diff options
Diffstat (limited to 'src/lib/libcrypto/evp/evp_lib.c')
| -rw-r--r-- | src/lib/libcrypto/evp/evp_lib.c | 55 |
1 files changed, 1 insertions, 54 deletions
diff --git a/src/lib/libcrypto/evp/evp_lib.c b/src/lib/libcrypto/evp/evp_lib.c index d6b929c0e3..24ce1963df 100644 --- a/src/lib/libcrypto/evp/evp_lib.c +++ b/src/lib/libcrypto/evp/evp_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: evp_lib.c,v 1.26 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: evp_lib.c,v 1.27 2023/07/07 19:37:53 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -79,7 +79,6 @@ EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
| 79 | ret = -1; | 79 | ret = -1; |
| 80 | return (ret); | 80 | return (ret); |
| 81 | } | 81 | } |
| 82 | LCRYPTO_ALIAS(EVP_CIPHER_param_to_asn1); | ||
| 83 | 82 | ||
| 84 | int | 83 | int |
| 85 | EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 84 | EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
| @@ -94,7 +93,6 @@ EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
| 94 | ret = -1; | 93 | ret = -1; |
| 95 | return (ret); | 94 | return (ret); |
| 96 | } | 95 | } |
| 97 | LCRYPTO_ALIAS(EVP_CIPHER_asn1_to_param); | ||
| 98 | 96 | ||
| 99 | int | 97 | int |
| 100 | EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 98 | EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
| @@ -116,7 +114,6 @@ EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
| 116 | } | 114 | } |
| 117 | return (i); | 115 | return (i); |
| 118 | } | 116 | } |
| 119 | LCRYPTO_ALIAS(EVP_CIPHER_get_asn1_iv); | ||
| 120 | 117 | ||
| 121 | int | 118 | int |
| 122 | EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 119 | EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
| @@ -134,7 +131,6 @@ EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
| 134 | } | 131 | } |
| 135 | return (i); | 132 | return (i); |
| 136 | } | 133 | } |
| 137 | LCRYPTO_ALIAS(EVP_CIPHER_set_asn1_iv); | ||
| 138 | 134 | ||
| 139 | /* Convert the various cipher NIDs and dummies to a proper OID NID */ | 135 | /* Convert the various cipher NIDs and dummies to a proper OID NID */ |
| 140 | int | 136 | int |
| @@ -188,21 +184,18 @@ EVP_CIPHER_type(const EVP_CIPHER *ctx) | |||
| 188 | return nid; | 184 | return nid; |
| 189 | } | 185 | } |
| 190 | } | 186 | } |
| 191 | LCRYPTO_ALIAS(EVP_CIPHER_type); | ||
| 192 | 187 | ||
| 193 | int | 188 | int |
| 194 | EVP_CIPHER_block_size(const EVP_CIPHER *e) | 189 | EVP_CIPHER_block_size(const EVP_CIPHER *e) |
| 195 | { | 190 | { |
| 196 | return e->block_size; | 191 | return e->block_size; |
| 197 | } | 192 | } |
| 198 | LCRYPTO_ALIAS(EVP_CIPHER_block_size); | ||
| 199 | 193 | ||
| 200 | int | 194 | int |
| 201 | EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx) | 195 | EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx) |
| 202 | { | 196 | { |
| 203 | return ctx->cipher->block_size; | 197 | return ctx->cipher->block_size; |
| 204 | } | 198 | } |
| 205 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_block_size); | ||
| 206 | 199 | ||
| 207 | int | 200 | int |
| 208 | EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, | 201 | EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, |
| @@ -210,56 +203,48 @@ EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, | |||
| 210 | { | 203 | { |
