diff options
author | Dr. Stephen Henson <steve@openssl.org> | 2001-07-27 02:22:42 +0000 |
---|---|---|
committer | Dr. Stephen Henson <steve@openssl.org> | 2001-07-27 02:22:42 +0000 |
commit | 1241126adf6c451d6a7115ffdc68fa64c4d55593 (patch) | |
tree | 07dde53487b16f716a07f12342af4f386e75be8a /crypto/x509/x_all.c | |
parent | 19da1300536be2ffddd5edef039e34b09a0c8440 (diff) |
More linker bloat reorganisation:
Split private key PEM and normal PEM handling. Private key
handling needs to link in stuff like PKCS#8.
Relocate the ASN1 *_dup() functions, to the relevant ASN1
modules using new macro IMPLEMENT_ASN1_DUP_FUNCTION. Previously
these were all in crypto/x509/x_all.c along with every ASN1
BIO/fp function which linked in *every* ASN1 function if
a single dup was used.
Move the authority key id ASN1 structure to a separate file.
This is used in the X509 routines and its previous location
linked in all the v3 extension code.
Also move ASN1_tag2bit to avoid linking in a_bytes.c which
is now largely obsolete.
So far under Linux stripped binary with single PEM_read_X509
is now 238K compared to 380K before these changes.
Diffstat (limited to 'crypto/x509/x_all.c')
-rw-r--r-- | crypto/x509/x_all.c | 54 |
1 files changed, 0 insertions, 54 deletions
diff --git a/crypto/x509/x_all.c b/crypto/x509/x_all.c index 3be4368c4f..69920e6d03 100644 --- a/crypto/x509/x_all.c +++ b/crypto/x509/x_all.c @@ -113,21 +113,6 @@ int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) x->signature, x->spkac,pkey,md)); } -X509_ATTRIBUTE *X509_ATTRIBUTE_dup(X509_ATTRIBUTE *xa) - { - return ASN1_item_dup(ASN1_ITEM_rptr(X509_ATTRIBUTE),xa); - } - -X509 *X509_dup(X509 *x509) - { - return ASN1_item_dup(ASN1_ITEM_rptr(X509),x509); - } - -X509_EXTENSION *X509_EXTENSION_dup(X509_EXTENSION *ex) - { - return ASN1_item_dup(ASN1_ITEM_rptr(X509_EXTENSION),ex); - } - #ifndef OPENSSL_NO_FP_API X509 *d2i_X509_fp(FILE *fp, X509 **x509) { @@ -150,11 +135,6 @@ int i2d_X509_bio(BIO *bp, X509 *x509) return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509), bp, x509); } -X509_CRL *X509_CRL_dup(X509_CRL *crl) - { - return ASN1_item_dup(ASN1_ITEM_rptr(X509_CRL), crl); - } - #ifndef OPENSSL_NO_FP_API X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) { @@ -177,11 +157,6 @@ int i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl); } -PKCS7 *PKCS7_dup(PKCS7 *p7) - { - return ASN1_item_dup(ASN1_ITEM_rptr(PKCS7), p7); - } - #ifndef OPENSSL_NO_FP_API PKCS7 *d2i_PKCS7_fp(FILE *fp, PKCS7 **p7) { @@ -204,11 +179,6 @@ int i2d_PKCS7_bio(BIO *bp, PKCS7 *p7) return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS7), bp, p7); } -X509_REQ *X509_REQ_dup(X509_REQ *req) - { - return ASN1_item_dup(ASN1_ITEM_rptr(X509_REQ), req); - } - #ifndef OPENSSL_NO_FP_API X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) { @@ -232,15 +202,6 @@ int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) } #ifndef OPENSSL_NO_RSA -RSA *RSAPublicKey_dup(RSA *rsa) - { - return ASN1_item_dup(ASN1_ITEM_rptr(RSAPublicKey), rsa); - } - -RSA *RSAPrivateKey_dup(RSA *rsa) - { - return ASN1_item_dup(ASN1_ITEM_rptr(RSAPrivateKey), rsa); - } #ifndef OPENSSL_NO_FP_API RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) @@ -364,21 +325,6 @@ int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa) #endif -X509_ALGOR *X509_ALGOR_dup(X509_ALGOR *xn) - { - return ASN1_item_dup(ASN1_ITEM_rptr(X509_ALGOR), xn); - } - -X509_NAME *X509_NAME_dup(X509_NAME *xn) - { - return ASN1_item_dup(ASN1_ITEM_rptr(X509_NAME), xn); - } - -X509_NAME_ENTRY *X509_NAME_ENTRY_dup(X509_NAME_ENTRY *ne) - { - return ASN1_item_dup(ASN1_ITEM_rptr(X509_NAME_ENTRY), ne); - } - int X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md, unsigned int *len) { |