diff options
author | tb <> | 2023-02-16 08:38:17 +0000 |
---|---|---|
committer | tb <> | 2023-02-16 08:38:17 +0000 |
commit | b1fbdd21532891fac5b0f128e57331894bd69d84 (patch) | |
tree | 689defafde66dbfa38a7854af566bd9a05f191b7 | |
parent | ee0f647faa09f91cb79b628dcb818adaa381af90 (diff) | |
download | openbsd-b1fbdd21532891fac5b0f128e57331894bd69d84.tar.gz openbsd-b1fbdd21532891fac5b0f128e57331894bd69d84.tar.bz2 openbsd-b1fbdd21532891fac5b0f128e57331894bd69d84.zip |
libressl *_namespace.h: adjust *_ALIAS() to require a semicolon
LCRYPTO_ALIAS() and LSSL_ALIAS() contained a trailing semicolon.
This does not conform to style(9), breaks editors and ctags and
(most importantly) my workflow. Fix this by neutering them with
asm("") so that -Wpedantic doesn't complain. There's precedent
in libc's namespace.h
fix suggested by & ok jsing
85 files changed, 1006 insertions, 1006 deletions
diff --git a/src/lib/libcrypto/hidden/crypto_namespace.h b/src/lib/libcrypto/hidden/crypto_namespace.h index 6ceef26e2d..5bf9b4d4da 100644 --- a/src/lib/libcrypto/hidden/crypto_namespace.h +++ b/src/lib/libcrypto/hidden/crypto_namespace.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: crypto_namespace.h,v 1.1 2022/11/11 11:25:18 beck Exp $ */ | 1 | /* $OpenBSD: crypto_namespace.h,v 1.2 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2016 Philip Guenther <guenther@openbsd.org> | 3 | * Copyright (c) 2016 Philip Guenther <guenther@openbsd.org> |
4 | * | 4 | * |
@@ -30,7 +30,7 @@ | |||
30 | # define LCRYPTO_USED(x) __attribute__((visibility("hidden"))) \ | 30 | # define LCRYPTO_USED(x) __attribute__((visibility("hidden"))) \ |
31 | typeof(x) x asm("_lcry_"#x) | 31 | typeof(x) x asm("_lcry_"#x) |
32 | # define LCRYPTO_ALIAS1(pre,x) asm(".global "#pre#x"; "#pre#x" = _lcry_"#x) | 32 | # define LCRYPTO_ALIAS1(pre,x) asm(".global "#pre#x"; "#pre#x" = _lcry_"#x) |
33 | # define LCRYPTO_ALIAS(x) LCRYPTO_ALIAS1(,x); LCRYPTO_ALIAS1(_libre_,x); | 33 | # define LCRYPTO_ALIAS(x) LCRYPTO_ALIAS1(,x); LCRYPTO_ALIAS1(_libre_,x) |
34 | #else | 34 | #else |
35 | # define LCRYPTO_USED(x) typeof(x) x asm("_libre_"#x) | 35 | # define LCRYPTO_USED(x) typeof(x) x asm("_libre_"#x) |
36 | #endif | 36 | #endif |
@@ -38,7 +38,7 @@ | |||
38 | # define LCRYPTO_UNUSED(x) | 38 | # define LCRYPTO_UNUSED(x) |
39 | # define LCRYPTO_USED(x) | 39 | # define LCRYPTO_USED(x) |
40 | # define LCRYPTO_ALIAS1(pre,x) | 40 | # define LCRYPTO_ALIAS1(pre,x) |
41 | # define LCRYPTO_ALIAS(x) | 41 | # define LCRYPTO_ALIAS(x) asm("") |
42 | #endif | 42 | #endif |
43 | 43 | ||
44 | #endif /* _LIBCRYPTO_CRYPTO_NAMESPACE_H_ */ | 44 | #endif /* _LIBCRYPTO_CRYPTO_NAMESPACE_H_ */ |
diff --git a/src/lib/libcrypto/hmac/hmac.c b/src/lib/libcrypto/hmac/hmac.c index 047b67b9ea..ea3a1b4a45 100644 --- a/src/lib/libcrypto/hmac/hmac.c +++ b/src/lib/libcrypto/hmac/hmac.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: hmac.c,v 1.30 2022/11/26 16:08:53 tb Exp $ */ | 1 | /* $OpenBSD: hmac.c,v 1.31 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -134,7 +134,7 @@ HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md, | |||
134 | err: | 134 | err: |
135 | return 0; | 135 | return 0; |
136 | } | 136 | } |
137 | LCRYPTO_ALIAS(HMAC_Init_ex) | 137 | LCRYPTO_ALIAS(HMAC_Init_ex); |
138 | 138 | ||
139 | int | 139 | int |
140 | HMAC_Init(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md) | 140 | HMAC_Init(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md) |
@@ -152,7 +152,7 @@ HMAC_Update(HMAC_CTX *ctx, const unsigned char *data, size_t len) | |||
152 | 152 | ||
153 | return EVP_DigestUpdate(&ctx->md_ctx, data, len); | 153 | return EVP_DigestUpdate(&ctx->md_ctx, data, len); |
154 | } | 154 | } |
155 | LCRYPTO_ALIAS(HMAC_Update) | 155 | LCRYPTO_ALIAS(HMAC_Update); |
156 | 156 | ||
157 | int | 157 | int |
158 | HMAC_Final(HMAC_CTX *ctx, unsigned char *md, unsigned int *len) | 158 | HMAC_Final(HMAC_CTX *ctx, unsigned char *md, unsigned int *len) |
@@ -175,7 +175,7 @@ HMAC_Final(HMAC_CTX *ctx, unsigned char *md, unsigned int *len) | |||
175 | err: | 175 | err: |
176 | return 0; | 176 | return 0; |
177 | } | 177 | } |
178 | LCRYPTO_ALIAS(HMAC_Final) | 178 | LCRYPTO_ALIAS(HMAC_Final); |
179 | 179 | ||
180 | HMAC_CTX * | 180 | HMAC_CTX * |
181 | HMAC_CTX_new(void) | 181 | HMAC_CTX_new(void) |
@@ -189,7 +189,7 @@ HMAC_CTX_new(void) | |||
189 | 189 | ||
190 | return ctx; | 190 | return ctx; |
191 | } | 191 | } |
192 | LCRYPTO_ALIAS(HMAC_CTX_new) | 192 | LCRYPTO_ALIAS(HMAC_CTX_new); |
193 | 193 | ||
194 | void | 194 | void |
195 | HMAC_CTX_free(HMAC_CTX *ctx) | 195 | HMAC_CTX_free(HMAC_CTX *ctx) |
@@ -201,7 +201,7 @@ HMAC_CTX_free(HMAC_CTX *ctx) | |||
201 | 201 | ||
202 | free(ctx); | 202 | free(ctx); |
203 | } | 203 | } |
204 | LCRYPTO_ALIAS(HMAC_CTX_free) | 204 | LCRYPTO_ALIAS(HMAC_CTX_free); |
205 | 205 | ||
206 | int | 206 | int |
207 | HMAC_CTX_reset(HMAC_CTX *ctx) | 207 | HMAC_CTX_reset(HMAC_CTX *ctx) |
@@ -236,7 +236,7 @@ HMAC_CTX_copy(HMAC_CTX *dctx, HMAC_CTX *sctx) | |||
236 | err: | 236 | err: |
237 | return 0; | 237 | return 0; |
238 | } | 238 | } |
239 | LCRYPTO_ALIAS(HMAC_CTX_copy) | 239 | LCRYPTO_ALIAS(HMAC_CTX_copy); |
240 | 240 | ||
241 | void | 241 | void |
242 | HMAC_CTX_cleanup(HMAC_CTX *ctx) | 242 | HMAC_CTX_cleanup(HMAC_CTX *ctx) |
@@ -254,14 +254,14 @@ HMAC_CTX_set_flags(HMAC_CTX *ctx, unsigned long flags) | |||
254 | EVP_MD_CTX_set_flags(&ctx->o_ctx, flags); | 254 | EVP_MD_CTX_set_flags(&ctx->o_ctx, flags); |
255 | EVP_MD_CTX_set_flags(&ctx->md_ctx, flags); | 255 | EVP_MD_CTX_set_flags(&ctx->md_ctx, flags); |
256 | } | 256 | } |
257 | LCRYPTO_ALIAS(HMAC_CTX_set_flags) | 257 | LCRYPTO_ALIAS(HMAC_CTX_set_flags); |
258 | 258 | ||
259 | const EVP_MD * | 259 | const EVP_MD * |
260 | HMAC_CTX_get_md(const HMAC_CTX *ctx) | 260 | HMAC_CTX_get_md(const HMAC_CTX *ctx) |
261 | { | 261 | { |
262 | return ctx->md; | 262 | return ctx->md; |
263 | } | 263 | } |
264 | LCRYPTO_ALIAS(HMAC_CTX_get_md) | 264 | LCRYPTO_ALIAS(HMAC_CTX_get_md); |
265 | 265 | ||
266 | unsigned char * | 266 | unsigned char * |
267 | HMAC(const EVP_MD *evp_md, const void *key, int key_len, const unsigned char *d, | 267 | HMAC(const EVP_MD *evp_md, const void *key, int key_len, const unsigned char *d, |
@@ -290,4 +290,4 @@ err: | |||
290 | HMAC_CTX_cleanup(&c); | 290 | HMAC_CTX_cleanup(&c); |
291 | return NULL; | 291 | return NULL; |
292 | } | 292 | } |
293 | LCRYPTO_ALIAS(HMAC) | 293 | LCRYPTO_ALIAS(HMAC); |
diff --git a/src/lib/libcrypto/pkcs12/p12_add.c b/src/lib/libcrypto/pkcs12/p12_add.c index 66cb95b1db..93c7c7221e 100644 --- a/src/lib/libcrypto/pkcs12/p12_add.c +++ b/src/lib/libcrypto/pkcs12/p12_add.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_add.c,v 1.21 2022/11/12 13:03:28 beck Exp $ */ | 1 | /* $OpenBSD: p12_add.c,v 1.22 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -90,7 +90,7 @@ PKCS12_item_pack_safebag(void *obj, const ASN1_ITEM *it, int nid1, int nid2) | |||
90 | safebag->type = OBJ_nid2obj(nid2); | 90 | safebag->type = OBJ_nid2obj(nid2); |
91 | return safebag; | 91 | return safebag; |
92 | } | 92 | } |
93 | LCRYPTO_ALIAS(PKCS12_item_pack_safebag) | 93 | LCRYPTO_ALIAS(PKCS12_item_pack_safebag); |
94 | 94 | ||
95 | /* Turn a stack of SAFEBAGS into a PKCS#7 data Contentinfo */ | 95 | /* Turn a stack of SAFEBAGS into a PKCS#7 data Contentinfo */ |
96 | PKCS7 * | 96 | PKCS7 * |
@@ -118,7 +118,7 @@ err: | |||
118 | PKCS7_free(p7); | 118 | PKCS7_free(p7); |
119 | return NULL; | 119 | return NULL; |
120 | } | 120 | } |
121 | LCRYPTO_ALIAS(PKCS12_pack_p7data) | 121 | LCRYPTO_ALIAS(PKCS12_pack_p7data); |
122 | 122 | ||
123 | /* Unpack SAFEBAGS from PKCS#7 data ContentInfo */ | 123 | /* Unpack SAFEBAGS from PKCS#7 data ContentInfo */ |
124 | STACK_OF(PKCS12_SAFEBAG) * | 124 | STACK_OF(PKCS12_SAFEBAG) * |
@@ -130,7 +130,7 @@ PKCS12_unpack_p7data(PKCS7 *p7) | |||
130 | } | 130 | } |
131 | return ASN1_item_unpack(p7->d.data, &PKCS12_SAFEBAGS_it); | 131 | return ASN1_item_unpack(p7->d.data, &PKCS12_SAFEBAGS_it); |
132 | } | 132 | } |
133 | LCRYPTO_ALIAS(PKCS12_unpack_p7data) | 133 | LCRYPTO_ALIAS(PKCS12_unpack_p7data); |
134 | 134 | ||
135 | /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ | 135 | /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ |
136 | 136 | ||
@@ -177,7 +177,7 @@ err: | |||
177 | PKCS7_free(p7); | 177 | PKCS7_free(p7); |
178 | return NULL; | 178 | return NULL; |
179 | } | 179 | } |
180 | LCRYPTO_ALIAS(PKCS12_pack_p7encdata) | 180 | LCRYPTO_ALIAS(PKCS12_pack_p7encdata); |
181 | 181 | ||
182 | STACK_OF(PKCS12_SAFEBAG) * | 182 | STACK_OF(PKCS12_SAFEBAG) * |
183 | PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen) | 183 | PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen) |
@@ -188,14 +188,14 @@ PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen) | |||
