diff options
Diffstat (limited to 'src/lib/libcrypto/evp/evp_lib.c')
-rw-r--r-- | src/lib/libcrypto/evp/evp_lib.c | 55 |
1 files changed, 1 insertions, 54 deletions
diff --git a/src/lib/libcrypto/evp/evp_lib.c b/src/lib/libcrypto/evp/evp_lib.c index d6b929c0e3..24ce1963df 100644 --- a/src/lib/libcrypto/evp/evp_lib.c +++ b/src/lib/libcrypto/evp/evp_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: evp_lib.c,v 1.26 2023/07/07 13:54:45 beck Exp $ */ | 1 | /* $OpenBSD: evp_lib.c,v 1.27 2023/07/07 19:37:53 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -79,7 +79,6 @@ EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
79 | ret = -1; | 79 | ret = -1; |
80 | return (ret); | 80 | return (ret); |
81 | } | 81 | } |
82 | LCRYPTO_ALIAS(EVP_CIPHER_param_to_asn1); | ||
83 | 82 | ||
84 | int | 83 | int |
85 | EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 84 | EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
@@ -94,7 +93,6 @@ EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
94 | ret = -1; | 93 | ret = -1; |
95 | return (ret); | 94 | return (ret); |
96 | } | 95 | } |
97 | LCRYPTO_ALIAS(EVP_CIPHER_asn1_to_param); | ||
98 | 96 | ||
99 | int | 97 | int |
100 | EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 98 | EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
@@ -116,7 +114,6 @@ EVP_CIPHER_get_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
116 | } | 114 | } |
117 | return (i); | 115 | return (i); |
118 | } | 116 | } |
119 | LCRYPTO_ALIAS(EVP_CIPHER_get_asn1_iv); | ||
120 | 117 | ||
121 | int | 118 | int |
122 | EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | 119 | EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) |
@@ -134,7 +131,6 @@ EVP_CIPHER_set_asn1_iv(EVP_CIPHER_CTX *c, ASN1_TYPE *type) | |||
134 | } | 131 | } |
135 | return (i); | 132 | return (i); |
136 | } | 133 | } |
137 | LCRYPTO_ALIAS(EVP_CIPHER_set_asn1_iv); | ||
138 | 134 | ||
139 | /* Convert the various cipher NIDs and dummies to a proper OID NID */ | 135 | /* Convert the various cipher NIDs and dummies to a proper OID NID */ |
140 | int | 136 | int |
@@ -188,21 +184,18 @@ EVP_CIPHER_type(const EVP_CIPHER *ctx) | |||
188 | return nid; | 184 | return nid; |
189 | } | 185 | } |
190 | } | 186 | } |
191 | LCRYPTO_ALIAS(EVP_CIPHER_type); | ||
192 | 187 | ||
193 | int | 188 | int |
194 | EVP_CIPHER_block_size(const EVP_CIPHER *e) | 189 | EVP_CIPHER_block_size(const EVP_CIPHER *e) |
195 | { | 190 | { |
196 | return e->block_size; | 191 | return e->block_size; |
197 | } | 192 | } |
198 | LCRYPTO_ALIAS(EVP_CIPHER_block_size); | ||
199 | 193 | ||
200 | int | 194 | int |
201 | EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx) | 195 | EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx) |
202 | { | 196 | { |
203 | return ctx->cipher->block_size; | 197 | return ctx->cipher->block_size; |
204 | } | 198 | } |
205 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_block_size); | ||
206 | 199 | ||
207 | int | 200 | int |
208 | EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, | 201 | EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, |
@@ -210,56 +203,48 @@ EVP_Cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, | |||