| 211 | return ctx->cipher->do_cipher(ctx, out, in, inl); | 204 | return ctx->cipher->do_cipher(ctx, out, in, inl); |
| 212 | } | 205 | } |
| 213 | LCRYPTO_ALIAS(EVP_Cipher); | ||
| 214 | 206 | ||
| 215 | const EVP_CIPHER * | 207 | const EVP_CIPHER * |
| 216 | EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx) | 208 | EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx) |
| 217 | { | 209 | { |
| 218 | return ctx->cipher; | 210 | return ctx->cipher; |
| 219 | } | 211 | } |
| 220 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_cipher); | ||
| 221 | 212 | ||
| 222 | int | 213 | int |
| 223 | EVP_CIPHER_CTX_encrypting(const EVP_CIPHER_CTX *ctx) | 214 | EVP_CIPHER_CTX_encrypting(const EVP_CIPHER_CTX *ctx) |
| 224 | { | 215 | { |
| 225 | return ctx->encrypt; | 216 | return ctx->encrypt; |
| 226 | } | 217 | } |
| 227 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_encrypting); | ||
| 228 | 218 | ||
| 229 | unsigned long | 219 | unsigned long |
| 230 | EVP_CIPHER_flags(const EVP_CIPHER *cipher) | 220 | EVP_CIPHER_flags(const EVP_CIPHER *cipher) |
| 231 | { | 221 | { |
| 232 | return cipher->flags; | 222 | return cipher->flags; |
| 233 | } | 223 | } |
| 234 | LCRYPTO_ALIAS(EVP_CIPHER_flags); | ||
| 235 | 224 | ||
| 236 | unsigned long | 225 | unsigned long |
| 237 | EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx) | 226 | EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx) |
| 238 | { | 227 | { |
| 239 | return ctx->cipher->flags; | 228 | return ctx->cipher->flags; |
| 240 | } | 229 | } |
| 241 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_flags); | ||
| 242 | 230 | ||
| 243 | void * | 231 | void * |
| 244 | EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx) | 232 | EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx) |
| 245 | { | 233 | { |
| 246 | return ctx->app_data; | 234 | return ctx->app_data; |
| 247 | } | 235 | } |
| 248 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_get_app_data); | ||
| 249 | 236 | ||
| 250 | void | 237 | void |
| 251 | EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data) | 238 | EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data) |
| 252 | { | 239 | { |
| 253 | ctx->app_data = data; | 240 | ctx->app_data = data; |
| 254 | } | 241 | } |
| 255 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_app_data); | ||
| 256 | 242 | ||
| 257 | void * | 243 | void * |
| 258 | EVP_CIPHER_CTX_get_cipher_data(const EVP_CIPHER_CTX *ctx) | 244 | EVP_CIPHER_CTX_get_cipher_data(const EVP_CIPHER_CTX *ctx) |
| 259 | { | 245 | { |
| 260 | return ctx->cipher_data; | 246 | return ctx->cipher_data; |
| 261 | } | 247 | } |
| 262 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_get_cipher_data); | ||
| 263 | 248 | ||
| 264 | void * | 249 | void * |
| 265 | EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) | 250 | EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) |
| @@ -271,56 +256,48 @@ EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) | |||
| 271 | 256 | ||
| 272 | return old_cipher_data; | 257 | return old_cipher_data; |
| 273 | } | 258 | } |
| 274 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_cipher_data); | ||
| 275 | 259 | ||
| 276 | int | 260 | int |
| 277 | EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) | 261 | EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) |