188 | &PKCS12_SAFEBAGS_it, pass, passlen, | 188 | &PKCS12_SAFEBAGS_it, pass, passlen, |
189 | p7->d.encrypted->enc_data->enc_data, 1); | 189 | p7->d.encrypted->enc_data->enc_data, 1); |
190 | } | 190 | } |
191 | LCRYPTO_ALIAS(PKCS12_unpack_p7encdata) | 191 | LCRYPTO_ALIAS(PKCS12_unpack_p7encdata); |
192 | 192 | ||
193 | PKCS8_PRIV_KEY_INFO * | 193 | PKCS8_PRIV_KEY_INFO * |
194 | PKCS12_decrypt_skey(const PKCS12_SAFEBAG *bag, const char *pass, int passlen) | 194 | PKCS12_decrypt_skey(const PKCS12_SAFEBAG *bag, const char *pass, int passlen) |
195 | { | 195 | { |
196 | return PKCS8_decrypt(bag->value.shkeybag, pass, passlen); | 196 | return PKCS8_decrypt(bag->value.shkeybag, pass, passlen); |
197 | } | 197 | } |
198 | LCRYPTO_ALIAS(PKCS12_decrypt_skey) | 198 | LCRYPTO_ALIAS(PKCS12_decrypt_skey); |
199 | 199 | ||
200 | int | 200 | int |
201 | PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) | 201 | PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) |
@@ -205,7 +205,7 @@ PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) | |||
205 | return 1; | 205 | return 1; |
206 | return 0; | 206 | return 0; |
207 | } | 207 | } |
208 | LCRYPTO_ALIAS(PKCS12_pack_authsafes) | 208 | LCRYPTO_ALIAS(PKCS12_pack_authsafes); |
209 | 209 | ||
210 | STACK_OF(PKCS7) * | 210 | STACK_OF(PKCS7) * |
211 | PKCS12_unpack_authsafes(const PKCS12 *p12) | 211 | PKCS12_unpack_authsafes(const PKCS12 *p12) |
@@ -217,4 +217,4 @@ PKCS12_unpack_authsafes(const PKCS12 *p12) | |||
217 | return ASN1_item_unpack(p12->authsafes->d.data, | 217 | return ASN1_item_unpack(p12->authsafes->d.data, |
218 | &PKCS12_AUTHSAFES_it); | 218 | &PKCS12_AUTHSAFES_it); |
219 | } | 219 | } |
220 | LCRYPTO_ALIAS(PKCS12_unpack_authsafes) | 220 | LCRYPTO_ALIAS(PKCS12_unpack_authsafes); |
diff --git a/src/lib/libcrypto/pkcs12/p12_asn.c b/src/lib/libcrypto/pkcs12/p12_asn.c index c45482d5f1..a9decccb5b 100644 --- a/src/lib/libcrypto/pkcs12/p12_asn.c +++ b/src/lib/libcrypto/pkcs12/p12_asn.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_asn.c,v 1.13 2022/11/12 13:03:28 beck Exp $ */ | 1 | /* $OpenBSD: p12_asn.c,v 1.14 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -106,28 +106,28 @@ d2i_PKCS12(PKCS12 **a, const unsigned char **in, long len) | |||
106 | return (PKCS12 *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 106 | return (PKCS12 *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
107 | &PKCS12_it); | 107 | &PKCS12_it); |
108 | } | 108 | } |
109 | LCRYPTO_ALIAS(d2i_PKCS12) | 109 | LCRYPTO_ALIAS(d2i_PKCS12); |
110 | 110 | ||
111 | int | 111 | int |
112 | i2d_PKCS12(PKCS12 *a, unsigned char **out) | 112 | i2d_PKCS12(PKCS12 *a, unsigned char **out) |
113 | { | 113 | { |
114 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS12_it); | 114 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS12_it); |
115 | } | 115 | } |
116 | LCRYPTO_ALIAS(i2d_PKCS12) | 116 | LCRYPTO_ALIAS(i2d_PKCS12); |
117 | 117 | ||
118 | PKCS12 * | 118 | PKCS12 * |
119 | PKCS12_new(void) | 119 | PKCS12_new(void) |
120 | { | 120 | { |
121 | return (PKCS12 *)ASN1_item_new(&PKCS12_it); | 121 | return (PKCS12 *)ASN1_item_new(&PKCS12_it); |
122 | } | 122 | } |
123 | LCRYPTO_ALIAS(PKCS12_new) | 123 | LCRYPTO_ALIAS(PKCS12_new); |
124 | 124 | ||
125 | void | 125 | void |
126 | PKCS12_free(PKCS12 *a) | 126 | PKCS12_free(PKCS12 *a) |
127 | { | 127 | { |
128 | ASN1_item_free((ASN1_VALUE *)a, &PKCS12_it); | 128 | ASN1_item_free((ASN1_VALUE *)a, &PKCS12_it); |
129 | } | 129 | } |
130 | LCRYPTO_ALIAS(PKCS12_free) | 130 | LCRYPTO_ALIAS(PKCS12_free); |
131 | 131 | ||
132 | static const ASN1_TEMPLATE PKCS12_MAC_DATA_seq_tt[] = { | 132 | static const ASN1_TEMPLATE PKCS12_MAC_DATA_seq_tt[] = { |
133 | { | 133 | { |
@@ -170,28 +170,28 @@ d2i_PKCS12_MAC_DATA(PKCS12_MAC_DATA **a, const unsigned char **in, long len) | |||
170 | return (PKCS12_MAC_DATA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 170 | return (PKCS12_MAC_DATA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
171 | &PKCS12_MAC_DATA_it); | 171 | &PKCS12_MAC_DATA_it); |
172 | } | 172 | } |
173 | LCRYPTO_ALIAS(d2i_PKCS12_MAC_DATA) | 173 | LCRYPTO_ALIAS(d2i_PKCS12_MAC_DATA); |
174 | 174 | ||
175 | int | 175 | int |
176 | i2d_PKCS12_MAC_DATA(PKCS12_MAC_DATA *a, unsigned char **out) | 176 | i2d_PKCS12_MAC_DATA(PKCS12_MAC_DATA *a, unsigned char **out) |
177 | { | 177 | { |
178 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS12_MAC_DATA_it); | 178 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS12_MAC_DATA_it); |
179 | } | 179 | } |
180 | LCRYPTO_ALIAS(i2d_PKCS12_MAC_DATA) | 180 | LCRYPTO_ALIAS(i2d_PKCS12_MAC_DATA); |
181 | 181 | ||
182 | PKCS12_MAC_DATA * | 182 | PKCS12_MAC_DATA * |
183 | PKCS12_MAC_DATA_new(void) | 183 | PKCS12_MAC_DATA_new(void) |
184 | { | 184 | { |
185 | return (PKCS12_MAC_DATA *)ASN1_item_new(&PKCS12_MAC_DATA_it); | 185 | return (PKCS12_MAC_DATA *)ASN1_item_new(&PKCS12_MAC_DATA_it); |
186 | } | 186 | } |
187 | LCRYPTO_ALIAS(PKCS12_MAC_DATA_new) | 187 | LCRYPTO_ALIAS(PKCS12_MAC_DATA_new); |
188 | 188 | ||
189 | void | 189 | void |
190 | PKCS12_MAC_DATA_free(PKCS12_MAC_DATA *a) | 190 | PKCS12_MAC_DATA_free(PKCS12_MAC_DATA *a) |
191 | { | 191 | { |
192 | ASN1_item_free((ASN1_VALUE *)a, &PKCS12_MAC_DATA_it); | 192 | ASN1_item_free((ASN1_VALUE *)a, &PKCS12_MAC_DATA_it); |
193 | } | 193 | } |
194 | LCRYPTO_ALIAS(PKCS12_MAC_DATA_free) | 194 | LCRYPTO_ALIAS(PKCS12_MAC_DATA_free); |
195 | 195 | ||
196 | static const ASN1_TEMPLATE bag_default_tt = { | 196 | static const ASN1_TEMPLATE bag_default_tt = { |
197 | .flags = ASN1_TFLG_EXPLICIT, | 197 | .flags = ASN1_TFLG_EXPLICIT, |
@@ -280,28 +280,28 @@ d2i_PKCS12_BAGS(PKCS12_BAGS **a, const unsigned char **in, long len) | |||
280 | return (PKCS12_BAGS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 280 | return (PKCS12_BAGS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
281 | &PKCS12_BAGS_it); | 281 | &PKCS12_BAGS_it); |
282 | } | 282 | } |
283 | LCRYPTO_ALIAS(d2i_PKCS12_BAGS) | 283 | LCRYPTO_ALIAS(d2i_PKCS12_BAGS); |
284 | 284 | ||
285 | int | 285 | int |
286 | i2d_PKCS12_BAGS(PKCS12_BAGS *a, unsigned char **out) | 286 | i2d_PKCS12_BAGS(PKCS12_BAGS *a, unsigned char **out) |
287 | { | 287 | { |
288 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS12_BAGS_it); | 288 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS12_BAGS_it); |
289 | } | 289 | } |
290 | LCRYPTO_ALIAS(i2d_PKCS12_BAGS) | 290 | LCRYPTO_ALIAS(i2d_PKCS12_BAGS); |
291 | 291 | ||
292 | PKCS12_BAGS * | 292 | PKCS12_BAGS * |
293 | PKCS12_BAGS_new(void) | 293 | PKCS12_BAGS_new(void) |
294 | { | 294 | { |
295 | return (PKCS12_BAGS *)ASN1_item_new(&PKCS12_BAGS_it); | 295 | return (PKCS12_BAGS *)ASN1_item_new(&PKCS12_BAGS_it); |
296 | } | 296 | } |
297 | LCRYPTO_ALIAS(PKCS12_BAGS_new) | 297 | LCRYPTO_ALIAS(PKCS12_BAGS_new); |
298 | 298 | ||
299 | void | 299 | void |
300 | PKCS12_BAGS_free(PKCS12_BAGS *a) | 300 | PKCS12_BAGS_free(PKCS12_BAGS *a) |
301 | { | 301 | { |
302 | ASN1_item_free((ASN1_VALUE *)a, &PKCS12_BAGS_it); | 302 | ASN1_item_free((ASN1_VALUE *)a, &PKCS12_BAGS_it); |
303 | } | 303 | } |
304 | LCRYPTO_ALIAS(PKCS12_BAGS_free) | 304 | LCRYPTO_ALIAS(PKCS12_BAGS_free); |
305 | 305 | ||
306 | static const ASN1_TEMPLATE safebag_default_tt = { | 306 | static const ASN1_TEMPLATE safebag_default_tt = { |
307 | .flags = ASN1_TFLG_EXPLICIT, | 307 | .flags = ASN1_TFLG_EXPLICIT, |
@@ -429,28 +429,28 @@ d2i_PKCS12_SAFEBAG(PKCS12_SAFEBAG **a, const unsigned char **in, long len) | |||
429 | return (PKCS12_SAFEBAG *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 429 | return (PKCS12_SAFEBAG *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
430 | &PKCS12_SAFEBAG_it); | 430 | &PKCS12_SAFEBAG_it); |
431 | } | 431 | } |
432 | LCRYPTO_ALIAS(d2i_PKCS12_SAFEBAG) | 432 | LCRYPTO_ALIAS(d2i_PKCS12_SAFEBAG); |
433 | 433 | ||
434 | int | 434 | int |
435 | i2d_PKCS12_SAFEBAG(PKCS12_SAFEBAG *a, unsigned char **out) | 435 | i2d_PKCS12_SAFEBAG(PKCS12_SAFEBAG *a, unsigned char **out) |
436 | { | 436 | { |
437 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS12_SAFEBAG_it); | 437 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS12_SAFEBAG_it); |
438 | } | 438 | } |
439 | LCRYPTO_ALIAS(i2d_PKCS12_SAFEBAG) | 439 | LCRYPTO_ALIAS(i2d_PKCS12_SAFEBAG); |
440 | 440 | ||
441 | PKCS12_SAFEBAG * | 441 | PKCS12_SAFEBAG * |
442 | PKCS12_SAFEBAG_new(void) | 442 | PKCS12_SAFEBAG_new(void) |
443 | { | 443 | { |
444 | return (PKCS12_SAFEBAG *)ASN1_item_new(&PKCS12_SAFEBAG_it); | 444 | return (PKCS12_SAFEBAG *)ASN1_item_new(&PKCS12_SAFEBAG_it); |
445 | } | 445 | } |
446 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_new) | 446 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_new); |
447 | 447 | ||
448 | void | 448 | void |
