diff options
Diffstat (limited to 'src/lib/libcrypto/evp/evp_lib.c')
-rw-r--r-- | src/lib/libcrypto/evp/evp_lib.c | 55 |
1 files changed, 54 insertions, 1 deletions
diff --git a/src/lib/libcrypto/evp/evp_lib.c b/src/lib/libcrypto/evp/evp_lib.c index f64842b86f..d6b929c0e3 100644 --- a/src/lib/libcrypto/evp/evp_lib.c +++ b/src/lib/libcrypto/evp/evp_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: evp_lib.c,v 1.25 2022/11/26 16:08:52 tb Exp $ */ | 1 | /* $OpenBSD: evp_lib.c,v 1.26 2023/07/07 13:54:45 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -79,6 +79,7 @@ EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
79 | ret = -1; | 79 | ret = -1; |
80 | return (ret); | 80 | return (ret); |
81 | } | 81 | } |
82 | LCRYPTO_ALIAS(EVP_CIPHER_param_to_asn1); | ||
82 | 83 | ||
83 | int | 84 | int |
84 | EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 85 | EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
@@ -93,6 +94,7 @@ EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
93 | ret = -1; | 94 | ret = -1; |
94 | return (ret); | 95 | return (ret); |
95 | } | 96 | } |
97 | LCRYPTO_ALIAS(EVP_CIPHER_asn1_to_param); | ||
96 | 98 | ||
97 | int | 99 | int |
98 | EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 100 | EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
@@ -114,6 +116,7 @@ EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
114 | } | 116 | } |
115 | return (i); | 117 | return (i); |
116 | } | 118 | } |
119 | LCRYPTO_ALIAS(EVP_CIPHER_get_asn1_iv); | ||
117 | 120 | ||
118 | int | 121 | int |
119 | EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 122 | EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
@@ -131,6 +134,7 @@ EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
131 | } | 134 | } |
132 | return (i); | 135 | return (i); |
133 | } | 136 | } |
137 | LCRYPTO_ALIAS(EVP_CIPHER_set_asn1_iv); | ||
134 | 138 | ||
135 | /* Convert the various cipher NIDs and dummies to a proper OID NID */ | 139 | /* Convert the various cipher NIDs and dummies to a proper OID NID */ |
136 | int | 140 | int |
@@ -184,18 +188,21 @@ EVP_CIPHER_type(const EVP_CIPHER *ctx) | |||
184 | return nid; | 188 | return nid; |
185 | } | 189 | } |
186 | } | 190 | } |
191 | LCRYPTO_ALIAS(EVP_CIPHER_type); | ||
187 | 192 | ||
188 | int | 193 | int |
189 | EVP_CIPHER_block_size(const EVP_CIPHER *e) | 194 | EVP_CIPHER_block_size(const EVP_CIPHER *e) |
190 | { | 195 | { |
191 | return e->block_size; | 196 | return e->block_size; |
192 | } | 197 | } |
198 | LCRYPTO_ALIAS(EVP_CIPHER_block_size); | ||
193 | 199 | ||
194 | int | 200 | int |
195 | EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx) | 201 | EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx) |
196 | { | 202 | { |
197 | return ctx->cipher->block_size; | 203 | return ctx->cipher->block_size; |
198 | } | 204 | } |
205 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_block_size); | ||
199 | 206 | ||
200 | int | 207 | int |
201 | EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, | 208 | EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, |
@@ -203,48 +210,56 @@ EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, | |||
203 | { | 210 | { |
204 | return ctx->cipher->do_cipher(ctx, out, in, inl); | 211 | return ctx->cipher->do_cipher(ctx, out, in, inl); |
205 | } | 212 | } |
213 | LCRYPTO_ALIAS(EVP_Cipher); | ||
206 | 214 | ||
207 | const EVP_CIPHER * | 215 | const EVP_CIPHER * |
208 | EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx) | 216 | EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx) |
209 | { | 217 | { |
210 | return ctx->cipher; | 218 | return ctx->cipher; |
211 | } | 219 | } |
220 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_cipher); | ||
212 | 221 | ||
213 | int | 222 | int |
