)); | 74 | return calloc(1, sizeof(EVP_AEAD_CTX)); |
| 81 | } | 75 | } |
| 82 | LCRYPTO_ALIAS(EVP_AEAD_CTX_new); | ||
| 83 | 76 | ||
| 84 | void | 77 | void |
| 85 | EVP_AEAD_CTX_free(EVP_AEAD_CTX *ctx) | 78 | EVP_AEAD_CTX_free(EVP_AEAD_CTX *ctx) |
| @@ -90,7 +83,6 @@ EVP_AEAD_CTX_free(EVP_AEAD_CTX *ctx) | |||
| 90 | EVP_AEAD_CTX_cleanup(ctx); | 83 | EVP_AEAD_CTX_cleanup(ctx); |
| 91 | free(ctx); | 84 | free(ctx); |
| 92 | } | 85 | } |
| 93 | LCRYPTO_ALIAS(EVP_AEAD_CTX_free); | ||
| 94 | 86 | ||
| 95 | /* check_alias returns 0 if out points within the buffer determined by in | 87 | /* check_alias returns 0 if out points within the buffer determined by in |
| 96 | * and in_len and 1 otherwise. | 88 | * and in_len and 1 otherwise. |
| @@ -141,7 +133,6 @@ error: | |||
| 141 | *out_len = 0; | 133 | *out_len = 0; |
| 142 | return 0; | 134 | return 0; |
| 143 | } | 135 | } |
| 144 | LCRYPTO_ALIAS(EVP_AEAD_CTX_seal); | ||
| 145 | 136 | ||
| 146 | int | 137 | int |
| 147 | EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, unsigned char *out, size_t *out_len, | 138 | EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, unsigned char *out, size_t *out_len, |
| @@ -167,4 +158,3 @@ error: | |||
| 167 | *out_len = 0; | 158 | *out_len = 0; |
| 168 | return 0; | 159 | return 0; |
| 169 | } | 160 | } |
| 170 | LCRYPTO_ALIAS(EVP_AEAD_CTX_open); | ||
diff --git a/src/lib/libcrypto/evp/evp_enc.c b/src/lib/libcrypto/evp/evp_enc.c index f9b8deddf5..27f753baa0 100644 --- a/src/lib/libcrypto/evp/evp_enc.c +++ b/src/lib/libcrypto/evp/evp_enc.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: evp_enc.c,v 1.51 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: evp_enc.c,v 1.52 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -82,7 +82,6 @@ EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, | |||
| 82 | EVP_CIPHER_CTX_init(ctx); | 82 | EVP_CIPHER_CTX_init(ctx); |
| 83 | return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc); | 83 | return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc); |
| 84 | } | 84 | } |
| 85 | LCRYPTO_ALIAS(EVP_CipherInit); | ||
| 86 | 85 | ||
| 87 | int | 86 | int |
| 88 | EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, | 87 | EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, |
| @@ -231,7 +230,6 @@ skip_to_init: | |||
| 231 | ctx->block_mask = ctx->cipher->block_size - 1; | 230 | ctx->block_mask = ctx->cipher->block_size - 1; |
| 232 | return 1; | 231 | return 1; |
| 233 | } | 232 | } |
| 234 | LCRYPTO_ALIAS(EVP_CipherInit_ex); | ||
| 235 | 233 | ||
| 236 | int | 234 | int |
| 237 | EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | 235 | EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, |
| @@ -242,7 +240,6 @@ EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
| 242 | else | 240 | else |
| 243 | return EVP_DecryptUpdate(ctx, out, outl, in, inl); | 241 | return EVP_DecryptUpdate(ctx, out, outl, in, inl); |
| 244 | } | 242 | } |
| 245 | LCRYPTO_ALIAS(EVP_CipherUpdate); | ||
| 246 | 243 | ||
| 247 | int | 244 | int |
| 248 | EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | 245 | EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) |
| @@ -252,7 +249,6 @@ EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
| 252 | else | 249 | else |
| 253 | return EVP_DecryptFinal_ex(ctx, out, outl); | 250 | return EVP_DecryptFinal_ex(ctx, out, outl); |
| 254 | } | 251 | } |
| 255 | LCRYPTO_ALIAS(EVP_CipherFinal_ex); | ||
| 256 | 252 | ||
| 257 | __warn_references(EVP_CipherFinal, | 253 | __warn_references(EVP_CipherFinal, |
| 258 | "EVP_CipherFinal is often misused, please use EVP_CipherFinal_ex and EVP_CIPHER_CTX_cleanup"); | 254 | "EVP_CipherFinal is often misused, please use EVP_CipherFinal_ex and EVP_CIPHER_CTX_cleanup"); |
| @@ -267,7 +263,6 @@ EVP_CipherFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
| 267 | ret = EVP_DecryptFinal_ex(ctx, out, outl); | 263 | ret = EVP_DecryptFinal_ex(ctx, out, outl); |
| 268 | return ret; | 264 | return ret; |
| 269 | } | 265 | } |
| 270 | LCRYPTO_ALIAS(EVP_CipherFinal); | ||
| 271 | 266 | ||
| 272 | int | 267 | int |
| 273 | EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, | 268 | EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, |
| @@ -275,7 +270,6 @@ EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, | |||
| 275 | { | 270 | { |
| 276 | return EVP_CipherInit(ctx, cipher, key, iv, 1); | 271 | return EVP_CipherInit(ctx, cipher, key, iv, 1); |
| 277 | } | 272 | } |
| 278 | LCRYPTO_ALIAS(EVP_EncryptInit); | ||
| 279 | 273 | ||
| 280 | int | 274 | int |
| 281 | EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, | 275 | EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, |
| @@ -283,7 +277,6 @@ EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, | |||
| 283 | { | 277 | { |
| 284 | return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 1); | 278 | return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 1); |
| 285 | } | 279 | } |
| 286 | LCRYPTO_ALIAS(EVP_EncryptInit_ex); | ||
| 287 | 280 | ||
| 288 | int | 281 | int |
| 289 | EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, | 282 | EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, |
| @@ -291,7 +284,6 @@ EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, | |||
| 291 | { | 284 | { |
| 292 | return EVP_CipherInit(ctx, cipher, key, iv, 0); | 285 | return EVP_CipherInit(ctx, cipher, key, iv, 0); |
| 293 | } | 286 | } |
| 294 | LCRYPTO_ALIAS(EVP_DecryptInit); | ||
| 295 | 287 | ||
| 296 | int | 288 | int |
| 297 | EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, | 289 | EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, |
| @@ -299,7 +291,6 @@ EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, | |||
| 299 | { | 291 | { |
| 300 | return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 0); | 292 | return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 0); |
| 301 | } | 293 | } |
| 302 | LCRYPTO_ALIAS(EVP_DecryptInit_ex); | ||
| 303 | 294 | ||
| 304 | int | 295 | int |
| 305 | EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | 296 | EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, |
| @@ -382,7 +373,6 @@ EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
| 382 | ctx->buf_len = i; | 373 | ctx->buf_len = i; |
| 383 | return 1; | 374 | return 1; |
| 384 | } | 375 | } |
| 385 | LCRYPTO_ALIAS(EVP_EncryptUpdate); | ||
| 386 | 376 | ||
| 387 | __warn_references(EVP_EncryptFinal, | 377 | __warn_references(EVP_EncryptFinal, |
| 388 | "EVP_EncryptFinal is often misused, please use EVP_EncryptFinal_ex and EVP_CIPHER_CTX_cleanup"); | 378 | "EVP_EncryptFinal is often misused, please use EVP_EncryptFinal_ex and EVP_CIPHER_CTX_cleanup"); |
| @@ -395,7 +385,6 @@ EVP_EncryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
| 395 | ret = EVP_EncryptFinal_ex(ctx, out, outl); | 385 | ret = EVP_EncryptFinal_ex(ctx, out, outl); |
| 396 | return ret; | 386 | return ret; |
| 397 | } | 387 | } |
| 398 | LCRYPTO_ALIAS(EVP_EncryptFinal); | ||
| 399 | 388 | ||
| 400 | int | 389 | int |
| 401 | EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | 390 | EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) |
| @@ -442,7 +431,6 @@ EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
| 442 | 431 | ||
| 443 | return ret; | 432 | return ret; |
| 444 | } | 433 | } |
| 445 | LCRYPTO_ALIAS(EVP_EncryptFinal_ex); | ||
| 446 | 434 | ||
| 447 | int | 435 | int |
| 448 | EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | 436 | EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, |
| @@ -513,7 +501,6 @@ EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, | |||
| 513 | 501 | ||
| 514 | return 1; | 502 | return 1; |
| 515 | } | 503 | } |
| 516 | LCRYPTO_ALIAS(EVP_DecryptUpdate); | ||
| 517 | 504 | ||
| 518 | __warn_references(EVP_DecryptFinal, | 505 | __warn_references(EVP_DecryptFinal, |
| 519 | "EVP_DecryptFinal is often misused, please use EVP_DecryptFinal_ex and EVP_CIPHER_CTX_cleanup"); | 506 | "EVP_DecryptFinal is often misused, please use EVP_DecryptFinal_ex and EVP_CIPHER_CTX_cleanup"); |
| @@ -526,7 +513,6 @@ EVP_DecryptFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
| 526 | ret = EVP_DecryptFinal_ex(ctx, out, outl); | 513 | ret = EVP_DecryptFinal_ex(ctx, out, outl); |
| 527 | return ret; | 514 | return ret; |
| 528 | } | 515 | } |
| 529 | LCRYPTO_ALIAS(EVP_DecryptFinal); | ||
| 530 | 516 | ||
| 531 | int | 517 | int |
| 532 | EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | 518 | EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) |
| @@ -581,14 +567,12 @@ EVP_DecryptFinal_ex(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
| 581 | *outl = 0; | 567 | *outl = 0; |
| 582 | return (1); | 568 | return (1); |
| 583 | } | 569 | } |
| 584 | LCRYPTO_ALIAS(EVP_DecryptFinal_ex); | ||
| 585 | 570 | ||
| 586 | EVP_CIPHER_CTX * | 571 | EVP_CIPHER_CTX * |
| 587 | EVP_CIPHER_CTX_new(void) | 572 | EVP_CIPHER_CTX_new(void) |
| 588 | { | 573 | { |
| 589 | return calloc(1, sizeof(EVP_CIPHER_CTX)); | 574 | return calloc(1, sizeof(EVP_CIPHER_CTX)); |
| 590 | } | 575 | } |
| 591 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_new); | ||
| 592 | 576 | ||
| 593 | void | 577 | void |
| 594 | EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx) | 578 | EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx) |
| @@ -600,21 +584,18 @@ EVP_CIPHER_CTX_free(EVP_CIPHER_CTX *ctx) | |||
| 600 | 584 | ||
| 601 | free(ctx); | 585 | free(ctx); |
| 602 | } | 586 | } |
| 603 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_free); | ||
| 604 | 587 | ||
| 605 | void | 588 | void |
| 606 | EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx) | 589 | EVP_CIPHER_CTX_init(EVP_CIPHER_CTX *ctx) |
| 607 | { | 590 | { |
| 608 | memset(ctx, 0, sizeof(EVP_CIPHER_CTX)); | 591 | memset(ctx, 0, sizeof(EVP_CIPHER_CTX)); |
| 609 | } | 592 | } |
| 610 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_init); | ||
| 611 | 593 | ||
| 612 | int | 594 | int |
| 613 | EVP_CIPHER_CTX_reset(EVP_CIPHER_CTX *a) | 595 | EVP_CIPHER_CTX_reset(EVP_CIPHER_CTX *a) |
| 614 | { | 596 | { |
| 615 | return EVP_CIPHER_CTX_cleanup(a); | 597 | return EVP_CIPHER_CTX_cleanup(a); |
| 616 | } | 598 | } |
| 617 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_reset); | ||
| 618 | 599 | ||
| 619 | int | 600 | int |
| 620 | EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) | 601 | EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) |
| @@ -638,7 +619,6 @@ EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) | |||
| 638 | 619 | ||
| 639 | return 1; | 620 | return 1; |
| 640 | } | 621 | } |
| 641 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_cleanup); | ||
| 642 | 622 | ||
| 643 | int | 623 | int |
| 644 | EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen) | 624 | EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen) |
| @@ -655,7 +635,6 @@ EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *c, int keylen) | |||
| 655 | EVPerror(EVP_R_INVALID_KEY_LENGTH); | 635 | EVPerror(EVP_R_INVALID_KEY_LENGTH); |
| 656 | return 0; | 636 | return 0; |
| 657 | } | 637 | } |
| 658 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_key_length); | ||
| 659 | 638 | ||
| 660 | int | 639 | int |
| 661 | EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *ctx, int pad) | 640 | EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *ctx, int pad) |
| @@ -666,7 +645,6 @@ EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *ctx, int pad) | |||
| 666 | ctx->flags |= EVP_CIPH_NO_PADDING; | 645 | ctx->flags |= EVP_CIPH_NO_PADDING; |
| 667 | return 1; | 646 | return 1; |
| 668 | } | 647 | } |
| 669 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_padding); | ||
| 670 | 648 | ||
| 671 | int | 649 | int |
| 672 | EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | 650 | EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) |
| @@ -690,7 +668,6 @@ EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) | |||
| 690 | } | 668 | } |
| 691 | return ret; | 669 | return ret; |
| 692 | } | 670 | } |
| 693 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_ctrl); | ||
| 694 | 671 | ||
| 695 | int | 672 | int |
| 696 | EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key) | 673 | EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key) |
| @@ -700,7 +677,6 @@ EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key) | |||
| 700 | arc4random_buf(key, ctx->key_len); | 677 | arc4random_buf(key, ctx->key_len); |
| 701 | return 1; | 678 | return 1; |
| 702 | } | 679 | } |
| 703 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_rand_key); | ||
| 704 | 680 | ||
| 705 | int | 681 | int |
| 706 | EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in) | 682 | EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in) |
| @@ -747,4 +723,3 @@ EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, const EVP_CIPHER_CTX *in) | |||
| 747 | 723 | ||
| 748 | return 1; | 724 | return 1; |
| 749 | } | 725 | } |
| 750 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_copy); | ||
diff --git a/src/lib/libcrypto/evp/evp_err.c b/src/lib/libcrypto/evp/evp_err.c index 8835215c14..039e17e6cf 100644 --- a/src/lib/libcrypto/evp/evp_err.c +++ b/src/lib/libcrypto/evp/evp_err.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: evp_err.c,v 1.31 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: evp_err.c,v 1.32 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* ==================================================================== | 2 | /* ==================================================================== |
| 3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. |
| 4 | * | 4 | * |
| @@ -164,4 +164,3 @@ ERR_load_EVP_strings(void) | |||
| 164 | } | 164 | } |
| 165 | #endif | 165 | #endif |
| 166 | } | 166 | } |
| 167 | LCRYPTO_ALIAS(ERR_load_EVP_strings); | ||
diff --git a/src/lib/libcrypto/evp/evp_key.c b/src/lib/libcrypto/evp/evp_key.c index 148fd2fe92..2f6e7e70cc 100644 --- a/src/lib/libcrypto/evp/evp_key.c +++ b/src/lib/libcrypto/evp/evp_key.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: evp_key.c,v 1.29 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: evp_key.c,v 1.30 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -79,7 +79,6 @@ EVP_set_pw_prompt(const char *prompt) | |||
| 79 | strlcpy(prompt_string, prompt, sizeof(prompt_string)); | 79 | strlcpy(prompt_string, prompt, sizeof(prompt_string)); |
| 80 | } | 80 | } |
| 81 | } | 81 | } |
| 82 | LCRYPTO_ALIAS(EVP_set_pw_prompt); | ||
| 83 | 82 | ||
| 84 | char * | 83 | char * |
| 85 | EVP_get_pw_prompt(void) | 84 | EVP_get_pw_prompt(void) |
| @@ -89,14 +88,12 @@ EVP_get_pw_prompt(void) | |||
| 89 | else | 88 | else |
| 90 | return (prompt_string); | 89 | return (prompt_string); |
| 91 | } | 90 | } |
| 92 | LCRYPTO_ALIAS(EVP_get_pw_prompt); | ||
| 93 | 91 | ||
| 94 | int | 92 | int |
| 95 | EVP_read_pw_string(char *buf, int len, const char *prompt, int verify) | 93 | EVP_read_pw_string(char *buf, int len, const char *prompt, int verify) |
| 96 | { | 94 | { |
| 97 | return EVP_read_pw_string_min(buf, 0, len, prompt, verify); | 95 | return EVP_read_pw_string_min(buf, 0, len, prompt, verify); |
| 98 | } | 96 | } |
| 99 | LCRYPTO_ALIAS(EVP_read_pw_string); | ||
| 100 | 97 | ||
| 101 | int | 98 | int |
| 102 | EVP_read_pw_string_min(char *buf, int min, int len, const char *prompt, | 99 | EVP_read_pw_string_min(char *buf, int min, int len, const char *prompt, |
| @@ -128,7 +125,6 @@ EVP_read_pw_string_min(char *buf, int min, int len, const char *prompt, | |||
| 128 | explicit_bzero(buff, BUFSIZ); | 125 | explicit_bzero(buff, BUFSIZ); |
| 129 | return ret; | 126 | return ret; |
| 130 | } | 127 | } |
| 131 | LCRYPTO_ALIAS(EVP_read_pw_string_min); | ||
| 132 | 128 | ||
| 133 | int | 129 | int |
| 134 | EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, | 130 | EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md, |
| @@ -214,4 +210,3 @@ err: | |||
| 214 | explicit_bzero(md_buf, sizeof md_buf); | 210 | explicit_bzero(md_buf, sizeof md_buf); |
| 215 | return rv; | 211 | return rv; |
| 216 | } | 212 | } |
| 217 | LCRYPTO_ALIAS(EVP_BytesToKey); | ||
diff --git a/src/lib/libcrypto/evp/evp_lib.c b/src/lib/libcrypto/evp/evp_lib.c index d6b929c0e3..24ce1963df 100644 --- a/src/lib/libcrypto/evp/evp_lib.c +++ b/src/lib/libcrypto/evp/evp_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: evp_lib.c,v 1.26 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: evp_lib.c,v 1.27 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -79,7 +79,6 @@ EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
| 79 | ret = -1; | 79 | ret = -1; |
| 80 | return (ret); | 80 | return (ret); |
| 81 | } | 81 | } |
| 82 | LCRYPTO_ALIAS(EVP_CIPHER_param_to_asn1); | ||
| 83 | 82 | ||
| 84 | int | 83 | int |
| 85 | EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 84 | EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
| @@ -94,7 +93,6 @@ EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
| 94 | ret = -1; | 93 | ret = -1; |
| 95 | return (ret); | 94 | return (ret); |
| 96 | } | 95 | } |
| 97 | LCRYPTO_ALIAS(EVP_CIPHER_asn1_to_param); | ||
| 98 | 96 | ||
| 99 | int | 97 | int |
| 100 | EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 98 | EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
| @@ -116,7 +114,6 @@ EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
| 116 | } | 114 | } |
| 117 | return (i); | 115 | return (i); |
| 118 | } | 116 | } |
| 119 | LCRYPTO_ALIAS(EVP_CIPHER_get_asn1_iv); | ||
| 120 | 117 | ||
| 121 | int | 118 | int |
| 122 | EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 119 | EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
| @@ -134,7 +131,6 @@ EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
| 134 | } | 131 | } |
| 135 | return (i); | 132 | return (i); |
| 136 | } | 133 | } |
| 137 | LCRYPTO_ALIAS(EVP_CIPHER_set_asn1_iv); | ||
| 138 | 134 | ||
| 139 | /* Convert the various cipher NIDs and dummies to a proper OID NID */ | 135 | /* Convert the various cipher NIDs and dummies to a proper OID NID */ |
| 140 | int | 136 | int |
| @@ -188,21 +184,18 @@ EVP_CIPHER_type(const EVP_CIPHER *ctx) | |||
| 188 | return nid; | 184 | return nid; |
| 189 | } | 185 | } |
| 190 | } | 186 | } |
| 191 | LCRYPTO_ALIAS(EVP_CIPHER_type); | ||
| 192 | 187 | ||
| 193 | int | 188 | int |
| 194 | EVP_CIPHER_block_size(const EVP_CIPHER *e) | 189 | EVP_CIPHER_block_size(const EVP_CIPHER *e) |
| 195 | { | 190 | { |
| 196 | return e->block_size; | 191 | return e->block_size; |
| 197 | } | 192 | } |
| 198 | LCRYPTO_ALIAS(EVP_CIPHER_block_size); | ||
| 199 | 193 | ||
| 200 | int | 194 | int |
| 201 | EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx) | 195 | EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx) |
| 202 | { | 196 | { |
| 203 | return ctx->cipher->block_size; | 197 | return ctx->cipher->block_size; |
| 204 | } | 198 | } |
| 205 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_block_size); | ||
| 206 | 199 | ||
| 207 | int | 200 | int |
| 208 | EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, | 201 | EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, |
| @@ -210,56 +203,48 @@ EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, | |||
| 210 | { | 203 | { |
| 211 | return ctx->cipher->do_cipher(ctx, out, in, inl); | 204 | return ctx->cipher->do_cipher(ctx, out, in, inl); |
| 212 | } | 205 | } |