449 | PKCS12_SAFEBAG_free(PKCS12_SAFEBAG *a) | 449 | PKCS12_SAFEBAG_free(PKCS12_SAFEBAG *a) |
450 | { | 450 | { |
451 | ASN1_item_free((ASN1_VALUE *)a, &PKCS12_SAFEBAG_it); | 451 | ASN1_item_free((ASN1_VALUE *)a, &PKCS12_SAFEBAG_it); |
452 | } | 452 | } |
453 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_free) | 453 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_free); |
454 | 454 | ||
455 | /* SEQUENCE OF SafeBag */ | 455 | /* SEQUENCE OF SafeBag */ |
456 | static const ASN1_TEMPLATE PKCS12_SAFEBAGS_item_tt = { | 456 | static const ASN1_TEMPLATE PKCS12_SAFEBAGS_item_tt = { |
diff --git a/src/lib/libcrypto/pkcs12/p12_attr.c b/src/lib/libcrypto/pkcs12/p12_attr.c index e1635ea038..d43b205a07 100644 --- a/src/lib/libcrypto/pkcs12/p12_attr.c +++ b/src/lib/libcrypto/pkcs12/p12_attr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_attr.c,v 1.19 2022/11/26 16:08:53 tb Exp $ */ | 1 | /* $OpenBSD: p12_attr.c,v 1.20 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -74,7 +74,7 @@ PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, int namelen) | |||
74 | else | 74 | else |
75 | return 0; | 75 | return 0; |
76 | } | 76 | } |
77 | LCRYPTO_ALIAS(PKCS12_add_localkeyid) | 77 | LCRYPTO_ALIAS(PKCS12_add_localkeyid); |
78 | 78 | ||
79 | /* Add key usage to PKCS#8 structure */ | 79 | /* Add key usage to PKCS#8 structure */ |
80 | 80 | ||
@@ -86,7 +86,7 @@ PKCS8_add_keyusage(PKCS8_PRIV_KEY_INFO *p8, int usage) | |||
86 | return PKCS8_pkey_add1_attr_by_NID(p8, NID_key_usage, V_ASN1_BIT_STRING, | 86 | return PKCS8_pkey_add1_attr_by_NID(p8, NID_key_usage, V_ASN1_BIT_STRING, |
87 | &us_val, 1); | 87 | &us_val, 1); |
88 | } | 88 | } |
89 | LCRYPTO_ALIAS(PKCS8_add_keyusage) | 89 | LCRYPTO_ALIAS(PKCS8_add_keyusage); |
90 | 90 | ||
91 | /* Add a friendlyname to a safebag */ | 91 | /* Add a friendlyname to a safebag */ |
92 | 92 | ||
@@ -99,7 +99,7 @@ PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, int namelen) | |||
99 | else | 99 | else |
100 | return 0; | 100 | return 0; |
101 | } | 101 | } |
102 | LCRYPTO_ALIAS(PKCS12_add_friendlyname_asc) | 102 | LCRYPTO_ALIAS(PKCS12_add_friendlyname_asc); |
103 | 103 | ||
104 | 104 | ||
105 | int | 105 | int |
@@ -112,7 +112,7 @@ PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, const unsigned char *name, | |||
112 | else | 112 | else |
113 | return 0; | 113 | return 0; |
114 | } | 114 | } |
115 | LCRYPTO_ALIAS(PKCS12_add_friendlyname_uni) | 115 | LCRYPTO_ALIAS(PKCS12_add_friendlyname_uni); |
116 | 116 | ||
117 | int | 117 | int |
118 | PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, int namelen) | 118 | PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, int namelen) |
@@ -123,7 +123,7 @@ PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, int namelen) | |||
123 | else | 123 | else |
124 | return 0; | 124 | return 0; |
125 | } | 125 | } |
126 | LCRYPTO_ALIAS(PKCS12_add_CSPName_asc) | 126 | LCRYPTO_ALIAS(PKCS12_add_CSPName_asc); |
127 | 127 | ||
128 | ASN1_TYPE * | 128 | ASN1_TYPE * |
129 | PKCS12_get_attr_gen(const STACK_OF(X509_ATTRIBUTE) *attrs, int attr_nid) | 129 | PKCS12_get_attr_gen(const STACK_OF(X509_ATTRIBUTE) *attrs, int attr_nid) |
@@ -140,7 +140,7 @@ PKCS12_get_attr_gen(const STACK_OF(X509_ATTRIBUTE) *attrs, int attr_nid) | |||
140 | } | 140 | } |
141 | return NULL; | 141 | return NULL; |
142 | } | 142 | } |
143 | LCRYPTO_ALIAS(PKCS12_get_attr_gen) | 143 | LCRYPTO_ALIAS(PKCS12_get_attr_gen); |
144 | 144 | ||
145 | char * | 145 | char * |
146 | PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) | 146 | PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) |
@@ -154,11 +154,11 @@ PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) | |||
154 | return OPENSSL_uni2asc(atype->value.bmpstring->data, | 154 | return OPENSSL_uni2asc(atype->value.bmpstring->data, |
155 | atype->value.bmpstring->length); | 155 | atype->value.bmpstring->length); |
156 | } | 156 | } |
157 | LCRYPTO_ALIAS(PKCS12_get_friendlyname) | 157 | LCRYPTO_ALIAS(PKCS12_get_friendlyname); |
158 | 158 | ||
159 | const STACK_OF(X509_ATTRIBUTE) * | 159 | const STACK_OF(X509_ATTRIBUTE) * |
160 | PKCS12_SAFEBAG_get0_attrs(const PKCS12_SAFEBAG *bag) | 160 | PKCS12_SAFEBAG_get0_attrs(const PKCS12_SAFEBAG *bag) |
161 | { | 161 | { |
162 | return bag->attrib; | 162 | return bag->attrib; |
163 | } | 163 | } |
164 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_attrs) | 164 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_attrs); |
diff --git a/src/lib/libcrypto/pkcs12/p12_crpt.c b/src/lib/libcrypto/pkcs12/p12_crpt.c index 63474621cb..e7d30101c3 100644 --- a/src/lib/libcrypto/pkcs12/p12_crpt.c +++ b/src/lib/libcrypto/pkcs12/p12_crpt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_crpt.c,v 1.16 2022/11/12 13:03:28 beck Exp $ */ | 1 | /* $OpenBSD: p12_crpt.c,v 1.17 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -68,7 +68,7 @@ void | |||
68 | PKCS12_PBE_add(void) | 68 | PKCS12_PBE_add(void) |
69 | { | 69 | { |
70 | } | 70 | } |
71 | LCRYPTO_ALIAS(PKCS12_PBE_add) | 71 | LCRYPTO_ALIAS(PKCS12_PBE_add); |
72 | 72 | ||
73 | int | 73 | int |
74 | PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | 74 | PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, |
@@ -120,4 +120,4 @@ PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, | |||
120 | explicit_bzero(iv, EVP_MAX_IV_LENGTH); | 120 | explicit_bzero(iv, EVP_MAX_IV_LENGTH); |
121 | return ret; | 121 | return ret; |
122 | } | 122 | } |
123 | LCRYPTO_ALIAS(PKCS12_PBE_keyivgen) | 123 | LCRYPTO_ALIAS(PKCS12_PBE_keyivgen); |
diff --git a/src/lib/libcrypto/pkcs12/p12_crt.c b/src/lib/libcrypto/pkcs12/p12_crt.c index 8655be108e..90a0cbe555 100644 --- a/src/lib/libcrypto/pkcs12/p12_crt.c +++ b/src/lib/libcrypto/pkcs12/p12_crt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_crt.c,v 1.22 2023/01/24 09:48:57 job Exp $ */ | 1 | /* $OpenBSD: p12_crt.c,v 1.23 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -184,7 +184,7 @@ err: | |||
184 | sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); | 184 | sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); |
185 | return NULL; | 185 | return NULL; |
186 | } | 186 | } |
187 | LCRYPTO_ALIAS(PKCS12_create) | 187 | LCRYPTO_ALIAS(PKCS12_create); |
188 | 188 | ||
189 | PKCS12_SAFEBAG * | 189 | PKCS12_SAFEBAG * |
190 | PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert) | 190 | PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert) |
@@ -222,7 +222,7 @@ err: | |||
222 | 222 | ||
223 | return NULL; | 223 | return NULL; |
224 | } | 224 | } |
225 | LCRYPTO_ALIAS(PKCS12_add_cert) | 225 | LCRYPTO_ALIAS(PKCS12_add_cert); |
226 | 226 | ||
227 | PKCS12_SAFEBAG * | 227 | PKCS12_SAFEBAG * |
228 | PKCS12_add_key(STACK_OF(PKCS12_SAFEBAG) **pbags, EVP_PKEY *key, int key_usage, | 228 | PKCS12_add_key(STACK_OF(PKCS12_SAFEBAG) **pbags, EVP_PKEY *key, int key_usage, |
@@ -263,7 +263,7 @@ err: | |||
263 | 263 | ||
264 | return NULL; | 264 | return NULL; |
265 | } | 265 | } |
266 | LCRYPTO_ALIAS(PKCS12_add_key) | 266 | LCRYPTO_ALIAS(PKCS12_add_key); |
267 | 267 | ||
268 | int | 268 | int |
269 | PKCS12_add_safe(STACK_OF(PKCS7) **psafes, STACK_OF(PKCS12_SAFEBAG) *bags, | 269 | PKCS12_add_safe(STACK_OF(PKCS7) **psafes, STACK_OF(PKCS12_SAFEBAG) *bags, |
@@ -307,7 +307,7 @@ err: | |||
307 | 307 | ||
308 | return 0; | 308 | return 0; |
309 | } | 309 | } |
310 | LCRYPTO_ALIAS(PKCS12_add_safe) | 310 | LCRYPTO_ALIAS(PKCS12_add_safe); |
311 | 311 | ||
312 | static int | 312 | static int |
313 | pkcs12_add_bag(STACK_OF(PKCS12_SAFEBAG) **pbags, PKCS12_SAFEBAG *bag) | 313 | pkcs12_add_bag(STACK_OF(PKCS12_SAFEBAG) **pbags, PKCS12_SAFEBAG *bag) |
@@ -354,4 +354,4 @@ PKCS12_add_safes(STACK_OF(PKCS7) *safes, int nid_p7) | |||
354 | 354 | ||
355 | return p12; | 355 | return p12; |
356 | } | 356 | } |
357 | LCRYPTO_ALIAS(PKCS12_add_safes) | 357 | LCRYPTO_ALIAS(PKCS12_add_safes); |
diff --git a/src/lib/libcrypto/pkcs12/p12_decr.c b/src/lib/libcrypto/pkcs12/p12_decr.c index 2d3d284a53..ea7f6a5ffa 100644 --- a/src/lib/libcrypto/pkcs12/p12_decr.c +++ b/src/lib/libcrypto/pkcs12/p12_decr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_decr.c,v 1.23 2022/11/26 16:08:53 tb Exp $ */ | 1 | /* $OpenBSD: p12_decr.c,v 1.24 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -116,7 +116,7 @@ err: | |||
116 | return out; | 116 | return out; |
117 | 117 | ||
118 | } | 118 | } |
119 | LCRYPTO_ALIAS(PKCS12_pbe_crypt) | 119 | LCRYPTO_ALIAS(PKCS12_pbe_crypt); |
120 | 120 | ||
121 | /* Decrypt an OCTET STRING and decode ASN1 structure | 121 | /* Decrypt an OCTET STRING and decode ASN1 structure |
122 | * if zbuf set zero buffer after use. | 122 | * if zbuf set zero buffer after use. |
@@ -145,7 +145,7 @@ PKCS12_item_decrypt_d2i(const X509_ALGOR *algor, const ASN1_ITEM *it, | |||
145 | free(out); | 145 | free(out); |