214 | EVP_CIPHER_CTX_encrypting(const EVP_CIPHER_CTX *ctx) | 223 | EVP_CIPHER_CTX_encrypting(const EVP_CIPHER_CTX *ctx) |
215 | { | 224 | { |
216 | return ctx->encrypt; | 225 | return ctx->encrypt; |
217 | } | 226 | } |
227 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_encrypting); | ||
218 | 228 | ||
219 | unsigned long | 229 | unsigned long |
220 | EVP_CIPHER_flags(const EVP_CIPHER *cipher) | 230 | EVP_CIPHER_flags(const EVP_CIPHER *cipher) |
221 | { | 231 | { |
222 | return cipher->flags; | 232 | return cipher->flags; |
223 | } | 233 | } |
234 | LCRYPTO_ALIAS(EVP_CIPHER_flags); | ||
224 | 235 | ||
225 | unsigned long | 236 | unsigned long |
226 | EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx) | 237 | EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx) |
227 | { | 238 | { |
228 | return ctx->cipher->flags; | 239 | return ctx->cipher->flags; |
229 | } | 240 | } |
241 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_flags); | ||
230 | 242 | ||
231 | void * | 243 | void * |
232 | EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx) | 244 | EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx) |
233 | { | 245 | { |
234 | return ctx->app_data; | 246 | return ctx->app_data; |
235 | } | 247 | } |
248 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_get_app_data); | ||
236 | 249 | ||
237 | void | 250 | void |
238 | EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data) | 251 | EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data) |
239 | { | 252 | { |
240 | ctx->app_data = data; | 253 | ctx->app_data = data; |
241 | } | 254 | } |
255 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_app_data); | ||
242 | 256 | ||
243 | void * | 257 | void * |
244 | EVP_CIPHER_CTX_get_cipher_data(const EVP_CIPHER_CTX *ctx) | 258 | EVP_CIPHER_CTX_get_cipher_data(const EVP_CIPHER_CTX *ctx) |
245 | { | 259 | { |
246 | return ctx->cipher_data; | 260 | return ctx->cipher_data; |
247 | } | 261 | } |
262 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_get_cipher_data); | ||
248 | 263 | ||
249 | void * | 264 | void * |
250 | EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) | 265 | EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) |
@@ -256,48 +271,56 @@ EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) | |||
256 | 271 | ||
257 | return old_cipher_data; | 272 | return old_cipher_data; |
258 | } | 273 | } |
274 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_cipher_data); | ||
259 | 275 | ||
260 | int | 276 | int |
261 | EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) | 277 | EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) |
262 | { | 278 | { |
263 | return cipher->iv_len; | 279 | return cipher->iv_len; |
264 | } | 280 | } |
281 | LCRYPTO_ALIAS(EVP_CIPHER_iv_length); | ||
265 | 282 | ||
266 | int | 283 | int |
267 | EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx) | 284 | EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx) |
268 | { | 285 | { |
269 | return ctx->cipher->iv_len; | 286 | return ctx->cipher->iv_len; |
270 | } | 287 | } |
288 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_iv_length); | ||
271 | 289 | ||
272 | unsigned char * | 290 | unsigned char * |
273 | EVP_CIPHER_CTX_buf_noconst(EVP_CIPHER_CTX *ctx) | 291 | EVP_CIPHER_CTX_buf_noconst(EVP_CIPHER_CTX *ctx) |
274 | { | 292 | { |
275 | return ctx->buf; | 293 | return ctx->buf; |
276 | } | 294 | } |
295 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_buf_noconst); | ||
277 | 296 | ||
278 | int | 297 | int |
279 | EVP_CIPHER_key_length(const EVP_CIPHER *cipher) | 298 | EVP_CIPHER_key_length(const EVP_CIPHER *cipher) |
280 | { | 299 | { |
281 | return cipher->key_len; | 300 | return cipher->key_len; |
282 | } | 301 | } |
302 | LCRYPTO_ALIAS(EVP_CIPHER_key_length); | ||
283 | 303 | ||
284 | int | 304 | int |
