diff options
author | David Benjamin <davidben@google.com> | 2023-07-11 13:51:59 -0400 |
---|---|---|
committer | Boringssl LUCI CQ <boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com> | 2023-07-11 21:45:46 +0000 |
commit | 690dcdf5c9792f7ab4ca6e3e009a6e0da9ebe933 (patch) | |
tree | e612a7bc8257d703cc2b52e5cce773d628b869cf /rust | |
parent | 00e3ffb10bb07b247c8993c3e4682acd4e217ed0 (diff) | |
download | boringssl-690dcdf5c9792f7ab4ca6e3e009a6e0da9ebe933.zip boringssl-690dcdf5c9792f7ab4ca6e3e009a6e0da9ebe933.tar.gz boringssl-690dcdf5c9792f7ab4ca6e3e009a6e0da9ebe933.tar.bz2 |
Make the old sk_* functions into full functions
Due to b/290792019 and b/290785937, we need them to actually exist at
the original symbols. For all of Rust's language-level safety benefits,
the ecosystem seems determined to undo it with patterns that are even
less safe than C.
This is not great and the bugs need to be fixed, but do this for now to
unblock the Android update.
Change-Id: Ia883336879779f652e7320cecdd5ca843996f6a3
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/61525
Reviewed-by: Bob Beck <bbe@google.com>
Commit-Queue: Bob Beck <bbe@google.com>
Auto-Submit: David Benjamin <davidben@google.com>
Diffstat (limited to 'rust')
-rw-r--r-- | rust/bssl-sys/src/lib.rs | 7 |
1 files changed, 0 insertions, 7 deletions
diff --git a/rust/bssl-sys/src/lib.rs b/rust/bssl-sys/src/lib.rs index 3b37110..06b907c 100644 --- a/rust/bssl-sys/src/lib.rs +++ b/rust/bssl-sys/src/lib.rs @@ -18,13 +18,6 @@ pub fn ERR_GET_FUNC(packed_error: u32) -> i32 { unsafe { ERR_GET_FUNC_RUST(packed_error) } } -pub use OPENSSL_sk_free as sk_free; -pub use OPENSSL_sk_new_null as sk_new_null; -pub use OPENSSL_sk_num as sk_num; -pub use OPENSSL_sk_pop as sk_pop; -pub use OPENSSL_sk_push as sk_push; -pub use OPENSSL_sk_value as sk_value; - pub fn init() { unsafe { CRYPTO_library_init(); |