146 | return ret; | 146 | return ret; |
147 | } | 147 | } |
148 | LCRYPTO_ALIAS(PKCS12_item_decrypt_d2i) | 148 | LCRYPTO_ALIAS(PKCS12_item_decrypt_d2i); |
149 | 149 | ||
150 | /* Encode ASN1 structure and encrypt, return OCTET STRING | 150 | /* Encode ASN1 structure and encrypt, return OCTET STRING |
151 | * if zbuf set zero encoding. | 151 | * if zbuf set zero encoding. |
@@ -184,6 +184,6 @@ err: | |||
184 | ASN1_OCTET_STRING_free(oct); | 184 | ASN1_OCTET_STRING_free(oct); |
185 | return NULL; | 185 | return NULL; |
186 | } | 186 | } |
187 | LCRYPTO_ALIAS(PKCS12_item_i2d_encrypt) | 187 | LCRYPTO_ALIAS(PKCS12_item_i2d_encrypt); |
188 | 188 | ||
189 | IMPLEMENT_PKCS12_STACK_OF(PKCS7) | 189 | IMPLEMENT_PKCS12_STACK_OF(PKCS7) |
diff --git a/src/lib/libcrypto/pkcs12/p12_init.c b/src/lib/libcrypto/pkcs12/p12_init.c index b865017c8d..09ff0d5593 100644 --- a/src/lib/libcrypto/pkcs12/p12_init.c +++ b/src/lib/libcrypto/pkcs12/p12_init.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_init.c,v 1.15 2022/11/12 13:03:28 beck Exp $ */ | 1 | /* $OpenBSD: p12_init.c,v 1.16 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -98,4 +98,4 @@ err: | |||
98 | PKCS12_free(pkcs12); | 98 | PKCS12_free(pkcs12); |
99 | return NULL; | 99 | return NULL; |
100 | } | 100 | } |
101 | LCRYPTO_ALIAS(PKCS12_init) | 101 | LCRYPTO_ALIAS(PKCS12_init); |
diff --git a/src/lib/libcrypto/pkcs12/p12_key.c b/src/lib/libcrypto/pkcs12/p12_key.c index 57cfd8b077..8812f1c06a 100644 --- a/src/lib/libcrypto/pkcs12/p12_key.c +++ b/src/lib/libcrypto/pkcs12/p12_key.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_key.c,v 1.33 2022/11/26 16:08:53 tb Exp $ */ | 1 | /* $OpenBSD: p12_key.c,v 1.34 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -93,7 +93,7 @@ PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, | |||
93 | freezero(unipass, uniplen); | 93 | freezero(unipass, uniplen); |
94 | return ret; | 94 | return ret; |
95 | } | 95 | } |
96 | LCRYPTO_ALIAS(PKCS12_key_gen_asc) | 96 | LCRYPTO_ALIAS(PKCS12_key_gen_asc); |
97 | 97 | ||
98 | int | 98 | int |
99 | PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, | 99 | PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, |
@@ -194,4 +194,4 @@ PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, | |||
194 | 194 | ||
195 | return ret; | 195 | return ret; |
196 | } | 196 | } |
197 | LCRYPTO_ALIAS(PKCS12_key_gen_uni) | 197 | LCRYPTO_ALIAS(PKCS12_key_gen_uni); |
diff --git a/src/lib/libcrypto/pkcs12/p12_kiss.c b/src/lib/libcrypto/pkcs12/p12_kiss.c index 1cf2fa7d49..48bbd137c6 100644 --- a/src/lib/libcrypto/pkcs12/p12_kiss.c +++ b/src/lib/libcrypto/pkcs12/p12_kiss.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_kiss.c,v 1.26 2022/11/12 13:03:28 beck Exp $ */ | 1 | /* $OpenBSD: p12_kiss.c,v 1.27 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -168,7 +168,7 @@ err: | |||
168 | 168 | ||
169 | return 0; | 169 | return 0; |
170 | } | 170 | } |
171 | LCRYPTO_ALIAS(PKCS12_parse) | 171 | LCRYPTO_ALIAS(PKCS12_parse); |
172 | 172 | ||
173 | /* Parse the outer PKCS#12 structure */ | 173 | /* Parse the outer PKCS#12 structure */ |
174 | 174 | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_mutl.c b/src/lib/libcrypto/pkcs12/p12_mutl.c index abfd9dd4b7..f0e6df9eb6 100644 --- a/src/lib/libcrypto/pkcs12/p12_mutl.c +++ b/src/lib/libcrypto/pkcs12/p12_mutl.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_mutl.c,v 1.34 2022/11/26 16:08:53 tb Exp $ */ | 1 | /* $OpenBSD: p12_mutl.c,v 1.35 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -78,7 +78,7 @@ PKCS12_mac_present(const PKCS12 *p12) | |||
78 | { | 78 | { |
79 | return p12->mac != NULL; | 79 | return p12->mac != NULL; |
80 | } | 80 | } |
81 | LCRYPTO_ALIAS(PKCS12_mac_present) | 81 | LCRYPTO_ALIAS(PKCS12_mac_present); |
82 | 82 | ||
83 | void | 83 | void |
84 | PKCS12_get0_mac(const ASN1_OCTET_STRING **pmac, const X509_ALGOR **pmacalg, | 84 | PKCS12_get0_mac(const ASN1_OCTET_STRING **pmac, const X509_ALGOR **pmacalg, |
@@ -106,7 +106,7 @@ PKCS12_get0_mac(const ASN1_OCTET_STRING **pmac, const X509_ALGOR **pmacalg, | |||
106 | if (piter != NULL) | 106 | if (piter != NULL) |
107 | *piter = p12->mac->iter; | 107 | *piter = p12->mac->iter; |
108 | } | 108 | } |
109 | LCRYPTO_ALIAS(PKCS12_get0_mac) | 109 | LCRYPTO_ALIAS(PKCS12_get0_mac); |
110 | 110 | ||
111 | /* Generate a MAC */ | 111 | /* Generate a MAC */ |
112 | int | 112 | int |
@@ -169,7 +169,7 @@ PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, | |||
169 | 169 | ||
170 | return ret; | 170 | return ret; |
171 | } | 171 | } |
172 | LCRYPTO_ALIAS(PKCS12_gen_mac) | 172 | LCRYPTO_ALIAS(PKCS12_gen_mac); |
173 | 173 | ||
174 | /* Verify the mac */ | 174 | /* Verify the mac */ |
175 | int | 175 | int |
@@ -191,7 +191,7 @@ PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) | |||
191 | return 0; | 191 | return 0; |
192 | return 1; | 192 | return 1; |
193 | } | 193 | } |
194 | LCRYPTO_ALIAS(PKCS12_verify_mac) | 194 | LCRYPTO_ALIAS(PKCS12_verify_mac); |
195 | 195 | ||
196 | /* Set a mac */ | 196 | /* Set a mac */ |
197 | 197 | ||
@@ -219,7 +219,7 @@ PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, | |||
219 | } | 219 | } |
220 | return 1; | 220 | return 1; |
221 | } | 221 | } |
222 | LCRYPTO_ALIAS(PKCS12_set_mac) | 222 | LCRYPTO_ALIAS(PKCS12_set_mac); |
223 | 223 | ||
224 | /* Set up a mac structure */ | 224 | /* Set up a mac structure */ |
225 | int | 225 | int |
@@ -259,5 +259,5 @@ PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, | |||
259 | 259 | ||
260 | return 1; | 260 | return 1; |
261 | } | 261 | } |
262 | LCRYPTO_ALIAS(PKCS12_setup_mac) | 262 | LCRYPTO_ALIAS(PKCS12_setup_mac); |
263 | #endif | 263 | #endif |
diff --git a/src/lib/libcrypto/pkcs12/p12_npas.c b/src/lib/libcrypto/pkcs12/p12_npas.c index 1e2538717e..30dd2ef8c4 100644 --- a/src/lib/libcrypto/pkcs12/p12_npas.c +++ b/src/lib/libcrypto/pkcs12/p12_npas.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_npas.c,v 1.17 2022/11/26 16:08:53 tb Exp $ */ | 1 | /* $OpenBSD: p12_npas.c,v 1.18 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -103,7 +103,7 @@ PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass) | |||
103 | 103 | ||
104 | return 1; | 104 | return 1; |
105 | } | 105 | } |
106 | LCRYPTO_ALIAS(PKCS12_newpass) | 106 | LCRYPTO_ALIAS(PKCS12_newpass); |
107 | 107 | ||
108 | /* Parse the outer PKCS#12 structure */ | 108 | /* Parse the outer PKCS#12 structure */ |
109 | 109 | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_p8d.c b/src/lib/libcrypto/pkcs12/p12_p8d.c index 53942a1d70..dd5e8d9875 100644 --- a/src/lib/libcrypto/pkcs12/p12_p8d.c +++ b/src/lib/libcrypto/pkcs12/p12_p8d.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_p8d.c,v 1.10 2022/11/26 16:08:53 tb Exp $ */ | 1 | /* $OpenBSD: p12_p8d.c,v 1.11 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2001. | 3 | * project 2001. |
4 | */ | 4 | */ |
@@ -68,4 +68,4 @@ PKCS8_decrypt(const X509_SIG *p8, const char *pass, int passlen) | |||
68 | return PKCS12_item_decrypt_d2i(p8->algor, | 68 | return PKCS12_item_decrypt_d2i(p8->algor, |
69 | &PKCS8_PRIV_KEY_INFO_it, pass, passlen, p8->digest, 1); | 69 | &PKCS8_PRIV_KEY_INFO_it, pass, passlen, p8->digest, 1); |
70 | } | 70 | } |
71 | LCRYPTO_ALIAS(PKCS8_decrypt) | 71 | LCRYPTO_ALIAS(PKCS8_decrypt); |
diff --git a/src/lib/libcrypto/pkcs12/p12_p8e.c b/src/lib/libcrypto/pkcs12/p12_p8e.c index 147d207cc8..87c4be56a3 100644 --- a/src/lib/libcrypto/pkcs12/p12_p8e.c +++ b/src/lib/libcrypto/pkcs12/p12_p8e.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_p8e.c,v 1.11 2022/11/26 16:08:53 tb Exp $ */ | 1 | /* $OpenBSD: p12_p8e.c,v 1.12 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2001. | 3 | * project 2001. |
4 | */ | 4 | */ |
@@ -100,4 +100,4 @@ err: | |||
100 | X509_SIG_free(p8); | 100 | X509_SIG_free(p8); |
101 | return NULL; | 101 | return NULL; |
102 | } | 102 | } |
103 | LCRYPTO_ALIAS(PKCS8_encrypt) | 103 | LCRYPTO_ALIAS(PKCS8_encrypt); |
diff --git a/src/lib/libcrypto/pkcs12/p12_sbag.c b/src/lib/libcrypto/pkcs12/p12_sbag.c index 16ada0eeb1..b7772b67b8 100644 --- a/src/lib/libcrypto/pkcs12/p12_sbag.c +++ b/src/lib/libcrypto/pkcs12/p12_sbag.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_sbag.c,v 1.7 2022/11/26 16:08:53 tb Exp $ */ | 1 | /* $OpenBSD: p12_sbag.c,v 1.8 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project | 3 | * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project |
4 | * 1999-2018. | 4 | * 1999-2018. |
@@ -70,14 +70,14 @@ PKCS12_SAFEBAG_get0_attr(const PKCS12_SAFEBAG *bag, int attr_nid) | |||
70 | { | 70 | { |
71 | return PKCS12_get_attr_gen(bag->attrib, attr_nid); | 71 | return PKCS12_get_attr_gen(bag->attrib, attr_nid); |
72 | } | 72 | } |
73 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_attr) | 73 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_attr); |
