mirror of
https://github.com/guanzhi/GmSSL.git
synced 2026-05-07 08:56:17 +08:00
remove useless symbols
This commit is contained in:
@@ -69,7 +69,7 @@ int BN_GFP2_one(BN_GFP2 *a);
|
||||
int BN_GFP2_zero(BN_GFP2 *a);
|
||||
int BN_GFP2_is_zero(const BN_GFP2 *a);
|
||||
int BN_GFP2_equ(const BN_GFP2 *a, const BN_GFP2 *b);
|
||||
int BN_GF2P_add(BN_GFP2 *r, const BN_GFP2 *a, const BN_GFP2 *b, const BIGNUM *p, BN_CTX *ctx);
|
||||
int BN_GFP2_add(BN_GFP2 *r, const BN_GFP2 *a, const BN_GFP2 *b, const BIGNUM *p, BN_CTX *ctx);
|
||||
int BN_GFP2_sub(BN_GFP2 *r, const BN_GFP2 *a, const BN_GFP2 *b, const BIGNUM *p, BN_CTX *ctx);
|
||||
int BN_GFP2_mul(BN_GFP2 *r, const BN_GFP2 *a, const BN_GFP2 *b, const BIGNUM *p, BN_CTX *ctx);
|
||||
int BN_GFP2_sqr(BN_GFP2 *r, const BN_GFP2 *a, const BIGNUM *p, BN_CTX *ctx);
|
||||
@@ -77,7 +77,7 @@ int BN_GFP2_inv(BN_GFP2 *r, const BN_GFP2 *a, const BIGNUM *p, BN_CTX *ctx);
|
||||
int BN_GFP2_div(BN_GFP2 *r, const BN_GFP2 *a, const BN_GFP2 *b, const BIGNUM *p, BN_CTX *ctx);
|
||||
int BN_GFP2_exp(BN_GFP2 *r, const BN_GFP2 *a, const BIGNUM *k, const BIGNUM *p, BN_CTX *ctx);
|
||||
int BN_GFP2_set_bn(BN_GFP2 *r, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx);
|
||||
int BN_GF2P_add_bn(BN_GFP2 *r, const BN_GFP2 *a, const BIGNUM *b, const BIGNUM *p,BN_CTX *ctx);
|
||||
int BN_GFP2_add_bn(BN_GFP2 *r, const BN_GFP2 *a, const BIGNUM *b, const BIGNUM *p,BN_CTX *ctx);
|
||||
int BN_GFP2_sub_bn(BN_GFP2 *r, const BN_GFP2 *a, const BIGNUM *b, const BIGNUM *p, BN_CTX *ctx);
|
||||
int BN_GFP2_mul_bn(BN_GFP2 *r, const BN_GFP2 *a, const BIGNUM *b, const BIGNUM *p, BN_CTX *ctx);
|
||||
int BN_GFP2_div_bn(BN_GFP2 *r, const BN_GFP2 *a, const BIGNUM *b, const BIGNUM *p, BN_CTX *ctx);
|
||||
|
||||
@@ -71,7 +71,6 @@ int CPK_MAP_is_valid(const X509_ALGOR *algor);
|
||||
int CPK_MAP_num_factors(const X509_ALGOR *algor);
|
||||
int CPK_MAP_num_indexes(const X509_ALGOR *algor);
|
||||
int CPK_MAP_str2index(const X509_ALGOR *algor, const char *str, int *index);
|
||||
int CPK_MAP_print(BIO *out, X509_ALGOR *map, int indent, unsigned long flags);
|
||||
|
||||
|
||||
typedef struct cpk_master_secret_st CPK_MASTER_SECRET;
|
||||
@@ -94,7 +93,7 @@ int CPK_PUBLIC_PARAMS_compute_share_key(CPK_PUBLIC_PARAMS *params,
|
||||
void *(*kdf)(const void *in, size_t inlen, void *out, size_t *outlen));
|
||||
|
||||
char *CPK_MASTER_SECRET_get_name(CPK_MASTER_SECRET *master, char *buf, int size);
|
||||
char *CPK_PUBLIC_PARAMS_get_name(CPK_PUBLIC_PARAMS *params);
|
||||
char *CPK_PUBLIC_PARAMS_get_name(CPK_PUBLIC_PARAMS *params, char *buf, int size);
|
||||
int CPK_MASTER_SECRET_digest(CPK_MASTER_SECRET *master, const EVP_MD *type, unsigned char *md, unsigned int *len);
|
||||
int CPK_PUBLIC_PARAMS_digest(CPK_PUBLIC_PARAMS *params, const EVP_MD *type, unsigned char *md, unsigned int *len);
|
||||
int CPK_MASTER_SECRET_print(BIO *out, CPK_MASTER_SECRET *master, int indent, unsigned long flags);
|
||||
|
||||
@@ -68,7 +68,6 @@ extern "C" {
|
||||
#endif
|
||||
|
||||
|
||||
EC_GROUP *EC_GROUP_generate_typ1curve(const BIGNUM *order, BN_CTX *ctx);
|
||||
|
||||
EC_GROUP *EC_GROUP_new_type1curve(const BIGNUM *p, const BIGNUM *x,
|
||||
const BIGNUM *y, const BIGNUM *order, BN_CTX *ctx);