210 | { | 203 | { |
211 | return ctx->cipher->do_cipher(ctx, out, in, inl); | 204 | return ctx->cipher->do_cipher(ctx, out, in, inl); |
212 | } | 205 | } |
213 | LCRYPTO_ALIAS(EVP_Cipher); | ||
214 | 206 | ||
215 | const EVP_CIPHER * | 207 | const EVP_CIPHER * |
216 | EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx) | 208 | EVP_CIPHER_CTX_cipher(const EVP_CIPHER_CTX *ctx) |
217 | { | 209 | { |
218 | return ctx->cipher; | 210 | return ctx->cipher; |
219 | } | 211 | } |
220 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_cipher); | ||
221 | 212 | ||
222 | int | 213 | int |
223 | EVP_CIPHER_CTX_encrypting(const EVP_CIPHER_CTX *ctx) | 214 | EVP_CIPHER_CTX_encrypting(const EVP_CIPHER_CTX *ctx) |
224 | { | 215 | { |
225 | return ctx->encrypt; | 216 | return ctx->encrypt; |
226 | } | 217 | } |
227 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_encrypting); | ||
228 | 218 | ||
229 | unsigned long | 219 | unsigned long |
230 | EVP_CIPHER_flags(const EVP_CIPHER *cipher) | 220 | EVP_CIPHER_flags(const EVP_CIPHER *cipher) |
231 | { | 221 | { |
232 | return cipher->flags; | 222 | return cipher->flags; |
233 | } | 223 | } |
234 | LCRYPTO_ALIAS(EVP_CIPHER_flags); | ||
235 | 224 | ||
236 | unsigned long | 225 | unsigned long |
237 | EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx) | 226 | EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx) |
238 | { | 227 | { |
239 | return ctx->cipher->flags; | 228 | return ctx->cipher->flags; |
240 | } | 229 | } |
241 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_flags); | ||
242 | 230 | ||
243 | void * | 231 | void * |
244 | EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx) | 232 | EVP_CIPHER_CTX_get_app_data(const EVP_CIPHER_CTX *ctx) |
245 | { | 233 | { |
246 | return ctx->app_data; | 234 | return ctx->app_data; |
247 | } | 235 | } |
248 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_get_app_data); | ||
249 | 236 | ||
250 | void | 237 | void |
251 | EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data) | 238 | EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data) |
252 | { | 239 | { |
253 | ctx->app_data = data; | 240 | ctx->app_data = data; |
254 | } | 241 | } |
255 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_app_data); | ||
256 | 242 | ||
257 | void * | 243 | void * |
258 | EVP_CIPHER_CTX_get_cipher_data(const EVP_CIPHER_CTX *ctx) | 244 | EVP_CIPHER_CTX_get_cipher_data(const EVP_CIPHER_CTX *ctx) |
259 | { | 245 | { |
260 | return ctx->cipher_data; | 246 | return ctx->cipher_data; |
261 | } | 247 | } |
262 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_get_cipher_data); | ||
263 | 248 | ||
264 | void * | 249 | void * |
265 | EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) | 250 | EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) |
@@ -271,56 +256,48 @@ EVP_CIPHER_CTX_set_cipher_data(EVP_CIPHER_CTX *ctx, void *cipher_data) | |||
271 | 256 | ||
272 | return old_cipher_data; | 257 | return old_cipher_data; |
273 | } | 258 | } |
274 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_cipher_data); | ||
275 | 259 | ||
276 | int | 260 | int |