74 | 74 | ||
75 | ASN1_TYPE * | 75 | ASN1_TYPE * |
76 | PKCS8_get_attr(PKCS8_PRIV_KEY_INFO *p8, int attr_nid) | 76 | PKCS8_get_attr(PKCS8_PRIV_KEY_INFO *p8, int attr_nid) |
77 | { | 77 | { |
78 | return PKCS12_get_attr_gen(p8->attributes, attr_nid); | 78 | return PKCS12_get_attr_gen(p8->attributes, attr_nid); |
79 | } | 79 | } |
80 | LCRYPTO_ALIAS(PKCS8_get_attr) | 80 | LCRYPTO_ALIAS(PKCS8_get_attr); |
81 | 81 | ||
82 | const PKCS8_PRIV_KEY_INFO * | 82 | const PKCS8_PRIV_KEY_INFO * |
83 | PKCS12_SAFEBAG_get0_p8inf(const PKCS12_SAFEBAG *bag) | 83 | PKCS12_SAFEBAG_get0_p8inf(const PKCS12_SAFEBAG *bag) |
@@ -87,7 +87,7 @@ PKCS12_SAFEBAG_get0_p8inf(const PKCS12_SAFEBAG *bag) | |||
87 | 87 | ||
88 | return bag->value.keybag; | 88 | return bag->value.keybag; |
89 | } | 89 | } |
90 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_p8inf) | 90 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_p8inf); |
91 | 91 | ||
92 | const X509_SIG * | 92 | const X509_SIG * |
93 | PKCS12_SAFEBAG_get0_pkcs8(const PKCS12_SAFEBAG *bag) | 93 | PKCS12_SAFEBAG_get0_pkcs8(const PKCS12_SAFEBAG *bag) |
@@ -97,7 +97,7 @@ PKCS12_SAFEBAG_get0_pkcs8(const PKCS12_SAFEBAG *bag) | |||
97 | 97 | ||
98 | return bag->value.shkeybag; | 98 | return bag->value.shkeybag; |
99 | } | 99 | } |
100 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_pkcs8) | 100 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_pkcs8); |
101 | 101 | ||
102 | const STACK_OF(PKCS12_SAFEBAG) * | 102 | const STACK_OF(PKCS12_SAFEBAG) * |
103 | PKCS12_SAFEBAG_get0_safes(const PKCS12_SAFEBAG *bag) | 103 | PKCS12_SAFEBAG_get0_safes(const PKCS12_SAFEBAG *bag) |
@@ -107,21 +107,21 @@ PKCS12_SAFEBAG_get0_safes(const PKCS12_SAFEBAG *bag) | |||
107 | 107 | ||
108 | return bag->value.safes; | 108 | return bag->value.safes; |
109 | } | 109 | } |
110 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_safes) | 110 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_safes); |
111 | 111 | ||
112 | const ASN1_OBJECT * | 112 | const ASN1_OBJECT * |
113 | PKCS12_SAFEBAG_get0_type(const PKCS12_SAFEBAG *bag) | 113 | PKCS12_SAFEBAG_get0_type(const PKCS12_SAFEBAG *bag) |
114 | { | 114 | { |
115 | return bag->type; | 115 | return bag->type; |
116 | } | 116 | } |
117 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_type) | 117 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_type); |
118 | 118 | ||
119 | int | 119 | int |
120 | PKCS12_SAFEBAG_get_nid(const PKCS12_SAFEBAG *bag) | 120 | PKCS12_SAFEBAG_get_nid(const PKCS12_SAFEBAG *bag) |
121 | { | 121 | { |
122 | return OBJ_obj2nid(bag->type); | 122 | return OBJ_obj2nid(bag->type); |
123 | } | 123 | } |
124 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get_nid) | 124 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get_nid); |
125 | 125 | ||
126 | int | 126 | int |
127 | PKCS12_SAFEBAG_get_bag_nid(const PKCS12_SAFEBAG *bag) | 127 | PKCS12_SAFEBAG_get_bag_nid(const PKCS12_SAFEBAG *bag) |
@@ -136,7 +136,7 @@ PKCS12_SAFEBAG_get_bag_nid(const PKCS12_SAFEBAG *bag) | |||
136 | 136 | ||
137 | return -1; | 137 | return -1; |
138 | } | 138 | } |
139 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get_bag_nid) | 139 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get_bag_nid); |
140 | 140 | ||
141 | X509 * | 141 | X509 * |
142 | PKCS12_SAFEBAG_get1_cert(const PKCS12_SAFEBAG *bag) | 142 | PKCS12_SAFEBAG_get1_cert(const PKCS12_SAFEBAG *bag) |
@@ -147,7 +147,7 @@ PKCS12_SAFEBAG_get1_cert(const PKCS12_SAFEBAG *bag) | |||
147 | return NULL; | 147 | return NULL; |
148 | return ASN1_item_unpack(bag->value.bag->value.octet, &X509_it); | 148 | return ASN1_item_unpack(bag->value.bag->value.octet, &X509_it); |
149 | } | 149 | } |
150 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get1_cert) | 150 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get1_cert); |
151 | 151 | ||
152 | X509_CRL * | 152 | X509_CRL * |
153 | PKCS12_SAFEBAG_get1_crl(const PKCS12_SAFEBAG *bag) | 153 | PKCS12_SAFEBAG_get1_crl(const PKCS12_SAFEBAG *bag) |
@@ -158,7 +158,7 @@ PKCS12_SAFEBAG_get1_crl(const PKCS12_SAFEBAG *bag) | |||
158 | return NULL; | 158 | return NULL; |
159 | return ASN1_item_unpack(bag->value.bag->value.octet, &X509_CRL_it); | 159 | return ASN1_item_unpack(bag->value.bag->value.octet, &X509_CRL_it); |
160 | } | 160 | } |
161 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get1_crl) | 161 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get1_crl); |
162 | 162 | ||
163 | PKCS12_SAFEBAG * | 163 | PKCS12_SAFEBAG * |
164 | PKCS12_SAFEBAG_create_cert(X509 *x509) | 164 | PKCS12_SAFEBAG_create_cert(X509 *x509) |
@@ -166,7 +166,7 @@ PKCS12_SAFEBAG_create_cert(X509 *x509) | |||
166 | return PKCS12_item_pack_safebag(x509, &X509_it, | 166 | return PKCS12_item_pack_safebag(x509, &X509_it, |
167 | NID_x509Certificate, NID_certBag); | 167 | NID_x509Certificate, NID_certBag); |
168 | } | 168 | } |
169 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_create_cert) | 169 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_create_cert); |
170 | 170 | ||
171 | PKCS12_SAFEBAG * | 171 | PKCS12_SAFEBAG * |
172 | PKCS12_SAFEBAG_create_crl(X509_CRL *crl) | 172 | PKCS12_SAFEBAG_create_crl(X509_CRL *crl) |
@@ -174,7 +174,7 @@ PKCS12_SAFEBAG_create_crl(X509_CRL *crl) | |||
174 | return PKCS12_item_pack_safebag(crl, &X509_CRL_it, | 174 | return PKCS12_item_pack_safebag(crl, &X509_CRL_it, |
175 | NID_x509Crl, NID_crlBag); | 175 | NID_x509Crl, NID_crlBag); |
176 | } | 176 | } |
177 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_create_crl) | 177 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_create_crl); |
178 | 178 | ||
179 | /* Turn PKCS8 object into a keybag */ | 179 | /* Turn PKCS8 object into a keybag */ |
180 | 180 | ||
@@ -193,7 +193,7 @@ PKCS12_SAFEBAG_create0_p8inf(PKCS8_PRIV_KEY_INFO *p8) | |||
193 | 193 | ||
194 | return bag; | 194 | return bag; |
195 | } | 195 | } |
196 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_create0_p8inf) | 196 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_create0_p8inf); |
197 | 197 | ||
198 | /* Turn PKCS8 object into a shrouded keybag */ | 198 | /* Turn PKCS8 object into a shrouded keybag */ |
199 | 199 | ||
@@ -213,7 +213,7 @@ PKCS12_SAFEBAG_create0_pkcs8(X509_SIG *p8) | |||
213 | 213 | ||
214 | return bag; | 214 | return bag; |
215 | } | 215 | } |
216 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_create0_pkcs8) | 216 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_create0_pkcs8); |
217 | 217 | ||
218 | PKCS12_SAFEBAG * | 218 | PKCS12_SAFEBAG * |
219 | PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen, | 219 | PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen, |
@@ -237,4 +237,4 @@ PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen, | |||
237 | 237 | ||
238 | return bag; | 238 | return bag; |
239 | } | 239 | } |
240 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_create_pkcs8_encrypt) | 240 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_create_pkcs8_encrypt); |
diff --git a/src/lib/libcrypto/pkcs12/p12_utl.c b/src/lib/libcrypto/pkcs12/p12_utl.c index 0758e875ae..72692a9eae 100644 --- a/src/lib/libcrypto/pkcs12/p12_utl.c +++ b/src/lib/libcrypto/pkcs12/p12_utl.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: p12_utl.c,v 1.20 2022/11/12 13:03:28 beck Exp $ */ | 1 | /* $OpenBSD: p12_utl.c,v 1.21 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -100,7 +100,7 @@ OPENSSL_asc2uni(const char *asc, int asclen, unsigned char **uni, int *unilen) | |||
100 | *uni = unitmp; | 100 | *uni = unitmp; |
101 | return unitmp; | 101 | return unitmp; |
102 | } | 102 | } |
103 | LCRYPTO_ALIAS(OPENSSL_asc2uni) | 103 | LCRYPTO_ALIAS(OPENSSL_asc2uni); |
104 | 104 | ||
105 | char * | 105 | char * |
106 | OPENSSL_uni2asc(const unsigned char *uni, int unilen) | 106 | OPENSSL_uni2asc(const unsigned char *uni, int unilen) |
@@ -126,32 +126,32 @@ OPENSSL_uni2asc(const unsigned char *uni, int unilen) | |||
126 | asctmp[asclen - 1] = '\0'; | 126 | asctmp[asclen - 1] = '\0'; |
127 | return asctmp; | 127 | return asctmp; |
128 | } | 128 | } |
129 | LCRYPTO_ALIAS(OPENSSL_uni2asc) | 129 | LCRYPTO_ALIAS(OPENSSL_uni2asc); |
130 | 130 | ||
131 | int | 131 | int |
132 | i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) | 132 | i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) |
133 | { | 133 | { |
134 | return ASN1_item_i2d_bio(&PKCS12_it, bp, p12); | 134 | return ASN1_item_i2d_bio(&PKCS12_it, bp, p12); |
135 | } | 135 | } |
136 | LCRYPTO_ALIAS(i2d_PKCS12_bio) | 136 | LCRYPTO_ALIAS(i2d_PKCS12_bio); |
137 | 137 | ||
138 | int | 138 | int |
139 | i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) | 139 | i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) |
140 | { | 140 | { |