| 213 | LCRYPTO_ALIAS(EVP_Cipher); | ||
| 214 | 206 | ||
| 215 | const EVP_CIPHER * | 207 | const EVP_CIPHER * |
| 216 | EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx) | 208 | EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx) |
| 217 | { | 209 | { |
| 218 | return ctx->cipher; | 210 | return ctx->cipher; |
| 219 | } | 211 | } |
| 220 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_cipher); | ||
| 221 | 212 | ||
| 222 | int | 213 | int |
| 223 | EVP_CIPHER_CTX_encrypting(const EVP_CIPHER_CTX *ctx) | 214 | EVP_CIPHER_CTX_encrypting(const EVP_CIPHER_CTX *ctx) |
| 224 | { | 215 | { |
| 225 | return ctx->encrypt; | 216 | return ctx->encrypt; |
| 226 | } | 217 | } |
| 227 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_encrypting); | ||
| 228 | 218 | ||
| 229 | unsigned long | 219 | unsigned long |
| 230 | EVP_CIPHER_flags(const EVP_CIPHER *cipher) | 220 | EVP_CIPHER_flags(const EVP_CIPHER *cipher) |
| 231 | { | 221 | { |
| 232 | return cipher->flags; | 222 | return cipher->flags; |
| 233 | } | 223 | } |
| 234 | LCRYPTO_ALIAS(EVP_CIPHER_flags); | ||
| 235 | 224 | ||
| 236 | unsigned long | 225 | unsigned long |
| 237 | EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx) | 226 | EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx) |
| 238 | { | 227 | { |
| 239 | return ctx->cipher->flags; | 228 | return ctx->cipher->flags; |
| 240 | } | 229 | } |
| 241 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_flags); | ||
| 242 | 230 | ||
| 243 | void * | 231 | void * |
| 244 | EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx) | 232 | EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx) |
| 245 | { | 233 | { |
| 246 | return ctx->app_data; | 234 | return ctx->app_data; |
| 247 | } | 235 | } |
| 248 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_get_app_data); | ||
| 249 | 236 | ||
| 250 | void | 237 | void |
| 251 | EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data) | 238 | EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data) |
| 252 | { | 239 | { |
| 253 | ctx->app_data = data; | 240 | ctx->app_data = data; |
| 254 | } | 241 | } |
| 255 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_app_data); | ||
| 256 | 242 | ||
| 257 | void * | 243 | void * |
| 258 | EVP_CIPHER_CTX_get_cipher_data(const EVP_CIPHER_CTX *ctx) | 244 | EVP_CIPHER_CTX_get_cipher_data(const EVP_CIPHER_CTX *ctx) |
| 259 | { | 245 | { |
| 260 | return ctx->cipher_data; | 246 | return ctx->cipher_data; |
| 261 | } | 247 | } |
| 262 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_get_cipher_data); | ||
| 263 | 248 | ||
| 264 | void * | 249 | void * |
| 265 | EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) | 250 | EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) |
| @@ -271,56 +256,48 @@ EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) | |||
| 271 | 256 | ||
| 272 | return old_cipher_data; | 257 | return old_cipher_data; |
| 273 | } | 258 | } |
| 274 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_cipher_data); | ||
| 275 | 259 | ||
| 276 | int | 260 | int |
| 277 | EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) | 261 | EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) |
| 278 | { | 262 | { |
| 279 | return cipher->iv_len; | 263 | return cipher->iv_len; |
| 280 | } | 264 | } |
| 281 | LCRYPTO_ALIAS(EVP_CIPHER_iv_length); | ||
| 282 | 265 | ||
| 283 | int | 266 | int |
| 284 | EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx) | 267 | EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx) |
| 285 | { | 268 | { |
| 286 | return ctx->cipher->iv_len; | 269 | return ctx->cipher->iv_len; |
| 287 | } | 270 | } |
| 288 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_iv_length); | ||
| 289 | 271 | ||
| 290 | unsigned char * | 272 | unsigned char * |
| 291 | EVP_CIPHER_CTX_buf_noconst(EVP_CIPHER_CTX *ctx) | 273 | EVP_CIPHER_CTX_buf_noconst(EVP_CIPHER_CTX *ctx) |
| 292 | { | 274 | { |
| 293 | return ctx->buf; | 275 | return ctx->buf; |
| 294 | } | 276 | } |
| 295 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_buf_noconst); | ||
| 296 | 277 | ||
| 297 | int | 278 | int |
| 298 | EVP_CIPHER_key_length(const EVP_CIPHER *cipher) | 279 | EVP_CIPHER_key_length(const EVP_CIPHER *cipher) |
| 299 | { | 280 | { |
| 300 | return cipher->key_len; | 281 | return cipher->key_len; |
| 301 | } | 282 | } |
| 302 | LCRYPTO_ALIAS(EVP_CIPHER_key_length); | ||
| 303 | 283 | ||
| 304 | int | 284 | int |
| 305 | EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx) | 285 | EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx) |
| 306 | { | 286 | { |
| 307 | return ctx->key_len; | 287 | return ctx->key_len; |
| 308 | } | 288 | } |
| 309 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_key_length); | ||
| 310 | 289 | ||
| 311 | int | 290 | int |
| 312 | EVP_CIPHER_nid(const EVP_CIPHER *cipher) | 291 | EVP_CIPHER_nid(const EVP_CIPHER *cipher) |
| 313 | { | 292 | { |
| 314 | return cipher->nid; | 293 | return cipher->nid; |
| 315 | } | 294 | } |
| 316 | LCRYPTO_ALIAS(EVP_CIPHER_nid); | ||
| 317 | 295 | ||
| 318 | int | 296 | int |
| 319 | EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx) | 297 | EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx) |
| 320 | { | 298 | { |
| 321 | return ctx->cipher->nid; | 299 | return ctx->cipher->nid; |
| 322 | } | 300 | } |
| 323 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_nid); | ||
| 324 | 301 | ||
| 325 | int | 302 | int |
| 326 | EVP_CIPHER_CTX_get_iv(const EVP_CIPHER_CTX *ctx, unsigned char *iv, size_t len) | 303 | EVP_CIPHER_CTX_get_iv(const EVP_CIPHER_CTX *ctx, unsigned char *iv, size_t len) |
| @@ -340,7 +317,6 @@ EVP_CIPHER_CTX_get_iv(const EVP_CIPHER_CTX *ctx, unsigned char *iv, size_t len) | |||
| 340 | } | 317 | } |
| 341 | return 1; | 318 | return 1; |
| 342 | } | 319 | } |
| 343 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_get_iv); | ||
| 344 | 320 | ||
| 345 | int | 321 | int |
| 346 | EVP_CIPHER_CTX_set_iv(EVP_CIPHER_CTX *ctx, const unsigned char *iv, size_t len) | 322 | EVP_CIPHER_CTX_set_iv(EVP_CIPHER_CTX *ctx, const unsigned char *iv, size_t len) |
| @@ -360,28 +336,24 @@ EVP_CIPHER_CTX_set_iv(EVP_CIPHER_CTX *ctx, const unsigned char *iv, size_t len) | |||
| 360 | } | 336 | } |
| 361 | return 1; | 337 | return 1; |
| 362 | } | 338 | } |
| 363 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_iv); | ||
| 364 | 339 | ||
| 365 | int | 340 | int |
| 366 | EVP_MD_block_size(const EVP_MD *md) | 341 | EVP_MD_block_size(const EVP_MD *md) |
| 367 | { | 342 | { |
| 368 | return md->block_size; | 343 | return md->block_size; |
| 369 | } | 344 | } |
| 370 | LCRYPTO_ALIAS(EVP_MD_block_size); | ||
| 371 | 345 | ||
| 372 | int | 346 | int |
| 373 | EVP_MD_type(const EVP_MD *md) | 347 | EVP_MD_type(const EVP_MD *md) |
| 374 | { | 348 | { |
| 375 | return md->type; | 349 | return md->type; |
| 376 | } | 350 | } |
| 377 | LCRYPTO_ALIAS(EVP_MD_type); | ||
| 378 | 351 | ||
| 379 | int | 352 | int |
| 380 | EVP_MD_pkey_type(const EVP_MD *md) | 353 | EVP_MD_pkey_type(const EVP_MD *md) |
| 381 | { | 354 | { |
| 382 | return md->pkey_type; | 355 | return md->pkey_type; |
| 383 | } | 356 | } |
| 384 | LCRYPTO_ALIAS(EVP_MD_pkey_type); | ||
| 385 | 357 | ||
| 386 | int | 358 | int |
| 387 | EVP_MD_size(const EVP_MD *md) | 359 | EVP_MD_size(const EVP_MD *md) |
| @@ -392,14 +364,12 @@ EVP_MD_size(const EVP_MD *md) | |||
| 392 | } | 364 | } |
| 393 | return md->md_size; | 365 | return md->md_size; |
| 394 | } | 366 | } |
| 395 | LCRYPTO_ALIAS(EVP_MD_size); | ||
| 396 | 367 | ||
| 397 | unsigned long | 368 | unsigned long |
| 398 | EVP_MD_flags(const EVP_MD *md) | 369 | EVP_MD_flags(const EVP_MD *md) |
| 399 | { | 370 | { |
| 400 | return md->flags; | 371 | return md->flags; |
| 401 | } | 372 | } |
| 402 | LCRYPTO_ALIAS(EVP_MD_flags); | ||
| 403 | 373 | ||
| 404 | EVP_MD * | 374 | EVP_MD * |
| 405 | EVP_MD_meth_new(int md_type, int pkey_type) | 375 | EVP_MD_meth_new(int md_type, int pkey_type) |
| @@ -414,7 +384,6 @@ EVP_MD_meth_new(int md_type, int pkey_type) | |||
| 414 | 384 | ||
| 415 | return md; | 385 | return md; |
| 416 | } | 386 | } |
| 417 | LCRYPTO_ALIAS(EVP_MD_meth_new); | ||
| 418 | 387 | ||
| 419 | EVP_MD * | 388 | EVP_MD * |
| 420 | EVP_MD_meth_dup(const EVP_MD *md) | 389 | EVP_MD_meth_dup(const EVP_MD *md) |
| @@ -428,14 +397,12 @@ EVP_MD_meth_dup(const EVP_MD *md) | |||
| 428 | 397 | ||
| 429 | return to; | 398 | return to; |
| 430 | } | 399 | } |
| 431 | LCRYPTO_ALIAS(EVP_MD_meth_dup); | ||
| 432 | 400 | ||
| 433 | void | 401 | void |
| 434 | EVP_MD_meth_free(EVP_MD *md) | 402 | EVP_MD_meth_free(EVP_MD *md) |
| 435 | { | 403 | { |
| 436 | freezero(md, sizeof(*md)); | 404 | freezero(md, sizeof(*md)); |
| 437 | } | 405 | } |
| 438 | LCRYPTO_ALIAS(EVP_MD_meth_free); | ||
| 439 | 406 | ||
| 440 | int | 407 | int |
| 441 | EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) | 408 | EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) |
| @@ -443,7 +410,6 @@ EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) | |||
| 443 | md->block_size = blocksize; | 410 | md->block_size = blocksize; |
| 444 | return 1; | 411 | return 1; |
| 445 | } | 412 | } |
| 446 | LCRYPTO_ALIAS(EVP_MD_meth_set_input_blocksize); | ||
| 447 | 413 | ||
| 448 | int | 414 | int |
| 449 | EVP_MD_meth_set_result_size(EVP_MD *md, int result_size) | 415 | EVP_MD_meth_set_result_size(EVP_MD *md, int result_size) |
| @@ -451,7 +417,6 @@ EVP_MD_meth_set_result_size(EVP_MD *md, int result_size) | |||
| 451 | md->md_size = result_size; | 417 | md->md_size = result_size; |
| 452 | return 1; | 418 | return 1; |
| 453 | } | 419 | } |
| 454 | LCRYPTO_ALIAS(EVP_MD_meth_set_result_size); | ||
| 455 | 420 | ||
| 456 | int | 421 | int |
| 457 | EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) | 422 | EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) |
| @@ -459,7 +424,6 @@ EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) | |||
| 459 | md->ctx_size = datasize; | 424 | md->ctx_size = datasize; |
| 460 | return 1; | 425 | return 1; |
| 461 | } | 426 | } |
| 462 | LCRYPTO_ALIAS(EVP_MD_meth_set_app_datasize); | ||
| 463 | 427 | ||
| 464 | int | 428 | int |
| 465 | EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) | 429 | EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) |
| @@ -467,7 +431,6 @@ EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) | |||
| 467 | md->flags = flags; | 431 | md->flags = flags; |
| 468 | return 1; | 432 | return 1; |
| 469 | } | 433 | } |
| 470 | LCRYPTO_ALIAS(EVP_MD_meth_set_flags); | ||
| 471 | 434 | ||
| 472 | int | 435 | int |
| 473 | EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) | 436 | EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) |
| @@ -475,7 +438,6 @@ EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) | |||
| 475 | md->init = init; | 438 | md->init = init; |
| 476 | return 1; | 439 | return 1; |
| 477 | } | 440 | } |
| 478 | LCRYPTO_ALIAS(EVP_MD_meth_set_init); | ||
| 479 | 441 | ||
| 480 | int | 442 | int |
| 481 | EVP_MD_meth_set_update(EVP_MD *md, | 443 | EVP_MD_meth_set_update(EVP_MD *md, |
| @@ -484,7 +446,6 @@ EVP_MD_meth_set_update(EVP_MD *md, | |||
| 484 | md->update = update; | 446 | md->update = update; |
| 485 | return 1; | 447 | return 1; |
| 486 | } | 448 | } |
| 487 | LCRYPTO_ALIAS(EVP_MD_meth_set_update); | ||
| 488 | 449 | ||
| 489 | int | 450 | int |
| 490 | EVP_MD_meth_set_final(EVP_MD *md, | 451 | EVP_MD_meth_set_final(EVP_MD *md, |
| @@ -493,7 +454,6 @@ EVP_MD_meth_set_final(EVP_MD *md, | |||
| 493 | md->final = final; | 454 | md->final = final; |
| 494 | return 1; | 455 | return 1; |
| 495 | } | 456 | } |
| 496 | LCRYPTO_ALIAS(EVP_MD_meth_set_final); | ||
| 497 | 457 | ||
| 498 | int | 458 | int |
| 499 | EVP_MD_meth_set_copy(EVP_MD *md, | 459 | EVP_MD_meth_set_copy(EVP_MD *md, |
| @@ -502,7 +462,6 @@ EVP_MD_meth_set_copy(EVP_MD *md, | |||
| 502 | md->copy = copy; | 462 | md->copy = copy; |
| 503 | return 1; | 463 | return 1; |
| 504 | } | 464 | } |
| 505 | LCRYPTO_ALIAS(EVP_MD_meth_set_copy); | ||
| 506 | 465 | ||
| 507 | int | 466 | int |
| 508 | EVP_MD_meth_set_cleanup(EVP_MD *md, | 467 | EVP_MD_meth_set_cleanup(EVP_MD *md, |
| @@ -511,7 +470,6 @@ EVP_MD_meth_set_cleanup(EVP_MD *md, | |||
| 511 | md->cleanup = cleanup; | 470 | md->cleanup = cleanup; |
| 512 | return 1; | 471 | return 1; |
| 513 | } | 472 | } |
| 514 | LCRYPTO_ALIAS(EVP_MD_meth_set_cleanup); | ||
| 515 | 473 | ||
| 516 | int | 474 | int |
| 517 | EVP_MD_meth_set_ctrl(EVP_MD *md, | 475 | EVP_MD_meth_set_ctrl(EVP_MD *md, |
| @@ -520,7 +478,6 @@ EVP_MD_meth_set_ctrl(EVP_MD *md, | |||
| 520 | md->md_ctrl = ctrl; | 478 | md->md_ctrl = ctrl; |
| 521 | return 1; | 479 | return 1; |
| 522 | } | 480 | } |
| 523 | LCRYPTO_ALIAS(EVP_MD_meth_set_ctrl); | ||
| 524 | 481 | ||
| 525 | const EVP_MD * | 482 | const EVP_MD * |
| 526 | EVP_MD_CTX_md(const EVP_MD_CTX *ctx) | 483 | EVP_MD_CTX_md(const EVP_MD_CTX *ctx) |
| @@ -529,21 +486,18 @@ EVP_MD_CTX_md(const EVP_MD_CTX *ctx) | |||
| 529 | return NULL; | 486 | return NULL; |
| 530 | return ctx->digest; | 487 | return ctx->digest; |
| 531 | } | 488 | } |
| 532 | LCRYPTO_ALIAS(EVP_MD_CTX_md); | ||
| 533 | 489 | ||
| 534 | void * | 490 | void * |
| 535 | EVP_MD_CTX_md_data(const EVP_MD_CTX *ctx) | 491 | EVP_MD_CTX_md_data(const EVP_MD_CTX *ctx) |
| 536 | { | 492 | { |
| 537 | return ctx->md_data; | 493 | return ctx->md_data; |
| 538 | } | 494 | } |
| 539 | LCRYPTO_ALIAS(EVP_MD_CTX_md_data); | ||
| 540 | 495 | ||
| 541 | EVP_PKEY_CTX * | 496 | EVP_PKEY_CTX * |
| 542 | EVP_MD_CTX_pkey_ctx(const EVP_MD_CTX *ctx) | 497 | EVP_MD_CTX_pkey_ctx(const EVP_MD_CTX *ctx) |
| 543 | { | 498 | { |
| 544 | return ctx->pctx; | 499 | return ctx->pctx; |
| 545 | } | 500 | } |
| 546 | LCRYPTO_ALIAS(EVP_MD_CTX_pkey_ctx); | ||
| 547 | 501 | ||
| 548 | void | 502 | void |
| 549 | EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) | 503 | EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) |
| @@ -567,46 +521,39 @@ EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) | |||
| 567 | EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX); | 521 | EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX); |
| 568 | } | 522 | } |
| 569 | } | 523 | } |
| 570 | LCRYPTO_ALIAS(EVP_MD_CTX_set_pkey_ctx); | ||
| 571 | 524 | ||
| 572 | void | 525 | void |
| 573 | EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags) | 526 | EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags) |
| 574 | { | 527 | { |
| 575 | ctx->flags |= flags; | 528 | ctx->flags |= flags; |
| 576 | } | 529 | } |
| 577 | LCRYPTO_ALIAS(EVP_MD_CTX_set_flags); | ||
| 578 | 530 | ||
| 579 | void | 531 | void |
| 580 | EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags) | 532 | EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags) |
| 581 | { | 533 | { |
| 582 | ctx->flags &= ~flags; | 534 | ctx->flags &= ~flags; |
| 583 | } | 535 | } |
| 584 | LCRYPTO_ALIAS(EVP_MD_CTX_clear_flags); | ||
| 585 | 536 | ||
| 586 | int | 537 | int |
| 587 | EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags) | 538 | EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags) |
| 588 | { | 539 | { |
| 589 | return (ctx->flags & flags); | 540 | return (ctx->flags & flags); |
| 590 | } | 541 | } |
| 591 | LCRYPTO_ALIAS(EVP_MD_CTX_test_flags); | ||
| 592 | 542 | ||
| 593 | void | 543 | void |
| 594 | EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags) | 544 | EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags) |
| 595 | { | 545 | { |
| 596 | ctx->flags |= flags; | 546 | ctx->flags |= flags; |
| 597 | } | 547 | } |
| 598 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_flags); | ||
| 599 | 548 | ||
| 600 | void | 549 | void |
| 601 | EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags) | 550 | EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags) |
| 602 | { | 551 | { |
| 603 | ctx->flags &= ~flags; | 552 | ctx->flags &= ~flags; |
| 604 | } | 553 | } |
| 605 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_clear_flags); | ||
| 606 | 554 | ||
| 607 | int | 555 | int |
| 608 | EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags) | 556 | EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags) |
| 609 | { | 557 | { |
| 610 | return (ctx->flags & flags); | 558 | return (ctx->flags & flags); |
| 611 | } | 559 | } |
| 612 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_test_flags); | ||
diff --git a/src/lib/libcrypto/evp/evp_pbe.c b/src/lib/libcrypto/evp/evp_pbe.c index 5592521e62..4a23a98f8d 100644 --- a/src/lib/libcrypto/evp/evp_pbe.c +++ b/src/lib/libcrypto/evp/evp_pbe.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: evp_pbe.c,v 1.28 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: evp_pbe.c,v 1.29 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 1999. | 3 | * project 1999. |
| 4 | */ | 4 | */ |
| @@ -170,7 +170,6 @@ EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, | |||
| 170 | } | 170 | } |
| 171 | return 1; | 171 | return 1; |
| 172 | } | 172 | } |
| 173 | LCRYPTO_ALIAS(EVP_PBE_CipherInit); | ||
| 174 | 173 | ||
| 175 | static int pbe2_cmp_BSEARCH_CMP_FN(const void *, const void *); | 174 | static int pbe2_cmp_BSEARCH_CMP_FN(const void *, const void *); |
| 176 | static int pbe2_cmp(EVP_PBE_CTL const *, EVP_PBE_CTL const *); | 175 | static int pbe2_cmp(EVP_PBE_CTL const *, EVP_PBE_CTL const *); |
| @@ -247,7 +246,6 @@ EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid, int md_nid, | |||
| 247 | } | 246 | } |
| 248 | return 1; | 247 | return 1; |
| 249 | } | 248 | } |
| 250 | LCRYPTO_ALIAS(EVP_PBE_alg_add_type); | ||
| 251 | 249 | ||
| 252 | int | 250 | int |
| 253 | EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, | 251 | EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, |
| @@ -267,7 +265,6 @@ EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, | |||
| 267 | return EVP_PBE_alg_add_type(EVP_PBE_TYPE_OUTER, nid, | 265 | return EVP_PBE_alg_add_type(EVP_PBE_TYPE_OUTER, nid, |
| 268 | cipher_nid, md_nid, keygen); | 266 | cipher_nid, md_nid, keygen); |
| 269 | } | 267 | } |
| 270 | LCRYPTO_ALIAS(EVP_PBE_alg_add); | ||
| 271 | 268 | ||
| 272 | int | 269 | int |
| 273 | EVP_PBE_find(int type, int pbe_nid, | 270 | EVP_PBE_find(int type, int pbe_nid, |
| @@ -300,7 +297,6 @@ EVP_PBE_find(int type, int pbe_nid, | |||
| 300 | *pkeygen = pbetmp->keygen; | 297 | *pkeygen = pbetmp->keygen; |
| 301 | return 1; | 298 | return 1; |
| 302 | } | 299 | } |
| 303 | LCRYPTO_ALIAS(EVP_PBE_find); | ||
| 304 | 300 | ||
| 305 | static void | 301 | static void |
| 306 | free_evp_pbe_ctl(EVP_PBE_CTL *pbe) | 302 | free_evp_pbe_ctl(EVP_PBE_CTL *pbe) |
| @@ -314,4 +310,3 @@ EVP_PBE_cleanup(void) | |||
| 314 | sk_EVP_PBE_CTL_pop_free(pbe_algs, free_evp_pbe_ctl); | 310 | sk_EVP_PBE_CTL_pop_free(pbe_algs, free_evp_pbe_ctl); |
| 315 | pbe_algs = NULL; | 311 | pbe_algs = NULL; |
| 316 | } | 312 | } |
| 317 | LCRYPTO_ALIAS(EVP_PBE_cleanup); | ||
diff --git a/src/lib/libcrypto/evp/evp_pkey.c b/src/lib/libcrypto/evp/evp_pkey.c index 31a59e2536..9e29a1ae69 100644 --- a/src/lib/libcrypto/evp/evp_pkey.c +++ b/src/lib/libcrypto/evp/evp_pkey.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: evp_pkey.c,v 1.26 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: evp_pkey.c,v 1.27 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 1999. | 3 | * project 1999. |
| 4 | */ | 4 | */ |
| @@ -105,7 +105,6 @@ error: | |||