277 | EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) | 261 | EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) |
278 | { | 262 | { |
279 | return cipher->iv_len; | 263 | return cipher->iv_len; |
280 | } | 264 | } |
281 | LCRYPTO_ALIAS(EVP_CIPHER_iv_length); | ||
282 | 265 | ||
283 | int | 266 | int |
284 | EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx) | 267 | EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx) |
285 | { | 268 | { |
286 | return ctx->cipher->iv_len; | 269 | return ctx->cipher->iv_len; |
287 | } | 270 | } |
288 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_iv_length); | ||
289 | 271 | ||
290 | unsigned char * | 272 | unsigned char * |
291 | EVP_CIPHER_CTX_buf_noconst(EVP_CIPHER_CTX *ctx) | 273 | EVP_CIPHER_CTX_buf_noconst(EVP_CIPHER_CTX *ctx) |
292 | { | 274 | { |
293 | return ctx->buf; | 275 | return ctx->buf; |
294 | } | 276 | } |
295 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_buf_noconst); | ||
296 | 277 | ||
297 | int | 278 | int |
298 | EVP_CIPHER_key_length(const EVP_CIPHER *cipher) | 279 | EVP_CIPHER_key_length(const EVP_CIPHER *cipher) |
299 | { | 280 | { |
300 | return cipher->key_len; | 281 | return cipher->key_len; |
301 | } | 282 | } |
302 | LCRYPTO_ALIAS(EVP_CIPHER_key_length); | ||
303 | 283 | ||
304 | int | 284 | int |
305 | EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx) | 285 | EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx) |
306 | { | 286 | { |
307 | return ctx->key_len; | 287 | return ctx->key_len; |
308 | } | 288 | } |
309 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_key_length); | ||
310 | 289 | ||
311 | int | 290 | int |
312 | EVP_CIPHER_nid(const EVP_CIPHER *cipher) | 291 | EVP_CIPHER_nid(const EVP_CIPHER *cipher) |
313 | { | 292 | { |
314 | return cipher->nid; | 293 | return cipher->nid; |
315 | } | 294 | } |
316 | LCRYPTO_ALIAS(EVP_CIPHER_nid); | ||
317 | 295 | ||
318 | int | 296 | int |
319 | EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx) | 297 | EVP_CIPHER_CTX_nid(const EVP_CIPHER_CTX *ctx) |
320 | { | 298 | { |
321 | return ctx->cipher->nid; | 299 | return ctx->cipher->nid; |
322 | } | 300 | } |
323 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_nid); | ||
324 | 301 | ||
325 | int | 302 | int |
326 | EVP_CIPHER_CTX_get_iv(const EVP_CIPHER_CTX *ctx, unsigned char *iv, size_t len) | 303 | EVP_CIPHER_CTX_get_iv(const EVP_CIPHER_CTX *ctx, unsigned char *iv, size_t len) |
@@ -340,7 +317,6 @@ EVP_CIPHER_CTX_get_iv(const EVP_CIPHER_CTX *ctx, unsigned char *iv, size_t len) | |||
340 | } | 317 | } |
341 | return 1; | 318 | return 1; |
342 | } | 319 | } |
343 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_get_iv); | ||
344 | 320 | ||
345 | int | 321 | int |
346 | EVP_CIPHER_CTX_set_iv(EVP_CIPHER_CTX *ctx, const unsigned char *iv, size_t len) | 322 | EVP_CIPHER_CTX_set_iv(EVP_CIPHER_CTX *ctx, const unsigned char *iv, size_t len) |
@@ -360,28 +336,24 @@ EVP_CIPHER_CTX_set_iv(EVP_CIPHER_CTX *ctx, const unsigned char *iv, size_t len) | |||
360 | } | 336 | } |
361 | return 1; | 337 | return 1; |
362 | } | 338 | } |
363 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_iv); | ||
364 | 339 | ||
365 | int | 340 | int |