141 | return ASN1_item_i2d_fp(&PKCS12_it, fp, p12); | 141 | return ASN1_item_i2d_fp(&PKCS12_it, fp, p12); |
142 | } | 142 | } |
143 | LCRYPTO_ALIAS(i2d_PKCS12_fp) | 143 | LCRYPTO_ALIAS(i2d_PKCS12_fp); |
144 | 144 | ||
145 | PKCS12 * | 145 | PKCS12 * |
146 | d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) | 146 | d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) |
147 | { | 147 | { |
148 | return ASN1_item_d2i_bio(&PKCS12_it, bp, p12); | 148 | return ASN1_item_d2i_bio(&PKCS12_it, bp, p12); |
149 | } | 149 | } |
150 | LCRYPTO_ALIAS(d2i_PKCS12_bio) | 150 | LCRYPTO_ALIAS(d2i_PKCS12_bio); |
151 | 151 | ||
152 | PKCS12 * | 152 | PKCS12 * |
153 | d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) | 153 | d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) |
154 | { | 154 | { |
155 | return ASN1_item_d2i_fp(&PKCS12_it, fp, p12); | 155 | return ASN1_item_d2i_fp(&PKCS12_it, fp, p12); |
156 | } | 156 | } |
157 | LCRYPTO_ALIAS(d2i_PKCS12_fp) | 157 | LCRYPTO_ALIAS(d2i_PKCS12_fp); |
diff --git a/src/lib/libcrypto/pkcs12/pk12err.c b/src/lib/libcrypto/pkcs12/pk12err.c index 7e9149288d..3af03528a2 100644 --- a/src/lib/libcrypto/pkcs12/pk12err.c +++ b/src/lib/libcrypto/pkcs12/pk12err.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pk12err.c,v 1.13 2022/11/12 13:03:28 beck Exp $ */ | 1 | /* $OpenBSD: pk12err.c,v 1.14 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2006 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2006 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -108,4 +108,4 @@ ERR_load_PKCS12_strings(void) | |||
108 | } | 108 | } |
109 | #endif | 109 | #endif |
110 | } | 110 | } |
111 | LCRYPTO_ALIAS(ERR_load_PKCS12_strings) | 111 | LCRYPTO_ALIAS(ERR_load_PKCS12_strings); |
diff --git a/src/lib/libcrypto/pkcs7/bio_pk7.c b/src/lib/libcrypto/pkcs7/bio_pk7.c index 5f02535484..83cf70fd87 100644 --- a/src/lib/libcrypto/pkcs7/bio_pk7.c +++ b/src/lib/libcrypto/pkcs7/bio_pk7.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: bio_pk7.c,v 1.6 2022/11/12 12:11:14 beck Exp $ */ | 1 | /* $OpenBSD: bio_pk7.c,v 1.7 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -64,4 +64,4 @@ BIO_new_PKCS7(BIO *out, PKCS7 *p7) | |||
64 | { | 64 | { |
65 | return BIO_new_NDEF(out, (ASN1_VALUE *)p7, &PKCS7_it); | 65 | return BIO_new_NDEF(out, (ASN1_VALUE *)p7, &PKCS7_it); |
66 | } | 66 | } |
67 | LCRYPTO_ALIAS(BIO_new_PKCS7) | 67 | LCRYPTO_ALIAS(BIO_new_PKCS7); |
diff --git a/src/lib/libcrypto/pkcs7/pk7_asn1.c b/src/lib/libcrypto/pkcs7/pk7_asn1.c index b0c4ee8016..e5366ca45e 100644 --- a/src/lib/libcrypto/pkcs7/pk7_asn1.c +++ b/src/lib/libcrypto/pkcs7/pk7_asn1.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pk7_asn1.c,v 1.14 2022/11/12 12:11:14 beck Exp $ */ | 1 | /* $OpenBSD: pk7_asn1.c,v 1.15 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2000. | 3 | * project 2000. |
4 | */ | 4 | */ |
@@ -221,42 +221,42 @@ d2i_PKCS7(PKCS7 **a, const unsigned char **in, long len) | |||
221 | return (PKCS7 *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 221 | return (PKCS7 *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
222 | &PKCS7_it); | 222 | &PKCS7_it); |
223 | } | 223 | } |
224 | LCRYPTO_ALIAS(d2i_PKCS7) | 224 | LCRYPTO_ALIAS(d2i_PKCS7); |
225 | 225 | ||
226 | int | 226 | int |
227 | i2d_PKCS7(PKCS7 *a, unsigned char **out) | 227 | i2d_PKCS7(PKCS7 *a, unsigned char **out) |
228 | { | 228 | { |
229 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_it); | 229 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_it); |
230 | } | 230 | } |
231 | LCRYPTO_ALIAS(i2d_PKCS7) | 231 | LCRYPTO_ALIAS(i2d_PKCS7); |
232 | 232 | ||
233 | PKCS7 * | 233 | PKCS7 * |
234 | PKCS7_new(void) | 234 | PKCS7_new(void) |
235 | { | 235 | { |
236 | return (PKCS7 *)ASN1_item_new(&PKCS7_it); | 236 | return (PKCS7 *)ASN1_item_new(&PKCS7_it); |
237 | } | 237 | } |
238 | LCRYPTO_ALIAS(PKCS7_new) | 238 | LCRYPTO_ALIAS(PKCS7_new); |
239 | 239 | ||
240 | void | 240 | void |
241 | PKCS7_free(PKCS7 *a) | 241 | PKCS7_free(PKCS7 *a) |
242 | { | 242 | { |
243 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_it); | 243 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_it); |
244 | } | 244 | } |
245 | LCRYPTO_ALIAS(PKCS7_free) | 245 | LCRYPTO_ALIAS(PKCS7_free); |
246 | 246 | ||
247 | int | 247 | int |
248 | i2d_PKCS7_NDEF(PKCS7 *a, unsigned char **out) | 248 | i2d_PKCS7_NDEF(PKCS7 *a, unsigned char **out) |
249 | { | 249 | { |
250 | return ASN1_item_ndef_i2d((ASN1_VALUE *)a, out, &PKCS7_it); | 250 | return ASN1_item_ndef_i2d((ASN1_VALUE *)a, out, &PKCS7_it); |
251 | } | 251 | } |
252 | LCRYPTO_ALIAS(i2d_PKCS7_NDEF) | 252 | LCRYPTO_ALIAS(i2d_PKCS7_NDEF); |
253 | 253 | ||
254 | PKCS7 * | 254 | PKCS7 * |
255 | PKCS7_dup(PKCS7 *x) | 255 | PKCS7_dup(PKCS7 *x) |
256 | { | 256 | { |
257 | return ASN1_item_dup(&PKCS7_it, x); | 257 | return ASN1_item_dup(&PKCS7_it, x); |
258 | } | 258 | } |
259 | LCRYPTO_ALIAS(PKCS7_dup) | 259 | LCRYPTO_ALIAS(PKCS7_dup); |
260 | 260 | ||
261 | static const ASN1_TEMPLATE PKCS7_SIGNED_seq_tt[] = { | 261 | static const ASN1_TEMPLATE PKCS7_SIGNED_seq_tt[] = { |
262 | { | 262 | { |
@@ -320,28 +320,28 @@ d2i_PKCS7_SIGNED(PKCS7_SIGNED **a, const unsigned char **in, long len) | |||
320 | return (PKCS7_SIGNED *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 320 | return (PKCS7_SIGNED *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
321 | &PKCS7_SIGNED_it); | 321 | &PKCS7_SIGNED_it); |
322 | } | 322 | } |
323 | LCRYPTO_ALIAS(d2i_PKCS7_SIGNED) | 323 | LCRYPTO_ALIAS(d2i_PKCS7_SIGNED); |
324 | 324 | ||
325 | int | 325 | int |
326 | i2d_PKCS7_SIGNED(PKCS7_SIGNED *a, unsigned char **out) | 326 | i2d_PKCS7_SIGNED(PKCS7_SIGNED *a, unsigned char **out) |
327 | { | 327 | { |
328 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_SIGNED_it); | 328 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_SIGNED_it); |
329 | } | 329 | } |
330 | LCRYPTO_ALIAS(i2d_PKCS7_SIGNED) | 330 | LCRYPTO_ALIAS(i2d_PKCS7_SIGNED); |
331 | 331 | ||
332 | PKCS7_SIGNED * | 332 | PKCS7_SIGNED * |
333 | PKCS7_SIGNED_new(void) | 333 | PKCS7_SIGNED_new(void) |
334 | { | 334 | { |
335 | return (PKCS7_SIGNED *)ASN1_item_new(&PKCS7_SIGNED_it); | 335 | return (PKCS7_SIGNED *)ASN1_item_new(&PKCS7_SIGNED_it); |
336 | } | 336 | } |
337 | LCRYPTO_ALIAS(PKCS7_SIGNED_new) | 337 | LCRYPTO_ALIAS(PKCS7_SIGNED_new); |
338 | 338 | ||
339 | void | 339 | void |
340 | PKCS7_SIGNED_free(PKCS7_SIGNED *a) | 340 | PKCS7_SIGNED_free(PKCS7_SIGNED *a) |
341 | { | 341 | { |
342 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_SIGNED_it); | 342 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_SIGNED_it); |
343 | } | 343 | } |
344 | LCRYPTO_ALIAS(PKCS7_SIGNED_free) | 344 | LCRYPTO_ALIAS(PKCS7_SIGNED_free); |
345 | 345 | ||
346 | /* Minor tweak to operation: free up EVP_PKEY */ | 346 | /* Minor tweak to operation: free up EVP_PKEY */ |
347 | static int | 347 | static int |
@@ -436,28 +436,28 @@ d2i_PKCS7_SIGNER_INFO(PKCS7_SIGNER_INFO **a, const unsigned char **in, long len) | |||
436 | return (PKCS7_SIGNER_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 436 | return (PKCS7_SIGNER_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
437 | &PKCS7_SIGNER_INFO_it); | 437 | &PKCS7_SIGNER_INFO_it); |
438 | } | 438 | } |
439 | LCRYPTO_ALIAS(d2i_PKCS7_SIGNER_INFO) | 439 | LCRYPTO_ALIAS(d2i_PKCS7_SIGNER_INFO); |
440 | 440 | ||
441 | int | 441 | int |
442 | i2d_PKCS7_SIGNER_INFO(PKCS7_SIGNER_INFO *a, unsigned char **out) | 442 | i2d_PKCS7_SIGNER_INFO(PKCS7_SIGNER_INFO *a, unsigned char **out) |
443 | { | 443 | { |
444 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_SIGNER_INFO_it); | 444 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_SIGNER_INFO_it); |
445 | } | 445 | } |
446 | LCRYPTO_ALIAS(i2d_PKCS7_SIGNER_INFO) | 446 | LCRYPTO_ALIAS(i2d_PKCS7_SIGNER_INFO); |
447 | 447 | ||
448 | PKCS7_SIGNER_INFO * | 448 | PKCS7_SIGNER_INFO * |
449 | PKCS7_SIGNER_INFO_new(void) | 449 | PKCS7_SIGNER_INFO_new(void) |
450 | { | 450 | { |
451 | return (PKCS7_SIGNER_INFO *)ASN1_item_new(&PKCS7_SIGNER_INFO_it); | 451 | return (PKCS7_SIGNER_INFO *)ASN1_item_new(&PKCS7_SIGNER_INFO_it); |
452 | } | 452 | } |
453 | LCRYPTO_ALIAS(PKCS7_SIGNER_INFO_new) | 453 | LCRYPTO_ALIAS(PKCS7_SIGNER_INFO_new); |
454 | 454 | ||
455 | void | 455 | void |
456 | PKCS7_SIGNER_INFO_free(PKCS7_SIGNER_INFO *a) | 456 | PKCS7_SIGNER_INFO_free(PKCS7_SIGNER_INFO *a) |
457 | { | 457 | { |
458 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_SIGNER_INFO_it); | 458 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_SIGNER_INFO_it); |
459 | } | 459 | } |
460 | LCRYPTO_ALIAS(PKCS7_SIGNER_INFO_free) | 460 | LCRYPTO_ALIAS(PKCS7_SIGNER_INFO_free); |
461 | 461 | ||
462 | static const ASN1_TEMPLATE PKCS7_ISSUER_AND_SERIAL_seq_tt[] = { | 462 | static const ASN1_TEMPLATE PKCS7_ISSUER_AND_SERIAL_seq_tt[] = { |