| 278 | { | 262 | { |
| 279 | return cipher->iv_len; | 263 | return cipher->iv_len; |
| 280 | } | 264 | } |
| 281 | LCRYPTO_ALIAS(EVP_CIPHER_iv_length); | ||
| 282 | 265 | ||
| 283 | int | 266 | int |
| 284 | EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx) | 267 | EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx) |
| 285 | { | 268 | { |
| 286 | return ctx->cipher->iv_len; | 269 | return ctx->cipher->iv_len; |
| 287 | } | 270 | } |
| 288 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_iv_length); | ||
| 289 | 271 | ||
| 290 | unsigned char * | 272 | unsigned char * |
| 291 | EVP_CIPHER_CTX_buf_noconst(EVP_CIPHER_CTX *ctx) | 273 | EVP_CIPHER_CTX_buf_noconst(EVP_CIPHER_CTX *ctx) |
| 292 | { | 274 | { |
| 293 | return ctx->buf; | 275 | return ctx->buf; |
| 294 | } | 276 | } |
| 295 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_buf_noconst); | ||
| 296 | 277 | ||
| 297 | int | 278 | int |
| 298 | EVP_CIPHER_key_length(const EVP_CIPHER *cipher) | 279 | EVP_CIPHER_key_length(const EVP_CIPHER *cipher) |
| 299 | { | 280 | { |
| 300 | return cipher->key_len; | 281 | return cipher->key_len; |
| 301 | } | 282 | } |
| 302 | LCRYPTO_ALIAS(EVP_CIPHER_key_length); | ||
| 303 | 283 | ||
| 304 | int | 284 | int |
| 305 | EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx) | 285 | EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx) |
| 306 | { | 286 | { |
| 307 | return ctx->key_len; | 287 | return ctx->key_len; |
| 308 | } | 288 | } |
| 309 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_key_length); | ||
| 310 | 289 | ||
| 311 | int | 290 | int |
| 312 | EVP_CIPHER_nid(const EVP_CIPHER *cipher) | 291 | EVP_CIPHER_nid(const EVP_CIPHER *cipher) |
| 313 | { | 292 | { |
| 314 | return cipher->nid; | 293 | return cipher->nid; |
| 315 | } | 294 | } |
| 316 | LCRYPTO_ALIAS(EVP_CIPHER_nid); | ||
| 317 | 295 | ||
| 318 | int | 296 | int |
| 319 | EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx) | 297 | EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx) |
| 320 | { | 298 | { |
| 321 | return ctx->cipher->nid; | 299 | return ctx->cipher->nid; |
| 322 | } | 300 | } |
| 323 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_nid); | ||
| 324 | 301 | ||
| 325 | int | 302 | int |
| 326 | EVP_CIPHER_CTX_get_iv(const EVP_CIPHER_CTX *ctx, unsigned char *iv, size_t len) | 303 | EVP_CIPHER_CTX_get_iv(const EVP_CIPHER_CTX *ctx, unsigned char *iv, size_t len) |
| @@ -340,7 +317,6 @@ EVP_CIPHER_CTX_get_iv(const EVP_CIPHER_CTX *ctx, unsigned char *iv, size_t len) | |||
| 340 | } | 317 | } |
| 341 | return 1; | 318 | return 1; |
| 342 | } | 319 | } |
| 343 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_get_iv); | ||
| 344 | 320 | ||
| 345 | int | 321 | int |
| 346 | EVP_CIPHER_CTX_set_iv(EVP_CIPHER_CTX *ctx, const unsigned char *iv, size_t len) | 322 | EVP_CIPHER_CTX_set_iv(EVP_CIPHER_CTX *ctx, const unsigned char *iv, size_t len) |
| @@ -360,28 +336,24 @@ EVP_CIPHER_CTX_set_iv(EVP_CIPHER_CTX *ctx, const unsigned char *iv, size_t len) | |||
| 360 | } | 336 | } |
| 361 | return 1; | 337 | return 1; |
| 362 | } | 338 | } |
| 363 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_iv); | ||
| 364 | 339 | ||
| 365 | int | 340 | int |
| 366 | EVP_MD_block_size(const EVP_MD *md) | 341 | EVP_MD_block_size(const EVP_MD *md) |