285 | EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx) | 305 | EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx) |
286 | { | 306 | { |
287 | return ctx->key_len; | 307 | return ctx->key_len; |
288 | } | 308 | } |
309 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_key_length); | ||
289 | 310 | ||
290 | int | 311 | int |
291 | EVP_CIPHER_nid(const EVP_CIPHER *cipher) | 312 | EVP_CIPHER_nid(const EVP_CIPHER *cipher) |
292 | { | 313 | { |
293 | return cipher->nid; | 314 | return cipher->nid; |
294 | } | 315 | } |
316 | LCRYPTO_ALIAS(EVP_CIPHER_nid); | ||
295 | 317 | ||
296 | int | 318 | int |
297 | EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx) | 319 | EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx) |
298 | { | 320 | { |
299 | return ctx->cipher->nid; | 321 | return ctx->cipher->nid; |
300 | } | 322 | } |
323 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_nid); | ||
301 | 324 | ||
302 | int | 325 | int |
303 | EVP_CIPHER_CTX_get_iv(const EVP_CIPHER_CTX *ctx, unsigned char *iv, size_t len) | 326 | EVP_CIPHER_CTX_get_iv(const EVP_CIPHER_CTX *ctx, unsigned char *iv, size_t len) |
@@ -317,6 +340,7 @@ EVP_CIPHER_CTX_get_iv(const EVP_CIPHER_CTX *ctx, unsigned char *iv, size_t len) | |||
317 | } | 340 | } |
318 | return 1; | 341 | return 1; |
319 | } | 342 | } |
343 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_get_iv); | ||
320 | 344 | ||
321 | int | 345 | int |
322 | EVP_CIPHER_CTX_set_iv(EVP_CIPHER_CTX *ctx, const unsigned char *iv, size_t len) | 346 | EVP_CIPHER_CTX_set_iv(EVP_CIPHER_CTX *ctx, const unsigned char *iv, size_t len) |
@@ -336,24 +360,28 @@ EVP_CIPHER_CTX_set_iv(EVP_CIPHER_CTX *ctx, const unsigned char *iv, size_t len) | |||
336 | } | 360 | } |
337 | return 1; | 361 | return 1; |
338 | } | 362 | } |
363 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_iv); | ||
339 | 364 | ||
340 | int | 365 | int |
341 | EVP_MD_block_size(const EVP_MD *md) | 366 | EVP_MD_block_size(const EVP_MD *md) |
342 | { | 367 | { |
343 | return md->block_size; | 368 | return md->block_size; |
344 | } | 369 | } |
370 | LCRYPTO_ALIAS(EVP_MD_block_size); | ||
345 | 371 | ||
346 | int | 372 | int |
347 | EVP_MD_type(const EVP_MD *md) | 373 | EVP_MD_type(const EVP_MD *md) |
348 | { | 374 | { |
349 | return md->type; | 375 | return md->type; |
350 | } | 376 | } |
377 | LCRYPTO_ALIAS(EVP_MD_type); | ||
351 | 378 | ||
352 | int | 379 | int |
353 | EVP_MD_pkey_type(const EVP_MD *md) | 380 | EVP_MD_pkey_type(const EVP_MD *md) |
354 | { | 381 | { |
355 | return md->pkey_type; | 382 | return md->pkey_type; |
356 | } | 383 | } |
384 | LCRYPTO_ALIAS(EVP_MD_pkey_type); | ||
357 | 385 | ||
358 | int | 386 | int |
359 | EVP_MD_size(const EVP_MD *md) | 387 | EVP_MD_size(const EVP_MD *md) |
@@ -364,12 +392,14 @@ EVP_MD_size(const EVP_MD *md) | |||
364 | } | 392 | } |
365 | return md->md_size; | 393 | return md->md_size; |
366 | } | 394 | } |
395 | LCRYPTO_ALIAS(EVP_MD_size); | ||
367 | 396 | ||
368 | unsigned long | 397 | unsigned long |
369 | EVP_MD_flags(const EVP_MD *md) | 398 | EVP_MD_flags(const EVP_MD *md) |
370 | { | 399 | { |
371 | return md->flags; | 400 | return md->flags; |
372 | } | 401 | } |
402 | LCRYPTO_ALIAS(EVP_MD_flags); | ||
373 | 403 | ||
374 | EVP_MD * | 404 | EVP_MD * |
375 | EVP_MD_meth_new(int md_type, int pkey_type) | 405 | EVP_MD_meth_new(int md_type, int pkey_type) |
@@ -384,6 +414,7 @@ EVP_MD_meth_new(int md_type, int pkey_type) | |||
384 | 414 | ||
385 | return md; | 415 | return md; |
386 | } | 416 | } |
417 | LCRYPTO_ALIAS(EVP_MD_meth_new); | ||
387 | 418 | ||
388 | EVP_MD * | 419 | EVP_MD * |
389 | EVP_MD_meth_dup(const EVP_MD *md) | 420 | EVP_MD_meth_dup(const EVP_MD *md) |
@@ -397,12 +428,14 @@ EVP_MD_meth_dup(const EVP_MD *md) | |||
397 | 428 | ||
398 | return to; | 429 | return to; |
399 | } | 430 | } |