463 | { | 463 | { |
@@ -493,28 +493,28 @@ d2i_PKCS7_ISSUER_AND_SERIAL(PKCS7_ISSUER_AND_SERIAL **a, const unsigned char **i | |||
493 | return (PKCS7_ISSUER_AND_SERIAL *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 493 | return (PKCS7_ISSUER_AND_SERIAL *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
494 | &PKCS7_ISSUER_AND_SERIAL_it); | 494 | &PKCS7_ISSUER_AND_SERIAL_it); |
495 | } | 495 | } |
496 | LCRYPTO_ALIAS(d2i_PKCS7_ISSUER_AND_SERIAL) | 496 | LCRYPTO_ALIAS(d2i_PKCS7_ISSUER_AND_SERIAL); |
497 | 497 | ||
498 | int | 498 | int |
499 | i2d_PKCS7_ISSUER_AND_SERIAL(PKCS7_ISSUER_AND_SERIAL *a, unsigned char **out) | 499 | i2d_PKCS7_ISSUER_AND_SERIAL(PKCS7_ISSUER_AND_SERIAL *a, unsigned char **out) |
500 | { | 500 | { |
501 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_ISSUER_AND_SERIAL_it); | 501 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_ISSUER_AND_SERIAL_it); |
502 | } | 502 | } |
503 | LCRYPTO_ALIAS(i2d_PKCS7_ISSUER_AND_SERIAL) | 503 | LCRYPTO_ALIAS(i2d_PKCS7_ISSUER_AND_SERIAL); |
504 | 504 | ||
505 | PKCS7_ISSUER_AND_SERIAL * | 505 | PKCS7_ISSUER_AND_SERIAL * |
506 | PKCS7_ISSUER_AND_SERIAL_new(void) | 506 | PKCS7_ISSUER_AND_SERIAL_new(void) |
507 | { | 507 | { |
508 | return (PKCS7_ISSUER_AND_SERIAL *)ASN1_item_new(&PKCS7_ISSUER_AND_SERIAL_it); | 508 | return (PKCS7_ISSUER_AND_SERIAL *)ASN1_item_new(&PKCS7_ISSUER_AND_SERIAL_it); |
509 | } | 509 | } |
510 | LCRYPTO_ALIAS(PKCS7_ISSUER_AND_SERIAL_new) | 510 | LCRYPTO_ALIAS(PKCS7_ISSUER_AND_SERIAL_new); |
511 | 511 | ||
512 | void | 512 | void |
513 | PKCS7_ISSUER_AND_SERIAL_free(PKCS7_ISSUER_AND_SERIAL *a) | 513 | PKCS7_ISSUER_AND_SERIAL_free(PKCS7_ISSUER_AND_SERIAL *a) |
514 | { | 514 | { |
515 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_ISSUER_AND_SERIAL_it); | 515 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_ISSUER_AND_SERIAL_it); |
516 | } | 516 | } |
517 | LCRYPTO_ALIAS(PKCS7_ISSUER_AND_SERIAL_free) | 517 | LCRYPTO_ALIAS(PKCS7_ISSUER_AND_SERIAL_free); |
518 | 518 | ||
519 | static const ASN1_TEMPLATE PKCS7_ENVELOPE_seq_tt[] = { | 519 | static const ASN1_TEMPLATE PKCS7_ENVELOPE_seq_tt[] = { |
520 | { | 520 | { |
@@ -557,28 +557,28 @@ d2i_PKCS7_ENVELOPE(PKCS7_ENVELOPE **a, const unsigned char **in, long len) | |||
557 | return (PKCS7_ENVELOPE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 557 | return (PKCS7_ENVELOPE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
558 | &PKCS7_ENVELOPE_it); | 558 | &PKCS7_ENVELOPE_it); |
559 | } | 559 | } |
560 | LCRYPTO_ALIAS(d2i_PKCS7_ENVELOPE) | 560 | LCRYPTO_ALIAS(d2i_PKCS7_ENVELOPE); |
561 | 561 | ||
562 | int | 562 | int |
563 | i2d_PKCS7_ENVELOPE(PKCS7_ENVELOPE *a, unsigned char **out) | 563 | i2d_PKCS7_ENVELOPE(PKCS7_ENVELOPE *a, unsigned char **out) |
564 | { | 564 | { |
565 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_ENVELOPE_it); | 565 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_ENVELOPE_it); |
566 | } | 566 | } |
567 | LCRYPTO_ALIAS(i2d_PKCS7_ENVELOPE) | 567 | LCRYPTO_ALIAS(i2d_PKCS7_ENVELOPE); |
568 | 568 | ||
569 | PKCS7_ENVELOPE * | 569 | PKCS7_ENVELOPE * |
570 | PKCS7_ENVELOPE_new(void) | 570 | PKCS7_ENVELOPE_new(void) |
571 | { | 571 | { |
572 | return (PKCS7_ENVELOPE *)ASN1_item_new(&PKCS7_ENVELOPE_it); | 572 | return (PKCS7_ENVELOPE *)ASN1_item_new(&PKCS7_ENVELOPE_it); |
573 | } | 573 | } |
574 | LCRYPTO_ALIAS(PKCS7_ENVELOPE_new) | 574 | LCRYPTO_ALIAS(PKCS7_ENVELOPE_new); |
575 | 575 | ||
576 | void | 576 | void |
577 | PKCS7_ENVELOPE_free(PKCS7_ENVELOPE *a) | 577 | PKCS7_ENVELOPE_free(PKCS7_ENVELOPE *a) |
578 | { | 578 | { |
579 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_ENVELOPE_it); | 579 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_ENVELOPE_it); |
580 | } | 580 | } |
581 | LCRYPTO_ALIAS(PKCS7_ENVELOPE_free) | 581 | LCRYPTO_ALIAS(PKCS7_ENVELOPE_free); |
582 | 582 | ||
583 | /* Minor tweak to operation: free up X509 */ | 583 | /* Minor tweak to operation: free up X509 */ |
584 | static int | 584 | static int |
@@ -647,28 +647,28 @@ d2i_PKCS7_RECIP_INFO(PKCS7_RECIP_INFO **a, const unsigned char **in, long len) | |||
647 | return (PKCS7_RECIP_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 647 | return (PKCS7_RECIP_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
648 | &PKCS7_RECIP_INFO_it); | 648 | &PKCS7_RECIP_INFO_it); |
649 | } | 649 | } |
650 | LCRYPTO_ALIAS(d2i_PKCS7_RECIP_INFO) | 650 | LCRYPTO_ALIAS(d2i_PKCS7_RECIP_INFO); |
651 | 651 | ||
652 | int | 652 | int |
653 | i2d_PKCS7_RECIP_INFO(PKCS7_RECIP_INFO *a, unsigned char **out) | 653 | i2d_PKCS7_RECIP_INFO(PKCS7_RECIP_INFO *a, unsigned char **out) |
654 | { | 654 | { |
655 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_RECIP_INFO_it); | 655 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_RECIP_INFO_it); |
656 | } | 656 | } |
657 | LCRYPTO_ALIAS(i2d_PKCS7_RECIP_INFO) | 657 | LCRYPTO_ALIAS(i2d_PKCS7_RECIP_INFO); |
658 | 658 | ||
659 | PKCS7_RECIP_INFO * | 659 | PKCS7_RECIP_INFO * |
660 | PKCS7_RECIP_INFO_new(void) | 660 | PKCS7_RECIP_INFO_new(void) |
661 | { | 661 | { |
662 | return (PKCS7_RECIP_INFO *)ASN1_item_new(&PKCS7_RECIP_INFO_it); | 662 | return (PKCS7_RECIP_INFO *)ASN1_item_new(&PKCS7_RECIP_INFO_it); |
663 | } | 663 | } |
664 | LCRYPTO_ALIAS(PKCS7_RECIP_INFO_new) | 664 | LCRYPTO_ALIAS(PKCS7_RECIP_INFO_new); |
665 | 665 | ||
666 | void | 666 | void |
667 | PKCS7_RECIP_INFO_free(PKCS7_RECIP_INFO *a) | 667 | PKCS7_RECIP_INFO_free(PKCS7_RECIP_INFO *a) |
668 | { | 668 | { |
669 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_RECIP_INFO_it); | 669 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_RECIP_INFO_it); |
670 | } | 670 | } |
671 | LCRYPTO_ALIAS(PKCS7_RECIP_INFO_free) | 671 | LCRYPTO_ALIAS(PKCS7_RECIP_INFO_free); |
672 | 672 | ||
673 | static const ASN1_TEMPLATE PKCS7_ENC_CONTENT_seq_tt[] = { | 673 | static const ASN1_TEMPLATE PKCS7_ENC_CONTENT_seq_tt[] = { |
674 | { | 674 | { |
@@ -711,28 +711,28 @@ d2i_PKCS7_ENC_CONTENT(PKCS7_ENC_CONTENT **a, const unsigned char **in, long len) | |||
711 | return (PKCS7_ENC_CONTENT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 711 | return (PKCS7_ENC_CONTENT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
712 | &PKCS7_ENC_CONTENT_it); | 712 | &PKCS7_ENC_CONTENT_it); |
713 | } | 713 | } |
714 | LCRYPTO_ALIAS(d2i_PKCS7_ENC_CONTENT) | 714 | LCRYPTO_ALIAS(d2i_PKCS7_ENC_CONTENT); |
715 | 715 | ||
716 | int | 716 | int |
717 | i2d_PKCS7_ENC_CONTENT(PKCS7_ENC_CONTENT *a, unsigned char **out) | 717 | i2d_PKCS7_ENC_CONTENT(PKCS7_ENC_CONTENT *a, unsigned char **out) |
718 | { | 718 | { |
719 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_ENC_CONTENT_it); | 719 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_ENC_CONTENT_it); |
720 | } | 720 | } |
721 | LCRYPTO_ALIAS(i2d_PKCS7_ENC_CONTENT) | 721 | LCRYPTO_ALIAS(i2d_PKCS7_ENC_CONTENT); |
722 | 722 | ||
723 | PKCS7_ENC_CONTENT * | 723 | PKCS7_ENC_CONTENT * |
724 | PKCS7_ENC_CONTENT_new(void) | 724 | PKCS7_ENC_CONTENT_new(void) |
725 | { | 725 | { |
726 | return (PKCS7_ENC_CONTENT *)ASN1_item_new(&PKCS7_ENC_CONTENT_it); | 726 | return (PKCS7_ENC_CONTENT *)ASN1_item_new(&PKCS7_ENC_CONTENT_it); |
727 | } | 727 | } |
728 | LCRYPTO_ALIAS(PKCS7_ENC_CONTENT_new) | 728 | LCRYPTO_ALIAS(PKCS7_ENC_CONTENT_new); |
729 | 729 | ||
730 | void | 730 | void |
731 | PKCS7_ENC_CONTENT_free(PKCS7_ENC_CONTENT *a) | 731 | PKCS7_ENC_CONTENT_free(PKCS7_ENC_CONTENT *a) |
732 | { | 732 | { |
733 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_ENC_CONTENT_it); | 733 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_ENC_CONTENT_it); |
734 | } | 734 | } |
735 | LCRYPTO_ALIAS(PKCS7_ENC_CONTENT_free) | 735 | LCRYPTO_ALIAS(PKCS7_ENC_CONTENT_free); |
736 | 736 | ||
737 | static const ASN1_TEMPLATE PKCS7_SIGN_ENVELOPE_seq_tt[] = { | 737 | static const ASN1_TEMPLATE PKCS7_SIGN_ENVELOPE_seq_tt[] = { |
738 | { | 738 | { |
@@ -803,28 +803,28 @@ d2i_PKCS7_SIGN_ENVELOPE(PKCS7_SIGN_ENVELOPE **a, const unsigned char **in, long | |||
803 | return (PKCS7_SIGN_ENVELOPE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 803 | return (PKCS7_SIGN_ENVELOPE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
804 | &PKCS7_SIGN_ENVELOPE_it); | 804 | &PKCS7_SIGN_ENVELOPE_it); |
805 | } | 805 | } |
806 | LCRYPTO_ALIAS(d2i_PKCS7_SIGN_ENVELOPE) | 806 | LCRYPTO_ALIAS(d2i_PKCS7_SIGN_ENVELOPE); |
807 | 807 | ||
808 | int | 808 | int |
809 | i2d_PKCS7_SIGN_ENVELOPE(PKCS7_SIGN_ENVELOPE *a, unsigned char **out) | 809 | i2d_PKCS7_SIGN_ENVELOPE(PKCS7_SIGN_ENVELOPE *a, unsigned char **out) |
810 | { | 810 | { |
811 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_SIGN_ENVELOPE_it); | 811 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_SIGN_ENVELOPE_it); |
812 | } | 812 | } |
813 | LCRYPTO_ALIAS(i2d_PKCS7_SIGN_ENVELOPE) | 813 | LCRYPTO_ALIAS(i2d_PKCS7_SIGN_ENVELOPE); |