| 367 | { | 342 | { |
| 368 | return md->block_size; | 343 | return md->block_size; |
| 369 | } | 344 | } |
| 370 | LCRYPTO_ALIAS(EVP_MD_block_size); | ||
| 371 | 345 | ||
| 372 | int | 346 | int |
| 373 | EVP_MD_type(const EVP_MD *md) | 347 | EVP_MD_type(const EVP_MD *md) |
| 374 | { | 348 | { |
| 375 | return md->type; | 349 | return md->type; |
| 376 | } | 350 | } |
| 377 | LCRYPTO_ALIAS(EVP_MD_type); | ||
| 378 | 351 | ||
| 379 | int | 352 | int |
| 380 | EVP_MD_pkey_type(const EVP_MD *md) | 353 | EVP_MD_pkey_type(const EVP_MD *md) |
| 381 | { | 354 | { |
| 382 | return md->pkey_type; | 355 | return md->pkey_type; |
| 383 | } | 356 | } |
| 384 | LCRYPTO_ALIAS(EVP_MD_pkey_type); | ||
| 385 | 357 | ||
| 386 | int | 358 | int |
| 387 | EVP_MD_size(const EVP_MD *md) | 359 | EVP_MD_size(const EVP_MD *md) |
| @@ -392,14 +364,12 @@ EVP_MD_size(const EVP_MD *md) | |||
| 392 | } | 364 | } |
| 393 | return md->md_size; | 365 | return md->md_size; |
| 394 | } | 366 | } |
| 395 | LCRYPTO_ALIAS(EVP_MD_size); | ||
| 396 | 367 | ||
| 397 | unsigned long | 368 | unsigned long |
| 398 | EVP_MD_flags(const EVP_MD *md) | 369 | EVP_MD_flags(const EVP_MD *md) |
| 399 | { | 370 | { |
| 400 | return md->flags; | 371 | return md->flags; |
| 401 | } | 372 | } |
| 402 | LCRYPTO_ALIAS(EVP_MD_flags); | ||
| 403 | 373 | ||
| 404 | EVP_MD * | 374 | EVP_MD * |
| 405 | EVP_MD_meth_new(int md_type, int pkey_type) | 375 | EVP_MD_meth_new(int md_type, int pkey_type) |
| @@ -414,7 +384,6 @@ EVP_MD_meth_new(int md_type, int pkey_type) | |||
| 414 | 384 | ||
| 415 | return md; | 385 | return md; |
| 416 | } | 386 | } |
| 417 | LCRYPTO_ALIAS(EVP_MD_meth_new); | ||
| 418 | 387 | ||
| 419 | EVP_MD * | 388 | EVP_MD * |
| 420 | EVP_MD_meth_dup(const EVP_MD *md) | 389 | EVP_MD_meth_dup(const EVP_MD *md) |
| @@ -428,14 +397,12 @@ EVP_MD_meth_dup(const EVP_MD *md) | |||
| 428 | 397 | ||
| 429 | return to; | 398 | return to; |
| 430 | } | 399 | } |
| 431 | LCRYPTO_ALIAS(EVP_MD_meth_dup); | ||
| 432 | 400 | ||
| 433 | void | 401 | void |
| 434 | EVP_MD_meth_free(EVP_MD *md) | 402 | EVP_MD_meth_free(EVP_MD *md) |
| 435 | { | 403 | { |
| 436 | freezero(md, sizeof(*md)); | 404 | freezero(md, sizeof(*md)); |
| 437 | } | 405 | } |
| 438 | LCRYPTO_ALIAS(EVP_MD_meth_free); | ||
| 439 | 406 | ||
| 440 | int | 407 | int |
| 441 | EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) | 408 | EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) |
| @@ -443,7 +410,6 @@ EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) | |||
| 443 | md->block_size = blocksize; | 410 | md->block_size = blocksize; |
| 444 | return 1; | 411 | return 1; |
| 445 | } | 412 | } |
| 446 | LCRYPTO_ALIAS(EVP_MD_meth_set_input_blocksize); | ||
| 447 | 413 | ||
| 448 | int | 414 | int |
| 449 | EVP_MD_meth_set_result_size(EVP_MD *md, int result_size) | 415 | EVP_MD_meth_set_result_size(EVP_MD *md, int result_size) |
| @@ -451,7 +417,6 @@ EVP_MD_meth_set_result_size(EVP_MD *md, int result_size) | |||
| 451 | md->md_size = result_size; | 417 | md->md_size = result_size; |
| 452 | return 1; | 418 | return 1; |
| 453 | } | 419 | } |
| 454 | LCRYPTO_ALIAS(EVP_MD_meth_set_result_size); | ||
| 455 | 420 | ||
| 456 | int | 421 | int |
