const char *password;
};
-int openssl_password_cb(char *buf, int size, UNUSED int rwflag, void *u)
+static int openssl_password_cb(char *buf, int size, UNUSED int rwflag, void *u)
{
struct openssl_password_data *cb_data = u;
return pass_len;
}
-int openssl_password_cb_error(UNUSED char *buf, UNUSED int size, UNUSED int rwflag, UNUSED void *u)
+static int openssl_password_cb_error(UNUSED char *buf, UNUSED int size, UNUSED int rwflag, UNUSED void *u)
{
return 0;
}
CONVERT_TYPES_TEMPLATE(KEY_TYPES_PARAMS, int, evp_id, yaca_key_type_e, pub)
CONVERT_TYPES_TEMPLATE(KEY_TYPES_PARAMS, int, evp_id, yaca_key_type_e, params)
-int base64_decode_length(const char *data, size_t data_len, size_t *len)
+static int base64_decode_length(const char *data, size_t data_len, size_t *len)
{
assert(data != NULL);
assert(data_len != 0);
#define TMP_BUF_LEN 512
-int base64_decode(const char *data, size_t data_len, BIO **output)
+static int base64_decode(const char *data, size_t data_len, BIO **output)
{
assert(data != NULL);
assert(data_len != 0);
return ret;
}
-int import_simple(yaca_key_h *key,
- yaca_key_type_e key_type,
- const char *data,
- size_t data_len)
+static int import_simple(yaca_key_h *key,
+ yaca_key_type_e key_type,
+ const char *data,
+ size_t data_len)
{
assert(key != NULL);
assert(data != NULL);
return NULL;
}
-int import_evp(yaca_key_h *key,
- yaca_key_type_e key_type,
- const char *password,
- const char *data,
- size_t data_len)
+static int import_evp(yaca_key_h *key,
+ yaca_key_type_e key_type,
+ const char *password,
+ const char *data,
+ size_t data_len)
{
assert(key != NULL);
assert(password == NULL || password[0] != '\0');
return ret;
}
-int export_simple_raw(struct yaca_key_simple_s *simple_key,
- char **data,
- size_t *data_len)
+static int export_simple_raw(struct yaca_key_simple_s *simple_key,
+ char **data,
+ size_t *data_len)
{
int ret;
assert(simple_key != NULL);
return YACA_ERROR_NONE;
}
-int export_simple_base64(struct yaca_key_simple_s *simple_key,
- char **data,
- size_t *data_len)
+static int export_simple_base64(struct yaca_key_simple_s *simple_key,
+ char **data,
+ size_t *data_len)
{
assert(simple_key != NULL);
assert(data != NULL);
return ret;
}
-int export_evp_default_bio(struct yaca_key_evp_s *evp_key,
- yaca_key_file_format_e key_file_fmt,
- const char *password,
- BIO *mem)
+static int export_evp_default_bio(struct yaca_key_evp_s *evp_key,
+ yaca_key_file_format_e key_file_fmt,
+ const char *password,
+ BIO *mem)
{
assert(evp_key != NULL);
assert(password == NULL || password[0] != '\0');
return YACA_ERROR_NONE;
}
-int export_evp_pkcs8_bio(struct yaca_key_evp_s *evp_key,
- yaca_key_file_format_e key_file_fmt,
- const char *password,
- BIO *mem)
+static int export_evp_pkcs8_bio(struct yaca_key_evp_s *evp_key,
+ yaca_key_file_format_e key_file_fmt,
+ const char *password,
+ BIO *mem)
{
assert(evp_key != NULL);
assert(password == NULL || password[0] != '\0');
return YACA_ERROR_NONE;
}
-int export_evp(struct yaca_key_evp_s *evp_key,
- yaca_key_format_e key_fmt,
- yaca_key_file_format_e key_file_fmt,
- const char *password,
- char **data,
- size_t *data_len)
+static int export_evp(struct yaca_key_evp_s *evp_key,
+ yaca_key_format_e key_fmt,
+ yaca_key_file_format_e key_file_fmt,
+ const char *password,
+ char **data,
+ size_t *data_len)
{
assert(evp_key != NULL);
assert(password == NULL || password[0] != '\0');
return ret;
}
-int generate_simple(struct yaca_key_simple_s **out, size_t key_bit_len)
+static int generate_simple(struct yaca_key_simple_s **out, size_t key_bit_len)
{
assert(out != NULL);
return YACA_ERROR_NONE;
}
-int generate_simple_des(struct yaca_key_simple_s **out, size_t key_bit_len)
+static int generate_simple_des(struct yaca_key_simple_s **out, size_t key_bit_len)
{
assert(out != NULL);