431 | LCRYPTO_ALIAS(EVP_MD_meth_dup); | ||
400 | 432 | ||
401 | void | 433 | void |
402 | EVP_MD_meth_free(EVP_MD *md) | 434 | EVP_MD_meth_free(EVP_MD *md) |
403 | { | 435 | { |
404 | freezero(md, sizeof(*md)); | 436 | freezero(md, sizeof(*md)); |
405 | } | 437 | } |
438 | LCRYPTO_ALIAS(EVP_MD_meth_free); | ||
406 | 439 | ||
407 | int | 440 | int |
408 | EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) | 441 | EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) |
@@ -410,6 +443,7 @@ EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) | |||
410 | md->block_size = blocksize; | 443 | md->block_size = blocksize; |
411 | return 1; | 444 | return 1; |
412 | } | 445 | } |
446 | LCRYPTO_ALIAS(EVP_MD_meth_set_input_blocksize); | ||
413 | 447 | ||
414 | int | 448 | int |
415 | EVP_MD_meth_set_result_size(EVP_MD *md, int result_size) | 449 | EVP_MD_meth_set_result_size(EVP_MD *md, int result_size) |
@@ -417,6 +451,7 @@ EVP_MD_meth_set_result_size(EVP_MD *md, int result_size) | |||
417 | md->md_size = result_size; | 451 | md->md_size = result_size; |
418 | return 1; | 452 | return 1; |
419 | } | 453 | } |
454 | LCRYPTO_ALIAS(EVP_MD_meth_set_result_size); | ||
420 | 455 | ||
421 | int | 456 | int |
422 | EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) | 457 | EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) |
@@ -424,6 +459,7 @@ EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) | |||
424 | md->ctx_size = datasize; | 459 | md->ctx_size = datasize; |
425 | return 1; | 460 | return 1; |
426 | } | 461 | } |
462 | LCRYPTO_ALIAS(EVP_MD_meth_set_app_datasize); | ||
427 | 463 | ||
428 | int | 464 | int |
429 | EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) | 465 | EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) |
@@ -431,6 +467,7 @@ EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) | |||
431 | md->flags = flags; | 467 | md->flags = flags; |
432 | return 1; | 468 | return 1; |
433 | } | 469 | } |
470 | LCRYPTO_ALIAS(EVP_MD_meth_set_flags); | ||
434 | 471 | ||
435 | int | 472 | int |
436 | EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) | 473 | EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) |
@@ -438,6 +475,7 @@ EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) | |||
438 | md->init = init; | 475 | md->init = init; |
439 | return 1; | 476 | return 1; |
440 | } | 477 | } |
478 | LCRYPTO_ALIAS(EVP_MD_meth_set_init); | ||
441 | 479 | ||
442 | int | 480 | int |
443 | EVP_MD_meth_set_update(EVP_MD *md, | 481 | EVP_MD_meth_set_update(EVP_MD *md, |
@@ -446,6 +484,7 @@ EVP_MD_meth_set_update(EVP_MD *md, | |||
446 | md->update = update; | 484 | md->update = update; |
447 | return 1; | 485 | return 1; |
448 | } | 486 | } |
487 | LCRYPTO_ALIAS(EVP_MD_meth_set_update); | ||
449 | 488 | ||
450 | int | 489 | int |
451 | EVP_MD_meth_set_final(EVP_MD *md, | 490 | EVP_MD_meth_set_final(EVP_MD *md, |
@@ -454,6 +493,7 @@ EVP_MD_meth_set_final(EVP_MD *md, | |||
454 | md->final = final; | 493 | md->final = final; |
455 | return 1; | 494 | return 1; |
456 | } | 495 | } |
496 | LCRYPTO_ALIAS(EVP_MD_meth_set_final); | ||
457 | 497 | ||
458 | int | 498 | int |
459 | EVP_MD_meth_set_copy(EVP_MD *md, | 499 | EVP_MD_meth_set_copy(EVP_MD *md, |
@@ -462,6 +502,7 @@ EVP_MD_meth_set_copy(EVP_MD *md, | |||
462 | md->copy = copy; | 502 | md->copy = copy; |
463 | return 1; | 503 | return 1; |
464 | } | 504 | } |
505 | LCRYPTO_ALIAS(EVP_MD_meth_set_copy); | ||
465 | 506 | ||
466 | int | 507 | int |
467 | EVP_MD_meth_set_cleanup(EVP_MD *md, | 508 | EVP_MD_meth_set_cleanup(EVP_MD *md, |
@@ -470,6 +511,7 @@ EVP_MD_meth_set_cleanup(EVP_MD *md, | |||
470 | md->cleanup = cleanup; | 511 | md->cleanup = cleanup; |
471 | return 1; | 512 | return 1; |
472 | } | 513 | } |
514 | LCRYPTO_ALIAS(EVP_MD_meth_set_cleanup); | ||
473 | 515 | ||