| 457 | EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) | 422 | EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) |
| @@ -459,7 +424,6 @@ EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) | |||
| 459 | md->ctx_size = datasize; | 424 | md->ctx_size = datasize; |
| 460 | return 1; | 425 | return 1; |
| 461 | } | 426 | } |
| 462 | LCRYPTO_ALIAS(EVP_MD_meth_set_app_datasize); | ||
| 463 | 427 | ||
| 464 | int | 428 | int |
| 465 | EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) | 429 | EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) |
| @@ -467,7 +431,6 @@ EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) | |||
| 467 | md->flags = flags; | 431 | md->flags = flags; |
| 468 | return 1; | 432 | return 1; |
| 469 | } | 433 | } |
| 470 | LCRYPTO_ALIAS(EVP_MD_meth_set_flags); | ||
| 471 | 434 | ||
| 472 | int | 435 | int |
| 473 | EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) | 436 | EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) |
| @@ -475,7 +438,6 @@ EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) | |||
| 475 | md->init = init; | 438 | md->init = init; |
| 476 | return 1; | 439 | return 1; |
| 477 | } | 440 | } |
| 478 | LCRYPTO_ALIAS(EVP_MD_meth_set_init); | ||
| 479 | 441 | ||
| 480 | int | 442 | int |
| 481 | EVP_MD_meth_set_update(EVP_MD *md, | 443 | EVP_MD_meth_set_update(EVP_MD *md, |
| @@ -484,7 +446,6 @@ EVP_MD_meth_set_update(EVP_MD *md, | |||
| 484 | md->update = update; | 446 | md->update = update; |
| 485 | return 1; | 447 | return 1; |
| 486 | } | 448 | } |
| 487 | LCRYPTO_ALIAS(EVP_MD_meth_set_update); | ||
| 488 | 449 | ||
| 489 | int | 450 | int |
| 490 | EVP_MD_meth_set_final(EVP_MD *md, | 451 | EVP_MD_meth_set_final(EVP_MD *md, |
| @@ -493,7 +454,6 @@ EVP_MD_meth_set_final(EVP_MD *md, | |||
| 493 | md->final = final; | 454 | md->final = final; |
| 494 | return 1; | 455 | return 1; |
| 495 | } | 456 | } |
| 496 | LCRYPTO_ALIAS(EVP_MD_meth_set_final); | ||
| 497 | 457 | ||
| 498 | int | 458 | int |
| 499 | EVP_MD_meth_set_copy(EVP_MD *md, | 459 | EVP_MD_meth_set_copy(EVP_MD *md, |
| @@ -502,7 +462,6 @@ EVP_MD_meth_set_copy(EVP_MD *md, | |||
| 502 | md->copy = copy; | 462 | md->copy = copy; |
| 503 | return 1; | 463 | return 1; |
| 504 | } | 464 | } |
| 505 | LCRYPTO_ALIAS(EVP_MD_meth_set_copy); | ||
| 506 | 465 | ||
| 507 | int | 466 | int |
| 508 | EVP_MD_meth_set_cleanup(EVP_MD *md, | 467 | EVP_MD_meth_set_cleanup(EVP_MD *md, |
| @@ -511,7 +470,6 @@ EVP_MD_meth_set_cleanup(EVP_MD *md, | |||
| 511 | md->cleanup = cleanup; | 470 | md->cleanup = cleanup; |
| 512 | return 1; | 471 | return 1; |
| 513 | } | 472 | } |
| 514 | LCRYPTO_ALIAS(EVP_MD_meth_set_cleanup); | ||
| 515 | 473 | ||
| 516 | int | 474 | int |
| 517 | EVP_MD_meth_set_ctrl(EVP_MD *md, | 475 | EVP_MD_meth_set_ctrl(EVP_MD *md, |
| @@ -520,7 +478,6 @@ EVP_MD_meth_set_ctrl(EVP_MD *md, | |||
| 520 | md->md_ctrl = ctrl; | 478 | md->md_ctrl = ctrl; |
| 521 | return 1; | 479 | return 1; |
| 522 | } | 480 | } |
| 523 | LCRYPTO_ALIAS(EVP_MD_meth_set_ctrl); | ||
| 524 | 481 | ||
| 525 | const EVP_MD * | 482 | const EVP_MD * |
| 526 | EVP_MD_CTX_md(const EVP_MD_CTX *ctx) | 483 | EVP_MD_CTX_md(const EVP_MD_CTX *ctx) |
| @@ -529,21 +486,18 @@ EVP_MD_CTX_md(const EVP_MD_CTX *ctx) | |||
| 529 | return NULL; | 486 | return NULL; |
| 530 | return ctx->digest; | 487 | return ctx->digest; |
