components/openssl/openssl-1.0.0-wanboot/mapfile
author Tomas Kuthan <tomas.kuthan@oracle.com>
Thu, 22 Mar 2012 14:20:01 -0700
changeset 745 09fd85317532
permissions -rw-r--r--
7141635 Deliver wanboot-openssl.o for wanboot 6869649 wanboot may not require "get_ip" anymore 7145496 OpenSSL's Configure calls /usr/bin/make for "make links" which fails

#
# CDDL HEADER START
#
# The contents of this file are subject to the terms of the
# Common Development and Distribution License (the "License").
# You may not use this file except in compliance with the License.
#
# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
# or http://www.opensolaris.org/os/licensing.
# See the License for the specific language governing permissions
# and limitations under the License.
#
# When distributing Covered Code, include this CDDL HEADER in each
# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
# If applicable, add the following below this CDDL HEADER, with the
# fields enclosed by brackets "[]" replaced with your own identifying
# information: Portions Copyright [yyyy] [name of copyright owner]
#
# CDDL HEADER END
#
# Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
#

#
# This file defines interface requirements of wanboot on OpenSSL.
#

$mapfile_version 2
SYMBOL_SCOPE {
		ERR_clear_error;
		SSL_CTX_set_default_passwd_cb;
		SSL_load_error_strings;
		EVP_PKEY_free;
		SSL_get_peer_certificate;
		SSL_CIPHER_get_name;
		sk_value;
		RAND_load_file;
		X509_NAME_oneline;
		SSL_write;
		X509_NAME_get_text_by_NID;
		OPENSSL_uni2asc;
		SSL_CTX_set_default_passwd_cb_userdata;
		SSL_CTX_use_PrivateKey_file;
		OPENSSL_asc2uni;
		SSL_get_error;
		ASN1_UTF8STRING_free;
		ASN1_mbstring_copy;
		ERR_error_string;
		PKCS12_unpack_p7data;
		X509_free;
		ERR_get_error;
		ERR_put_error;
		PKCS12_free;
		ASN1_UTF8STRING_new;
		OPENSSL_add_all_algorithms_noconf;
		OBJ_nid2obj;
		PKCS12_SAFEBAG_free;
		ASN1_STRING_free;
		sk_delete;
		OBJ_obj2nid;
		SSL_CTX_set_verify_depth;
		PKCS8_PRIV_KEY_INFO_free;
		SSL_set_connect_state;
		sk_pop_free;
		BIO_s_file;
		SSL_set_fd;
		SSL_CTX_use_PrivateKey;
		ASN1_STRING_to_UTF8;
		PKCS12_certbag2x509;
		PKCS7_free;
		PKCS12_decrypt_skey;
		BIO_new;
		RAND_status;
		sk_num;
		SSL_get_verify_result;
		SSL_free;
		SSL_read;
		SSL_new;
		SSLv3_client_method;
		X509_check_private_key;
		SSL_CTX_new;
		ASN1_TYPE_set;
		ASN1_TYPE_new;
		ERR_peek_error;
		CRYPTO_free;
		SSL_CTX_load_verify_locations;
		PKCS12_unpack_authsafes;
		X509_ATTRIBUTE_new;
		PKCS12_unpack_p7encdata;
		sk_push;
		SSL_connect;
		SSL_shutdown;
		SSL_CTX_use_certificate_file;
		PKCS12_get_attr_gen;
		X509_verify_cert_error_string;
		X509_ATTRIBUTE_free;
		X509_alias_set1;
		PKCS12_verify_mac;
		ASN1_TIME_print;
		SSL_CTX_use_certificate;
		SSL_get_ciphers;
		SSL_CTX_ctrl;
		SSL_CTX_free;
		X509_keyid_set1;
		ERR_load_strings;
		EVP_EncodeBlock;
		ASN1_TYPE_free;
		sk_new_null;
		SSL_get_current_cipher;
		ASN1_STRING_cmp;
		ASN1_STRING_set;
		ERR_get_next_error_library;
		EVP_PKCS82PKEY;
		X509_get_issuer_name;
		CRYPTO_malloc;
		BIO_ctrl;
		BIO_free;
		X509_STORE_add_cert;
		ASN1_STRING_type_new;
		SSL_CTX_set_cipher_list;
		X509_get_subject_name;
		SSL_library_init;
		d2i_PKCS12_fp;
	local:
		*;
};