366 | EVP_MD_block_size(const EVP_MD *md) | 341 | EVP_MD_block_size(const EVP_MD *md) |
367 | { | 342 | { |
368 | return md->block_size; | 343 | return md->block_size; |
369 | } | 344 | } |
370 | LCRYPTO_ALIAS(EVP_MD_block_size); | ||
371 | 345 | ||
372 | int | 346 | int |
373 | EVP_MD_type(const EVP_MD *md) | 347 | EVP_MD_type(const EVP_MD *md) |
374 | { | 348 | { |
375 | return md->type; | 349 | return md->type; |
376 | } | 350 | } |
377 | LCRYPTO_ALIAS(EVP_MD_type); | ||
378 | 351 | ||
379 | int | 352 | int |
380 | EVP_MD_pkey_type(const EVP_MD *md) | 353 | EVP_MD_pkey_type(const EVP_MD *md) |
381 | { | 354 | { |
382 | return md->pkey_type; | 355 | return md->pkey_type; |
383 | } | 356 | } |
384 | LCRYPTO_ALIAS(EVP_MD_pkey_type); | ||
385 | 357 | ||
386 | int | 358 | int |
387 | EVP_MD_size(const EVP_MD *md) | 359 | EVP_MD_size(const EVP_MD *md) |
@@ -392,14 +364,12 @@ EVP_MD_size(const EVP_MD *md) | |||
392 | } | 364 | } |
393 | return md->md_size; | 365 | return md->md_size; |
394 | } | 366 | } |
395 | LCRYPTO_ALIAS(EVP_MD_size); | ||
396 | 367 | ||
397 | unsigned long | 368 | unsigned long |
398 | EVP_MD_flags(const EVP_MD *md) | 369 | EVP_MD_flags(const EVP_MD *md) |
399 | { | 370 | { |
400 | return md->flags; | 371 | return md->flags; |
401 | } | 372 | } |
402 | LCRYPTO_ALIAS(EVP_MD_flags); | ||
403 | 373 | ||
404 | EVP_MD * | 374 | EVP_MD * |
405 | EVP_MD_meth_new(int md_type, int pkey_type) | 375 | EVP_MD_meth_new(int md_type, int pkey_type) |
@@ -414,7 +384,6 @@ EVP_MD_meth_new(int md_type, int pkey_type) | |||
414 | 384 | ||
415 | return md; | 385 | return md; |
416 | } | 386 | } |
417 | LCRYPTO_ALIAS(EVP_MD_meth_new); | ||
418 | 387 | ||
419 | EVP_MD * | 388 | EVP_MD * |
420 | EVP_MD_meth_dup(const EVP_MD *md) | 389 | EVP_MD_meth_dup(const EVP_MD *md) |
@@ -428,14 +397,12 @@ EVP_MD_meth_dup(const EVP_MD *md) | |||
428 | 397 | ||
429 | return to; | 398 | return to; |
430 | } | 399 | } |
431 | LCRYPTO_ALIAS(EVP_MD_meth_dup); | ||
432 | 400 | ||
433 | void | 401 | void |
434 | EVP_MD_meth_free(EVP_MD *md) | 402 | EVP_MD_meth_free(EVP_MD *md) |
435 | { | 403 | { |
436 | freezero(md, sizeof(*md)); | 404 | freezero(md, sizeof(*md)); |
437 | } | 405 | } |
438 | LCRYPTO_ALIAS(EVP_MD_meth_free); | ||
439 | 406 | ||
440 | int | 407 | int |
441 | EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) | 408 | EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) |
@@ -443,7 +410,6 @@ EVP_MD_meth_set_input_blocksize(EVP_MD *md, int blocksize) | |||
443 | md->block_size = blocksize; | 410 | md->block_size = blocksize; |
444 | return 1; | 411 | return 1; |
445 | } | 412 | } |
446 | LCRYPTO_ALIAS(EVP_MD_meth_set_input_blocksize); | ||
447 | 413 | ||
448 | int | 414 | int |
449 | EVP_MD_meth_set_result_size(EVP_MD *md, int result_size) | 415 | EVP_MD_meth_set_result_size(EVP_MD *md, int result_size) |
@@ -451,7 +417,6 @@ EVP_MD_meth_set_result_size(EVP_MD *md, int result_size) | |||
451 | md->md_size = result_size; | 417 | md->md_size = result_size; |
452 | return 1; | 418 | return 1; |
453 | } | 419 | } |
454 | LCRYPTO_ALIAS(EVP_MD_meth_set_result_size); | ||
455 | 420 | ||
456 | int | 421 | int |