| 105 | EVP_PKEY_free(pkey); | 105 | EVP_PKEY_free(pkey); |
| 106 | return NULL; | 106 | return NULL; |
| 107 | } | 107 | } |
| 108 | LCRYPTO_ALIAS(EVP_PKCS82PKEY); | ||
| 109 | 108 | ||
| 110 | /* Turn a private key into a PKCS8 structure */ | 109 | /* Turn a private key into a PKCS8 structure */ |
| 111 | 110 | ||
| @@ -139,7 +138,6 @@ error: | |||
| 139 | PKCS8_PRIV_KEY_INFO_free(p8); | 138 | PKCS8_PRIV_KEY_INFO_free(p8); |
| 140 | return NULL; | 139 | return NULL; |
| 141 | } | 140 | } |
| 142 | LCRYPTO_ALIAS(EVP_PKEY2PKCS8); | ||
| 143 | 141 | ||
| 144 | /* EVP_PKEY attribute functions */ | 142 | /* EVP_PKEY attribute functions */ |
| 145 | 143 | ||
| @@ -148,14 +146,12 @@ EVP_PKEY_get_attr_count(const EVP_PKEY *key) | |||
| 148 | { | 146 | { |
| 149 | return X509at_get_attr_count(key->attributes); | 147 | return X509at_get_attr_count(key->attributes); |
| 150 | } | 148 | } |
| 151 | LCRYPTO_ALIAS(EVP_PKEY_get_attr_count); | ||
| 152 | 149 | ||
| 153 | int | 150 | int |
| 154 | EVP_PKEY_get_attr_by_NID(const EVP_PKEY *key, int nid, int lastpos) | 151 | EVP_PKEY_get_attr_by_NID(const EVP_PKEY *key, int nid, int lastpos) |
| 155 | { | 152 | { |
| 156 | return X509at_get_attr_by_NID(key->attributes, nid, lastpos); | 153 | return X509at_get_attr_by_NID(key->attributes, nid, lastpos); |
| 157 | } | 154 | } |
| 158 | LCRYPTO_ALIAS(EVP_PKEY_get_attr_by_NID); | ||
| 159 | 155 | ||
| 160 | int | 156 | int |
| 161 | EVP_PKEY_get_attr_by_OBJ(const EVP_PKEY *key, const ASN1_OBJECT *obj, | 157 | EVP_PKEY_get_attr_by_OBJ(const EVP_PKEY *key, const ASN1_OBJECT *obj, |
| @@ -163,21 +159,18 @@ EVP_PKEY_get_attr_by_OBJ(const EVP_PKEY *key, const ASN1_OBJECT *obj, | |||
| 163 | { | 159 | { |
| 164 | return X509at_get_attr_by_OBJ(key->attributes, obj, lastpos); | 160 | return X509at_get_attr_by_OBJ(key->attributes, obj, lastpos); |
| 165 | } | 161 | } |
| 166 | LCRYPTO_ALIAS(EVP_PKEY_get_attr_by_OBJ); | ||
| 167 | 162 | ||
| 168 | X509_ATTRIBUTE * | 163 | X509_ATTRIBUTE * |
| 169 | EVP_PKEY_get_attr(const EVP_PKEY *key, int loc) | 164 | EVP_PKEY_get_attr(const EVP_PKEY *key, int loc) |
| 170 | { | 165 | { |
| 171 | return X509at_get_attr(key->attributes, loc); | 166 | return X509at_get_attr(key->attributes, loc); |
| 172 | } | 167 | } |
| 173 | LCRYPTO_ALIAS(EVP_PKEY_get_attr); | ||
| 174 | 168 | ||
| 175 | X509_ATTRIBUTE * | 169 | X509_ATTRIBUTE * |
| 176 | EVP_PKEY_delete_attr(EVP_PKEY *key, int loc) | 170 | EVP_PKEY_delete_attr(EVP_PKEY *key, int loc) |
| 177 | { | 171 | { |
| 178 | return X509at_delete_attr(key->attributes, loc); | 172 | return X509at_delete_attr(key->attributes, loc); |
| 179 | } | 173 | } |
| 180 | LCRYPTO_ALIAS(EVP_PKEY_delete_attr); | ||
| 181 | 174 | ||
| 182 | int | 175 | int |
| 183 | EVP_PKEY_add1_attr(EVP_PKEY *key, X509_ATTRIBUTE *attr) | 176 | EVP_PKEY_add1_attr(EVP_PKEY *key, X509_ATTRIBUTE *attr) |
| @@ -186,7 +179,6 @@ EVP_PKEY_add1_attr(EVP_PKEY *key, X509_ATTRIBUTE *attr) | |||
| 186 | return 1; | 179 | return 1; |
| 187 | return 0; | 180 | return 0; |
| 188 | } | 181 | } |
| 189 | LCRYPTO_ALIAS(EVP_PKEY_add1_attr); | ||
| 190 | 182 | ||
| 191 | int | 183 | int |
| 192 | EVP_PKEY_add1_attr_by_OBJ(EVP_PKEY *key, const ASN1_OBJECT *obj, int type, | 184 | EVP_PKEY_add1_attr_by_OBJ(EVP_PKEY *key, const ASN1_OBJECT *obj, int type, |
| @@ -196,7 +188,6 @@ EVP_PKEY_add1_attr_by_OBJ(EVP_PKEY *key, const ASN1_OBJECT *obj, int type, | |||
| 196 | return 1; | 188 | return 1; |
| 197 | return 0; | 189 | return 0; |
| 198 | } | 190 | } |
| 199 | LCRYPTO_ALIAS(EVP_PKEY_add1_attr_by_OBJ); | ||
| 200 | 191 | ||
| 201 | int | 192 | int |
| 202 | EVP_PKEY_add1_attr_by_NID(EVP_PKEY *key, int nid, int type, | 193 | EVP_PKEY_add1_attr_by_NID(EVP_PKEY *key, int nid, int type, |
| @@ -206,7 +197,6 @@ EVP_PKEY_add1_attr_by_NID(EVP_PKEY *key, int nid, int type, | |||
| 206 | return 1; | 197 | return 1; |
| 207 | return 0; | 198 | return 0; |
| 208 | } | 199 | } |
| 209 | LCRYPTO_ALIAS(EVP_PKEY_add1_attr_by_NID); | ||
| 210 | 200 | ||
| 211 | int | 201 | int |
| 212 | EVP_PKEY_add1_attr_by_txt(EVP_PKEY *key, const char *attrname, int type, | 202 | EVP_PKEY_add1_attr_by_txt(EVP_PKEY *key, const char *attrname, int type, |
| @@ -217,4 +207,3 @@ EVP_PKEY_add1_attr_by_txt(EVP_PKEY *key, const char *attrname, int type, | |||
| 217 | return 1; | 207 | return 1; |
| 218 | return 0; | 208 | return 0; |
| 219 | } | 209 | } |
| 220 | LCRYPTO_ALIAS(EVP_PKEY_add1_attr_by_txt); | ||
diff --git a/src/lib/libcrypto/evp/m_gost2814789.c b/src/lib/libcrypto/evp/m_gost2814789.c index 69f927c5a7..9b8a09e5a4 100644 --- a/src/lib/libcrypto/evp/m_gost2814789.c +++ b/src/lib/libcrypto/evp/m_gost2814789.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: m_gost2814789.c,v 1.5 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: m_gost2814789.c,v 1.6 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2014 Dmitry Eremin-Solenikov <dbaryshkov@gmail.com> | 3 | * Copyright (c) 2014 Dmitry Eremin-Solenikov <dbaryshkov@gmail.com> |
| 4 | * Copyright (c) 2005-2006 Cryptocom LTD | 4 | * Copyright (c) 2005-2006 Cryptocom LTD |
| @@ -110,5 +110,4 @@ EVP_gost2814789imit(void) | |||
| 110 | { | 110 | { |
| 111 | return (&gost2814789imit_md); | 111 | return (&gost2814789imit_md); |
| 112 | } | 112 | } |
| 113 | LCRYPTO_ALIAS(EVP_gost2814789imit); | ||
| 114 | #endif | 113 | #endif |
diff --git a/src/lib/libcrypto/evp/m_gostr341194.c b/src/lib/libcrypto/evp/m_gostr341194.c index e2a65a3147..723349a0d8 100644 --- a/src/lib/libcrypto/evp/m_gostr341194.c +++ b/src/lib/libcrypto/evp/m_gostr341194.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: m_gostr341194.c,v 1.6 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: m_gostr341194.c,v 1.7 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2014 Dmitry Eremin-Solenikov <dbaryshkov@gmail.com> | 3 | * Copyright (c) 2014 Dmitry Eremin-Solenikov <dbaryshkov@gmail.com> |
| 4 | * Copyright (c) 2005-2006 Cryptocom LTD | 4 | * Copyright (c) 2005-2006 Cryptocom LTD |
| @@ -97,5 +97,4 @@ EVP_gostr341194(void) | |||
| 97 | { | 97 | { |
| 98 | return (&gostr341194_md); | 98 | return (&gostr341194_md); |
| 99 | } | 99 | } |
| 100 | LCRYPTO_ALIAS(EVP_gostr341194); | ||
| 101 | #endif | 100 | #endif |
diff --git a/src/lib/libcrypto/evp/m_md4.c b/src/lib/libcrypto/evp/m_md4.c index d86ed426d3..199dba8489 100644 --- a/src/lib/libcrypto/evp/m_md4.c +++ b/src/lib/libcrypto/evp/m_md4.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: m_md4.c,v 1.20 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: m_md4.c,v 1.21 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -110,5 +110,4 @@ EVP_md4(void) | |||
| 110 | { | 110 | { |
| 111 | return (&md4_md); | 111 | return (&md4_md); |
| 112 | } | 112 | } |
| 113 | LCRYPTO_ALIAS(EVP_md4); | ||
| 114 | #endif | 113 | #endif |
diff --git a/src/lib/libcrypto/evp/m_md5.c b/src/lib/libcrypto/evp/m_md5.c index 18a78016c6..0dfad89aaf 100644 --- a/src/lib/libcrypto/evp/m_md5.c +++ b/src/lib/libcrypto/evp/m_md5.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: m_md5.c,v 1.19 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: m_md5.c,v 1.20 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -110,5 +110,4 @@ EVP_md5(void) | |||
| 110 | { | 110 | { |
| 111 | return (&md5_md); | 111 | return (&md5_md); |
| 112 | } | 112 | } |
| 113 | LCRYPTO_ALIAS(EVP_md5); | ||
| 114 | #endif | 113 | #endif |
diff --git a/src/lib/libcrypto/evp/m_md5_sha1.c b/src/lib/libcrypto/evp/m_md5_sha1.c index 32a6f56a1b..f4a6600ec6 100644 --- a/src/lib/libcrypto/evp/m_md5_sha1.c +++ b/src/lib/libcrypto/evp/m_md5_sha1.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: m_md5_sha1.c,v 1.6 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: m_md5_sha1.c,v 1.7 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -87,4 +87,3 @@ EVP_md5_sha1(void) | |||
| 87 | { | 87 | { |
| 88 | return &md5_sha1_md; | 88 | return &md5_sha1_md; |
| 89 | } | 89 | } |
| 90 | LCRYPTO_ALIAS(EVP_md5_sha1); | ||
diff --git a/src/lib/libcrypto/evp/m_null.c b/src/lib/libcrypto/evp/m_null.c index 884a47927e..28634d2da5 100644 --- a/src/lib/libcrypto/evp/m_null.c +++ b/src/lib/libcrypto/evp/m_null.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: m_null.c,v 1.13 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: m_null.c,v 1.14 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -101,4 +101,3 @@ EVP_md_null(void) | |||
| 101 | { | 101 | { |
| 102 | return (&null_md); | 102 | return (&null_md); |
| 103 | } | 103 | } |
| 104 | LCRYPTO_ALIAS(EVP_md_null); | ||
diff --git a/src/lib/libcrypto/evp/m_ripemd.c b/src/lib/libcrypto/evp/m_ripemd.c index 3cba1dcf1b..638d0cd274 100644 --- a/src/lib/libcrypto/evp/m_ripemd.c +++ b/src/lib/libcrypto/evp/m_ripemd.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: m_ripemd.c,v 1.16 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: m_ripemd.c,v 1.17 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -110,5 +110,4 @@ EVP_ripemd160(void) | |||
| 110 | { | 110 | { |
| 111 | return (&ripemd160_md); | 111 | return (&ripemd160_md); |
| 112 | } | 112 | } |
| 113 | LCRYPTO_ALIAS(EVP_ripemd160); | ||
| 114 | #endif | 113 | #endif |
diff --git a/src/lib/libcrypto/evp/m_sha1.c b/src/lib/libcrypto/evp/m_sha1.c index 631e19549e..c65e0515c8 100644 --- a/src/lib/libcrypto/evp/m_sha1.c +++ b/src/lib/libcrypto/evp/m_sha1.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: m_sha1.c,v 1.24 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: m_sha1.c,v 1.25 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -110,7 +110,6 @@ EVP_sha1(void) | |||
| 110 | { | 110 | { |
| 111 | return &sha1_md; | 111 | return &sha1_md; |
| 112 | } | 112 | } |
| 113 | LCRYPTO_ALIAS(EVP_sha1); | ||
| 114 | #endif | 113 | #endif |
| 115 | 114 | ||
| 116 | #ifndef OPENSSL_NO_SHA256 | 115 | #ifndef OPENSSL_NO_SHA256 |
| @@ -156,7 +155,6 @@ EVP_sha224(void) | |||
| 156 | { | 155 | { |
| 157 | return &sha224_md; | 156 | return &sha224_md; |
| 158 | } | 157 | } |
| 159 | LCRYPTO_ALIAS(EVP_sha224); | ||
| 160 | 158 | ||
| 161 | static int | 159 | static int |
| 162 | sha256_init(EVP_MD_CTX *ctx) | 160 | sha256_init(EVP_MD_CTX *ctx) |
| @@ -195,7 +193,6 @@ EVP_sha256(void) | |||
| 195 | { | 193 | { |
| 196 | return &sha256_md; | 194 | return &sha256_md; |
| 197 | } | 195 | } |
| 198 | LCRYPTO_ALIAS(EVP_sha256); | ||
| 199 | #endif /* ifndef OPENSSL_NO_SHA256 */ | 196 | #endif /* ifndef OPENSSL_NO_SHA256 */ |
| 200 | 197 | ||
| 201 | #ifndef OPENSSL_NO_SHA512 | 198 | #ifndef OPENSSL_NO_SHA512 |
| @@ -237,7 +234,6 @@ EVP_sha384(void) | |||
| 237 | { | 234 | { |
| 238 | return &sha384_md; | 235 | return &sha384_md; |
| 239 | } | 236 | } |
| 240 | LCRYPTO_ALIAS(EVP_sha384); | ||
| 241 | 237 | ||
| 242 | static int | 238 | static int |
| 243 | sha512_init(EVP_MD_CTX *ctx) | 239 | sha512_init(EVP_MD_CTX *ctx) |
| @@ -276,7 +272,6 @@ EVP_sha512(void) | |||
| 276 | { | 272 | { |
| 277 | return &sha512_md; | 273 | return &sha512_md; |
| 278 | } | 274 | } |
| 279 | LCRYPTO_ALIAS(EVP_sha512); | ||
| 280 | 275 | ||
| 281 | static int | 276 | static int |
| 282 | sha512_224_init(EVP_MD_CTX *ctx) | 277 | sha512_224_init(EVP_MD_CTX *ctx) |
| @@ -315,7 +310,6 @@ EVP_sha512_224(void) | |||
| 315 | { | 310 | { |
| 316 | return &sha512_224_md; | 311 | return &sha512_224_md; |
| 317 | } | 312 | } |
| 318 | LCRYPTO_ALIAS(EVP_sha512_224); | ||
| 319 | 313 | ||
| 320 | static int | 314 | static int |
| 321 | sha512_256_init(EVP_MD_CTX *ctx) | 315 | sha512_256_init(EVP_MD_CTX *ctx) |
| @@ -354,5 +348,4 @@ EVP_sha512_256(void) | |||
| 354 | { | 348 | { |
| 355 | return &sha512_256_md; | 349 | return &sha512_256_md; |
| 356 | } | 350 | } |
| 357 | LCRYPTO_ALIAS(EVP_sha512_256); | ||
| 358 | #endif /* ifndef OPENSSL_NO_SHA512 */ | 351 | #endif /* ifndef OPENSSL_NO_SHA512 */ |
diff --git a/src/lib/libcrypto/evp/m_sha3.c b/src/lib/libcrypto/evp/m_sha3.c index 9137629823..67f94f7956 100644 --- a/src/lib/libcrypto/evp/m_sha3.c +++ b/src/lib/libcrypto/evp/m_sha3.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: m_sha3.c,v 1.2 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: m_sha3.c,v 1.3 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2023 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -57,7 +57,6 @@ EVP_sha3_224(void) | |||
| 57 | { | 57 | { |
| 58 | return &sha3_224_md; | 58 | return &sha3_224_md; |
| 59 | } | 59 | } |
| 60 | LCRYPTO_ALIAS(EVP_sha3_224); | ||
| 61 | 60 | ||
| 62 | static int | 61 | static int |
| 63 | sha3_256_init(EVP_MD_CTX *ctx) | 62 | sha3_256_init(EVP_MD_CTX *ctx) |
| @@ -96,7 +95,6 @@ EVP_sha3_256(void) | |||
| 96 | { | 95 | { |
| 97 | return &sha3_256_md; | 96 | return &sha3_256_md; |
| 98 | } | 97 | } |
| 99 | LCRYPTO_ALIAS(EVP_sha3_256); | ||
| 100 | 98 | ||
| 101 | static int | 99 | static int |
| 102 | sha3_384_init(EVP_MD_CTX *ctx) | 100 | sha3_384_init(EVP_MD_CTX *ctx) |
| @@ -135,7 +133,6 @@ EVP_sha3_384(void) | |||
| 135 | { | 133 | { |
| 136 | return &sha3_384_md; | 134 | return &sha3_384_md; |
| 137 | } | 135 | } |
| 138 | LCRYPTO_ALIAS(EVP_sha3_384); | ||
| 139 | 136 | ||
| 140 | static int | 137 | static int |
| 141 | sha3_512_init(EVP_MD_CTX *ctx) | 138 | sha3_512_init(EVP_MD_CTX *ctx) |
| @@ -174,4 +171,3 @@ EVP_sha3_512(void) | |||
| 174 | { | 171 | { |
| 175 | return &sha3_512_md; | 172 | return &sha3_512_md; |
| 176 | } | 173 | } |
| 177 | LCRYPTO_ALIAS(EVP_sha3_512); | ||
diff --git a/src/lib/libcrypto/evp/m_sigver.c b/src/lib/libcrypto/evp/m_sigver.c index 950e4a2a2f..47c01f784a 100644 --- a/src/lib/libcrypto/evp/m_sigver.c +++ b/src/lib/libcrypto/evp/m_sigver.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: m_sigver.c,v 1.12 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: m_sigver.c,v 1.13 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 2006. | 3 | * project 2006. |
| 4 | */ | 4 | */ |
| @@ -133,7 +133,6 @@ EVP_DigestSignInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, | |||
| 133 | { | 133 | { |
| 134 | return do_sigver_init(ctx, pctx, type, e, pkey, 0); | 134 | return do_sigver_init(ctx, pctx, type, e, pkey, 0); |
| 135 | } | 135 | } |
| 136 | LCRYPTO_ALIAS(EVP_DigestSignInit); | ||
| 137 | 136 | ||
| 138 | int | 137 | int |
| 139 | EVP_DigestVerifyInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, | 138 | EVP_DigestVerifyInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, |
| @@ -141,7 +140,6 @@ EVP_DigestVerifyInit(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, | |||
| 141 | { | 140 | { |
| 142 | return do_sigver_init(ctx, pctx, type, e, pkey, 1); | 141 | return do_sigver_init(ctx, pctx, type, e, pkey, 1); |
| 143 | } | 142 | } |
| 144 | LCRYPTO_ALIAS(EVP_DigestVerifyInit); | ||
| 145 | 143 | ||
| 146 | int | 144 | int |
| 147 | EVP_DigestSignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen) | 145 | EVP_DigestSignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen) |
| @@ -200,7 +198,6 @@ EVP_DigestSignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen) | |||
| 200 | } | 198 | } |
| 201 | return 1; | 199 | return 1; |
| 202 | } | 200 | } |
| 203 | LCRYPTO_ALIAS(EVP_DigestSignFinal); | ||
| 204 | 201 | ||
| 205 | int | 202 | int |
| 206 | EVP_DigestSign(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen, | 203 | EVP_DigestSign(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen, |
| @@ -217,7 +214,6 @@ EVP_DigestSign(EVP_MD_CTX *ctx, unsigned char *sigret, size_t *siglen, | |||
| 217 | 214 | ||
| 218 | return EVP_DigestSignFinal(ctx, sigret, siglen); | 215 | return EVP_DigestSignFinal(ctx, sigret, siglen); |
| 219 | } | 216 | } |
| 220 | LCRYPTO_ALIAS(EVP_DigestSign); | ||
| 221 | 217 | ||
| 222 | int | 218 | int |
| 223 | EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sig, size_t siglen) | 219 | EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sig, size_t siglen) |
| @@ -245,7 +241,6 @@ EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sig, size_t siglen) | |||
| 245 | return r; | 241 | return r; |
| 246 | return EVP_PKEY_verify(ctx->pctx, sig, siglen, md, mdlen); | 242 | return EVP_PKEY_verify(ctx->pctx, sig, siglen, md, mdlen); |
| 247 | } | 243 | } |
| 248 | LCRYPTO_ALIAS(EVP_DigestVerifyFinal); | ||
| 249 | 244 | ||
| 250 | int | 245 | int |
| 251 | EVP_DigestVerify(EVP_MD_CTX *ctx, const unsigned char *sigret, size_t siglen, | 246 | EVP_DigestVerify(EVP_MD_CTX *ctx, const unsigned char *sigret, size_t siglen, |
| @@ -260,4 +255,3 @@ EVP_DigestVerify(EVP_MD_CTX *ctx, const unsigned char *sigret, size_t siglen, | |||
| 260 | 255 | ||
| 261 | return EVP_DigestVerifyFinal(ctx, sigret, siglen); | 256 | return EVP_DigestVerifyFinal(ctx, sigret, siglen); |
| 262 | } | 257 | } |
| 263 | LCRYPTO_ALIAS(EVP_DigestVerify); | ||
diff --git a/src/lib/libcrypto/evp/m_sm3.c b/src/lib/libcrypto/evp/m_sm3.c index 169a492d68..ea30d8d222 100644 --- a/src/lib/libcrypto/evp/m_sm3.c +++ b/src/lib/libcrypto/evp/m_sm3.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: m_sm3.c,v 1.5 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: m_sm3.c,v 1.6 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2018, Ribose Inc | 3 | * Copyright (c) 2018, Ribose Inc |
| 4 | * | 4 | * |
| @@ -64,6 +64,5 @@ EVP_sm3(void) | |||
| 64 | { | 64 | { |
| 65 | return &sm3_md; | 65 | return &sm3_md; |
| 66 | } | 66 | } |
| 67 | LCRYPTO_ALIAS(EVP_sm3); | ||
| 68 | 67 | ||
| 69 | #endif /* OPENSSL_NO_SM3 */ | 68 | #endif /* OPENSSL_NO_SM3 */ |
diff --git a/src/lib/libcrypto/evp/m_streebog.c b/src/lib/libcrypto/evp/m_streebog.c index ce41e4ca8f..48fa65864e 100644 --- a/src/lib/libcrypto/evp/m_streebog.c +++ b/src/lib/libcrypto/evp/m_streebog.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: m_streebog.c,v 1.6 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: m_streebog.c,v 1.7 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2014 Dmitry Eremin-Solenikov <dbaryshkov@gmail.com> | 3 | * Copyright (c) 2014 Dmitry Eremin-Solenikov <dbaryshkov@gmail.com> |
| 4 | * Copyright (c) 2005-2006 Cryptocom LTD | 4 | * Copyright (c) 2005-2006 Cryptocom LTD |
| @@ -124,12 +124,10 @@ EVP_streebog256(void) | |||
| 124 | { | 124 | { |
| 125 | return (&streebog256_md); | 125 | return (&streebog256_md); |
| 126 | } | 126 | } |
| 127 | LCRYPTO_ALIAS(EVP_streebog256); | ||
| 128 | 127 | ||
| 129 | const EVP_MD * | 128 | const EVP_MD * |
| 130 | EVP_streebog512(void) | 129 | EVP_streebog512(void) |
| 131 | { | 130 | { |
| 132 | return (&streebog512_md); | 131 | return (&streebog512_md); |
| 133 | } | 132 | } |
| 134 | LCRYPTO_ALIAS(EVP_streebog512); | ||
| 135 | #endif | 133 | #endif |
diff --git a/src/lib/libcrypto/evp/m_wp.c b/src/lib/libcrypto/evp/m_wp.c index 9bd43370e6..44d13b1484 100644 --- a/src/lib/libcrypto/evp/m_wp.c +++ b/src/lib/libcrypto/evp/m_wp.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: m_wp.c,v 1.12 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: m_wp.c,v 1.13 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | 2 | ||
| 3 | #include <stdio.h> | 3 | #include <stdio.h> |
| 4 | 4 | ||
| @@ -50,5 +50,4 @@ EVP_whirlpool(void) | |||
| 50 | { | 50 | { |
| 51 | return (&whirlpool_md); | 51 | return (&whirlpool_md); |
| 52 | } | 52 | } |
| 53 | LCRYPTO_ALIAS(EVP_whirlpool); | ||
| 54 | #endif | 53 | #endif |