474 | int | 516 | int |
475 | EVP_MD_meth_set_ctrl(EVP_MD *md, | 517 | EVP_MD_meth_set_ctrl(EVP_MD *md, |
@@ -478,6 +520,7 @@ EVP_MD_meth_set_ctrl(EVP_MD *md, | |||
478 | md->md_ctrl = ctrl; | 520 | md->md_ctrl = ctrl; |
479 | return 1; | 521 | return 1; |
480 | } | 522 | } |
523 | LCRYPTO_ALIAS(EVP_MD_meth_set_ctrl); | ||
481 | 524 | ||
482 | const EVP_MD * | 525 | const EVP_MD * |
483 | EVP_MD_CTX_md(const EVP_MD_CTX *ctx) | 526 | EVP_MD_CTX_md(const EVP_MD_CTX *ctx) |
@@ -486,18 +529,21 @@ EVP_MD_CTX_md(const EVP_MD_CTX *ctx) | |||
486 | return NULL; | 529 | return NULL; |
487 | return ctx->digest; | 530 | return ctx->digest; |
488 | } | 531 | } |
532 | LCRYPTO_ALIAS(EVP_MD_CTX_md); | ||
489 | 533 | ||
490 | void * | 534 | void * |
491 | EVP_MD_CTX_md_data(const EVP_MD_CTX *ctx) | 535 | EVP_MD_CTX_md_data(const EVP_MD_CTX *ctx) |
492 | { | 536 | { |
493 | return ctx->md_data; | 537 | return ctx->md_data; |
494 | } | 538 | } |
539 | LCRYPTO_ALIAS(EVP_MD_CTX_md_data); | ||
495 | 540 | ||
496 | EVP_PKEY_CTX * | 541 | EVP_PKEY_CTX * |
497 | EVP_MD_CTX_pkey_ctx(const EVP_MD_CTX *ctx) | 542 | EVP_MD_CTX_pkey_ctx(const EVP_MD_CTX *ctx) |
498 | { | 543 | { |
499 | return ctx->pctx; | 544 | return ctx->pctx; |
500 | } | 545 | } |
546 | LCRYPTO_ALIAS(EVP_MD_CTX_pkey_ctx); | ||
501 | 547 | ||
502 | void | 548 | void |
503 | EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) | 549 | EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) |
@@ -521,39 +567,46 @@ EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) | |||
521 | EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX); | 567 | EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX); |
522 | } | 568 | } |
523 | } | 569 | } |
570 | LCRYPTO_ALIAS(EVP_MD_CTX_set_pkey_ctx); | ||
524 | 571 | ||
525 | void | 572 | void |
526 | EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags) | 573 | EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags) |
527 | { | 574 | { |
528 | ctx->flags |= flags; | 575 | ctx->flags |= flags; |
529 | } | 576 | } |
577 | LCRYPTO_ALIAS(EVP_MD_CTX_set_flags); | ||
530 | 578 | ||
531 | void | 579 | void |
532 | EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags) | 580 | EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags) |
533 | { | 581 | { |
534 | ctx->flags &= ~flags; | 582 | ctx->flags &= ~flags; |
535 | } | 583 | } |
584 | LCRYPTO_ALIAS(EVP_MD_CTX_clear_flags); | ||
536 | 585 | ||
537 | int | 586 | int |
538 | EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags) | 587 | EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags) |
539 | { | 588 | { |
540 | return (ctx->flags & flags); | 589 | return (ctx->flags & flags); |
541 | } | 590 | } |
591 | LCRYPTO_ALIAS(EVP_MD_CTX_test_flags); | ||
542 | 592 | ||
543 | void | 593 | void |
544 | EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags) | 594 | EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags) |
545 | { | 595 | { |
546 | ctx->flags |= flags; | 596 | ctx->flags |= flags; |
547 | } | 597 | } |
598 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_flags); | ||
548 | 599 | ||
549 | void | 600 | void |
550 | EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags) | 601 | EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags) |
551 | { | 602 | { |
552 | ctx->flags &= ~flags; | 603 | ctx->flags &= ~flags; |
553 | } | 604 | } |
605 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_clear_flags); | ||
554 | 606 | ||
555 | int | 607 | int |
556 | EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags) | 608 | EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags) |
557 | { | 609 | { |
558 | return (ctx->flags & flags); | 610 | return (ctx->flags & flags); |
559 | } | 611 | } |
612 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_test_flags); | ||