| 531 | } | 488 | } |
| 532 | LCRYPTO_ALIAS(EVP_MD_CTX_md); | ||
| 533 | 489 | ||
| 534 | void * | 490 | void * |
| 535 | EVP_MD_CTX_md_data(const EVP_MD_CTX *ctx) | 491 | EVP_MD_CTX_md_data(const EVP_MD_CTX *ctx) |
| 536 | { | 492 | { |
| 537 | return ctx->md_data; | 493 | return ctx->md_data; |
| 538 | } | 494 | } |
| 539 | LCRYPTO_ALIAS(EVP_MD_CTX_md_data); | ||
| 540 | 495 | ||
| 541 | EVP_PKEY_CTX * | 496 | EVP_PKEY_CTX * |
| 542 | EVP_MD_CTX_pkey_ctx(const EVP_MD_CTX *ctx) | 497 | EVP_MD_CTX_pkey_ctx(const EVP_MD_CTX *ctx) |
| 543 | { | 498 | { |
| 544 | return ctx->pctx; | 499 | return ctx->pctx; |
| 545 | } | 500 | } |
| 546 | LCRYPTO_ALIAS(EVP_MD_CTX_pkey_ctx); | ||
| 547 | 501 | ||
| 548 | void | 502 | void |
| 549 | EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) | 503 | EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) |
| @@ -567,46 +521,39 @@ EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) | |||
| 567 | EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX); | 521 | EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX); |
| 568 | } | 522 | } |
| 569 | } | 523 | } |
| 570 | LCRYPTO_ALIAS(EVP_MD_CTX_set_pkey_ctx); | ||
| 571 | 524 | ||
| 572 | void | 525 | void |
| 573 | EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags) | 526 | EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags) |
| 574 | { | 527 | { |
| 575 | ctx->flags |= flags; | 528 | ctx->flags |= flags; |
| 576 | } | 529 | } |
| 577 | LCRYPTO_ALIAS(EVP_MD_CTX_set_flags); | ||
| 578 | 530 | ||
| 579 | void | 531 | void |
| 580 | EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags) | 532 | EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags) |
| 581 | { | 533 | { |
| 582 | ctx->flags &= ~flags; | 534 | ctx->flags &= ~flags; |
| 583 | } | 535 | } |
| 584 | LCRYPTO_ALIAS(EVP_MD_CTX_clear_flags); | ||
| 585 | 536 | ||
| 586 | int | 537 | int |
| 587 | EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags) | 538 | EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags) |
| 588 | { | 539 | { |
| 589 | return (ctx->flags & flags); | 540 | return (ctx->flags & flags); |
| 590 | } | 541 | } |
| 591 | LCRYPTO_ALIAS(EVP_MD_CTX_test_flags); | ||
| 592 | 542 | ||
| 593 | void | 543 | void |
| 594 | EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags) | 544 | EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags) |
| 595 | { | 545 | { |
| 596 | ctx->flags |= flags; | 546 | ctx->flags |= flags; |
| 597 | } | 547 | } |
| 598 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_flags); | ||
| 599 | 548 | ||
| 600 | void | 549 | void |
| 601 | EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags) | 550 | EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags) |
| 602 | { | 551 | { |
| 603 | ctx->flags &= ~flags; | 552 | ctx->flags &= ~flags; |
| 604 | } | 553 | } |
| 605 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_clear_flags); | ||
| 606 | 554 | ||
| 607 | int | 555 | int |
| 608 | EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags) | 556 | EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags) |
| 609 | { | 557 | { |
| 610 | return (ctx->flags & flags); | 558 | return (ctx->flags & flags); |
| 611 | } | 559 | } |
| 612 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_test_flags); | ||