diff --git a/src/lib/libcrypto/evp/names.c b/src/lib/libcrypto/evp/names.c index c6109a5356..f7864f5958 100644 --- a/src/lib/libcrypto/evp/names.c +++ b/src/lib/libcrypto/evp/names.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: names.c,v 1.18 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: names.c,v 1.19 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -84,7 +84,6 @@ EVP_add_cipher(const EVP_CIPHER *c) | |||
| 84 | (const char *)c); | 84 | (const char *)c); |
| 85 | return (r); | 85 | return (r); |
| 86 | } | 86 | } |
| 87 | LCRYPTO_ALIAS(EVP_add_cipher); | ||
| 88 | 87 | ||
| 89 | int | 88 | int |
| 90 | EVP_add_digest(const EVP_MD *md) | 89 | EVP_add_digest(const EVP_MD *md) |
| @@ -113,7 +112,6 @@ EVP_add_digest(const EVP_MD *md) | |||
| 113 | } | 112 | } |
| 114 | return (r); | 113 | return (r); |
| 115 | } | 114 | } |
| 116 | LCRYPTO_ALIAS(EVP_add_digest); | ||
| 117 | 115 | ||
| 118 | const EVP_CIPHER * | 116 | const EVP_CIPHER * |
| 119 | EVP_get_cipherbyname(const char *name) | 117 | EVP_get_cipherbyname(const char *name) |
| @@ -126,7 +124,6 @@ EVP_get_cipherbyname(const char *name) | |||
| 126 | cp = (const EVP_CIPHER *)OBJ_NAME_get(name, OBJ_NAME_TYPE_CIPHER_METH); | 124 | cp = (const EVP_CIPHER *)OBJ_NAME_get(name, OBJ_NAME_TYPE_CIPHER_METH); |
| 127 | return (cp); | 125 | return (cp); |
| 128 | } | 126 | } |
| 129 | LCRYPTO_ALIAS(EVP_get_cipherbyname); | ||
| 130 | 127 | ||
| 131 | const EVP_MD * | 128 | const EVP_MD * |
| 132 | EVP_get_digestbyname(const char *name) | 129 | EVP_get_digestbyname(const char *name) |
| @@ -139,7 +136,6 @@ EVP_get_digestbyname(const char *name) | |||
| 139 | cp = (const EVP_MD *)OBJ_NAME_get(name, OBJ_NAME_TYPE_MD_METH); | 136 | cp = (const EVP_MD *)OBJ_NAME_get(name, OBJ_NAME_TYPE_MD_METH); |
| 140 | return (cp); | 137 | return (cp); |
| 141 | } | 138 | } |
| 142 | LCRYPTO_ALIAS(EVP_get_digestbyname); | ||
| 143 | 139 | ||
| 144 | void | 140 | void |
| 145 | EVP_cleanup(void) | 141 | EVP_cleanup(void) |
| @@ -158,7 +154,6 @@ EVP_cleanup(void) | |||
| 158 | } | 154 | } |
| 159 | OBJ_sigid_free(); | 155 | OBJ_sigid_free(); |
| 160 | } | 156 | } |
| 161 | LCRYPTO_ALIAS(EVP_cleanup); | ||
| 162 | 157 | ||
| 163 | struct doall_cipher { | 158 | struct doall_cipher { |
| 164 | void *arg; | 159 | void *arg; |
| @@ -190,7 +185,6 @@ EVP_CIPHER_do_all(void (*fn)(const EVP_CIPHER *ciph, const char *from, | |||
| 190 | dc.arg = arg; | 185 | dc.arg = arg; |
| 191 | OBJ_NAME_do_all(OBJ_NAME_TYPE_CIPHER_METH, do_all_cipher_fn, &dc); | 186 | OBJ_NAME_do_all(OBJ_NAME_TYPE_CIPHER_METH, do_all_cipher_fn, &dc); |
| 192 | } | 187 | } |
| 193 | LCRYPTO_ALIAS(EVP_CIPHER_do_all); | ||
| 194 | 188 | ||
| 195 | void | 189 | void |
| 196 | EVP_CIPHER_do_all_sorted(void (*fn)(const EVP_CIPHER *ciph, const char *from, | 190 | EVP_CIPHER_do_all_sorted(void (*fn)(const EVP_CIPHER *ciph, const char *from, |
| @@ -206,7 +200,6 @@ EVP_CIPHER_do_all_sorted(void (*fn)(const EVP_CIPHER *ciph, const char *from, | |||
| 206 | OBJ_NAME_do_all_sorted(OBJ_NAME_TYPE_CIPHER_METH, | 200 | OBJ_NAME_do_all_sorted(OBJ_NAME_TYPE_CIPHER_METH, |
| 207 | do_all_cipher_fn, &dc); | 201 | do_all_cipher_fn, &dc); |
| 208 | } | 202 | } |
| 209 | LCRYPTO_ALIAS(EVP_CIPHER_do_all_sorted); | ||
| 210 | 203 | ||
| 211 | struct doall_md { | 204 | struct doall_md { |
| 212 | void *arg; | 205 | void *arg; |
| @@ -238,7 +231,6 @@ EVP_MD_do_all(void (*fn)(const EVP_MD *md, const char *from, const char *to, | |||
| 238 | dc.arg = arg; | 231 | dc.arg = arg; |
| 239 | OBJ_NAME_do_all(OBJ_NAME_TYPE_MD_METH, do_all_md_fn, &dc); | 232 | OBJ_NAME_do_all(OBJ_NAME_TYPE_MD_METH, do_all_md_fn, &dc); |
| 240 | } | 233 | } |
| 241 | LCRYPTO_ALIAS(EVP_MD_do_all); | ||
| 242 | 234 | ||
| 243 | void | 235 | void |
| 244 | EVP_MD_do_all_sorted(void (*fn)(const EVP_MD *md, | 236 | EVP_MD_do_all_sorted(void (*fn)(const EVP_MD *md, |
| @@ -253,4 +245,3 @@ EVP_MD_do_all_sorted(void (*fn)(const EVP_MD *md, | |||
| 253 | dc.arg = arg; | 245 | dc.arg = arg; |
| 254 | OBJ_NAME_do_all_sorted(OBJ_NAME_TYPE_MD_METH, do_all_md_fn, &dc); | 246 | OBJ_NAME_do_all_sorted(OBJ_NAME_TYPE_MD_METH, do_all_md_fn, &dc); |
| 255 | } | 247 | } |
| 256 | LCRYPTO_ALIAS(EVP_MD_do_all_sorted); | ||
diff --git a/src/lib/libcrypto/evp/p5_crpt.c b/src/lib/libcrypto/evp/p5_crpt.c index cf30ad9176..d26439ad26 100644 --- a/src/lib/libcrypto/evp/p5_crpt.c +++ b/src/lib/libcrypto/evp/p5_crpt.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: p5_crpt.c,v 1.22 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: p5_crpt.c,v 1.23 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 1999. | 3 | * project 1999. |
| 4 | */ | 4 | */ |
| @@ -73,7 +73,6 @@ void | |||
| 73 | PKCS5_PBE_add(void) | 73 | PKCS5_PBE_add(void) |
| 74 | { | 74 | { |
| 75 | } | 75 | } |
| 76 | LCRYPTO_ALIAS(PKCS5_PBE_add); | ||
| 77 | 76 | ||
| 78 | int | 77 | int |
| 79 | PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, | 78 | PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, |
| @@ -162,4 +161,3 @@ err: | |||
| 162 | PBEPARAM_free(pbe); | 161 | PBEPARAM_free(pbe); |
| 163 | return rv; | 162 | return rv; |
| 164 | } | 163 | } |
| 165 | LCRYPTO_ALIAS(PKCS5_PBE_keyivgen); | ||
diff --git a/src/lib/libcrypto/evp/p5_crpt2.c b/src/lib/libcrypto/evp/p5_crpt2.c index a6fcc30fa4..3c66af9314 100644 --- a/src/lib/libcrypto/evp/p5_crpt2.c +++ b/src/lib/libcrypto/evp/p5_crpt2.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: p5_crpt2.c,v 1.26 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: p5_crpt2.c,v 1.27 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 1999. | 3 | * project 1999. |
| 4 | */ | 4 | */ |
| @@ -149,7 +149,6 @@ PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, | |||
| 149 | HMAC_CTX_cleanup(&hctx_tpl); | 149 | HMAC_CTX_cleanup(&hctx_tpl); |
| 150 | return 1; | 150 | return 1; |
| 151 | } | 151 | } |
| 152 | LCRYPTO_ALIAS(PKCS5_PBKDF2_HMAC); | ||
| 153 | 152 | ||
| 154 | int | 153 | int |
| 155 | PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, | 154 | PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, |
| @@ -158,7 +157,6 @@ PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt, | |||
| 158 | return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, | 157 | return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, |
| 159 | EVP_sha1(), keylen, out); | 158 | EVP_sha1(), keylen, out); |
| 160 | } | 159 | } |
| 161 | LCRYPTO_ALIAS(PKCS5_PBKDF2_HMAC_SHA1); | ||
| 162 | 160 | ||
| 163 | /* Now the key derivation function itself. This is a bit evil because | 161 | /* Now the key derivation function itself. This is a bit evil because |
| 164 | * it has to check the ASN1 parameters are valid: and there are quite a | 162 | * it has to check the ASN1 parameters are valid: and there are quite a |
| @@ -220,7 +218,6 @@ err: | |||
| 220 | PBE2PARAM_free(pbe2); | 218 | PBE2PARAM_free(pbe2); |
| 221 | return rv; | 219 | return rv; |
| 222 | } | 220 | } |
| 223 | LCRYPTO_ALIAS(PKCS5_v2_PBE_keyivgen); | ||
| 224 | 221 | ||
| 225 | int | 222 | int |
| 226 | PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | 223 | PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, |
diff --git a/src/lib/libcrypto/evp/p_dec.c b/src/lib/libcrypto/evp/p_dec.c index 7225606c31..d55b48b771 100644 --- a/src/lib/libcrypto/evp/p_dec.c +++ b/src/lib/libcrypto/evp/p_dec.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: p_dec.c,v 1.14 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: p_dec.c,v 1.15 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -92,4 +92,3 @@ err: | |||
| 92 | #endif | 92 | #endif |
| 93 | return (ret); | 93 | return (ret); |
| 94 | } | 94 | } |
| 95 | LCRYPTO_ALIAS(EVP_PKEY_decrypt_old); | ||
diff --git a/src/lib/libcrypto/evp/p_enc.c b/src/lib/libcrypto/evp/p_enc.c index c2a16234e8..1abaf0b268 100644 --- a/src/lib/libcrypto/evp/p_enc.c +++ b/src/lib/libcrypto/evp/p_enc.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: p_enc.c,v 1.14 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: p_enc.c,v 1.15 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -89,4 +89,3 @@ err: | |||
| 89 | #endif | 89 | #endif |
| 90 | return (ret); | 90 | return (ret); |
| 91 | } | 91 | } |
| 92 | LCRYPTO_ALIAS(EVP_PKEY_encrypt_old); | ||
diff --git a/src/lib/libcrypto/evp/p_lib.c b/src/lib/libcrypto/evp/p_lib.c index 325fb605df..85e7978ff4 100644 --- a/src/lib/libcrypto/evp/p_lib.c +++ b/src/lib/libcrypto/evp/p_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: p_lib.c,v 1.33 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: p_lib.c,v 1.34 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -93,7 +93,6 @@ EVP_PKEY_bits(const EVP_PKEY *pkey) | |||
| 93 | return pkey->ameth->pkey_bits(pkey); | 93 | return pkey->ameth->pkey_bits(pkey); |
| 94 | return 0; | 94 | return 0; |
| 95 | } | 95 | } |
| 96 | LCRYPTO_ALIAS(EVP_PKEY_bits); | ||
| 97 | 96 | ||
| 98 | int | 97 | int |
| 99 | EVP_PKEY_security_bits(const EVP_PKEY *pkey) | 98 | EVP_PKEY_security_bits(const EVP_PKEY *pkey) |
| @@ -105,7 +104,6 @@ EVP_PKEY_security_bits(const EVP_PKEY *pkey) | |||
| 105 | 104 | ||
| 106 | return pkey->ameth->pkey_security_bits(pkey); | 105 | return pkey->ameth->pkey_security_bits(pkey); |
| 107 | } | 106 | } |
| 108 | LCRYPTO_ALIAS(EVP_PKEY_security_bits); | ||
| 109 | 107 | ||
| 110 | int | 108 | int |
| 111 | EVP_PKEY_size(const EVP_PKEY *pkey) | 109 | EVP_PKEY_size(const EVP_PKEY *pkey) |
| @@ -114,7 +112,6 @@ EVP_PKEY_size(const EVP_PKEY *pkey) | |||
| 114 | return pkey->ameth->pkey_size(pkey); | 112 | return pkey->ameth->pkey_size(pkey); |
| 115 | return 0; | 113 | return 0; |
| 116 | } | 114 | } |
| 117 | LCRYPTO_ALIAS(EVP_PKEY_size); | ||
| 118 | 115 | ||
| 119 | int | 116 | int |
| 120 | EVP_PKEY_save_parameters(EVP_PKEY *pkey, int mode) | 117 | EVP_PKEY_save_parameters(EVP_PKEY *pkey, int mode) |
| @@ -139,7 +136,6 @@ EVP_PKEY_save_parameters(EVP_PKEY *pkey, int mode) | |||
| 139 | #endif | 136 | #endif |
| 140 | return (0); | 137 | return (0); |
| 141 | } | 138 | } |
| 142 | LCRYPTO_ALIAS(EVP_PKEY_save_parameters); | ||
| 143 | 139 | ||
| 144 | int | 140 | int |
| 145 | EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from) | 141 | EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from) |
| @@ -159,7 +155,6 @@ EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from) | |||
| 159 | err: | 155 | err: |
| 160 | return 0; | 156 | return 0; |
| 161 | } | 157 | } |
| 162 | LCRYPTO_ALIAS(EVP_PKEY_copy_parameters); | ||
| 163 | 158 | ||
| 164 | int | 159 | int |
| 165 | EVP_PKEY_missing_parameters(const EVP_PKEY *pkey) | 160 | EVP_PKEY_missing_parameters(const EVP_PKEY *pkey) |
| @@ -168,7 +163,6 @@ EVP_PKEY_missing_parameters(const EVP_PKEY *pkey) | |||
| 168 | return pkey->ameth->param_missing(pkey); | 163 | return pkey->ameth->param_missing(pkey); |
| 169 | return 0; | 164 | return 0; |
| 170 | } | 165 | } |
| 171 | LCRYPTO_ALIAS(EVP_PKEY_missing_parameters); | ||
| 172 | 166 | ||
| 173 | int | 167 | int |
| 174 | EVP_PKEY_cmp_parameters(const EVP_PKEY *a, const EVP_PKEY *b) | 168 | EVP_PKEY_cmp_parameters(const EVP_PKEY *a, const EVP_PKEY *b) |
| @@ -179,7 +173,6 @@ EVP_PKEY_cmp_parameters(const EVP_PKEY *a, const EVP_PKEY *b) | |||
| 179 | return a->ameth->param_cmp(a, b); | 173 | return a->ameth->param_cmp(a, b); |
| 180 | return -2; | 174 | return -2; |
| 181 | } | 175 | } |
| 182 | LCRYPTO_ALIAS(EVP_PKEY_cmp_parameters); | ||
| 183 | 176 | ||
| 184 | int | 177 | int |
| 185 | EVP_PKEY_cmp(const EVP_PKEY *a, const EVP_PKEY *b) | 178 | EVP_PKEY_cmp(const EVP_PKEY *a, const EVP_PKEY *b) |
| @@ -202,7 +195,6 @@ EVP_PKEY_cmp(const EVP_PKEY *a, const EVP_PKEY *b) | |||
| 202 | 195 | ||
| 203 | return -2; | 196 | return -2; |
| 204 | } | 197 | } |
| 205 | LCRYPTO_ALIAS(EVP_PKEY_cmp); | ||
| 206 | 198 | ||
| 207 | EVP_PKEY * | 199 | EVP_PKEY * |
| 208 | EVP_PKEY_new(void) | 200 | EVP_PKEY_new(void) |
| @@ -224,7 +216,6 @@ EVP_PKEY_new(void) | |||
| 224 | ret->save_parameters = 1; | 216 | ret->save_parameters = 1; |
| 225 | return (ret); | 217 | return (ret); |
| 226 | } | 218 | } |
| 227 | LCRYPTO_ALIAS(EVP_PKEY_new); | ||
| 228 | 219 | ||
| 229 | int | 220 | int |
| 230 | EVP_PKEY_up_ref(EVP_PKEY *pkey) | 221 | EVP_PKEY_up_ref(EVP_PKEY *pkey) |
| @@ -232,7 +223,6 @@ EVP_PKEY_up_ref(EVP_PKEY *pkey) | |||
| 232 | int refs = CRYPTO_add(&pkey->references, 1, CRYPTO_LOCK_EVP_PKEY); | 223 | int refs = CRYPTO_add(&pkey->references, 1, CRYPTO_LOCK_EVP_PKEY); |
| 233 | return ((refs > 1) ? 1 : 0); | 224 | return ((refs > 1) ? 1 : 0); |
| 234 | } | 225 | } |
| 235 | LCRYPTO_ALIAS(EVP_PKEY_up_ref); | ||
| 236 | 226 | ||
| 237 | /* Setup a public key ASN1 method and ENGINE from a NID or a string. | 227 | /* Setup a public key ASN1 method and ENGINE from a NID or a string. |
| 238 | * If pkey is NULL just return 1 or 0 if the algorithm exists. | 228 | * If pkey is NULL just return 1 or 0 if the algorithm exists. |
| @@ -287,7 +277,6 @@ EVP_PKEY_set_type(EVP_PKEY *pkey, int type) | |||
| 287 | { | 277 | { |
| 288 | return pkey_set_type(pkey, NULL, type, NULL, -1); | 278 | return pkey_set_type(pkey, NULL, type, NULL, -1); |
| 289 | } | 279 | } |
| 290 | LCRYPTO_ALIAS(EVP_PKEY_set_type); | ||
| 291 | 280 | ||
| 292 | EVP_PKEY * | 281 | EVP_PKEY * |
| 293 | EVP_PKEY_new_raw_private_key(int type, ENGINE *engine, | 282 | EVP_PKEY_new_raw_private_key(int type, ENGINE *engine, |
| @@ -317,7 +306,6 @@ EVP_PKEY_new_raw_private_key(int type, ENGINE *engine, | |||
| 317 | 306 | ||
| 318 | return NULL; | 307 | return NULL; |
| 319 | } | 308 | } |
| 320 | LCRYPTO_ALIAS(EVP_PKEY_new_raw_private_key); | ||
| 321 | 309 | ||
| 322 | EVP_PKEY * | 310 | EVP_PKEY * |
| 323 | EVP_PKEY_new_raw_public_key(int type, ENGINE *engine, | 311 | EVP_PKEY_new_raw_public_key(int type, ENGINE *engine, |
| @@ -347,7 +335,6 @@ EVP_PKEY_new_raw_public_key(int type, ENGINE *engine, | |||
| 347 | 335 | ||
| 348 | return NULL; | 336 | return NULL; |
| 349 | } | 337 | } |
| 350 | LCRYPTO_ALIAS(EVP_PKEY_new_raw_public_key); | ||
| 351 | 338 | ||
| 352 | int | 339 | int |
| 353 | EVP_PKEY_get_raw_private_key(const EVP_PKEY *pkey, | 340 | EVP_PKEY_get_raw_private_key(const EVP_PKEY *pkey, |
| @@ -364,7 +351,6 @@ EVP_PKEY_get_raw_private_key(const EVP_PKEY *pkey, | |||
| 364 | 351 | ||
| 365 | return 1; | 352 | return 1; |
| 366 | } | 353 | } |
| 367 | LCRYPTO_ALIAS(EVP_PKEY_get_raw_private_key); | ||
| 368 | 354 | ||
| 369 | int | 355 | int |
| 370 | EVP_PKEY_get_raw_public_key(const EVP_PKEY *pkey, | 356 | EVP_PKEY_get_raw_public_key(const EVP_PKEY *pkey, |
| @@ -381,7 +367,6 @@ EVP_PKEY_get_raw_public_key(const EVP_PKEY *pkey, | |||
| 381 | 367 | ||
| 382 | return 1; | 368 | return 1; |
| 383 | } | 369 | } |
| 384 | LCRYPTO_ALIAS(EVP_PKEY_get_raw_public_key); | ||
| 385 | 370 | ||
| 386 | EVP_PKEY * | 371 | EVP_PKEY * |
| 387 | EVP_PKEY_new_CMAC_key(ENGINE *e, const unsigned char *priv, size_t len, | 372 | EVP_PKEY_new_CMAC_key(ENGINE *e, const unsigned char *priv, size_t len, |
| @@ -412,14 +397,12 @@ EVP_PKEY_new_CMAC_key(ENGINE *e, const unsigned char *priv, size_t len, | |||
| 412 | CMAC_CTX_free(cmctx); | 397 | CMAC_CTX_free(cmctx); |
| 413 | return NULL; | 398 | return NULL; |
| 414 | } | 399 | } |
| 415 | LCRYPTO_ALIAS(EVP_PKEY_new_CMAC_key); | ||
| 416 | 400 | ||
| 417 | int | 401 | int |
| 418 | EVP_PKEY_set_type_str(EVP_PKEY *pkey, const char *str, int len) | 402 | EVP_PKEY_set_type_str(EVP_PKEY *pkey, const char *str, int len) |
| 419 | { | 403 | { |
| 420 | return pkey_set_type(pkey, NULL, EVP_PKEY_NONE, str, len); | 404 | return pkey_set_type(pkey, NULL, EVP_PKEY_NONE, str, len); |
| 421 | } | 405 | } |
| 422 | LCRYPTO_ALIAS(EVP_PKEY_set_type_str); | ||
| 423 | 406 | ||
| 424 | int | 407 | int |
| 425 | EVP_PKEY_assign(EVP_PKEY *pkey, int type, void *key) | 408 | EVP_PKEY_assign(EVP_PKEY *pkey, int type, void *key) |
| @@ -429,14 +412,12 @@ EVP_PKEY_assign(EVP_PKEY *pkey, int type, void *key) | |||
| 429 | pkey->pkey.ptr = key; | 412 | pkey->pkey.ptr = key; |
| 430 | return (key != NULL); | 413 | return (key != NULL); |
| 431 | } | 414 | } |
| 432 | LCRYPTO_ALIAS(EVP_PKEY_assign); | ||
| 433 | 415 | ||
| 434 | void * | 416 | void * |
| 435 | EVP_PKEY_get0(const EVP_PKEY *pkey) | 417 | EVP_PKEY_get0(const EVP_PKEY *pkey) |
| 436 | { | 418 | { |
| 437 | return pkey->pkey.ptr; | 419 | return pkey->pkey.ptr; |
| 438 | } | 420 | } |
| 439 | LCRYPTO_ALIAS(EVP_PKEY_get0); | ||
| 440 | 421 | ||
| 441 | const unsigned char * | 422 | const unsigned char * |
| 442 | EVP_PKEY_get0_hmac(const EVP_PKEY *pkey, size_t *len) | 423 | EVP_PKEY_get0_hmac(const EVP_PKEY *pkey, size_t *len) |
| @@ -453,7 +434,6 @@ EVP_PKEY_get0_hmac(const EVP_PKEY *pkey, size_t *len) | |||
| 453 | 434 | ||
| 454 | return os->data; | 435 | return os->data; |
| 455 | } | 436 | } |
| 456 | LCRYPTO_ALIAS(EVP_PKEY_get0_hmac); | ||
| 457 | 437 | ||
| 458 | #ifndef OPENSSL_NO_RSA | 438 | #ifndef OPENSSL_NO_RSA |
| 459 | RSA * | 439 | RSA * |
| @@ -465,7 +445,6 @@ EVP_PKEY_get0_RSA(EVP_PKEY *pkey) | |||
| 465 | } | 445 | } |
| 466 | return pkey->pkey.rsa; | 446 | return pkey->pkey.rsa; |
| 467 | } | 447 | } |
| 468 | LCRYPTO_ALIAS(EVP_PKEY_get0_RSA); | ||
| 469 | 448 | ||
| 470 | RSA * | 449 | RSA * |
| 471 | EVP_PKEY_get1_RSA(EVP_PKEY *pkey) | 450 | EVP_PKEY_get1_RSA(EVP_PKEY *pkey) |
| @@ -477,7 +456,6 @@ EVP_PKEY_get1_RSA(EVP_PKEY *pkey) | |||
| 477 | RSA_up_ref(pkey->pkey.rsa); | 456 | RSA_up_ref(pkey->pkey.rsa); |
| 478 | return pkey->pkey.rsa; | 457 | return pkey->pkey.rsa; |
| 479 | } | 458 | } |
| 480 | LCRYPTO_ALIAS(EVP_PKEY_get1_RSA); | ||
| 481 | 459 | ||
| 482 | int | 460 | int |
| 483 | EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) | 461 | EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) |
| @@ -487,7 +465,6 @@ EVP_PKEY_set1_RSA(EVP_PKEY *pkey, RSA *key) | |||
| 487 | RSA_up_ref(key); | 465 | RSA_up_ref(key); |
| 488 | return ret; | 466 | return ret; |
| 489 | } | 467 | } |
| 490 | LCRYPTO_ALIAS(EVP_PKEY_set1_RSA); | ||
| 491 | #endif | 468 | #endif |
| 492 | 469 | ||
| 493 | #ifndef OPENSSL_NO_DSA | 470 | #ifndef OPENSSL_NO_DSA |
| @@ -500,7 +477,6 @@ EVP_PKEY_get0_DSA(EVP_PKEY *pkey) | |||
| 500 | } | 477 | } |
| 501 | return pkey->pkey.dsa; | 478 | return pkey->pkey.dsa; |
| 502 | } | 479 | } |
| 503 | LCRYPTO_ALIAS(EVP_PKEY_get0_DSA); | ||
| 504 | 480 | ||
| 505 | DSA * | 481 | DSA * |
| 506 | EVP_PKEY_get1_DSA(EVP_PKEY *pkey) | 482 | EVP_PKEY_get1_DSA(EVP_PKEY *pkey) |
| @@ -512,7 +488,6 @@ EVP_PKEY_get1_DSA(EVP_PKEY *pkey) | |||
| 512 | DSA_up_ref(pkey->pkey.dsa); | 488 | DSA_up_ref(pkey->pkey.dsa); |
| 513 | return pkey->pkey.dsa; | 489 | return pkey->pkey.dsa; |
| 514 | } | 490 | } |
| 515 | LCRYPTO_ALIAS(EVP_PKEY_get1_DSA); | ||
| 516 | 491 | ||
| 517 | int | 492 | int |
| 518 | EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key) | 493 | EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key) |
| @@ -522,7 +497,6 @@ EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key) | |||
| 522 | DSA_up_ref(key); | 497 | DSA_up_ref(key); |
| 523 | return ret; | 498 | return ret; |
| 524 | } | 499 | } |
| 525 | LCRYPTO_ALIAS(EVP_PKEY_set1_DSA); | ||
| 526 | #endif | 500 | #endif |
| 527 | 501 | ||
| 528 | #ifndef OPENSSL_NO_EC | 502 | #ifndef OPENSSL_NO_EC |
| @@ -535,7 +509,6 @@ EVP_PKEY_get0_EC_KEY(EVP_PKEY *pkey) | |||
| 535 | } | 509 | } |
| 536 | return pkey->pkey.ec; | 510 | return pkey->pkey.ec; |
| 537 | } | 511 | } |
| 538 | LCRYPTO_ALIAS(EVP_PKEY_get0_EC_KEY); | ||
| 539 | 512 | ||
| 540 | EC_KEY * | 513 | EC_KEY * |
| 541 | EVP_PKEY_get1_EC_KEY(EVP_PKEY *pkey) | 514 | EVP_PKEY_get1_EC_KEY(EVP_PKEY *pkey) |