|
||||
|
||||
@@ -118,17 +118,14 @@ typedef struct ecies_params_st {
|
||||
|
||||
} ECIES_PARAMS;
|
||||
|
||||
ECIES_PARAMS *ECIES_PARAMS_new(void);
|
||||
int ECIES_PARAMS_init_with_recommended(ECIES_PARAMS *param);
|
||||
int ECIES_PARAMS_init_with_type(ECIES_PARAMS *param, int type);
|
||||
ECIES_PARAMS *ECIES_PARAMS_dup(const ECIES_PARAMS *param);
|
||||
KDF_FUNC ECIES_PARAMS_get_kdf(const ECIES_PARAMS *param);
|
||||
int ECIES_PARAMS_get_enc(const ECIES_PARAMS *param, size_t inlen,
|
||||
const EVP_CIPHER **enc_cipher, size_t *enckeylen, size_t *ciphertextlen);
|
||||
int ECIES_PARAMS_get_mac(const ECIES_PARAMS *param,
|
||||
const EVP_MD **hmac_md, const EVP_CIPHER **cmac_cipher,
|
||||
unsigned int *mackeylen, unsigned int *maclen);
|
||||
void ECIES_PARAMS_free(ECIES_PARAMS *param);
|
||||
|
||||
int i2d_ECIESParameters(const ECIES_PARAMS *param, unsigned char **out);
|
||||
ECIES_PARAMS *d2i_ECIESParameters(ECIES_PARAMS **param,
|
||||
|
||||
@@ -59,7 +59,6 @@ extern "C" {
|
||||
#endif
|
||||
|
||||
|
||||
int SAF_PrintNameInfo(FILE *fp, SGD_NAME_INFO *nameInfo);
|
||||
const char *SAF_GetErrorString(int err);
|
||||
|
||||
/* GmSSL Extension */
|
||||
|
||||
@@ -71,17 +71,20 @@ int SDF_PrintRSAPublicKey(FILE *fp, RSArefPublicKey *pk);
|
||||
int SDF_PrintRSAPrivateKey(FILE *fp, RSArefPrivateKey *pk);
|
||||
int SDF_PrintECCPublicKey(FILE *fp, ECCrefPublicKey *pk);
|
||||
int SDF_PrintECCPrivateKey(FILE *fp, ECCrefPrivateKey *pk);
|
||||
/*
|
||||
int SDF_PrintECCCipher(FILE *fp, ECCCipher *cipher);
|
||||
int SDF_PrintECCSignature(FILE *fp, ECCSignature *sig);
|
||||
*/
|
||||
const char *SDF_GetErrorString(int err);
|
||||
|
||||
//FIXME: implement this in a standalone file in sdf module
|
||||
/*
|
||||
int SDF_ImportKey(
|
||||
void *hSessionHandle,
|
||||
unsigned char *pucKey,
|
||||
unsigned int uiKeyLength,
|
||||
void **phKeyHandle);
|
||||
|
||||
*/
|
||||
|
||||
/* BEGIN ERROR CODES */
|
||||
/*
|
||||
|
||||
@@ -77,7 +77,9 @@ extern "C" {
|
||||
|
||||
|
||||
//FIXME: change name
|
||||
/*
|
||||
const char *SKF_get_alg_name(ULONG ulAlgID);
|
||||
*/
|
||||
|
||||
int SKF_PrintDeviceInfo(FILE *fp, DEVINFO *devInfo);
|
||||
int SKF_PrintRSAPublicKey(FILE *fp, RSAPUBLICKEYBLOB *pk);
|
||||
|
||||
@@ -62,10 +62,11 @@ typedef void *(*KDF_FUNC)(const void *in, size_t inlen, void *out, size_t *outle
|
||||
|
||||
KDF_FUNC KDF_get_x9_63(const EVP_MD *md);
|
||||
KDF_FUNC KDF_get_ibcs(const EVP_MD *md);
|
||||
/*
|
||||
KDF_FUNC KDF_get_nist_concatenation(void);
|
||||
KDF_FUNC KDF_get_tls_kdf(void);
|
||||
KDF_FUNC KDF_get_ikev2_kdf(void);
|
||||
|
||||
*/
|
||||
|
||||
/* BEGIN ERROR CODES */
|
||||
/*
|
||||
|
||||
@@ -81,9 +81,11 @@ extern "C" {
|
||||
|
||||
|
||||
# ifndef OPENSSL_NO_PAILLIER
|
||||
/*
|
||||
DECLARE_PEM_rw_cb(PAILLIERPrivateKey, PAILLIER)
|
||||
DECLARE_PEM_rw_const(PAILLIERPublicKey, PAILLIER)
|
||||
DECLARE_PEM_rw(PAILLIER_PUBKEY, PAILLIER)
|
||||
*/
|
||||
# endif
|
||||
|
||||
|
||||
|
||||
@@ -97,7 +97,7 @@ int sms4_wrap_key(sms4_key_t *key, const unsigned char *iv,
|
||||
int sms4_unwrap_key(sms4_key_t *key, const unsigned char *iv,
|
||||
unsigned char *out, const unsigned char *in, unsigned int inlen);
