diff options
Diffstat (limited to 'src/lib/libcrypto/des/set_key.c')
-rw-r--r-- | src/lib/libcrypto/des/set_key.c | 10 |
1 files changed, 9 insertions, 1 deletions
diff --git a/src/lib/libcrypto/des/set_key.c b/src/lib/libcrypto/des/set_key.c index 8ae40a81cd..0e7aab688c 100644 --- a/src/lib/libcrypto/des/set_key.c +++ b/src/lib/libcrypto/des/set_key.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: set_key.c,v 1.26 2023/12/20 06:30:04 tb Exp $ */ | 1 | /* $OpenBSD: set_key.c,v 1.27 2024/03/29 01:47:29 joshua Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -91,6 +91,7 @@ DES_set_odd_parity(DES_cblock *key) | |||
91 | for (i = 0; i < DES_KEY_SZ; i++) | 91 | for (i = 0; i < DES_KEY_SZ; i++) |
92 | (*key)[i] = odd_parity[(*key)[i]]; | 92 | (*key)[i] = odd_parity[(*key)[i]]; |
93 | } | 93 | } |
94 | LCRYPTO_ALIAS(DES_set_odd_parity); | ||
94 | 95 | ||
95 | int | 96 | int |
96 | DES_check_key_parity(const_DES_cblock *key) | 97 | DES_check_key_parity(const_DES_cblock *key) |
@@ -103,6 +104,7 @@ DES_check_key_parity(const_DES_cblock *key) | |||
103 | } | 104 | } |
104 | return (1); | 105 | return (1); |
105 | } | 106 | } |
107 | LCRYPTO_ALIAS(DES_check_key_parity); | ||
106 | 108 | ||
107 | /* Weak and semi weak keys as taken from | 109 | /* Weak and semi weak keys as taken from |
108 | * %A D.W. Davies | 110 | * %A D.W. Davies |
@@ -145,6 +147,7 @@ DES_is_weak_key(const_DES_cblock *key) | |||
145 | return 1; | 147 | return 1; |
146 | return 0; | 148 | return 0; |
147 | } | 149 | } |
150 | LCRYPTO_ALIAS(DES_is_weak_key); | ||
148 | 151 | ||
149 | /* NOW DEFINED IN des_local.h | 152 | /* NOW DEFINED IN des_local.h |
150 | * See ecb_encrypt.c for a pseudo description of these macros. | 153 | * See ecb_encrypt.c for a pseudo description of these macros. |
@@ -314,6 +317,7 @@ DES_set_key(const_DES_cblock *key, DES_key_schedule *schedule) | |||
314 | return 0; | 317 | return 0; |
315 | } | 318 | } |
316 | } | 319 | } |
320 | LCRYPTO_ALIAS(DES_set_key); | ||
317 | 321 | ||
318 | /* return 0 if key parity is odd (correct), | 322 | /* return 0 if key parity is odd (correct), |
319 | * return -1 if key parity error, | 323 | * return -1 if key parity error, |
@@ -329,6 +333,7 @@ DES_set_key_checked(const_DES_cblock *key, DES_key_schedule *schedule) | |||
329 | DES_set_key_unchecked(key, schedule); | 333 | DES_set_key_unchecked(key, schedule); |
330 | return 0; | 334 | return 0; |
331 | } | 335 | } |
336 | LCRYPTO_ALIAS(DES_set_key_checked); | ||
332 | 337 | ||
333 | void | 338 | void |
334 | DES_set_key_unchecked(const_DES_cblock *key, DES_key_schedule *schedule) | 339 | DES_set_key_unchecked(const_DES_cblock *key, DES_key_schedule *schedule) |
@@ -388,12 +393,14 @@ DES_set_key_unchecked(const_DES_cblock *key, DES_key_schedule *schedule) | |||
388 | *(k++) = ROTATE(t2, 26) & 0xffffffffL; | 393 | *(k++) = ROTATE(t2, 26) & 0xffffffffL; |
389 | } | 394 | } |
390 | } | 395 | } |
396 | LCRYPTO_ALIAS(DES_set_key_unchecked); | ||
391 | 397 | ||
392 | int | 398 | int |
393 | DES_key_sched(const_DES_cblock *key, DES_key_schedule *schedule) | 399 | DES_key_sched(const_DES_cblock *key, DES_key_schedule *schedule) |
394 | { | 400 | { |
395 | return (DES_set_key(key, schedule)); | 401 | return (DES_set_key(key, schedule)); |
396 | } | 402 | } |
403 | LCRYPTO_ALIAS(DES_key_sched); | ||
397 | 404 | ||
398 | int | 405 | int |
399 | DES_random_key(DES_cblock *ret) | 406 | DES_random_key(DES_cblock *ret) |
@@ -404,3 +411,4 @@ DES_random_key(DES_cblock *ret) | |||
404 | } while (DES_is_weak_key(ret)); | 411 | } while (DES_is_weak_key(ret)); |
405 | return (1); | 412 | return (1); |
406 | } | 413 | } |
414 | LCRYPTO_ALIAS(DES_random_key); | ||