| @@ -547,7 +520,6 @@ EVP_PKEY_get1_EC_KEY(EVP_PKEY *pkey) | |||
| 547 | EC_KEY_up_ref(pkey->pkey.ec); | 520 | EC_KEY_up_ref(pkey->pkey.ec); |
| 548 | return pkey->pkey.ec; | 521 | return pkey->pkey.ec; |
| 549 | } | 522 | } |
| 550 | LCRYPTO_ALIAS(EVP_PKEY_get1_EC_KEY); | ||
| 551 | 523 | ||
| 552 | int | 524 | int |
| 553 | EVP_PKEY_set1_EC_KEY(EVP_PKEY *pkey, EC_KEY *key) | 525 | EVP_PKEY_set1_EC_KEY(EVP_PKEY *pkey, EC_KEY *key) |
| @@ -557,7 +529,6 @@ EVP_PKEY_set1_EC_KEY(EVP_PKEY *pkey, EC_KEY *key) | |||
| 557 | EC_KEY_up_ref(key); | 529 | EC_KEY_up_ref(key); |
| 558 | return ret; | 530 | return ret; |
| 559 | } | 531 | } |
| 560 | LCRYPTO_ALIAS(EVP_PKEY_set1_EC_KEY); | ||
| 561 | #endif | 532 | #endif |
| 562 | 533 | ||
| 563 | 534 | ||
| @@ -571,7 +542,6 @@ EVP_PKEY_get0_DH(EVP_PKEY *pkey) | |||
| 571 | } | 542 | } |
| 572 | return pkey->pkey.dh; | 543 | return pkey->pkey.dh; |
| 573 | } | 544 | } |
| 574 | LCRYPTO_ALIAS(EVP_PKEY_get0_DH); | ||
| 575 | 545 | ||
| 576 | DH * | 546 | DH * |
| 577 | EVP_PKEY_get1_DH(EVP_PKEY *pkey) | 547 | EVP_PKEY_get1_DH(EVP_PKEY *pkey) |
| @@ -583,7 +553,6 @@ EVP_PKEY_get1_DH(EVP_PKEY *pkey) | |||
| 583 | DH_up_ref(pkey->pkey.dh); | 553 | DH_up_ref(pkey->pkey.dh); |
| 584 | return pkey->pkey.dh; | 554 | return pkey->pkey.dh; |
| 585 | } | 555 | } |
| 586 | LCRYPTO_ALIAS(EVP_PKEY_get1_DH); | ||
| 587 | 556 | ||
| 588 | int | 557 | int |
| 589 | EVP_PKEY_set1_DH(EVP_PKEY *pkey, DH *key) | 558 | EVP_PKEY_set1_DH(EVP_PKEY *pkey, DH *key) |
| @@ -593,7 +562,6 @@ EVP_PKEY_set1_DH(EVP_PKEY *pkey, DH *key) | |||
| 593 | DH_up_ref(key); | 562 | DH_up_ref(key); |
| 594 | return ret; | 563 | return ret; |
| 595 | } | 564 | } |
| 596 | LCRYPTO_ALIAS(EVP_PKEY_set1_DH); | ||
| 597 | #endif | 565 | #endif |
| 598 | 566 | ||
| 599 | int | 567 | int |
| @@ -612,21 +580,18 @@ EVP_PKEY_type(int type) | |||
| 612 | #endif | 580 | #endif |
| 613 | return ret; | 581 | return ret; |
| 614 | } | 582 | } |
| 615 | LCRYPTO_ALIAS(EVP_PKEY_type); | ||
| 616 | 583 | ||
| 617 | int | 584 | int |
| 618 | EVP_PKEY_id(const EVP_PKEY *pkey) | 585 | EVP_PKEY_id(const EVP_PKEY *pkey) |
| 619 | { | 586 | { |
| 620 | return pkey->type; | 587 | return pkey->type; |
| 621 | } | 588 | } |
| 622 | LCRYPTO_ALIAS(EVP_PKEY_id); | ||
| 623 | 589 | ||
| 624 | int | 590 | int |
| 625 | EVP_PKEY_base_id(const EVP_PKEY *pkey) | 591 | EVP_PKEY_base_id(const EVP_PKEY *pkey) |
| 626 | { | 592 | { |
| 627 | return EVP_PKEY_type(pkey->type); | 593 | return EVP_PKEY_type(pkey->type); |
| 628 | } | 594 | } |
| 629 | LCRYPTO_ALIAS(EVP_PKEY_base_id); | ||
| 630 | 595 | ||
| 631 | void | 596 | void |
| 632 | EVP_PKEY_free(EVP_PKEY *x) | 597 | EVP_PKEY_free(EVP_PKEY *x) |
| @@ -645,7 +610,6 @@ EVP_PKEY_free(EVP_PKEY *x) | |||
| 645 | sk_X509_ATTRIBUTE_pop_free(x->attributes, X509_ATTRIBUTE_free); | 610 | sk_X509_ATTRIBUTE_pop_free(x->attributes, X509_ATTRIBUTE_free); |
| 646 | free(x); | 611 | free(x); |
| 647 | } | 612 | } |
| 648 | LCRYPTO_ALIAS(EVP_PKEY_free); | ||
| 649 | 613 | ||
| 650 | static void | 614 | static void |
| 651 | EVP_PKEY_free_it(EVP_PKEY *x) | 615 | EVP_PKEY_free_it(EVP_PKEY *x) |
| @@ -679,7 +643,6 @@ EVP_PKEY_print_public(BIO *out, const EVP_PKEY *pkey, int indent, | |||
| 679 | 643 | ||
| 680 | return unsup_alg(out, pkey, indent, "Public Key"); | 644 | return unsup_alg(out, pkey, indent, "Public Key"); |
| 681 | } | 645 | } |
| 682 | LCRYPTO_ALIAS(EVP_PKEY_print_public); | ||
| 683 | 646 | ||
| 684 | int | 647 | int |
| 685 | EVP_PKEY_print_private(BIO *out, const EVP_PKEY *pkey, int indent, | 648 | EVP_PKEY_print_private(BIO *out, const EVP_PKEY *pkey, int indent, |
| @@ -690,7 +653,6 @@ EVP_PKEY_print_private(BIO *out, const EVP_PKEY *pkey, int indent, | |||
| 690 | 653 | ||
| 691 | return unsup_alg(out, pkey, indent, "Private Key"); | 654 | return unsup_alg(out, pkey, indent, "Private Key"); |
| 692 | } | 655 | } |
| 693 | LCRYPTO_ALIAS(EVP_PKEY_print_private); | ||
| 694 | 656 | ||
| 695 | int | 657 | int |
| 696 | EVP_PKEY_print_params(BIO *out, const EVP_PKEY *pkey, int indent, | 658 | EVP_PKEY_print_params(BIO *out, const EVP_PKEY *pkey, int indent, |
| @@ -700,7 +662,6 @@ EVP_PKEY_print_params(BIO *out, const EVP_PKEY *pkey, int indent, | |||
| 700 | return pkey->ameth->param_print(out, pkey, indent, pctx); | 662 | return pkey->ameth->param_print(out, pkey, indent, pctx); |
| 701 | return unsup_alg(out, pkey, indent, "Parameters"); | 663 | return unsup_alg(out, pkey, indent, "Parameters"); |
| 702 | } | 664 | } |
| 703 | LCRYPTO_ALIAS(EVP_PKEY_print_params); | ||
| 704 | 665 | ||
| 705 | int | 666 | int |
| 706 | EVP_PKEY_get_default_digest_nid(EVP_PKEY *pkey, int *pnid) | 667 | EVP_PKEY_get_default_digest_nid(EVP_PKEY *pkey, int *pnid) |
| @@ -710,4 +671,3 @@ EVP_PKEY_get_default_digest_nid(EVP_PKEY *pkey, int *pnid) | |||
| 710 | return pkey->ameth->pkey_ctrl(pkey, ASN1_PKEY_CTRL_DEFAULT_MD_NID, | 671 | return pkey->ameth->pkey_ctrl(pkey, ASN1_PKEY_CTRL_DEFAULT_MD_NID, |
| 711 | 0, pnid); | 672 | 0, pnid); |
| 712 | } | 673 | } |
| 713 | LCRYPTO_ALIAS(EVP_PKEY_get_default_digest_nid); | ||
diff --git a/src/lib/libcrypto/evp/p_open.c b/src/lib/libcrypto/evp/p_open.c index 5ab36b8ef5..d18548e3f2 100644 --- a/src/lib/libcrypto/evp/p_open.c +++ b/src/lib/libcrypto/evp/p_open.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: p_open.c,v 1.22 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: p_open.c,v 1.23 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -114,7 +114,6 @@ err: | |||
| 114 | freezero(key, size); | 114 | freezero(key, size); |
| 115 | return (ret); | 115 | return (ret); |
| 116 | } | 116 | } |
| 117 | LCRYPTO_ALIAS(EVP_OpenInit); | ||
| 118 | 117 | ||
| 119 | int | 118 | int |
| 120 | EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | 119 | EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) |
| @@ -126,5 +125,4 @@ EVP_OpenFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
| 126 | i = EVP_DecryptInit_ex(ctx, NULL, NULL, NULL, NULL); | 125 | i = EVP_DecryptInit_ex(ctx, NULL, NULL, NULL, NULL); |
| 127 | return (i); | 126 | return (i); |
| 128 | } | 127 | } |
| 129 | LCRYPTO_ALIAS(EVP_OpenFinal); | ||
| 130 | #endif | 128 | #endif |
diff --git a/src/lib/libcrypto/evp/p_seal.c b/src/lib/libcrypto/evp/p_seal.c index 52521e133b..b98da94360 100644 --- a/src/lib/libcrypto/evp/p_seal.c +++ b/src/lib/libcrypto/evp/p_seal.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: p_seal.c,v 1.15 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: p_seal.c,v 1.16 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -99,7 +99,6 @@ EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, | |||
| 99 | } | 99 | } |
| 100 | return (npubk); | 100 | return (npubk); |
| 101 | } | 101 | } |
| 102 | LCRYPTO_ALIAS(EVP_SealInit); | ||
| 103 | 102 | ||
| 104 | /* MACRO | 103 | /* MACRO |
| 105 | void EVP_SealUpdate(ctx,out,outl,in,inl) | 104 | void EVP_SealUpdate(ctx,out,outl,in,inl) |
| @@ -123,4 +122,3 @@ EVP_SealFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl) | |||
| 123 | i = EVP_EncryptInit_ex(ctx, NULL, NULL, NULL, NULL); | 122 | i = EVP_EncryptInit_ex(ctx, NULL, NULL, NULL, NULL); |
| 124 | return i; | 123 | return i; |
| 125 | } | 124 | } |
| 126 | LCRYPTO_ALIAS(EVP_SealFinal); | ||
diff --git a/src/lib/libcrypto/evp/p_sign.c b/src/lib/libcrypto/evp/p_sign.c index 13655b076f..f7c21178a0 100644 --- a/src/lib/libcrypto/evp/p_sign.c +++ b/src/lib/libcrypto/evp/p_sign.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: p_sign.c,v 1.18 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: p_sign.c,v 1.19 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -102,4 +102,3 @@ EVP_SignFinal(EVP_MD_CTX *ctx, unsigned char *sigret, unsigned int *siglen, | |||
| 102 | EVP_PKEY_CTX_free(pkctx); | 102 | EVP_PKEY_CTX_free(pkctx); |
| 103 | return ret; | 103 | return ret; |
| 104 | } | 104 | } |
| 105 | LCRYPTO_ALIAS(EVP_SignFinal); | ||
diff --git a/src/lib/libcrypto/evp/p_verify.c b/src/lib/libcrypto/evp/p_verify.c index 601b44e5e0..da7ab5425a 100644 --- a/src/lib/libcrypto/evp/p_verify.c +++ b/src/lib/libcrypto/evp/p_verify.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: p_verify.c,v 1.17 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: p_verify.c,v 1.18 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -95,4 +95,3 @@ EVP_VerifyFinal(EVP_MD_CTX *ctx, const unsigned char *sigbuf, | |||
| 95 | EVP_PKEY_CTX_free(pkctx); | 95 | EVP_PKEY_CTX_free(pkctx); |
| 96 | return ret; | 96 | return ret; |
| 97 | } | 97 | } |
| 98 | LCRYPTO_ALIAS(EVP_VerifyFinal); | ||
diff --git a/src/lib/libcrypto/evp/pmeth_fn.c b/src/lib/libcrypto/evp/pmeth_fn.c index 3025005034..a304752e63 100644 --- a/src/lib/libcrypto/evp/pmeth_fn.c +++ b/src/lib/libcrypto/evp/pmeth_fn.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: pmeth_fn.c,v 1.8 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: pmeth_fn.c,v 1.9 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 2006. | 3 | * project 2006. |
| 4 | */ | 4 | */ |
| @@ -98,7 +98,6 @@ EVP_PKEY_sign_init(EVP_PKEY_CTX *ctx) | |||
| 98 | ctx->operation = EVP_PKEY_OP_UNDEFINED; | 98 | ctx->operation = EVP_PKEY_OP_UNDEFINED; |
| 99 | return ret; | 99 | return ret; |
| 100 | } | 100 | } |
| 101 | LCRYPTO_ALIAS(EVP_PKEY_sign_init); | ||
| 102 | 101 | ||
| 103 | int | 102 | int |
| 104 | EVP_PKEY_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, | 103 | EVP_PKEY_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, |
| @@ -115,7 +114,6 @@ EVP_PKEY_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, | |||
| 115 | M_check_autoarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN) | 114 | M_check_autoarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN) |
| 116 | return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); | 115 | return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); |
| 117 | } | 116 | } |
| 118 | LCRYPTO_ALIAS(EVP_PKEY_sign); | ||
| 119 | 117 | ||
| 120 | int | 118 | int |
| 121 | EVP_PKEY_verify_init(EVP_PKEY_CTX *ctx) | 119 | EVP_PKEY_verify_init(EVP_PKEY_CTX *ctx) |
| @@ -134,7 +132,6 @@ EVP_PKEY_verify_init(EVP_PKEY_CTX *ctx) | |||
| 134 | ctx->operation = EVP_PKEY_OP_UNDEFINED; | 132 | ctx->operation = EVP_PKEY_OP_UNDEFINED; |
| 135 | return ret; | 133 | return ret; |
| 136 | } | 134 | } |
| 137 | LCRYPTO_ALIAS(EVP_PKEY_verify_init); | ||
| 138 | 135 | ||
| 139 | int | 136 | int |
| 140 | EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, | 137 | EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, |
| @@ -150,7 +147,6 @@ EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, | |||
| 150 | } | 147 | } |
| 151 | return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); | 148 | return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); |
| 152 | } | 149 | } |
| 153 | LCRYPTO_ALIAS(EVP_PKEY_verify); | ||
| 154 | 150 | ||
| 155 | int | 151 | int |
| 156 | EVP_PKEY_verify_recover_init(EVP_PKEY_CTX *ctx) | 152 | EVP_PKEY_verify_recover_init(EVP_PKEY_CTX *ctx) |
| @@ -169,7 +165,6 @@ EVP_PKEY_verify_recover_init(EVP_PKEY_CTX *ctx) | |||
| 169 | ctx->operation = EVP_PKEY_OP_UNDEFINED; | 165 | ctx->operation = EVP_PKEY_OP_UNDEFINED; |
| 170 | return ret; | 166 | return ret; |
| 171 | } | 167 | } |
| 172 | LCRYPTO_ALIAS(EVP_PKEY_verify_recover_init); | ||
| 173 | 168 | ||
| 174 | int | 169 | int |
| 175 | EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, | 170 | EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, |
| @@ -186,7 +181,6 @@ EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, | |||
| 186 | M_check_autoarg(ctx, rout, routlen, EVP_F_EVP_PKEY_VERIFY_RECOVER) | 181 | M_check_autoarg(ctx, rout, routlen, EVP_F_EVP_PKEY_VERIFY_RECOVER) |
| 187 | return ctx->pmeth->verify_recover(ctx, rout, routlen, sig, siglen); | 182 | return ctx->pmeth->verify_recover(ctx, rout, routlen, sig, siglen); |
| 188 | } | 183 | } |
| 189 | LCRYPTO_ALIAS(EVP_PKEY_verify_recover); | ||
| 190 | 184 | ||
| 191 | int | 185 | int |
| 192 | EVP_PKEY_encrypt_init(EVP_PKEY_CTX *ctx) | 186 | EVP_PKEY_encrypt_init(EVP_PKEY_CTX *ctx) |
| @@ -205,7 +199,6 @@ EVP_PKEY_encrypt_init(EVP_PKEY_CTX *ctx) | |||
| 205 | ctx->operation = EVP_PKEY_OP_UNDEFINED; | 199 | ctx->operation = EVP_PKEY_OP_UNDEFINED; |
| 206 | return ret; | 200 | return ret; |
| 207 | } | 201 | } |
| 208 | LCRYPTO_ALIAS(EVP_PKEY_encrypt_init); | ||
| 209 | 202 | ||
| 210 | int | 203 | int |
| 211 | EVP_PKEY_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, | 204 | EVP_PKEY_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, |
| @@ -222,7 +215,6 @@ EVP_PKEY_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, | |||
| 222 | M_check_autoarg(ctx, out, outlen, EVP_F_EVP_PKEY_ENCRYPT) | 215 | M_check_autoarg(ctx, out, outlen, EVP_F_EVP_PKEY_ENCRYPT) |
| 223 | return ctx->pmeth->encrypt(ctx, out, outlen, in, inlen); | 216 | return ctx->pmeth->encrypt(ctx, out, outlen, in, inlen); |
| 224 | } | 217 | } |
| 225 | LCRYPTO_ALIAS(EVP_PKEY_encrypt); | ||
| 226 | 218 | ||
| 227 | int | 219 | int |
| 228 | EVP_PKEY_decrypt_init(EVP_PKEY_CTX *ctx) | 220 | EVP_PKEY_decrypt_init(EVP_PKEY_CTX *ctx) |
| @@ -241,7 +233,6 @@ EVP_PKEY_decrypt_init(EVP_PKEY_CTX *ctx) | |||
| 241 | ctx->operation = EVP_PKEY_OP_UNDEFINED; | 233 | ctx->operation = EVP_PKEY_OP_UNDEFINED; |
| 242 | return ret; | 234 | return ret; |
| 243 | } | 235 | } |
| 244 | LCRYPTO_ALIAS(EVP_PKEY_decrypt_init); | ||
| 245 | 236 | ||
| 246 | int | 237 | int |
| 247 | EVP_PKEY_decrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, | 238 | EVP_PKEY_decrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, |
| @@ -258,7 +249,6 @@ EVP_PKEY_decrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, | |||
| 258 | M_check_autoarg(ctx, out, outlen, EVP_F_EVP_PKEY_DECRYPT) | 249 | M_check_autoarg(ctx, out, outlen, EVP_F_EVP_PKEY_DECRYPT) |
| 259 | return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); | 250 | return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); |
| 260 | } | 251 | } |
| 261 | LCRYPTO_ALIAS(EVP_PKEY_decrypt); | ||
| 262 | 252 | ||
| 263 | int | 253 | int |
| 264 | EVP_PKEY_derive_init(EVP_PKEY_CTX *ctx) | 254 | EVP_PKEY_derive_init(EVP_PKEY_CTX *ctx) |
| @@ -277,7 +267,6 @@ EVP_PKEY_derive_init(EVP_PKEY_CTX *ctx) | |||
| 277 | ctx->operation = EVP_PKEY_OP_UNDEFINED; | 267 | ctx->operation = EVP_PKEY_OP_UNDEFINED; |
| 278 | return ret; | 268 | return ret; |
| 279 | } | 269 | } |
| 280 | LCRYPTO_ALIAS(EVP_PKEY_derive_init); | ||
| 281 | 270 | ||
| 282 | int | 271 | int |
| 283 | EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) | 272 | EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) |
| @@ -339,7 +328,6 @@ EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer) | |||
| 339 | CRYPTO_add(&peer->references, 1, CRYPTO_LOCK_EVP_PKEY); | 328 | CRYPTO_add(&peer->references, 1, CRYPTO_LOCK_EVP_PKEY); |
| 340 | return 1; | 329 | return 1; |
| 341 | } | 330 | } |
| 342 | LCRYPTO_ALIAS(EVP_PKEY_derive_set_peer); | ||
| 343 | 331 | ||
| 344 | int | 332 | int |
| 345 | EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *pkeylen) | 333 | EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *pkeylen) |
| @@ -355,4 +343,3 @@ EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *pkeylen) | |||
| 355 | M_check_autoarg(ctx, key, pkeylen, EVP_F_EVP_PKEY_DERIVE) | 343 | M_check_autoarg(ctx, key, pkeylen, EVP_F_EVP_PKEY_DERIVE) |
| 356 | return ctx->pmeth->derive(ctx, key, pkeylen); | 344 | return ctx->pmeth->derive(ctx, key, pkeylen); |
| 357 | } | 345 | } |
| 358 | LCRYPTO_ALIAS(EVP_PKEY_derive); | ||
diff --git a/src/lib/libcrypto/evp/pmeth_gn.c b/src/lib/libcrypto/evp/pmeth_gn.c index 2b835cd8fe..b4c0395d97 100644 --- a/src/lib/libcrypto/evp/pmeth_gn.c +++ b/src/lib/libcrypto/evp/pmeth_gn.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: pmeth_gn.c,v 1.12 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: pmeth_gn.c,v 1.13 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 2006. | 3 | * project 2006. |
| 4 | */ | 4 | */ |
| @@ -85,7 +85,6 @@ EVP_PKEY_paramgen_init(EVP_PKEY_CTX *ctx) | |||
| 85 | ctx->operation = EVP_PKEY_OP_UNDEFINED; | 85 | ctx->operation = EVP_PKEY_OP_UNDEFINED; |
| 86 | return ret; | 86 | return ret; |
| 87 | } | 87 | } |
| 88 | LCRYPTO_ALIAS(EVP_PKEY_paramgen_init); | ||
| 89 | 88 | ||
| 90 | int | 89 | int |
| 91 | EVP_PKEY_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey) | 90 | EVP_PKEY_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey) |
| @@ -115,7 +114,6 @@ EVP_PKEY_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey) | |||
| 115 | } | 114 | } |
| 116 | return ret; | 115 | return ret; |
| 117 | } | 116 | } |
| 118 | LCRYPTO_ALIAS(EVP_PKEY_paramgen); | ||
| 119 | 117 | ||
| 120 | int | 118 | int |
| 121 | EVP_PKEY_keygen_init(EVP_PKEY_CTX *ctx) | 119 | EVP_PKEY_keygen_init(EVP_PKEY_CTX *ctx) |
| @@ -134,7 +132,6 @@ EVP_PKEY_keygen_init(EVP_PKEY_CTX *ctx) | |||
| 134 | ctx->operation = EVP_PKEY_OP_UNDEFINED; | 132 | ctx->operation = EVP_PKEY_OP_UNDEFINED; |
| 135 | return ret; | 133 | return ret; |
| 136 | } | 134 | } |
| 137 | LCRYPTO_ALIAS(EVP_PKEY_keygen_init); | ||
| 138 | 135 | ||
| 139 | int | 136 | int |
| 140 | EVP_PKEY_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey) | 137 | EVP_PKEY_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey) |
| @@ -163,21 +160,18 @@ EVP_PKEY_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY **ppkey) | |||
| 163 | } | 160 | } |
| 164 | return ret; | 161 | return ret; |
| 165 | } | 162 | } |
| 166 | LCRYPTO_ALIAS(EVP_PKEY_keygen); | ||
| 167 | 163 | ||
| 168 | void | 164 | void |
| 169 | EVP_PKEY_CTX_set_cb(EVP_PKEY_CTX *ctx, EVP_PKEY_gen_cb *cb) | 165 | EVP_PKEY_CTX_set_cb(EVP_PKEY_CTX *ctx, EVP_PKEY_gen_cb *cb) |
| 170 | { | 166 | { |
| 171 | ctx->pkey_gencb = cb; | 167 | ctx->pkey_gencb = cb; |
| 172 | } | 168 | } |
| 173 | LCRYPTO_ALIAS(EVP_PKEY_CTX_set_cb); | ||
| 174 | 169 | ||
| 175 | EVP_PKEY_gen_cb * | 170 | EVP_PKEY_gen_cb * |
| 176 | EVP_PKEY_CTX_get_cb(EVP_PKEY_CTX *ctx) | 171 | EVP_PKEY_CTX_get_cb(EVP_PKEY_CTX *ctx) |
| 177 | { | 172 | { |
| 178 | return ctx->pkey_gencb; | 173 | return ctx->pkey_gencb; |
| 179 | } | 174 | } |
| 180 | LCRYPTO_ALIAS(EVP_PKEY_CTX_get_cb); | ||
| 181 | 175 | ||
| 182 | /* "translation callback" to call EVP_PKEY_CTX callbacks using BN_GENCB | 176 | /* "translation callback" to call EVP_PKEY_CTX callbacks using BN_GENCB |
| 183 | * style callbacks. | 177 | * style callbacks. |
| @@ -207,7 +201,6 @@ EVP_PKEY_CTX_get_keygen_info(EVP_PKEY_CTX *ctx, int idx) | |||
| 207 | return 0; | 201 | return 0; |
| 208 | return ctx->keygen_info[idx]; | 202 | return ctx->keygen_info[idx]; |
| 209 | } | 203 | } |
| 210 | LCRYPTO_ALIAS(EVP_PKEY_CTX_get_keygen_info); | ||
| 211 | 204 | ||
| 212 | EVP_PKEY * | 205 | EVP_PKEY * |
| 213 | EVP_PKEY_new_mac_key(int type, ENGINE *e, const unsigned char *key, int keylen) | 206 | EVP_PKEY_new_mac_key(int type, ENGINE *e, const unsigned char *key, int keylen) |
| @@ -230,7 +223,6 @@ merr: | |||
| 230 | EVP_PKEY_CTX_free(mac_ctx); | 223 | EVP_PKEY_CTX_free(mac_ctx); |
| 231 | return mac_key; | 224 | return mac_key; |
| 232 | } | 225 | } |
| 233 | LCRYPTO_ALIAS(EVP_PKEY_new_mac_key); | ||
| 234 | 226 | ||
| 235 | int | 227 | int |
| 236 | EVP_PKEY_check(EVP_PKEY_CTX *ctx) | 228 | EVP_PKEY_check(EVP_PKEY_CTX *ctx) |
| @@ -252,7 +244,6 @@ EVP_PKEY_check(EVP_PKEY_CTX *ctx) | |||
| 252 | 244 | ||