|
||||
|
||||
|
||||
/*
|
||||
void sms4_avx2_encrypt_init(sms4_key_t *key);
|
||||
void sms4_avx2_encrypt_8blocks(const unsigned char *in, unsigned char *out, const sms4_key_t *key);
|
||||
void sms4_avx2_encrypt_16blocks(const unsigned char *in, unsigned char *out, const sms4_key_t *key);
|
||||
@@ -106,7 +106,6 @@ void sms4_knc_encrypt_init(sms4_key_t *key);
|
||||
void sms4_knc_encrypt_8blocks(const unsigned char *in, unsigned char *out, const sms4_key_t *key);
|
||||
void sms4_knc_encrypt_16blocks(const unsigned char *in, unsigned char *out, const sms4_key_t *key);
|
||||
|
||||
|
||||
#define SMS4_EDE_KEY_LENGTH 32
|
||||
|
||||
typedef struct {
|
||||
@@ -122,7 +121,7 @@ void sms4_ede_encrypt_16blocks(sms4_ede_key_t *key, const unsigned char *in, uns
|
||||
void sms4_ede_decrypt(sms4_ede_key_t *key, const unsigned char *in, unsigned char *out);
|
||||
void sms4_ede_decrypt_8blocks(sms4_ede_key_t *key, const unsigned char *in, unsigned char *out);
|
||||
void sms4_ede_decrypt_16blocks(sms4_ede_key_t *key, const unsigned char *in, unsigned char *out);
|
||||
|
||||
*/
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
|
||||
@@ -62,9 +62,10 @@ typedef struct {
|
||||
uint32_t state[22];
|
||||
} zuc_key_t;
|
||||
|
||||
/*
|
||||
void zuc_set_key(zuc_key_t *key, const unsigned char *user_key, const unsigned char *iv);
|
||||
void zuc_generate_keystream(zuc_key_t *key, size_t nwords, uint32_t *words);
|
||||
|
||||
*/
|
||||
|
||||
typedef struct {
|
||||
zuc_key_t key;
|
||||
@@ -72,9 +73,11 @@ typedef struct {
|
||||
size_t buflen;
|
||||
} zuc_ctx_t;
|
||||
|
||||
/*
|
||||
void zuc_ctx_init(zuc_ctx_t *ctx, const unsigned char *user_key, const unsigned char *iv);
|
||||
void zuc_encrypt(zuc_ctx_t *ctx, size_t len, const unsigned char *in, unsigned char *out);
|
||||
#define zuc_decrypt(ctx,len,in,out) zuc_encrypt(ctx,len,in,out)
|
||||
*/
|
||||
|
||||
#define EEA3_MIN_BITS 1
|
||||
#define EEA3_MAX_BITS 65504
|
||||
@@ -87,11 +90,13 @@ typedef struct {
|
||||
/* maybe buffer */
|
||||
} eea3_ctx_t;
|
||||
|
||||
/*
|
||||
void eea3_init(eea3_ctx_t *ctx, const unsigned char *user_key, uint32_t count, uint32_t bearer, int direction);
|
||||
void eea3_encrypt(eea3_ctx_t *ctx, size_t len, const unsigned char *in, unsigned char *out);
|
||||
#define eea3_decrypt(ctx,len,in,out) eea3_encrypt(ctx,len,in,out)
|
||||
void eea3(const unsigned char *key, uint32_t count, uint32_t bearer, int direction,
|
||||
size_t len, const unsigned char *in, unsigned char *out);
|
||||
*/
|
||||
|
||||
#define EIA3_MIN_BYTES EEA3_MIN_BYTES
|
||||
#define EIA3_MAX_BYTES EEA3_MAX_BYTES
|
||||
@@ -103,11 +108,13 @@ typedef struct {
|
||||
/* maybe buffer */
|
||||
} eia3_ctx_t;
|
||||
|
||||
/*
|
||||
void eia3_init(eia3_ctx_t *ctx, const unsigned char *user_key, uint32_t count, uint32_t bearer, int direction);
|
||||
void eia3_update(eia3_ctx_t *ctx, const unsigned char *data, size_t datalen);
|
||||
void eia3_final(eia3_ctx_t *ctx, uint32_t *mac);
|
||||
void eia3(const unsigned char *key, uint32_t count, uint32_t bearer, int direction,
|
||||
const unsigned char *data, size_t len, uint32_t *mac);
|
||||
*/
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user