457 | EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) | 422 | EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) |
@@ -459,7 +424,6 @@ EVP_MD_meth_set_app_datasize(EVP_MD *md, int datasize) | |||
459 | md->ctx_size = datasize; | 424 | md->ctx_size = datasize; |
460 | return 1; | 425 | return 1; |
461 | } | 426 | } |
462 | LCRYPTO_ALIAS(EVP_MD_meth_set_app_datasize); | ||
463 | 427 | ||
464 | int | 428 | int |
465 | EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) | 429 | EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) |
@@ -467,7 +431,6 @@ EVP_MD_meth_set_flags(EVP_MD *md, unsigned long flags) | |||
467 | md->flags = flags; | 431 | md->flags = flags; |
468 | return 1; | 432 | return 1; |
469 | } | 433 | } |
470 | LCRYPTO_ALIAS(EVP_MD_meth_set_flags); | ||
471 | 434 | ||
472 | int | 435 | int |
473 | EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) | 436 | EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) |
@@ -475,7 +438,6 @@ EVP_MD_meth_set_init(EVP_MD *md, int (*init)(EVP_MD_CTX *ctx)) | |||
475 | md->init = init; | 438 | md->init = init; |
476 | return 1; | 439 | return 1; |
477 | } | 440 | } |
478 | LCRYPTO_ALIAS(EVP_MD_meth_set_init); | ||
479 | 441 | ||
480 | int | 442 | int |
481 | EVP_MD_meth_set_update(EVP_MD *md, | 443 | EVP_MD_meth_set_update(EVP_MD *md, |
@@ -484,7 +446,6 @@ EVP_MD_meth_set_update(EVP_MD *md, | |||
484 | md->update = update; | 446 | md->update = update; |
485 | return 1; | 447 | return 1; |
486 | } | 448 | } |
487 | LCRYPTO_ALIAS(EVP_MD_meth_set_update); | ||
488 | 449 | ||
489 | int | 450 | int |
490 | EVP_MD_meth_set_final(EVP_MD *md, | 451 | EVP_MD_meth_set_final(EVP_MD *md, |
@@ -493,7 +454,6 @@ EVP_MD_meth_set_final(EVP_MD *md, | |||
493 | md->final = final; | 454 | md->final = final; |
494 | return 1; | 455 | return 1; |
495 | } | 456 | } |
496 | LCRYPTO_ALIAS(EVP_MD_meth_set_final); | ||
497 | 457 | ||
498 | int | 458 | int |
499 | EVP_MD_meth_set_copy(EVP_MD *md, | 459 | EVP_MD_meth_set_copy(EVP_MD *md, |
@@ -502,7 +462,6 @@ EVP_MD_meth_set_copy(EVP_MD *md, | |||
502 | md->copy = copy; | 462 | md->copy = copy; |
503 | return 1; | 463 | return 1; |
504 | } | 464 | } |
505 | LCRYPTO_ALIAS(EVP_MD_meth_set_copy); | ||
506 | 465 | ||
507 | int | 466 | int |
508 | EVP_MD_meth_set_cleanup(EVP_MD *md, | 467 | EVP_MD_meth_set_cleanup(EVP_MD *md, |
@@ -511,7 +470,6 @@ EVP_MD_meth_set_cleanup(EVP_MD *md, | |||
511 | md->cleanup = cleanup; | 470 | md->cleanup = cleanup; |
512 | return 1; | 471 | return 1; |
513 | } | 472 | } |
514 | LCRYPTO_ALIAS(EVP_MD_meth_set_cleanup); | ||
515 | 473 | ||
516 | int | 474 | int |
517 | EVP_MD_meth_set_ctrl(EVP_MD *md, | 475 | EVP_MD_meth_set_ctrl(EVP_MD *md, |
@@ -520,7 +478,6 @@ EVP_MD_meth_set_ctrl(EVP_MD *md, | |||
520 | md->md_ctrl = ctrl; | 478 | md->md_ctrl = ctrl; |
521 | return 1; | 479 | return 1; |
522 | } | 480 | } |
523 | LCRYPTO_ALIAS(EVP_MD_meth_set_ctrl); | ||
524 | 481 | ||
525 | const EVP_MD * | 482 | const EVP_MD * |
526 | EVP_MD_CTX_md(const EVP_MD_CTX *ctx) | 483 | EVP_MD_CTX_md(const EVP_MD_CTX *ctx) |
@@ -529,21 +486,18 @@ EVP_MD_CTX_md(const EVP_MD_CTX *ctx) | |||
529 | return NULL; | 486 | return NULL; |