| 253 | return pkey->ameth->pkey_check(pkey); | 245 | return pkey->ameth->pkey_check(pkey); |
| 254 | } | 246 | } |
| 255 | LCRYPTO_ALIAS(EVP_PKEY_check); | ||
| 256 | 247 | ||
| 257 | int | 248 | int |
| 258 | EVP_PKEY_public_check(EVP_PKEY_CTX *ctx) | 249 | EVP_PKEY_public_check(EVP_PKEY_CTX *ctx) |
| @@ -274,7 +265,6 @@ EVP_PKEY_public_check(EVP_PKEY_CTX *ctx) | |||
| 274 | 265 | ||
| 275 | return pkey->ameth->pkey_public_check(pkey); | 266 | return pkey->ameth->pkey_public_check(pkey); |
| 276 | } | 267 | } |
| 277 | LCRYPTO_ALIAS(EVP_PKEY_public_check); | ||
| 278 | 268 | ||
| 279 | int | 269 | int |
| 280 | EVP_PKEY_param_check(EVP_PKEY_CTX *ctx) | 270 | EVP_PKEY_param_check(EVP_PKEY_CTX *ctx) |
| @@ -296,4 +286,3 @@ EVP_PKEY_param_check(EVP_PKEY_CTX *ctx) | |||
| 296 | 286 | ||
| 297 | return pkey->ameth->pkey_param_check(pkey); | 287 | return pkey->ameth->pkey_param_check(pkey); |
| 298 | } | 288 | } |
| 299 | LCRYPTO_ALIAS(EVP_PKEY_param_check); | ||
diff --git a/src/lib/libcrypto/evp/pmeth_lib.c b/src/lib/libcrypto/evp/pmeth_lib.c index cad38d4fe9..b480a574fe 100644 --- a/src/lib/libcrypto/evp/pmeth_lib.c +++ b/src/lib/libcrypto/evp/pmeth_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: pmeth_lib.c,v 1.32 2023/07/07 13:54:46 beck Exp $ */ | 1 | /* $OpenBSD: pmeth_lib.c,v 1.33 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 2006. | 3 | * project 2006. |
| 4 | */ | 4 | */ |
| @@ -149,7 +149,6 @@ EVP_PKEY_meth_find(int type) | |||
| 149 | 149 | ||
| 150 | return NULL; | 150 | return NULL; |
| 151 | } | 151 | } |
| 152 | LCRYPTO_ALIAS(EVP_PKEY_meth_find); | ||
| 153 | 152 | ||
| 154 | static EVP_PKEY_CTX * | 153 | static EVP_PKEY_CTX * |
| 155 | evp_pkey_ctx_new(EVP_PKEY *pkey, ENGINE *engine, int id) | 154 | evp_pkey_ctx_new(EVP_PKEY *pkey, ENGINE *engine, int id) |
| @@ -226,7 +225,6 @@ EVP_PKEY_meth_new(int id, int flags) | |||
| 226 | 225 | ||
| 227 | return pmeth; | 226 | return pmeth; |
| 228 | } | 227 | } |
| 229 | LCRYPTO_ALIAS(EVP_PKEY_meth_new); | ||
| 230 | 228 | ||
| 231 | void | 229 | void |
| 232 | EVP_PKEY_meth_get0_info(int *ppkey_id, int *pflags, const EVP_PKEY_METHOD *meth) | 230 | EVP_PKEY_meth_get0_info(int *ppkey_id, int *pflags, const EVP_PKEY_METHOD *meth) |
| @@ -236,7 +234,6 @@ EVP_PKEY_meth_get0_info(int *ppkey_id, int *pflags, const EVP_PKEY_METHOD *meth) | |||
| 236 | if (pflags) | 234 | if (pflags) |
| 237 | *pflags = meth->flags; | 235 | *pflags = meth->flags; |
| 238 | } | 236 | } |
| 239 | LCRYPTO_ALIAS(EVP_PKEY_meth_get0_info); | ||
| 240 | 237 | ||
| 241 | void | 238 | void |
| 242 | EVP_PKEY_meth_copy(EVP_PKEY_METHOD *dst, const EVP_PKEY_METHOD *src) | 239 | EVP_PKEY_meth_copy(EVP_PKEY_METHOD *dst, const EVP_PKEY_METHOD *src) |
| @@ -251,7 +248,6 @@ EVP_PKEY_meth_copy(EVP_PKEY_METHOD *dst, const EVP_PKEY_METHOD *src) | |||
| 251 | dst->pkey_id = preserve.pkey_id; | 248 | dst->pkey_id = preserve.pkey_id; |
| 252 | dst->flags = preserve.flags; | 249 | dst->flags = preserve.flags; |
| 253 | } | 250 | } |
| 254 | LCRYPTO_ALIAS(EVP_PKEY_meth_copy); | ||
| 255 | 251 | ||
| 256 | void | 252 | void |
| 257 | EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth) | 253 | EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth) |
| @@ -259,21 +255,18 @@ EVP_PKEY_meth_free(EVP_PKEY_METHOD *pmeth) | |||
| 259 | if (pmeth && (pmeth->flags & EVP_PKEY_FLAG_DYNAMIC)) | 255 | if (pmeth && (pmeth->flags & EVP_PKEY_FLAG_DYNAMIC)) |
| 260 | free(pmeth); | 256 | free(pmeth); |
| 261 | } | 257 | } |
| 262 | LCRYPTO_ALIAS(EVP_PKEY_meth_free); | ||
| 263 | 258 | ||
| 264 | EVP_PKEY_CTX * | 259 | EVP_PKEY_CTX * |
| 265 | EVP_PKEY_CTX_new(EVP_PKEY *pkey, ENGINE *engine) | 260 | EVP_PKEY_CTX_new(EVP_PKEY *pkey, ENGINE *engine) |
| 266 | { | 261 | { |
| 267 | return evp_pkey_ctx_new(pkey, engine, -1); | 262 | return evp_pkey_ctx_new(pkey, engine, -1); |
| 268 | } | 263 | } |
| 269 | LCRYPTO_ALIAS(EVP_PKEY_CTX_new); | ||
| 270 | 264 | ||
| 271 | EVP_PKEY_CTX * | 265 | EVP_PKEY_CTX * |
| 272 | EVP_PKEY_CTX_new_id(int id, ENGINE *engine) | 266 | EVP_PKEY_CTX_new_id(int id, ENGINE *engine) |
| 273 | { | 267 | { |
| 274 | return evp_pkey_ctx_new(NULL, engine, id); | 268 | return evp_pkey_ctx_new(NULL, engine, id); |
| 275 | } | 269 | } |
| 276 | LCRYPTO_ALIAS(EVP_PKEY_CTX_new_id); | ||
| 277 | 270 | ||
| 278 | EVP_PKEY_CTX * | 271 | EVP_PKEY_CTX * |
| 279 | EVP_PKEY_CTX_dup(EVP_PKEY_CTX *pctx) | 272 | EVP_PKEY_CTX_dup(EVP_PKEY_CTX *pctx) |
| @@ -315,7 +308,6 @@ EVP_PKEY_CTX_dup(EVP_PKEY_CTX *pctx) | |||
| 315 | EVP_PKEY_CTX_free(rctx); | 308 | EVP_PKEY_CTX_free(rctx); |
| 316 | return NULL; | 309 | return NULL; |
| 317 | } | 310 | } |
| 318 | LCRYPTO_ALIAS(EVP_PKEY_CTX_dup); | ||
| 319 | 311 | ||
| 320 | int | 312 | int |
| 321 | EVP_PKEY_meth_add0(const EVP_PKEY_METHOD *pmeth) | 313 | EVP_PKEY_meth_add0(const EVP_PKEY_METHOD *pmeth) |
| @@ -331,7 +323,6 @@ EVP_PKEY_meth_add0(const EVP_PKEY_METHOD *pmeth) | |||
| 331 | 323 | ||
| 332 | return 1; | 324 | return 1; |
| 333 | } | 325 | } |
| 334 | LCRYPTO_ALIAS(EVP_PKEY_meth_add0); | ||
| 335 | 326 | ||
| 336 | void | 327 | void |
| 337 | EVP_PKEY_CTX_free(EVP_PKEY_CTX *ctx) | 328 | EVP_PKEY_CTX_free(EVP_PKEY_CTX *ctx) |
| @@ -347,7 +338,6 @@ EVP_PKEY_CTX_free(EVP_PKEY_CTX *ctx) | |||
| 347 | #endif | 338 | #endif |
| 348 | free(ctx); | 339 | free(ctx); |
| 349 | } | 340 | } |
| 350 | LCRYPTO_ALIAS(EVP_PKEY_CTX_free); | ||
| 351 | 341 | ||
| 352 | int | 342 | int |
| 353 | EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype, int cmd, | 343 | EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype, int cmd, |
| @@ -380,7 +370,6 @@ EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype, int cmd, | |||
| 380 | return ret; | 370 | return ret; |
| 381 | 371 | ||
| 382 | } | 372 | } |
| 383 | LCRYPTO_ALIAS(EVP_PKEY_CTX_ctrl); | ||
| 384 | 373 | ||
| 385 | int | 374 | int |
| 386 | EVP_PKEY_CTX_ctrl_str(EVP_PKEY_CTX *ctx, const char *name, const char *value) | 375 | EVP_PKEY_CTX_ctrl_str(EVP_PKEY_CTX *ctx, const char *name, const char *value) |
| @@ -395,7 +384,6 @@ EVP_PKEY_CTX_ctrl_str(EVP_PKEY_CTX *ctx, const char *name, const char *value) | |||
| 395 | } | 384 | } |
| 396 | return ctx->pmeth->ctrl_str(ctx, name, value); | 385 | return ctx->pmeth->ctrl_str(ctx, name, value); |
| 397 | } | 386 | } |
| 398 | LCRYPTO_ALIAS(EVP_PKEY_CTX_ctrl_str); | ||
| 399 | 387 | ||
| 400 | int | 388 | int |
| 401 | EVP_PKEY_CTX_str2ctrl(EVP_PKEY_CTX *ctx, int cmd, const char *str) | 389 | EVP_PKEY_CTX_str2ctrl(EVP_PKEY_CTX *ctx, int cmd, const char *str) |
| @@ -446,7 +434,6 @@ EVP_PKEY_CTX_get_operation(EVP_PKEY_CTX *ctx) | |||
| 446 | { | 434 | { |
| 447 | return ctx->operation; | 435 | return ctx->operation; |
| 448 | } | 436 | } |
| 449 | LCRYPTO_ALIAS(EVP_PKEY_CTX_get_operation); | ||
| 450 | 437 | ||
| 451 | void | 438 | void |
| 452 | EVP_PKEY_CTX_set0_keygen_info(EVP_PKEY_CTX *ctx, int *dat, int datlen) | 439 | EVP_PKEY_CTX_set0_keygen_info(EVP_PKEY_CTX *ctx, int *dat, int datlen) |
| @@ -454,49 +441,42 @@ EVP_PKEY_CTX_set0_keygen_info(EVP_PKEY_CTX *ctx, int *dat, int datlen) | |||
| 454 | ctx->keygen_info = dat; | 441 | ctx->keygen_info = dat; |
| 455 | ctx->keygen_info_count = datlen; | 442 | ctx->keygen_info_count = datlen; |
| 456 | } | 443 | } |
| 457 | LCRYPTO_ALIAS(EVP_PKEY_CTX_set0_keygen_info); | ||
| 458 | 444 | ||
| 459 | void | 445 | void |
| 460 | EVP_PKEY_CTX_set_data(EVP_PKEY_CTX *ctx, void *data) | 446 | EVP_PKEY_CTX_set_data(EVP_PKEY_CTX *ctx, void *data) |
| 461 | { | 447 | { |
| 462 | ctx->data = data; | 448 | ctx->data = data; |
| 463 | } | 449 | } |
| 464 | LCRYPTO_ALIAS(EVP_PKEY_CTX_set_data); | ||
| 465 | 450 | ||
| 466 | void * | 451 | void * |
| 467 | EVP_PKEY_CTX_get_data(EVP_PKEY_CTX *ctx) | 452 | EVP_PKEY_CTX_get_data(EVP_PKEY_CTX *ctx) |
| 468 | { | 453 | { |
| 469 | return ctx->data; | 454 | return ctx->data; |
| 470 | } | 455 | } |
| 471 | LCRYPTO_ALIAS(EVP_PKEY_CTX_get_data); | ||
| 472 | 456 | ||
| 473 | EVP_PKEY * | 457 | EVP_PKEY * |
| 474 | EVP_PKEY_CTX_get0_pkey(EVP_PKEY_CTX *ctx) | 458 | EVP_PKEY_CTX_get0_pkey(EVP_PKEY_CTX *ctx) |
| 475 | { | 459 | { |
| 476 | return ctx->pkey; | 460 | return ctx->pkey; |
| 477 | } | 461 | } |
| 478 | LCRYPTO_ALIAS(EVP_PKEY_CTX_get0_pkey); | ||
| 479 | 462 | ||
| 480 | EVP_PKEY * | 463 | EVP_PKEY * |
| 481 | EVP_PKEY_CTX_get0_peerkey(EVP_PKEY_CTX *ctx) | 464 | EVP_PKEY_CTX_get0_peerkey(EVP_PKEY_CTX *ctx) |
| 482 | { | 465 | { |
| 483 | return ctx->peerkey; | 466 | return ctx->peerkey; |
| 484 | } | 467 | } |
| 485 | LCRYPTO_ALIAS(EVP_PKEY_CTX_get0_peerkey); | ||
| 486 | 468 | ||
| 487 | void | 469 | void |
| 488 | EVP_PKEY_CTX_set_app_data(EVP_PKEY_CTX *ctx, void *data) | 470 | EVP_PKEY_CTX_set_app_data(EVP_PKEY_CTX *ctx, void *data) |
| 489 | { | 471 | { |
| 490 | ctx->app_data = data; | 472 | ctx->app_data = data; |
| 491 | } | 473 | } |
| 492 | LCRYPTO_ALIAS(EVP_PKEY_CTX_set_app_data); | ||
| 493 | 474 | ||
| 494 | void * | 475 | void * |
| 495 | EVP_PKEY_CTX_get_app_data(EVP_PKEY_CTX *ctx) | 476 | EVP_PKEY_CTX_get_app_data(EVP_PKEY_CTX *ctx) |
| 496 | { | 477 | { |
| 497 | return ctx->app_data; | 478 | return ctx->app_data; |
| 498 | } | 479 | } |
| 499 | LCRYPTO_ALIAS(EVP_PKEY_CTX_get_app_data); | ||
| 500 | 480 | ||
| 501 | void | 481 | void |
| 502 | EVP_PKEY_meth_set_init(EVP_PKEY_METHOD *pmeth, | 482 | EVP_PKEY_meth_set_init(EVP_PKEY_METHOD *pmeth, |
| @@ -504,7 +484,6 @@ EVP_PKEY_meth_set_init(EVP_PKEY_METHOD *pmeth, | |||
| 504 | { | 484 | { |
| 505 | pmeth->init = init; | 485 | pmeth->init = init; |
| 506 | } | 486 | } |
| 507 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_init); | ||
| 508 | 487 | ||
| 509 | void | 488 | void |
| 510 | EVP_PKEY_meth_set_copy(EVP_PKEY_METHOD *pmeth, | 489 | EVP_PKEY_meth_set_copy(EVP_PKEY_METHOD *pmeth, |
| @@ -512,7 +491,6 @@ EVP_PKEY_meth_set_copy(EVP_PKEY_METHOD *pmeth, | |||
| 512 | { | 491 | { |
| 513 | pmeth->copy = copy; | 492 | pmeth->copy = copy; |
| 514 | } | 493 | } |
| 515 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_copy); | ||
| 516 | 494 | ||
| 517 | void | 495 | void |
| 518 | EVP_PKEY_meth_set_cleanup(EVP_PKEY_METHOD *pmeth, | 496 | EVP_PKEY_meth_set_cleanup(EVP_PKEY_METHOD *pmeth, |
| @@ -520,7 +498,6 @@ EVP_PKEY_meth_set_cleanup(EVP_PKEY_METHOD *pmeth, | |||
| 520 | { | 498 | { |
| 521 | pmeth->cleanup = cleanup; | 499 | pmeth->cleanup = cleanup; |
| 522 | } | 500 | } |
| 523 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_cleanup); | ||
| 524 | 501 | ||
| 525 | void | 502 | void |
| 526 | EVP_PKEY_meth_set_paramgen(EVP_PKEY_METHOD *pmeth, | 503 | EVP_PKEY_meth_set_paramgen(EVP_PKEY_METHOD *pmeth, |
| @@ -530,7 +507,6 @@ EVP_PKEY_meth_set_paramgen(EVP_PKEY_METHOD *pmeth, | |||
| 530 | pmeth->paramgen_init = paramgen_init; | 507 | pmeth->paramgen_init = paramgen_init; |
| 531 | pmeth->paramgen = paramgen; | 508 | pmeth->paramgen = paramgen; |
| 532 | } | 509 | } |
| 533 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_paramgen); | ||
| 534 | 510 | ||
| 535 | void | 511 | void |
| 536 | EVP_PKEY_meth_set_keygen(EVP_PKEY_METHOD *pmeth, | 512 | EVP_PKEY_meth_set_keygen(EVP_PKEY_METHOD *pmeth, |
| @@ -540,7 +516,6 @@ EVP_PKEY_meth_set_keygen(EVP_PKEY_METHOD *pmeth, | |||
| 540 | pmeth->keygen_init = keygen_init; | 516 | pmeth->keygen_init = keygen_init; |
| 541 | pmeth->keygen = keygen; | 517 | pmeth->keygen = keygen; |
| 542 | } | 518 | } |
| 543 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_keygen); | ||
| 544 | 519 | ||
| 545 | void | 520 | void |
| 546 | EVP_PKEY_meth_set_sign(EVP_PKEY_METHOD *pmeth, | 521 | EVP_PKEY_meth_set_sign(EVP_PKEY_METHOD *pmeth, |
| @@ -551,7 +526,6 @@ EVP_PKEY_meth_set_sign(EVP_PKEY_METHOD *pmeth, | |||
| 551 | pmeth->sign_init = sign_init; | 526 | pmeth->sign_init = sign_init; |
| 552 | pmeth->sign = sign; | 527 | pmeth->sign = sign; |
| 553 | } | 528 | } |
| 554 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_sign); | ||
| 555 | 529 | ||
| 556 | void | 530 | void |
| 557 | EVP_PKEY_meth_set_verify(EVP_PKEY_METHOD *pmeth, | 531 | EVP_PKEY_meth_set_verify(EVP_PKEY_METHOD *pmeth, |
| @@ -562,7 +536,6 @@ EVP_PKEY_meth_set_verify(EVP_PKEY_METHOD *pmeth, | |||
| 562 | pmeth->verify_init = verify_init; | 536 | pmeth->verify_init = verify_init; |
| 563 | pmeth->verify = verify; | 537 | pmeth->verify = verify; |
| 564 | } | 538 | } |
| 565 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_verify); | ||
| 566 | 539 | ||
| 567 | void | 540 | void |
| 568 | EVP_PKEY_meth_set_verify_recover(EVP_PKEY_METHOD *pmeth, | 541 | EVP_PKEY_meth_set_verify_recover(EVP_PKEY_METHOD *pmeth, |
| @@ -574,7 +547,6 @@ EVP_PKEY_meth_set_verify_recover(EVP_PKEY_METHOD *pmeth, | |||
| 574 | pmeth->verify_recover_init = verify_recover_init; | 547 | pmeth->verify_recover_init = verify_recover_init; |
| 575 | pmeth->verify_recover = verify_recover; | 548 | pmeth->verify_recover = verify_recover; |
| 576 | } | 549 | } |
| 577 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_verify_recover); | ||
| 578 | 550 | ||
| 579 | void | 551 | void |
| 580 | EVP_PKEY_meth_set_signctx(EVP_PKEY_METHOD *pmeth, | 552 | EVP_PKEY_meth_set_signctx(EVP_PKEY_METHOD *pmeth, |
| @@ -585,7 +557,6 @@ EVP_PKEY_meth_set_signctx(EVP_PKEY_METHOD *pmeth, | |||
| 585 | pmeth->signctx_init = signctx_init; | 557 | pmeth->signctx_init = signctx_init; |
| 586 | pmeth->signctx = signctx; | 558 | pmeth->signctx = signctx; |
| 587 | } | 559 | } |
| 588 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_signctx); | ||
| 589 | 560 | ||
| 590 | void | 561 | void |
| 591 | EVP_PKEY_meth_set_verifyctx(EVP_PKEY_METHOD *pmeth, | 562 | EVP_PKEY_meth_set_verifyctx(EVP_PKEY_METHOD *pmeth, |
| @@ -596,7 +567,6 @@ EVP_PKEY_meth_set_verifyctx(EVP_PKEY_METHOD *pmeth, | |||
| 596 | pmeth->verifyctx_init = verifyctx_init; | 567 | pmeth->verifyctx_init = verifyctx_init; |
| 597 | pmeth->verifyctx = verifyctx; | 568 | pmeth->verifyctx = verifyctx; |
| 598 | } | 569 | } |
| 599 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_verifyctx); | ||
| 600 | 570 | ||
| 601 | void | 571 | void |
| 602 | EVP_PKEY_meth_set_encrypt(EVP_PKEY_METHOD *pmeth, | 572 | EVP_PKEY_meth_set_encrypt(EVP_PKEY_METHOD *pmeth, |
| @@ -607,7 +577,6 @@ EVP_PKEY_meth_set_encrypt(EVP_PKEY_METHOD *pmeth, | |||
| 607 | pmeth->encrypt_init = encrypt_init; | 577 | pmeth->encrypt_init = encrypt_init; |
| 608 | pmeth->encrypt = encryptfn; | 578 | pmeth->encrypt = encryptfn; |
| 609 | } | 579 | } |
| 610 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_encrypt); | ||
| 611 | 580 | ||
| 612 | void | 581 | void |
| 613 | EVP_PKEY_meth_set_decrypt(EVP_PKEY_METHOD *pmeth, | 582 | EVP_PKEY_meth_set_decrypt(EVP_PKEY_METHOD *pmeth, |
| @@ -618,7 +587,6 @@ EVP_PKEY_meth_set_decrypt(EVP_PKEY_METHOD *pmeth, | |||
| 618 | pmeth->decrypt_init = decrypt_init; | 587 | pmeth->decrypt_init = decrypt_init; |
| 619 | pmeth->decrypt = decrypt; | 588 | pmeth->decrypt = decrypt; |
| 620 | } | 589 | } |
| 621 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_decrypt); | ||
| 622 | 590 | ||
| 623 | void | 591 | void |
| 624 | EVP_PKEY_meth_set_derive(EVP_PKEY_METHOD *pmeth, | 592 | EVP_PKEY_meth_set_derive(EVP_PKEY_METHOD *pmeth, |
| @@ -628,7 +596,6 @@ EVP_PKEY_meth_set_derive(EVP_PKEY_METHOD *pmeth, | |||
| 628 | pmeth->derive_init = derive_init; | 596 | pmeth->derive_init = derive_init; |
| 629 | pmeth->derive = derive; | 597 | pmeth->derive = derive; |
| 630 | } | 598 | } |
| 631 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_derive); | ||
| 632 | 599 | ||
| 633 | void | 600 | void |
| 634 | EVP_PKEY_meth_set_ctrl(EVP_PKEY_METHOD *pmeth, | 601 | EVP_PKEY_meth_set_ctrl(EVP_PKEY_METHOD *pmeth, |
| @@ -638,14 +605,12 @@ EVP_PKEY_meth_set_ctrl(EVP_PKEY_METHOD *pmeth, | |||
| 638 | pmeth->ctrl = ctrl; | 605 | pmeth->ctrl = ctrl; |
| 639 | pmeth->ctrl_str = ctrl_str; | 606 | pmeth->ctrl_str = ctrl_str; |
| 640 | } | 607 | } |
| 641 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_ctrl); | ||
| 642 | 608 | ||
| 643 | void | 609 | void |
| 644 | EVP_PKEY_meth_set_check(EVP_PKEY_METHOD *pmeth, int (*check)(EVP_PKEY *pkey)) | 610 | EVP_PKEY_meth_set_check(EVP_PKEY_METHOD *pmeth, int (*check)(EVP_PKEY *pkey)) |
| 645 | { | 611 | { |
| 646 | pmeth->check = check; | 612 | pmeth->check = check; |
| 647 | } | 613 | } |
| 648 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_check); | ||
| 649 | 614 | ||
| 650 | void | 615 | void |
| 651 | EVP_PKEY_meth_set_public_check(EVP_PKEY_METHOD *pmeth, | 616 | EVP_PKEY_meth_set_public_check(EVP_PKEY_METHOD *pmeth, |
| @@ -653,7 +618,6 @@ EVP_PKEY_meth_set_public_check(EVP_PKEY_METHOD *pmeth, | |||
| 653 | { | 618 | { |
| 654 | pmeth->public_check = public_check; | 619 | pmeth->public_check = public_check; |
| 655 | } | 620 | } |
| 656 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_public_check); | ||
| 657 | 621 | ||
| 658 | void | 622 | void |
| 659 | EVP_PKEY_meth_set_param_check(EVP_PKEY_METHOD *pmeth, | 623 | EVP_PKEY_meth_set_param_check(EVP_PKEY_METHOD *pmeth, |
| @@ -661,4 +625,3 @@ EVP_PKEY_meth_set_param_check(EVP_PKEY_METHOD *pmeth, | |||
| 661 | { | 625 | { |
| 662 | pmeth->param_check = param_check; | 626 | pmeth->param_check = param_check; |
| 663 | } | 627 | } |
| 664 | LCRYPTO_ALIAS(EVP_PKEY_meth_set_param_check); | ||
diff --git a/src/lib/libcrypto/hidden/openssl/asn1.h b/src/lib/libcrypto/hidden/openssl/asn1.h index 0bdfd7b056..7e41ec862c 100644 --- a/src/lib/libcrypto/hidden/openssl/asn1.h +++ b/src/lib/libcrypto/hidden/openssl/asn1.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: asn1.h,v 1.1 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: asn1.h,v 1.2 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
| @@ -80,7 +80,6 @@ LCRYPTO_USED(ASN1_UTCTIME_check); | |||
| 80 | LCRYPTO_USED(ASN1_UTCTIME_set); | 80 | LCRYPTO_USED(ASN1_UTCTIME_set); |
| 81 | LCRYPTO_USED(ASN1_UTCTIME_adj); | 81 | LCRYPTO_USED(ASN1_UTCTIME_adj); |
| 82 | LCRYPTO_USED(ASN1_UTCTIME_set_string); | 82 | LCRYPTO_USED(ASN1_UTCTIME_set_string); |
| 83 | LCRYPTO_USED(ASN1_UTCTIME_cmp_time_t); | ||
| 84 | LCRYPTO_USED(ASN1_GENERALIZEDTIME_check); | 83 | LCRYPTO_USED(ASN1_GENERALIZEDTIME_check); |
| 85 | LCRYPTO_USED(ASN1_GENERALIZEDTIME_set); | 84 | LCRYPTO_USED(ASN1_GENERALIZEDTIME_set); |
| 86 | LCRYPTO_USED(ASN1_GENERALIZEDTIME_adj); | 85 | LCRYPTO_USED(ASN1_GENERALIZEDTIME_adj); |
| @@ -194,7 +193,6 @@ LCRYPTO_USED(ASN1_put_object); | |||
| 194 | LCRYPTO_USED(ASN1_put_eoc); | 193 | LCRYPTO_USED(ASN1_put_eoc); |
| 195 | LCRYPTO_USED(ASN1_object_size); | 194 | LCRYPTO_USED(ASN1_object_size); |
| 196 | LCRYPTO_USED(ASN1_item_dup); | 195 | LCRYPTO_USED(ASN1_item_dup); |
| 197 | LCRYPTO_USED(ASN1_dup); | ||
| 198 | LCRYPTO_USED(ASN1_d2i_fp); | 196 | LCRYPTO_USED(ASN1_d2i_fp); |
| 199 | LCRYPTO_USED(ASN1_item_d2i_fp); | 197 | LCRYPTO_USED(ASN1_item_d2i_fp); |
| 200 | LCRYPTO_USED(ASN1_i2d_fp); | 198 | LCRYPTO_USED(ASN1_i2d_fp); |
diff --git a/src/lib/libcrypto/hidden/openssl/asn1t.h b/src/lib/libcrypto/hidden/openssl/asn1t.h index dcc95cf0b2..d37d1dbbc0 100644 --- a/src/lib/libcrypto/hidden/openssl/asn1t.h +++ b/src/lib/libcrypto/hidden/openssl/asn1t.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: asn1t.h,v 1.1 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: asn1t.h,v 1.2 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