530 | return ctx->digest; | 487 | return ctx->digest; |
531 | } | 488 | } |
532 | LCRYPTO_ALIAS(EVP_MD_CTX_md); | ||
533 | 489 | ||
534 | void * | 490 | void * |
535 | EVP_MD_CTX_md_data(const EVP_MD_CTX *ctx) | 491 | EVP_MD_CTX_md_data(const EVP_MD_CTX *ctx) |
536 | { | 492 | { |
537 | return ctx->md_data; | 493 | return ctx->md_data; |
538 | } | 494 | } |
539 | LCRYPTO_ALIAS(EVP_MD_CTX_md_data); | ||
540 | 495 | ||
541 | EVP_PKEY_CTX * | 496 | EVP_PKEY_CTX * |
542 | EVP_MD_CTX_pkey_ctx(const EVP_MD_CTX *ctx) | 497 | EVP_MD_CTX_pkey_ctx(const EVP_MD_CTX *ctx) |
543 | { | 498 | { |
544 | return ctx->pctx; | 499 | return ctx->pctx; |
545 | } | 500 | } |
546 | LCRYPTO_ALIAS(EVP_MD_CTX_pkey_ctx); | ||
547 | 501 | ||
548 | void | 502 | void |
549 | EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) | 503 | EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) |
@@ -567,46 +521,39 @@ EVP_MD_CTX_set_pkey_ctx(EVP_MD_CTX *ctx, EVP_PKEY_CTX *pctx) | |||
567 | EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX); | 521 | EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_KEEP_PKEY_CTX); |
568 | } | 522 | } |
569 | } | 523 | } |
570 | LCRYPTO_ALIAS(EVP_MD_CTX_set_pkey_ctx); | ||
571 | 524 | ||
572 | void | 525 | void |
573 | EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags) | 526 | EVP_MD_CTX_set_flags(EVP_MD_CTX *ctx, int flags) |
574 | { | 527 | { |
575 | ctx->flags |= flags; | 528 | ctx->flags |= flags; |
576 | } | 529 | } |
577 | LCRYPTO_ALIAS(EVP_MD_CTX_set_flags); | ||
578 | 530 | ||
579 | void | 531 | void |
580 | EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags) | 532 | EVP_MD_CTX_clear_flags(EVP_MD_CTX *ctx, int flags) |
581 | { | 533 | { |
582 | ctx->flags &= ~flags; | 534 | ctx->flags &= ~flags; |
583 | } | 535 | } |
584 | LCRYPTO_ALIAS(EVP_MD_CTX_clear_flags); | ||
585 | 536 | ||
586 | int | 537 | int |
587 | EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags) | 538 | EVP_MD_CTX_test_flags(const EVP_MD_CTX *ctx, int flags) |
588 | { | 539 | { |
589 | return (ctx->flags & flags); | 540 | return (ctx->flags & flags); |
590 | } | 541 | } |
591 | LCRYPTO_ALIAS(EVP_MD_CTX_test_flags); | ||
592 | 542 | ||
593 | void | 543 | void |
594 | EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags) | 544 | EVP_CIPHER_CTX_set_flags(EVP_CIPHER_CTX *ctx, int flags) |
595 | { | 545 | { |
596 | ctx->flags |= flags; | 546 | ctx->flags |= flags; |
597 | } | 547 | } |
598 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_set_flags); | ||
599 | 548 | ||
600 | void | 549 | void |
601 | EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags) | 550 | EVP_CIPHER_CTX_clear_flags(EVP_CIPHER_CTX *ctx, int flags) |
602 | { | 551 | { |
603 | ctx->flags &= ~flags; | 552 | ctx->flags &= ~flags; |
604 | } | 553 | } |
605 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_clear_flags); | ||
606 | 554 | ||
607 | int | 555 | int |
608 | EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags) | 556 | EVP_CIPHER_CTX_test_flags(const EVP_CIPHER_CTX *ctx, int flags) |
609 | { | 557 | { |
610 | return (ctx->flags & flags); | 558 | return (ctx->flags & flags); |
611 | } | 559 | } |
612 | LCRYPTO_ALIAS(EVP_CIPHER_CTX_test_flags); | ||