diff --git a/src/lib/libcrypto/hidden/openssl/bio.h b/src/lib/libcrypto/hidden/openssl/bio.h index 72c50d5196..c04a0a447f 100644 --- a/src/lib/libcrypto/hidden/openssl/bio.h +++ b/src/lib/libcrypto/hidden/openssl/bio.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: bio.h,v 1.1 2023/07/05 21:23:37 beck Exp $ */ | 1 | /* $OpenBSD: bio.h,v 1.2 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
diff --git a/src/lib/libcrypto/hidden/openssl/chacha.h b/src/lib/libcrypto/hidden/openssl/chacha.h index 98108261ce..a9f3b7e908 100644 --- a/src/lib/libcrypto/hidden/openssl/chacha.h +++ b/src/lib/libcrypto/hidden/openssl/chacha.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: chacha.h,v 1.2 2023/07/05 21:14:54 bcook Exp $ */ | 1 | /* $OpenBSD: chacha.h,v 1.3 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
diff --git a/src/lib/libcrypto/hidden/openssl/ec.h b/src/lib/libcrypto/hidden/openssl/ec.h index ea77d44597..5e4121eac3 100644 --- a/src/lib/libcrypto/hidden/openssl/ec.h +++ b/src/lib/libcrypto/hidden/openssl/ec.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ec.h,v 1.1 2023/07/07 13:53:52 beck Exp $ */ | 1 | /* $OpenBSD: ec.h,v 1.2 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
| @@ -29,7 +29,6 @@ LCRYPTO_USED(EC_GFp_simple_method); | |||
| 29 | LCRYPTO_USED(EC_GFp_mont_method); | 29 | LCRYPTO_USED(EC_GFp_mont_method); |
| 30 | LCRYPTO_USED(EC_GROUP_new); | 30 | LCRYPTO_USED(EC_GROUP_new); |
| 31 | LCRYPTO_USED(EC_GROUP_free); | 31 | LCRYPTO_USED(EC_GROUP_free); |
| 32 | LCRYPTO_USED(EC_GROUP_clear_free); | ||
| 33 | LCRYPTO_USED(EC_GROUP_copy); | 32 | LCRYPTO_USED(EC_GROUP_copy); |
| 34 | LCRYPTO_USED(EC_GROUP_dup); | 33 | LCRYPTO_USED(EC_GROUP_dup); |
| 35 | LCRYPTO_USED(EC_GROUP_method_of); | 34 | LCRYPTO_USED(EC_GROUP_method_of); |
| @@ -50,8 +49,6 @@ LCRYPTO_USED(EC_GROUP_get_seed_len); | |||
| 50 | LCRYPTO_USED(EC_GROUP_set_seed); | 49 | LCRYPTO_USED(EC_GROUP_set_seed); |
| 51 | LCRYPTO_USED(EC_GROUP_set_curve); | 50 | LCRYPTO_USED(EC_GROUP_set_curve); |
| 52 | LCRYPTO_USED(EC_GROUP_get_curve); | 51 | LCRYPTO_USED(EC_GROUP_get_curve); |
| 53 | LCRYPTO_USED(EC_GROUP_set_curve_GFp); | ||
| 54 | LCRYPTO_USED(EC_GROUP_get_curve_GFp); | ||
| 55 | LCRYPTO_USED(EC_GROUP_get_degree); | 52 | LCRYPTO_USED(EC_GROUP_get_degree); |
| 56 | LCRYPTO_USED(EC_GROUP_check); | 53 | LCRYPTO_USED(EC_GROUP_check); |
| 57 | LCRYPTO_USED(EC_GROUP_check_discriminant); | 54 | LCRYPTO_USED(EC_GROUP_check_discriminant); |
| @@ -63,7 +60,6 @@ LCRYPTO_USED(EC_curve_nid2nist); | |||
| 63 | LCRYPTO_USED(EC_curve_nist2nid); | 60 | LCRYPTO_USED(EC_curve_nist2nid); |
| 64 | LCRYPTO_USED(EC_POINT_new); | 61 | LCRYPTO_USED(EC_POINT_new); |
| 65 | LCRYPTO_USED(EC_POINT_free); | 62 | LCRYPTO_USED(EC_POINT_free); |
| 66 | LCRYPTO_USED(EC_POINT_clear_free); | ||
| 67 | LCRYPTO_USED(EC_POINT_copy); | 63 | LCRYPTO_USED(EC_POINT_copy); |
| 68 | LCRYPTO_USED(EC_POINT_dup); | 64 | LCRYPTO_USED(EC_POINT_dup); |
| 69 | LCRYPTO_USED(EC_POINT_method_of); | 65 | LCRYPTO_USED(EC_POINT_method_of); |
| @@ -71,11 +67,6 @@ LCRYPTO_USED(EC_POINT_set_to_infinity); | |||
| 71 | LCRYPTO_USED(EC_POINT_set_affine_coordinates); | 67 | LCRYPTO_USED(EC_POINT_set_affine_coordinates); |
| 72 | LCRYPTO_USED(EC_POINT_get_affine_coordinates); | 68 | LCRYPTO_USED(EC_POINT_get_affine_coordinates); |
| 73 | LCRYPTO_USED(EC_POINT_set_compressed_coordinates); | 69 | LCRYPTO_USED(EC_POINT_set_compressed_coordinates); |
| 74 | LCRYPTO_USED(EC_POINT_set_Jprojective_coordinates_GFp); | ||
| 75 | LCRYPTO_USED(EC_POINT_get_Jprojective_coordinates_GFp); | ||
| 76 | LCRYPTO_USED(EC_POINT_set_affine_coordinates_GFp); | ||
| 77 | LCRYPTO_USED(EC_POINT_get_affine_coordinates_GFp); | ||
| 78 | LCRYPTO_USED(EC_POINT_set_compressed_coordinates_GFp); | ||
| 79 | LCRYPTO_USED(EC_POINT_point2oct); | 70 | LCRYPTO_USED(EC_POINT_point2oct); |
| 80 | LCRYPTO_USED(EC_POINT_oct2point); | 71 | LCRYPTO_USED(EC_POINT_oct2point); |
| 81 | LCRYPTO_USED(EC_POINT_point2bn); | 72 | LCRYPTO_USED(EC_POINT_point2bn); |
diff --git a/src/lib/libcrypto/hidden/openssl/ecdsa.h b/src/lib/libcrypto/hidden/openssl/ecdsa.h index 25eb2b3b57..ef8a789939 100644 --- a/src/lib/libcrypto/hidden/openssl/ecdsa.h +++ b/src/lib/libcrypto/hidden/openssl/ecdsa.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ecdsa.h,v 1.1 2023/07/07 13:53:52 beck Exp $ */ | 1 | /* $OpenBSD: ecdsa.h,v 1.2 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
diff --git a/src/lib/libcrypto/hidden/openssl/err.h b/src/lib/libcrypto/hidden/openssl/err.h index f43f5f00e6..bc2a96644c 100644 --- a/src/lib/libcrypto/hidden/openssl/err.h +++ b/src/lib/libcrypto/hidden/openssl/err.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: err.h,v 1.1 2023/07/07 13:53:52 beck Exp $ */ | 1 | /* $OpenBSD: err.h,v 1.2 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
| @@ -46,8 +46,6 @@ LCRYPTO_USED(ERR_print_errors_cb); | |||
| 46 | LCRYPTO_USED(ERR_print_errors_fp); | 46 | LCRYPTO_USED(ERR_print_errors_fp); |
| 47 | LCRYPTO_USED(ERR_print_errors); | 47 | LCRYPTO_USED(ERR_print_errors); |
| 48 | LCRYPTO_USED(ERR_asprintf_error_data); | 48 | LCRYPTO_USED(ERR_asprintf_error_data); |
| 49 | LCRYPTO_USED(ERR_add_error_data); | ||
| 50 | LCRYPTO_USED(ERR_add_error_vdata); | ||
| 51 | LCRYPTO_USED(ERR_load_strings); | 49 | LCRYPTO_USED(ERR_load_strings); |
| 52 | LCRYPTO_USED(ERR_unload_strings); | 50 | LCRYPTO_USED(ERR_unload_strings); |
| 53 | LCRYPTO_USED(ERR_load_ERR_strings); | 51 | LCRYPTO_USED(ERR_load_ERR_strings); |
diff --git a/src/lib/libcrypto/hidden/openssl/evp.h b/src/lib/libcrypto/hidden/openssl/evp.h deleted file mode 100644 index d4bcb2719e..0000000000 --- a/src/lib/libcrypto/hidden/openssl/evp.h +++ /dev/null | |||
| @@ -1,457 +0,0 @@ | |||
| 1 | /* $OpenBSD: evp.h,v 1.1 2023/07/07 13:53:52 beck Exp $ */ | ||
| 2 | /* | ||
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | ||
| 4 | * | ||
| 5 | * Permission to use, copy, modify, and distribute this software for any | ||
| 6 | * purpose with or without fee is hereby granted, provided that the above | ||
| 7 | * copyright notice and this permission notice appear in all copies. | ||
| 8 | * | ||
| 9 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
| 10 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
| 11 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
| 12 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
| 13 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
| 14 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
| 15 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
| 16 | */ | ||
| 17 | |||
| 18 | #ifndef _LIBCRYPTO_EVP_H | ||
| 19 | #define _LIBCRYPTO_EVP_H | ||
| 20 | |||
| 21 | #ifndef _MSC_VER | ||
| 22 | #include_next <openssl/evp.h> | ||
| 23 | #else | ||
| 24 | #include "../include/openssl/evp.h" | ||
| 25 | #endif | ||
| 26 | #include "crypto_namespace.h" | ||
| 27 | |||
| 28 | LCRYPTO_USED(EVP_MD_type); | ||
| 29 | LCRYPTO_USED(EVP_MD_pkey_type); | ||
| 30 | LCRYPTO_USED(EVP_MD_size); | ||
| 31 | LCRYPTO_USED(EVP_MD_block_size); | ||
| 32 | LCRYPTO_USED(EVP_MD_flags); | ||
| 33 | LCRYPTO_USED(EVP_MD_meth_new); | ||
| 34 | LCRYPTO_USED(EVP_MD_meth_free); | ||
| 35 | LCRYPTO_USED(EVP_MD_meth_dup); | ||
| 36 | LCRYPTO_USED(EVP_MD_meth_set_input_blocksize); | ||
| 37 | LCRYPTO_USED(EVP_MD_meth_set_result_size); | ||
| 38 | LCRYPTO_USED(EVP_MD_meth_set_app_datasize); | ||
| 39 | LCRYPTO_USED(EVP_MD_meth_set_flags); | ||
| 40 | LCRYPTO_USED(EVP_MD_meth_set_init); | ||
| 41 | LCRYPTO_USED(EVP_MD_meth_set_update); | ||
| 42 | LCRYPTO_USED(EVP_MD_meth_set_final); | ||
| 43 | LCRYPTO_USED(EVP_MD_meth_set_copy); | ||
| 44 | LCRYPTO_USED(EVP_MD_meth_set_cleanup); | ||
| 45 | LCRYPTO_USED(EVP_MD_meth_set_ctrl); | ||
| 46 | LCRYPTO_USED(EVP_MD_CTX_md); | ||
| 47 | LCRYPTO_USED(EVP_MD_CTX_md_data); | ||
| 48 | LCRYPTO_USED(EVP_MD_CTX_pkey_ctx); | ||
| 49 | LCRYPTO_USED(EVP_MD_CTX_set_pkey_ctx); | ||
| 50 | LCRYPTO_USED(EVP_CIPHER_nid); | ||
| 51 | LCRYPTO_USED(EVP_CIPHER_block_size); | ||
| 52 | LCRYPTO_USED(EVP_CIPHER_key_length); | ||
| 53 | LCRYPTO_USED(EVP_CIPHER_iv_length); | ||
| 54 | LCRYPTO_USED(EVP_CIPHER_flags); | ||
| 55 | LCRYPTO_USED(EVP_CIPHER_CTX_cipher); | ||
| 56 | LCRYPTO_USED(EVP_CIPHER_CTX_encrypting); | ||
| 57 | LCRYPTO_USED(EVP_CIPHER_CTX_nid); | ||
| 58 | LCRYPTO_USED(EVP_CIPHER_CTX_block_size); | ||
| 59 | LCRYPTO_USED(EVP_CIPHER_CTX_key_length); | ||
| 60 | LCRYPTO_USED(EVP_CIPHER_CTX_iv_length); | ||
| 61 | LCRYPTO_USED(EVP_CIPHER_CTX_get_iv); | ||
| 62 | LCRYPTO_USED(EVP_CIPHER_CTX_set_iv); | ||
| 63 | LCRYPTO_USED(EVP_CIPHER_CTX_copy); | ||
| 64 | LCRYPTO_USED(EVP_CIPHER_CTX_get_app_data); | ||
| 65 | LCRYPTO_USED(EVP_CIPHER_CTX_set_app_data); | ||
| 66 | LCRYPTO_USED(EVP_CIPHER_CTX_get_cipher_data); | ||
| 67 | LCRYPTO_USED(EVP_CIPHER_CTX_set_cipher_data); | ||
| 68 | LCRYPTO_USED(EVP_CIPHER_CTX_buf_noconst); | ||
| 69 | LCRYPTO_USED(EVP_CIPHER_CTX_flags); | ||
| 70 | LCRYPTO_USED(EVP_CIPHER_meth_new); | ||
| 71 | LCRYPTO_USED(EVP_CIPHER_meth_dup); | ||
| 72 | LCRYPTO_USED(EVP_CIPHER_meth_free); | ||
| 73 | LCRYPTO_USED(EVP_CIPHER_meth_set_iv_length); | ||
| 74 | LCRYPTO_USED(EVP_CIPHER_meth_set_flags); | ||
| 75 | LCRYPTO_USED(EVP_CIPHER_meth_set_impl_ctx_size); | ||
| 76 | LCRYPTO_USED(EVP_CIPHER_meth_set_init); | ||
| 77 | LCRYPTO_USED(EVP_CIPHER_meth_set_do_cipher); | ||
| 78 | LCRYPTO_USED(EVP_CIPHER_meth_set_cleanup); | ||
| 79 | LCRYPTO_USED(EVP_CIPHER_meth_set_set_asn1_params); | ||
| 80 | LCRYPTO_USED(EVP_CIPHER_meth_set_get_asn1_params); | ||
| 81 | LCRYPTO_USED(EVP_CIPHER_meth_set_ctrl); | ||
| 82 | LCRYPTO_USED(EVP_PKEY_new_raw_private_key); | ||
| 83 | LCRYPTO_USED(EVP_PKEY_new_raw_public_key); | ||
| 84 | LCRYPTO_USED(EVP_PKEY_get_raw_private_key); | ||
| 85 | LCRYPTO_USED(EVP_PKEY_get_raw_public_key); | ||
| 86 | LCRYPTO_USED(EVP_Cipher); | ||
| 87 | LCRYPTO_USED(EVP_MD_CTX_new); | ||
| 88 | LCRYPTO_USED(EVP_MD_CTX_free); | ||
| 89 | LCRYPTO_USED(EVP_MD_CTX_init); | ||
| 90 | LCRYPTO_USED(EVP_MD_CTX_reset); | ||
| 91 | LCRYPTO_USED(EVP_MD_CTX_create); | ||
| 92 | LCRYPTO_USED(EVP_MD_CTX_destroy); | ||
| 93 | LCRYPTO_USED(EVP_MD_CTX_cleanup); | ||
| 94 | LCRYPTO_USED(EVP_MD_CTX_copy_ex); | ||
| 95 | LCRYPTO_USED(EVP_MD_CTX_set_flags); | ||
| 96 | LCRYPTO_USED(EVP_MD_CTX_clear_flags); | ||
| 97 | LCRYPTO_USED(EVP_MD_CTX_ctrl); | ||
| 98 | LCRYPTO_USED(EVP_MD_CTX_test_flags); | ||
| 99 | LCRYPTO_USED(EVP_DigestInit_ex); | ||
| 100 | LCRYPTO_USED(EVP_DigestUpdate); | ||
| 101 | LCRYPTO_USED(EVP_DigestFinal_ex); | ||
| 102 | LCRYPTO_USED(EVP_Digest); | ||
| 103 | LCRYPTO_USED(EVP_MD_CTX_copy); | ||
| 104 | LCRYPTO_USED(EVP_DigestInit); | ||
| 105 | LCRYPTO_USED(EVP_DigestFinal); | ||
| 106 | LCRYPTO_USED(EVP_read_pw_string); | ||
| 107 | LCRYPTO_USED(EVP_read_pw_string_min); | ||
| 108 | LCRYPTO_USED(EVP_set_pw_prompt); | ||
| 109 | LCRYPTO_USED(EVP_get_pw_prompt); | ||
| 110 | LCRYPTO_USED(EVP_BytesToKey); | ||
| 111 | LCRYPTO_USED(EVP_CIPHER_CTX_set_flags); | ||
| 112 | LCRYPTO_USED(EVP_CIPHER_CTX_clear_flags); | ||
| 113 | LCRYPTO_USED(EVP_CIPHER_CTX_test_flags); | ||
| 114 | LCRYPTO_USED(EVP_EncryptInit); | ||
| 115 | LCRYPTO_USED(EVP_EncryptInit_ex); | ||
| 116 | LCRYPTO_USED(EVP_EncryptUpdate); | ||
| 117 | LCRYPTO_USED(EVP_EncryptFinal_ex); | ||
| 118 | LCRYPTO_USED(EVP_EncryptFinal); | ||
| 119 | LCRYPTO_USED(EVP_DecryptInit); | ||
| 120 | LCRYPTO_USED(EVP_DecryptInit_ex); | ||
| 121 | LCRYPTO_USED(EVP_DecryptUpdate); | ||
| 122 | LCRYPTO_USED(EVP_DecryptFinal_ex); | ||
| 123 | LCRYPTO_USED(EVP_DecryptFinal); | ||
| 124 | LCRYPTO_USED(EVP_CipherInit); | ||
| 125 | LCRYPTO_USED(EVP_CipherInit_ex); | ||
| 126 | LCRYPTO_USED(EVP_CipherUpdate); | ||
| 127 | LCRYPTO_USED(EVP_CipherFinal_ex); | ||
| 128 | LCRYPTO_USED(EVP_CipherFinal); | ||
| 129 | LCRYPTO_USED(EVP_SignFinal); | ||
| 130 | LCRYPTO_USED(EVP_VerifyFinal); | ||
| 131 | LCRYPTO_USED(EVP_DigestSignInit); | ||
| 132 | LCRYPTO_USED(EVP_DigestSignFinal); | ||
| 133 | LCRYPTO_USED(EVP_DigestSign); | ||
| 134 | LCRYPTO_USED(EVP_DigestVerifyInit); | ||
| 135 | LCRYPTO_USED(EVP_DigestVerifyFinal); | ||
| 136 | LCRYPTO_USED(EVP_DigestVerify); | ||
| 137 | LCRYPTO_USED(EVP_OpenInit); | ||
| 138 | LCRYPTO_USED(EVP_OpenFinal); | ||
| 139 | LCRYPTO_USED(EVP_SealInit); | ||
| 140 | LCRYPTO_USED(EVP_SealFinal); | ||
| 141 | LCRYPTO_USED(EVP_ENCODE_CTX_new); | ||
| 142 | LCRYPTO_USED(EVP_ENCODE_CTX_free); | ||
| 143 | LCRYPTO_USED(EVP_EncodeInit); | ||
| 144 | LCRYPTO_USED(EVP_EncodeUpdate); | ||
| 145 | LCRYPTO_USED(EVP_EncodeFinal); | ||
| 146 | LCRYPTO_USED(EVP_EncodeBlock); | ||
| 147 | LCRYPTO_USED(EVP_DecodeInit); | ||
| 148 | LCRYPTO_USED(EVP_DecodeUpdate); | ||
| 149 | LCRYPTO_USED(EVP_DecodeFinal); | ||
| 150 | LCRYPTO_USED(EVP_DecodeBlock); | ||
| 151 | LCRYPTO_USED(EVP_CIPHER_CTX_init); | ||
| 152 | LCRYPTO_USED(EVP_CIPHER_CTX_cleanup); | ||
| 153 | LCRYPTO_USED(EVP_CIPHER_CTX_new); | ||
| 154 | LCRYPTO_USED(EVP_CIPHER_CTX_free); | ||
| 155 | LCRYPTO_USED(EVP_CIPHER_CTX_reset); | ||
| 156 | LCRYPTO_USED(EVP_CIPHER_CTX_set_key_length); | ||
| 157 | LCRYPTO_USED(EVP_CIPHER_CTX_set_padding); | ||
| 158 | LCRYPTO_USED(EVP_CIPHER_CTX_ctrl); | ||
| 159 | LCRYPTO_USED(EVP_CIPHER_CTX_rand_key); | ||
| 160 | LCRYPTO_USED(BIO_f_md); | ||
| 161 | LCRYPTO_USED(BIO_f_base64); | ||
| 162 | LCRYPTO_USED(BIO_f_cipher); | ||
| 163 | LCRYPTO_USED(BIO_set_cipher); | ||
| 164 | LCRYPTO_USED(EVP_md_null); | ||
| 165 | LCRYPTO_USED(EVP_md4); | ||
| 166 | LCRYPTO_USED(EVP_md5); | ||
| 167 | LCRYPTO_USED(EVP_md5_sha1); | ||
| 168 | LCRYPTO_USED(EVP_sha1); | ||
| 169 | LCRYPTO_USED(EVP_sha224); | ||
| 170 | LCRYPTO_USED(EVP_sha256); | ||
| 171 | LCRYPTO_USED(EVP_sha384); | ||
| 172 | LCRYPTO_USED(EVP_sha512); | ||
| 173 | LCRYPTO_USED(EVP_sha512_224); | ||
| 174 | LCRYPTO_USED(EVP_sha512_256); | ||
| 175 | LCRYPTO_USED(EVP_sha3_224); | ||
| 176 | LCRYPTO_USED(EVP_sha3_256); | ||
| 177 | LCRYPTO_USED(EVP_sha3_384); | ||
| 178 | LCRYPTO_USED(EVP_sha3_512); | ||
| 179 | LCRYPTO_USED(EVP_sm3); | ||
| 180 | LCRYPTO_USED(EVP_ripemd160); | ||
| 181 | LCRYPTO_USED(EVP_whirlpool); | ||
| 182 | LCRYPTO_USED(EVP_gostr341194); | ||
| 183 | LCRYPTO_USED(EVP_gost2814789imit); | ||
| 184 | LCRYPTO_USED(EVP_streebog256); | ||
| 185 | LCRYPTO_USED(EVP_streebog512); | ||
| 186 | LCRYPTO_USED(EVP_enc_null); | ||
| 187 | LCRYPTO_USED(EVP_des_ecb); | ||
| 188 | LCRYPTO_USED(EVP_des_ede); | ||
| 189 | LCRYPTO_USED(EVP_des_ede3); | ||
| 190 | LCRYPTO_USED(EVP_des_ede_ecb); | ||
| 191 | LCRYPTO_USED(EVP_des_ede3_ecb); | ||
| 192 | LCRYPTO_USED(EVP_des_cfb64); | ||
| 193 | LCRYPTO_USED(EVP_des_cfb1); | ||
| 194 | LCRYPTO_USED(EVP_des_cfb8); | ||
| 195 | LCRYPTO_USED(EVP_des_ede_cfb64); | ||
| 196 | LCRYPTO_USED(EVP_des_ede3_cfb64); | ||
| 197 | LCRYPTO_USED(EVP_des_ede3_cfb1); | ||
| 198 | LCRYPTO_USED(EVP_des_ede3_cfb8); | ||
| 199 | LCRYPTO_USED(EVP_des_ofb); | ||
| 200 | LCRYPTO_USED(EVP_des_ede_ofb); | ||
| 201 | LCRYPTO_USED(EVP_des_ede3_ofb); | ||
| 202 | LCRYPTO_USED(EVP_des_cbc); | ||
| 203 | LCRYPTO_USED(EVP_des_ede_cbc); | ||
| 204 | LCRYPTO_USED(EVP_des_ede3_cbc); | ||
| 205 | LCRYPTO_USED(EVP_desx_cbc); | ||
| 206 | LCRYPTO_USED(EVP_rc4); | ||
| 207 | LCRYPTO_USED(EVP_rc4_40); | ||
| 208 | LCRYPTO_USED(EVP_rc4_hmac_md5); | ||
| 209 | LCRYPTO_USED(EVP_idea_ecb); | ||
| 210 | LCRYPTO_USED(EVP_idea_cfb64); | ||
| 211 | LCRYPTO_USED(EVP_idea_ofb); | ||
| 212 | LCRYPTO_USED(EVP_idea_cbc); | ||
| 213 | LCRYPTO_USED(EVP_rc2_ecb); | ||
| 214 | LCRYPTO_USED(EVP_rc2_cbc); | ||
| 215 | LCRYPTO_USED(EVP_rc2_40_cbc); | ||
| 216 | LCRYPTO_USED(EVP_rc2_64_cbc); | ||
| 217 | LCRYPTO_USED(EVP_rc2_cfb64); | ||
| 218 | LCRYPTO_USED(EVP_rc2_ofb); | ||
| 219 | LCRYPTO_USED(EVP_bf_ecb); | ||
| 220 | LCRYPTO_USED(EVP_bf_cbc); | ||
| 221 | LCRYPTO_USED(EVP_bf_cfb64); | ||
| 222 | LCRYPTO_USED(EVP_bf_ofb); | ||
| 223 | LCRYPTO_USED(EVP_cast5_ecb); | ||
| 224 | LCRYPTO_USED(EVP_cast5_cbc); | ||
| 225 | LCRYPTO_USED(EVP_cast5_cfb64); | ||
| 226 | LCRYPTO_USED(EVP_cast5_ofb); | ||
| 227 | LCRYPTO_USED(EVP_aes_128_ecb); | ||
| 228 | LCRYPTO_USED(EVP_aes_128_cbc); | ||
| 229 | LCRYPTO_USED(EVP_aes_128_cfb1); | ||
| 230 | LCRYPTO_USED(EVP_aes_128_cfb8); | ||
| 231 | LCRYPTO_USED(EVP_aes_128_cfb128); | ||
| 232 | LCRYPTO_USED(EVP_aes_128_ofb); | ||
| 233 | LCRYPTO_USED(EVP_aes_128_ctr); | ||
| 234 | LCRYPTO_USED(EVP_aes_128_ccm); | ||
| 235 | LCRYPTO_USED(EVP_aes_128_gcm); | ||
| 236 | LCRYPTO_USED(EVP_aes_128_wrap); | ||
| 237 | LCRYPTO_USED(EVP_aes_128_xts); | ||
| 238 | LCRYPTO_USED(EVP_aes_192_ecb); | ||
| 239 | LCRYPTO_USED(EVP_aes_192_cbc); | ||
| 240 | LCRYPTO_USED(EVP_aes_192_cfb1); | ||
| 241 | LCRYPTO_USED(EVP_aes_192_cfb8); | ||
| 242 | LCRYPTO_USED(EVP_aes_192_cfb128); | ||
| 243 | LCRYPTO_USED(EVP_aes_192_ofb); | ||
| 244 | LCRYPTO_USED(EVP_aes_192_ctr); | ||
| 245 | LCRYPTO_USED(EVP_aes_192_ccm); | ||
| 246 | LCRYPTO_USED(EVP_aes_192_gcm); | ||
| 247 | LCRYPTO_USED(EVP_aes_192_wrap); | ||
| 248 | LCRYPTO_USED(EVP_aes_256_ecb); | ||
| 249 | LCRYPTO_USED(EVP_aes_256_cbc); | ||
| 250 | LCRYPTO_USED(EVP_aes_256_cfb1); | ||
| 251 | LCRYPTO_USED(EVP_aes_256_cfb8); | ||
| 252 | LCRYPTO_USED(EVP_aes_256_cfb128); | ||
| 253 | LCRYPTO_USED(EVP_aes_256_ofb); | ||
| 254 | LCRYPTO_USED(EVP_aes_256_ctr); | ||
| 255 | LCRYPTO_USED(EVP_aes_256_ccm); | ||
| 256 | LCRYPTO_USED(EVP_aes_256_gcm); | ||
| 257 | LCRYPTO_USED(EVP_aes_256_wrap); | ||
| 258 | LCRYPTO_USED(EVP_aes_256_xts); | ||
| 259 | LCRYPTO_USED(EVP_chacha20_poly1305); | ||
| 260 | LCRYPTO_USED(EVP_aes_128_cbc_hmac_sha1); | ||
| 261 | LCRYPTO_USED(EVP_aes_256_cbc_hmac_sha1); | ||
| 262 | LCRYPTO_USED(EVP_camellia_128_ecb); | ||
| 263 | LCRYPTO_USED(EVP_camellia_128_cbc); | ||
| 264 | LCRYPTO_USED(EVP_camellia_128_cfb1); | ||
| 265 | LCRYPTO_USED(EVP_camellia_128_cfb8); | ||
| 266 | LCRYPTO_USED(EVP_camellia_128_cfb128); | ||
| 267 | LCRYPTO_USED(EVP_camellia_128_ofb); | ||
| 268 | LCRYPTO_USED(EVP_camellia_192_ecb); | ||
| 269 | LCRYPTO_USED(EVP_camellia_192_cbc); | ||
| 270 | LCRYPTO_USED(EVP_camellia_192_cfb1); | ||
| 271 | LCRYPTO_USED(EVP_camellia_192_cfb8); | ||
| 272 | LCRYPTO_USED(EVP_camellia_192_cfb128); | ||
| 273 | LCRYPTO_USED(EVP_camellia_192_ofb); | ||
| 274 | LCRYPTO_USED(EVP_camellia_256_ecb); | ||
| 275 | LCRYPTO_USED(EVP_camellia_256_cbc); | ||
| 276 | LCRYPTO_USED(EVP_camellia_256_cfb1); | ||
| 277 | LCRYPTO_USED(EVP_camellia_256_cfb8); | ||
| 278 | LCRYPTO_USED(EVP_camellia_256_cfb128); | ||
| 279 | LCRYPTO_USED(EVP_camellia_256_ofb); | ||
| 280 | LCRYPTO_USED(EVP_chacha20); | ||
| 281 | LCRYPTO_USED(EVP_gost2814789_ecb); | ||
| 282 | LCRYPTO_USED(EVP_gost2814789_cfb64); | ||
| 283 | LCRYPTO_USED(EVP_gost2814789_cnt); | ||
| 284 | LCRYPTO_USED(EVP_sm4_ecb); | ||
| 285 | LCRYPTO_USED(EVP_sm4_cbc); | ||
| 286 | LCRYPTO_USED(EVP_sm4_cfb128); | ||
| 287 | LCRYPTO_USED(EVP_sm4_ofb); | ||
| 288 | LCRYPTO_USED(EVP_sm4_ctr); | ||
| 289 | LCRYPTO_USED(OPENSSL_add_all_algorithms_noconf); | ||
| 290 | LCRYPTO_USED(OPENSSL_add_all_algorithms_conf); | ||
| 291 | LCRYPTO_USED(OpenSSL_add_all_ciphers); | ||
| 292 | LCRYPTO_USED(OpenSSL_add_all_digests); | ||
| 293 | LCRYPTO_USED(EVP_add_cipher); | ||
| 294 | LCRYPTO_USED(EVP_add_digest); | ||
| 295 | LCRYPTO_USED(EVP_get_cipherbyname); | ||
| 296 | LCRYPTO_USED(EVP_get_digestbyname); | ||
| 297 | LCRYPTO_USED(EVP_cleanup); | ||
| 298 | LCRYPTO_USED(EVP_CIPHER_do_all); | ||
| 299 | LCRYPTO_USED(EVP_CIPHER_do_all_sorted); | ||
| 300 | LCRYPTO_USED(EVP_MD_do_all); | ||
| 301 | LCRYPTO_USED(EVP_MD_do_all_sorted); | ||
| 302 | LCRYPTO_USED(EVP_PKEY_decrypt_old); | ||
| 303 | LCRYPTO_USED(EVP_PKEY_encrypt_old); | ||
| 304 | LCRYPTO_USED(EVP_PKEY_type); | ||
| 305 | LCRYPTO_USED(EVP_PKEY_id); | ||
| 306 | LCRYPTO_USED(EVP_PKEY_base_id); | ||
| 307 | LCRYPTO_USED(EVP_PKEY_bits); | ||
| 308 | LCRYPTO_USED(EVP_PKEY_security_bits); | ||
| 309 | LCRYPTO_USED(EVP_PKEY_size); | ||
| 310 | LCRYPTO_USED(EVP_PKEY_set_type); | ||
| 311 | LCRYPTO_USED(EVP_PKEY_set_type_str); | ||
| 312 | LCRYPTO_USED(EVP_PKEY_assign); | ||
| 313 | LCRYPTO_USED(EVP_PKEY_get0); | ||
| 314 | LCRYPTO_USED(EVP_PKEY_get0_hmac); | ||
| 315 | LCRYPTO_USED(EVP_PKEY_get0_RSA); | ||
| 316 | LCRYPTO_USED(EVP_PKEY_get1_RSA); | ||
| 317 | LCRYPTO_USED(EVP_PKEY_set1_RSA); | ||
| 318 | LCRYPTO_USED(EVP_PKEY_get0_DSA); | ||
| 319 | LCRYPTO_USED(EVP_PKEY_get1_DSA); | ||
| 320 | LCRYPTO_USED(EVP_PKEY_set1_DSA); | ||
| 321 | LCRYPTO_USED(EVP_PKEY_get0_DH); | ||
| 322 | LCRYPTO_USED(EVP_PKEY_get1_DH); | ||
| 323 | LCRYPTO_USED(EVP_PKEY_set1_DH); | ||
| 324 | LCRYPTO_USED(EVP_PKEY_get0_EC_KEY); | ||
| 325 | LCRYPTO_USED(EVP_PKEY_get1_EC_KEY); | ||
| 326 | LCRYPTO_USED(EVP_PKEY_set1_EC_KEY); | ||
| 327 | LCRYPTO_USED(EVP_PKEY_new); | ||
| 328 | LCRYPTO_USED(EVP_PKEY_free); | ||
| 329 | LCRYPTO_USED(EVP_PKEY_up_ref); | ||
| 330 | LCRYPTO_USED(d2i_PublicKey); | ||
| 331 | LCRYPTO_USED(i2d_PublicKey); | ||
| 332 | LCRYPTO_USED(d2i_PrivateKey); | ||
| 333 | LCRYPTO_USED(d2i_AutoPrivateKey); | ||
| 334 | LCRYPTO_USED(i2d_PrivateKey); | ||
| 335 | LCRYPTO_USED(EVP_PKEY_copy_parameters); | ||
| 336 | LCRYPTO_USED(EVP_PKEY_missing_parameters); | ||
| 337 | LCRYPTO_USED(EVP_PKEY_save_parameters); | ||
| 338 | LCRYPTO_USED(EVP_PKEY_cmp_parameters); | ||
| 339 | LCRYPTO_USED(EVP_PKEY_cmp); | ||
| 340 | LCRYPTO_USED(EVP_PKEY_print_public); | ||
| 341 | LCRYPTO_USED(EVP_PKEY_print_private); | ||
| 342 | LCRYPTO_USED(EVP_PKEY_print_params); | ||
| 343 | LCRYPTO_USED(EVP_PKEY_get_default_digest_nid); | ||
| 344 | LCRYPTO_USED(EVP_CIPHER_type); | ||
| 345 | LCRYPTO_USED(EVP_CIPHER_param_to_asn1); | ||
| 346 | LCRYPTO_USED(EVP_CIPHER_asn1_to_param); | ||
| 347 | LCRYPTO_USED(EVP_CIPHER_set_asn1_iv); | ||
| 348 | LCRYPTO_USED(EVP_CIPHER_get_asn1_iv); | ||
| 349 | LCRYPTO_USED(PKCS5_PBE_keyivgen); | ||
| 350 | LCRYPTO_USED(PKCS5_PBKDF2_HMAC_SHA1); | ||
| 351 | LCRYPTO_USED(PKCS5_PBKDF2_HMAC); | ||
| 352 | LCRYPTO_USED(PKCS5_v2_PBE_keyivgen); | ||
| 353 | LCRYPTO_USED(PKCS5_PBE_add); | ||
| 354 | LCRYPTO_USED(EVP_PBE_CipherInit); | ||
| 355 | LCRYPTO_USED(EVP_PBE_alg_add_type); | ||
| 356 | LCRYPTO_USED(EVP_PBE_alg_add); | ||
| 357 | LCRYPTO_USED(EVP_PBE_find); | ||
| 358 | LCRYPTO_USED(EVP_PBE_cleanup); | ||
| 359 | LCRYPTO_USED(EVP_PKEY_asn1_get_count); | ||
| 360 | LCRYPTO_USED(EVP_PKEY_asn1_get0); | ||
| 361 | LCRYPTO_USED(EVP_PKEY_asn1_find); | ||
| 362 | LCRYPTO_USED(EVP_PKEY_asn1_find_str); | ||
| 363 | LCRYPTO_USED(EVP_PKEY_asn1_add0); | ||
| 364 | LCRYPTO_USED(EVP_PKEY_asn1_add_alias); | ||
| 365 | LCRYPTO_USED(EVP_PKEY_asn1_get0_info); | ||
| 366 | LCRYPTO_USED(EVP_PKEY_get0_asn1); | ||
| 367 | LCRYPTO_USED(EVP_PKEY_asn1_new); | ||
| 368 | LCRYPTO_USED(EVP_PKEY_asn1_copy); | ||
| 369 | LCRYPTO_USED(EVP_PKEY_asn1_free); | ||
| 370 | LCRYPTO_USED(EVP_PKEY_asn1_set_public); | ||
| 371 | LCRYPTO_USED(EVP_PKEY_asn1_set_private); | ||
| 372 | LCRYPTO_USED(EVP_PKEY_asn1_set_param); | ||
| 373 | LCRYPTO_USED(EVP_PKEY_asn1_set_free); | ||
| 374 | LCRYPTO_USED(EVP_PKEY_asn1_set_ctrl); | ||
| 375 | LCRYPTO_USED(EVP_PKEY_asn1_set_security_bits); | ||
| 376 | LCRYPTO_USED(EVP_PKEY_asn1_set_check); | ||
| 377 | LCRYPTO_USED(EVP_PKEY_asn1_set_public_check); | ||
| 378 | LCRYPTO_USED(EVP_PKEY_asn1_set_param_check); | ||
| 379 | LCRYPTO_USED(EVP_PKEY_meth_find); | ||
| 380 | LCRYPTO_USED(EVP_PKEY_meth_new); | ||
| 381 | LCRYPTO_USED(EVP_PKEY_meth_get0_info); | ||
| 382 | LCRYPTO_USED(EVP_PKEY_meth_copy); | ||
| 383 | LCRYPTO_USED(EVP_PKEY_meth_free); | ||
| 384 | LCRYPTO_USED(EVP_PKEY_meth_add0); | ||
| 385 | LCRYPTO_USED(EVP_PKEY_CTX_new); | ||
| 386 | LCRYPTO_USED(EVP_PKEY_CTX_new_id); | ||
| 387 | LCRYPTO_USED(EVP_PKEY_CTX_dup); | ||
| 388 | LCRYPTO_USED(EVP_PKEY_CTX_free); | ||
| 389 | LCRYPTO_USED(EVP_PKEY_CTX_ctrl); | ||
| 390 | LCRYPTO_USED(EVP_PKEY_CTX_ctrl_str); | ||
| 391 | LCRYPTO_USED(EVP_PKEY_CTX_get_operation); | ||
| 392 | LCRYPTO_USED(EVP_PKEY_CTX_set0_keygen_info); | ||
| 393 | LCRYPTO_USED(EVP_PKEY_new_mac_key); | ||
| 394 | LCRYPTO_USED(EVP_PKEY_new_CMAC_key); | ||
| 395 | LCRYPTO_USED(EVP_PKEY_CTX_set_data); | ||
| 396 | LCRYPTO_USED(EVP_PKEY_CTX_get_data); | ||
| 397 | LCRYPTO_USED(EVP_PKEY_CTX_get0_pkey); | ||
| 398 | LCRYPTO_USED(EVP_PKEY_CTX_get0_peerkey); | ||
| 399 | LCRYPTO_USED(EVP_PKEY_CTX_set_app_data); | ||
| 400 | LCRYPTO_USED(EVP_PKEY_CTX_get_app_data); | ||
| 401 | LCRYPTO_USED(EVP_PKEY_sign_init); | ||
| 402 | LCRYPTO_USED(EVP_PKEY_sign); | ||
| 403 | LCRYPTO_USED(EVP_PKEY_verify_init); | ||
| 404 | LCRYPTO_USED(EVP_PKEY_verify); | ||
| 405 | LCRYPTO_USED(EVP_PKEY_verify_recover_init); | ||
| 406 | LCRYPTO_USED(EVP_PKEY_verify_recover); | ||
| 407 | LCRYPTO_USED(EVP_PKEY_encrypt_init); | ||
| 408 | LCRYPTO_USED(EVP_PKEY_encrypt); | ||
| 409 | LCRYPTO_USED(EVP_PKEY_decrypt_init); | ||
| 410 | LCRYPTO_USED(EVP_PKEY_decrypt); | ||
| 411 | LCRYPTO_USED(EVP_PKEY_derive_init); | ||
| 412 | LCRYPTO_USED(EVP_PKEY_derive_set_peer); | ||
| 413 | LCRYPTO_USED(EVP_PKEY_derive); | ||
| 414 | LCRYPTO_USED(EVP_PKEY_paramgen_init); | ||
| 415 | LCRYPTO_USED(EVP_PKEY_paramgen); | ||
| 416 | LCRYPTO_USED(EVP_PKEY_keygen_init); | ||
| 417 | LCRYPTO_USED(EVP_PKEY_keygen); | ||
| 418 | LCRYPTO_USED(EVP_PKEY_check); | ||
| 419 | LCRYPTO_USED(EVP_PKEY_public_check); | ||
| 420 | LCRYPTO_USED(EVP_PKEY_param_check); | ||
| 421 | LCRYPTO_USED(EVP_PKEY_CTX_set_cb); | ||
| 422 | LCRYPTO_USED(EVP_PKEY_CTX_get_cb); | ||
| 423 | LCRYPTO_USED(EVP_PKEY_CTX_get_keygen_info); | ||
| 424 | LCRYPTO_USED(EVP_PKEY_meth_set_init); | ||
| 425 | LCRYPTO_USED(EVP_PKEY_meth_set_copy); | ||
| 426 | LCRYPTO_USED(EVP_PKEY_meth_set_cleanup); | ||
| 427 | LCRYPTO_USED(EVP_PKEY_meth_set_paramgen); | ||
| 428 | LCRYPTO_USED(EVP_PKEY_meth_set_keygen); | ||
| 429 | LCRYPTO_USED(EVP_PKEY_meth_set_sign); | ||
| 430 | LCRYPTO_USED(EVP_PKEY_meth_set_verify); | ||
| 431 | LCRYPTO_USED(EVP_PKEY_meth_set_verify_recover); | ||
| 432 | LCRYPTO_USED(EVP_PKEY_meth_set_signctx); | ||
| 433 | LCRYPTO_USED(EVP_PKEY_meth_set_verifyctx); | ||
| 434 | LCRYPTO_USED(EVP_PKEY_meth_set_encrypt); | ||
| 435 | LCRYPTO_USED(EVP_PKEY_meth_set_decrypt); | ||
| 436 | LCRYPTO_USED(EVP_PKEY_meth_set_derive); | ||
| 437 | LCRYPTO_USED(EVP_PKEY_meth_set_ctrl); | ||
| 438 | LCRYPTO_USED(EVP_PKEY_meth_set_check); | ||
| 439 | LCRYPTO_USED(EVP_PKEY_meth_set_public_check); | ||
| 440 | LCRYPTO_USED(EVP_PKEY_meth_set_param_check); | ||
| 441 | LCRYPTO_USED(EVP_aead_aes_128_gcm); | ||
| 442 | LCRYPTO_USED(EVP_aead_aes_256_gcm); | ||
| 443 | LCRYPTO_USED(EVP_aead_chacha20_poly1305); | ||
| 444 | LCRYPTO_USED(EVP_aead_xchacha20_poly1305); | ||
| 445 | LCRYPTO_USED(EVP_AEAD_key_length); | ||
| 446 | LCRYPTO_USED(EVP_AEAD_nonce_length); | ||
| 447 | LCRYPTO_USED(EVP_AEAD_max_overhead); | ||
| 448 | LCRYPTO_USED(EVP_AEAD_max_tag_len); | ||
| 449 | LCRYPTO_USED(EVP_AEAD_CTX_new); | ||
| 450 | LCRYPTO_USED(EVP_AEAD_CTX_free); | ||
| 451 | LCRYPTO_USED(EVP_AEAD_CTX_init); | ||
| 452 | LCRYPTO_USED(EVP_AEAD_CTX_cleanup); | ||
| 453 | LCRYPTO_USED(EVP_AEAD_CTX_seal); | ||
| 454 | LCRYPTO_USED(EVP_AEAD_CTX_open); | ||
| 455 | LCRYPTO_USED(ERR_load_EVP_strings); | ||
| 456 | |||
| 457 | #endif /* _LIBCRYPTO_EVP_H */ | ||
diff --git a/src/lib/libcrypto/hidden/openssl/hkdf.h b/src/lib/libcrypto/hidden/openssl/hkdf.h index abb1241112..0c01cf3e6b 100644 --- a/src/lib/libcrypto/hidden/openssl/hkdf.h +++ b/src/lib/libcrypto/hidden/openssl/hkdf.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: hkdf.h,v 1.1 2023/07/07 13:53:52 beck Exp $ */ | 1 | /* $OpenBSD: hkdf.h,v 1.2 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
diff --git a/src/lib/libcrypto/hidden/openssl/lhash.h b/src/lib/libcrypto/hidden/openssl/lhash.h index 6341745322..151f154a47 100644 --- a/src/lib/libcrypto/hidden/openssl/lhash.h +++ b/src/lib/libcrypto/hidden/openssl/lhash.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: lhash.h,v 1.1 2023/07/07 13:40:44 beck Exp $ */ | 1 | /* $OpenBSD: lhash.h,v 1.2 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
diff --git a/src/lib/libcrypto/hidden/openssl/pem.h b/src/lib/libcrypto/hidden/openssl/pem.h index 84be94aef6..5838f07f4d 100644 --- a/src/lib/libcrypto/hidden/openssl/pem.h +++ b/src/lib/libcrypto/hidden/openssl/pem.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: pem.h,v 1.1 2023/07/07 13:40:44 beck Exp $ */ | 1 | /* $OpenBSD: pem.h,v 1.2 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
diff --git a/src/lib/libcrypto/hidden/openssl/poly1305.h b/src/lib/libcrypto/hidden/openssl/poly1305.h index 0959c560ee..7a459cb5a3 100644 --- a/src/lib/libcrypto/hidden/openssl/poly1305.h +++ b/src/lib/libcrypto/hidden/openssl/poly1305.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: poly1305.h,v 1.1 2023/07/07 12:01:32 beck Exp $ */ | 1 | /* $OpenBSD: poly1305.h,v 1.2 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
diff --git a/src/lib/libcrypto/hidden/openssl/rand.h b/src/lib/libcrypto/hidden/openssl/rand.h index 0bec707a8a..d94a1bfd5c 100644 --- a/src/lib/libcrypto/hidden/openssl/rand.h +++ b/src/lib/libcrypto/hidden/openssl/rand.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: rand.h,v 1.1 2023/07/07 12:01:32 beck Exp $ */ | 1 | /* $OpenBSD: rand.h,v 1.2 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
| @@ -29,16 +29,6 @@ LCRYPTO_USED(RAND_set_rand_method); | |||
| 29 | LCRYPTO_USED(RAND_get_rand_method); | 29 | LCRYPTO_USED(RAND_get_rand_method); |
| 30 | LCRYPTO_USED(RAND_set_rand_engine); | 30 | LCRYPTO_USED(RAND_set_rand_engine); |
| 31 | LCRYPTO_USED(RAND_SSLeay); | 31 | LCRYPTO_USED(RAND_SSLeay); |
| 32 | LCRYPTO_USED(RAND_cleanup); | ||
| 33 | LCRYPTO_USED(RAND_bytes); | ||
| 34 | LCRYPTO_USED(RAND_pseudo_bytes); | ||
| 35 | LCRYPTO_USED(RAND_seed); | ||
| 36 | LCRYPTO_USED(RAND_add); | ||
| 37 | LCRYPTO_USED(RAND_load_file); | ||
| 38 | LCRYPTO_USED(RAND_write_file); | ||
| 39 | LCRYPTO_USED(RAND_file_name); | ||
| 40 | LCRYPTO_USED(RAND_status); | ||
| 41 | LCRYPTO_USED(RAND_poll); | ||
| 42 | LCRYPTO_USED(ERR_load_RAND_strings); | 32 | LCRYPTO_USED(ERR_load_RAND_strings); |
| 43 | 33 | ||
| 44 | #endif /* _LIBCRYPTO_RAND_H */ | 34 | #endif /* _LIBCRYPTO_RAND_H */ |
diff --git a/src/lib/libcrypto/hidden/openssl/sm3.h b/src/lib/libcrypto/hidden/openssl/sm3.h deleted file mode 100644 index 3d0a4cd269..0000000000 --- a/src/lib/libcrypto/hidden/openssl/sm3.h +++ /dev/null | |||
| @@ -1,32 +0,0 @@ | |||
| 1 | /* $OpenBSD: sm3.h,v 1.1 2023/07/07 12:01:32 beck Exp $ */ | ||
| 2 | /* | ||
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | ||
| 4 | * | ||
| 5 | * Permission to use, copy, modify, and distribute this software for any | ||
| 6 | * purpose with or without fee is hereby granted, provided that the above | ||
| 7 | * copyright notice and this permission notice appear in all copies. | ||
| 8 | * | ||
| 9 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
| 10 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
| 11 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
| 12 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
| 13 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
| 14 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
| 15 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
| 16 | */ | ||
| 17 | |||
| 18 | #ifndef _LIBCRYPTO_SM3_H | ||
| 19 | #define _LIBCRYPTO_SM3_H | ||
| 20 | |||
| 21 | #ifndef _MSC_VER | ||
| 22 | #include_next <openssl/sm3.h> | ||
| 23 | #else | ||
| 24 | #include "../include/openssl/sm3.h" | ||
| 25 | #endif | ||
| 26 | #include "crypto_namespace.h" | ||
| 27 | |||
| 28 | LCRYPTO_USED(SM3_Init); | ||
| 29 | LCRYPTO_USED(SM3_Update); | ||
| 30 | LCRYPTO_USED(SM3_Final); | ||
| 31 | |||
| 32 | #endif /* _LIBCRYPTO_SM3_H */ | ||
diff --git a/src/lib/libcrypto/hidden/openssl/sm4.h b/src/lib/libcrypto/hidden/openssl/sm4.h index cccb3cecbc..1b80e5cbc6 100644 --- a/src/lib/libcrypto/hidden/openssl/sm4.h +++ b/src/lib/libcrypto/hidden/openssl/sm4.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: sm4.h,v 1.1 2023/07/07 12:01:32 beck Exp $ */ | 1 | /* $OpenBSD: sm4.h,v 1.2 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
diff --git a/src/lib/libcrypto/hidden/openssl/ts.h b/src/lib/libcrypto/hidden/openssl/ts.h index de336ef93b..638f72f2f1 100644 --- a/src/lib/libcrypto/hidden/openssl/ts.h +++ b/src/lib/libcrypto/hidden/openssl/ts.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ts.h,v 1.1 2023/07/07 07:25:21 beck Exp $ */ | 1 | /* $OpenBSD: ts.h,v 1.2 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2023 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
diff --git a/src/lib/libcrypto/rand/rand_lib.c b/src/lib/libcrypto/rand/rand_lib.c index b51db8acf6..5c5df98c98 100644 --- a/src/lib/libcrypto/rand/rand_lib.c +++ b/src/lib/libcrypto/rand/rand_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: rand_lib.c,v 1.21 2023/07/07 12:01:32 beck Exp $ */ | 1 | /* $OpenBSD: rand_lib.c,v 1.22 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2014 Ted Unangst <tedu@openbsd.org> | 3 | * Copyright (c) 2014 Ted Unangst <tedu@openbsd.org> |
| 4 | * | 4 | * |
| @@ -59,35 +59,30 @@ RAND_cleanup(void) | |||
| 59 | { | 59 | { |
| 60 | 60 | ||
| 61 | } | 61 | } |
| 62 | LCRYPTO_ALIAS(RAND_cleanup); | ||
| 63 | 62 | ||
| 64 | void | 63 | void |
| 65 | RAND_seed(const void *buf, int num) | 64 | RAND_seed(const void *buf, int num) |
| 66 | { | 65 | { |
| 67 | 66 | ||
| 68 | } | 67 | } |
| 69 | LCRYPTO_ALIAS(RAND_seed); | ||
| 70 | 68 | ||
| 71 | void | 69 | void |
| 72 | RAND_add(const void *buf, int num, double entropy) | 70 | RAND_add(const void *buf, int num, double entropy) |
| 73 | { | 71 | { |
| 74 | 72 | ||
| 75 | } | 73 | } |
| 76 | LCRYPTO_ALIAS(RAND_add); | ||
| 77 | 74 | ||
| 78 | int | 75 | int |
| 79 | RAND_status(void) | 76 | RAND_status(void) |
| 80 | { | 77 | { |
| 81 | return 1; | 78 | return 1; |
| 82 | } | 79 | } |
| 83 | LCRYPTO_ALIAS(RAND_status); | ||
| 84 | 80 | ||
| 85 | int | 81 | int |
| 86 | RAND_poll(void) | 82 | RAND_poll(void) |
| 87 | { | 83 | { |
| 88 | return 1; | 84 | return 1; |
| 89 | } | 85 | } |
| 90 | LCRYPTO_ALIAS(RAND_poll); | ||
| 91 | 86 | ||
| 92 | /* | 87 | /* |
| 93 | * Hurray. You've made it to the good parts. | 88 | * Hurray. You've made it to the good parts. |
| @@ -99,7 +94,6 @@ RAND_bytes(unsigned char *buf, int num) | |||
| 99 | arc4random_buf(buf, num); | 94 | arc4random_buf(buf, num); |
| 100 | return 1; | 95 | return 1; |
| 101 | } | 96 | } |
| 102 | LCRYPTO_ALIAS(RAND_bytes); | ||
| 103 | 97 | ||
| 104 | int | 98 | int |
| 105 | RAND_pseudo_bytes(unsigned char *buf, int num) | 99 | RAND_pseudo_bytes(unsigned char *buf, int num) |
| @@ -108,4 +102,3 @@ RAND_pseudo_bytes(unsigned char *buf, int num) | |||
| 108 | arc4random_buf(buf, num); | 102 | arc4random_buf(buf, num); |
| 109 | return 1; | 103 | return 1; |
| 110 | } | 104 | } |
| 111 | LCRYPTO_ALIAS(RAND_pseudo_bytes); | ||
diff --git a/src/lib/libcrypto/rand/randfile.c b/src/lib/libcrypto/rand/randfile.c index 7384a65791..00008af755 100644 --- a/src/lib/libcrypto/rand/randfile.c +++ b/src/lib/libcrypto/rand/randfile.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: randfile.c,v 1.43 2023/07/07 12:01:32 beck Exp $ */ | 1 | /* $OpenBSD: randfile.c,v 1.44 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -85,7 +85,6 @@ RAND_load_file(const char *file, long bytes) | |||
| 85 | else | 85 | else |
| 86 | return bytes; | 86 | return bytes; |
| 87 | } | 87 | } |
| 88 | LCRYPTO_ALIAS(RAND_load_file); | ||
| 89 | 88 | ||
| 90 | int | 89 | int |
| 91 | RAND_write_file(const char *file) | 90 | RAND_write_file(const char *file) |
| @@ -134,7 +133,6 @@ RAND_write_file(const char *file) | |||
| 134 | explicit_bzero(buf, BUFSIZE); | 133 | explicit_bzero(buf, BUFSIZE); |
| 135 | return ret; | 134 | return ret; |
| 136 | } | 135 | } |
| 137 | LCRYPTO_ALIAS(RAND_write_file); | ||
| 138 | 136 | ||
| 139 | const char * | 137 | const char * |
| 140 | RAND_file_name(char * buf, size_t size) | 138 | RAND_file_name(char * buf, size_t size) |
| @@ -143,4 +141,3 @@ RAND_file_name(char * buf, size_t size) | |||
| 143 | return (NULL); | 141 | return (NULL); |
| 144 | return buf; | 142 | return buf; |
| 145 | } | 143 | } |
| 146 | LCRYPTO_ALIAS(RAND_file_name); | ||
diff --git a/src/lib/libcrypto/sm3/sm3.c b/src/lib/libcrypto/sm3/sm3.c index 039a92201b..df4a4e8229 100644 --- a/src/lib/libcrypto/sm3/sm3.c +++ b/src/lib/libcrypto/sm3/sm3.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: sm3.c,v 1.3 2023/07/07 12:01:32 beck Exp $ */ | 1 | /* $OpenBSD: sm3.c,v 1.4 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2018, Ribose Inc | 3 | * Copyright (c) 2018, Ribose Inc |
| 4 | * | 4 | * |
| @@ -35,7 +35,6 @@ SM3_Init(SM3_CTX *c) | |||
| 35 | c->H = SM3_H; | 35 | c->H = SM3_H; |
| 36 | return 1; | 36 | return 1; |
| 37 | } | 37 | } |
| 38 | LCRYPTO_ALIAS(SM3_Init); | ||
| 39 | 38 | ||
| 40 | void | 39 | void |
| 41 | SM3_block_data_order(SM3_CTX *ctx, const void *p, size_t num) | 40 | SM3_block_data_order(SM3_CTX *ctx, const void *p, size_t num) |
diff --git a/src/lib/libcrypto/ts/ts_req_utils.c b/src/lib/libcrypto/ts/ts_req_utils.c index f331219373..d679418060 100644 --- a/src/lib/libcrypto/ts/ts_req_utils.c +++ b/src/lib/libcrypto/ts/ts_req_utils.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ts_req_utils.c,v 1.8 2023/07/07 07:25:21 beck Exp $ */ | 1 | /* $OpenBSD: ts_req_utils.c,v 1.9 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Written by Zoltan Glozik (zglozik@stones.com) for the OpenSSL | 2 | /* Written by Zoltan Glozik (zglozik@stones.com) for the OpenSSL |
| 3 | * project 2002. | 3 | * project 2002. |
| 4 | */ | 4 | */ |
| @@ -212,6 +212,7 @@ STACK_OF(X509_EXTENSION) *TS_REQ_get_exts(TS_REQ *a) | |||
| 212 | { | 212 | { |
| 213 | return a->extensions; | 213 | return a->extensions; |
| 214 | } | 214 | } |
| 215 | LCRYPTO_ALIAS(TS_REQ_get_exts); | ||
| 215 | 216 | ||
| 216 | void | 217 | void |
| 217 | TS_REQ_ext_free(TS_REQ *a) | 218 | TS_REQ_ext_free(TS_REQ *a) |
diff --git a/src/lib/libcrypto/ts/ts_rsp_utils.c b/src/lib/libcrypto/ts/ts_rsp_utils.c index 4449c4a94c..34994adce8 100644 --- a/src/lib/libcrypto/ts/ts_rsp_utils.c +++ b/src/lib/libcrypto/ts/ts_rsp_utils.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ts_rsp_utils.c,v 1.10 2023/07/07 07:25:21 beck Exp $ */ | 1 | /* $OpenBSD: ts_rsp_utils.c,v 1.11 2023/07/07 19:37:54 beck Exp $ */ |
| 2 | /* Written by Zoltan Glozik (zglozik@stones.com) for the OpenSSL | 2 | /* Written by Zoltan Glozik (zglozik@stones.com) for the OpenSSL |
| 3 | * project 2002. | 3 | * project 2002. |
| 4 | */ | 4 | */ |
| @@ -434,6 +434,7 @@ STACK_OF(X509_EXTENSION) *TS_TST_INFO_get_exts(TS_TST_INFO *a) | |||
| 434 | { | 434 | { |
| 435 | return a->extensions; | 435 | return a->extensions; |
| 436 | } | 436 | } |
| 437 | LCRYPTO_ALIAS(TS_TST_INFO_get_exts); | ||
| 437 | 438 | ||
| 438 | void | 439 | void |
| 439 | TS_TST_INFO_ext_free(TS_TST_INFO *a) | 440 | TS_TST_INFO_ext_free(TS_TST_INFO *a) |