814 | 814 | ||
815 | PKCS7_SIGN_ENVELOPE * | 815 | PKCS7_SIGN_ENVELOPE * |
816 | PKCS7_SIGN_ENVELOPE_new(void) | 816 | PKCS7_SIGN_ENVELOPE_new(void) |
817 | { | 817 | { |
818 | return (PKCS7_SIGN_ENVELOPE *)ASN1_item_new(&PKCS7_SIGN_ENVELOPE_it); | 818 | return (PKCS7_SIGN_ENVELOPE *)ASN1_item_new(&PKCS7_SIGN_ENVELOPE_it); |
819 | } | 819 | } |
820 | LCRYPTO_ALIAS(PKCS7_SIGN_ENVELOPE_new) | 820 | LCRYPTO_ALIAS(PKCS7_SIGN_ENVELOPE_new); |
821 | 821 | ||
822 | void | 822 | void |
823 | PKCS7_SIGN_ENVELOPE_free(PKCS7_SIGN_ENVELOPE *a) | 823 | PKCS7_SIGN_ENVELOPE_free(PKCS7_SIGN_ENVELOPE *a) |
824 | { | 824 | { |
825 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_SIGN_ENVELOPE_it); | 825 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_SIGN_ENVELOPE_it); |
826 | } | 826 | } |
827 | LCRYPTO_ALIAS(PKCS7_SIGN_ENVELOPE_free) | 827 | LCRYPTO_ALIAS(PKCS7_SIGN_ENVELOPE_free); |
828 | 828 | ||
829 | static const ASN1_TEMPLATE PKCS7_ENCRYPT_seq_tt[] = { | 829 | static const ASN1_TEMPLATE PKCS7_ENCRYPT_seq_tt[] = { |
830 | { | 830 | { |
@@ -860,28 +860,28 @@ d2i_PKCS7_ENCRYPT(PKCS7_ENCRYPT **a, const unsigned char **in, long len) | |||
860 | return (PKCS7_ENCRYPT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 860 | return (PKCS7_ENCRYPT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
861 | &PKCS7_ENCRYPT_it); | 861 | &PKCS7_ENCRYPT_it); |
862 | } | 862 | } |
863 | LCRYPTO_ALIAS(d2i_PKCS7_ENCRYPT) | 863 | LCRYPTO_ALIAS(d2i_PKCS7_ENCRYPT); |
864 | 864 | ||
865 | int | 865 | int |
866 | i2d_PKCS7_ENCRYPT(PKCS7_ENCRYPT *a, unsigned char **out) | 866 | i2d_PKCS7_ENCRYPT(PKCS7_ENCRYPT *a, unsigned char **out) |
867 | { | 867 | { |
868 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_ENCRYPT_it); | 868 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_ENCRYPT_it); |
869 | } | 869 | } |
870 | LCRYPTO_ALIAS(i2d_PKCS7_ENCRYPT) | 870 | LCRYPTO_ALIAS(i2d_PKCS7_ENCRYPT); |
871 | 871 | ||
872 | PKCS7_ENCRYPT * | 872 | PKCS7_ENCRYPT * |
873 | PKCS7_ENCRYPT_new(void) | 873 | PKCS7_ENCRYPT_new(void) |
874 | { | 874 | { |
875 | return (PKCS7_ENCRYPT *)ASN1_item_new(&PKCS7_ENCRYPT_it); | 875 | return (PKCS7_ENCRYPT *)ASN1_item_new(&PKCS7_ENCRYPT_it); |
876 | } | 876 | } |
877 | LCRYPTO_ALIAS(PKCS7_ENCRYPT_new) | 877 | LCRYPTO_ALIAS(PKCS7_ENCRYPT_new); |
878 | 878 | ||
879 | void | 879 | void |
880 | PKCS7_ENCRYPT_free(PKCS7_ENCRYPT *a) | 880 | PKCS7_ENCRYPT_free(PKCS7_ENCRYPT *a) |
881 | { | 881 | { |
882 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_ENCRYPT_it); | 882 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_ENCRYPT_it); |
883 | } | 883 | } |
884 | LCRYPTO_ALIAS(PKCS7_ENCRYPT_free) | 884 | LCRYPTO_ALIAS(PKCS7_ENCRYPT_free); |
885 | 885 | ||
886 | static const ASN1_TEMPLATE PKCS7_DIGEST_seq_tt[] = { | 886 | static const ASN1_TEMPLATE PKCS7_DIGEST_seq_tt[] = { |
887 | { | 887 | { |
@@ -931,28 +931,28 @@ d2i_PKCS7_DIGEST(PKCS7_DIGEST **a, const unsigned char **in, long len) | |||
931 | return (PKCS7_DIGEST *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 931 | return (PKCS7_DIGEST *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
932 | &PKCS7_DIGEST_it); | 932 | &PKCS7_DIGEST_it); |
933 | } | 933 | } |
934 | LCRYPTO_ALIAS(d2i_PKCS7_DIGEST) | 934 | LCRYPTO_ALIAS(d2i_PKCS7_DIGEST); |
935 | 935 | ||
936 | int | 936 | int |
937 | i2d_PKCS7_DIGEST(PKCS7_DIGEST *a, unsigned char **out) | 937 | i2d_PKCS7_DIGEST(PKCS7_DIGEST *a, unsigned char **out) |
938 | { | 938 | { |
939 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_DIGEST_it); | 939 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS7_DIGEST_it); |
940 | } | 940 | } |
941 | LCRYPTO_ALIAS(i2d_PKCS7_DIGEST) | 941 | LCRYPTO_ALIAS(i2d_PKCS7_DIGEST); |
942 | 942 | ||
943 | PKCS7_DIGEST * | 943 | PKCS7_DIGEST * |
944 | PKCS7_DIGEST_new(void) | 944 | PKCS7_DIGEST_new(void) |
945 | { | 945 | { |
946 | return (PKCS7_DIGEST *)ASN1_item_new(&PKCS7_DIGEST_it); | 946 | return (PKCS7_DIGEST *)ASN1_item_new(&PKCS7_DIGEST_it); |
947 | } | 947 | } |
948 | LCRYPTO_ALIAS(PKCS7_DIGEST_new) | 948 | LCRYPTO_ALIAS(PKCS7_DIGEST_new); |
949 | 949 | ||
950 | void | 950 | void |
951 | PKCS7_DIGEST_free(PKCS7_DIGEST *a) | 951 | PKCS7_DIGEST_free(PKCS7_DIGEST *a) |
952 | { | 952 | { |
953 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_DIGEST_it); | 953 | ASN1_item_free((ASN1_VALUE *)a, &PKCS7_DIGEST_it); |
954 | } | 954 | } |
955 | LCRYPTO_ALIAS(PKCS7_DIGEST_free) | 955 | LCRYPTO_ALIAS(PKCS7_DIGEST_free); |
956 | 956 | ||
957 | /* Specials for authenticated attributes */ | 957 | /* Specials for authenticated attributes */ |
958 | 958 | ||
@@ -1007,35 +1007,35 @@ PKCS7_print_ctx(BIO *out, PKCS7 *x, int indent, const ASN1_PCTX *pctx) | |||
1007 | return ASN1_item_print(out, (ASN1_VALUE *)x, indent, | 1007 | return ASN1_item_print(out, (ASN1_VALUE *)x, indent, |
1008 | &PKCS7_it, pctx); | 1008 | &PKCS7_it, pctx); |
1009 | } | 1009 | } |
1010 | LCRYPTO_ALIAS(PKCS7_print_ctx) | 1010 | LCRYPTO_ALIAS(PKCS7_print_ctx); |
1011 | 1011 | ||
1012 | PKCS7 * | 1012 | PKCS7 * |
1013 | d2i_PKCS7_bio(BIO *bp, PKCS7 **p7) | 1013 | d2i_PKCS7_bio(BIO *bp, PKCS7 **p7) |
1014 | { | 1014 | { |
1015 | return ASN1_item_d2i_bio(&PKCS7_it, bp, p7); | 1015 | return ASN1_item_d2i_bio(&PKCS7_it, bp, p7); |
1016 | } | 1016 | } |
1017 | LCRYPTO_ALIAS(d2i_PKCS7_bio) | 1017 | LCRYPTO_ALIAS(d2i_PKCS7_bio); |
1018 | 1018 | ||
1019 | int | 1019 | int |
1020 | i2d_PKCS7_bio(BIO *bp, PKCS7 *p7) | 1020 | i2d_PKCS7_bio(BIO *bp, PKCS7 *p7) |
1021 | { | 1021 | { |
1022 | return ASN1_item_i2d_bio(&PKCS7_it, bp, p7); | 1022 | return ASN1_item_i2d_bio(&PKCS7_it, bp, p7); |
1023 | } | 1023 | } |
1024 | LCRYPTO_ALIAS(i2d_PKCS7_bio) | 1024 | LCRYPTO_ALIAS(i2d_PKCS7_bio); |
1025 | 1025 | ||
1026 | PKCS7 * | 1026 | PKCS7 * |
1027 | d2i_PKCS7_fp(FILE *fp, PKCS7 **p7) | 1027 | d2i_PKCS7_fp(FILE *fp, PKCS7 **p7) |
1028 | { | 1028 | { |
1029 | return ASN1_item_d2i_fp(&PKCS7_it, fp, p7); | 1029 | return ASN1_item_d2i_fp(&PKCS7_it, fp, p7); |
1030 | } | 1030 | } |
1031 | LCRYPTO_ALIAS(d2i_PKCS7_fp) | 1031 | LCRYPTO_ALIAS(d2i_PKCS7_fp); |
1032 | 1032 | ||
1033 | int | 1033 | int |
1034 | i2d_PKCS7_fp(FILE *fp, PKCS7 *p7) | 1034 | i2d_PKCS7_fp(FILE *fp, PKCS7 *p7) |
1035 | { | 1035 | { |
1036 | return ASN1_item_i2d_fp(&PKCS7_it, fp, p7); | 1036 | return ASN1_item_i2d_fp(&PKCS7_it, fp, p7); |
1037 | } | 1037 | } |
1038 | LCRYPTO_ALIAS(i2d_PKCS7_fp) | 1038 | LCRYPTO_ALIAS(i2d_PKCS7_fp); |
1039 | 1039 | ||
1040 | int | 1040 | int |
1041 | PKCS7_ISSUER_AND_SERIAL_digest(PKCS7_ISSUER_AND_SERIAL *data, | 1041 | PKCS7_ISSUER_AND_SERIAL_digest(PKCS7_ISSUER_AND_SERIAL *data, |
@@ -1044,4 +1044,4 @@ PKCS7_ISSUER_AND_SERIAL_digest(PKCS7_ISSUER_AND_SERIAL *data, | |||
1044 | return(ASN1_item_digest(&PKCS7_ISSUER_AND_SERIAL_it, type, | 1044 | return(ASN1_item_digest(&PKCS7_ISSUER_AND_SERIAL_it, type, |
1045 | (char *)data, md, len)); | 1045 | (char *)data, md, len)); |
1046 | } | 1046 | } |
1047 | LCRYPTO_ALIAS(PKCS7_ISSUER_AND_SERIAL_digest) | 1047 | LCRYPTO_ALIAS(PKCS7_ISSUER_AND_SERIAL_digest); |
diff --git a/src/lib/libcrypto/pkcs7/pk7_attr.c b/src/lib/libcrypto/pkcs7/pk7_attr.c index 1a5dc06dc5..5eff5241ef 100644 --- a/src/lib/libcrypto/pkcs7/pk7_attr.c +++ b/src/lib/libcrypto/pkcs7/pk7_attr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pk7_attr.c,v 1.13 2022/11/12 12:11:14 beck Exp $ */ | 1 | /* $OpenBSD: pk7_attr.c,v 1.14 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2001. | 3 | * project 2001. |
4 | */ | 4 | */ |
@@ -79,7 +79,7 @@ PKCS7_add_attrib_smimecap(PKCS7_SIGNER_INFO *si, STACK_OF(X509_ALGOR) *cap) | |||
79 | return PKCS7_add_signed_attribute(si, NID_SMIMECapabilities, | 79 | return PKCS7_add_signed_attribute(si, NID_SMIMECapabilities, |
80 | V_ASN1_SEQUENCE, seq); | 80 | V_ASN1_SEQUENCE, seq); |
81 | } | 81 | } |
82 | LCRYPTO_ALIAS(PKCS7_add_attrib_smimecap) | 82 | LCRYPTO_ALIAS(PKCS7_add_attrib_smimecap); |
83 | 83 | ||
84 | STACK_OF(X509_ALGOR) * | 84 | STACK_OF(X509_ALGOR) * |
85 | PKCS7_get_smimecap(PKCS7_SIGNER_INFO *si) | 85 | PKCS7_get_smimecap(PKCS7_SIGNER_INFO *si) |
@@ -95,7 +95,7 @@ PKCS7_get_smimecap(PKCS7_SIGNER_INFO *si) | |||
95 | ASN1_item_d2i(NULL, &p, cap->value.sequence->length, | 95 | ASN1_item_d2i(NULL, &p, cap->value.sequence->length, |
96 | &X509_ALGORS_it); | 96 | &X509_ALGORS_it); |
97 | } | 97 | } |
98 | LCRYPTO_ALIAS(PKCS7_get_smimecap) | 98 | LCRYPTO_ALIAS(PKCS7_get_smimecap); |
99 | 99 | ||
100 | /* Basic smime-capabilities OID and optional integer arg */ | 100 | /* Basic smime-capabilities OID and optional integer arg */ |
101 | int | 101 | int |
@@ -132,7 +132,7 @@ err: | |||
132 | X509_ALGOR_free(alg); | 132 | X509_ALGOR_free(alg); |
133 | return 0; | 133 | return 0; |
134 | } | 134 | } |
135 | LCRYPTO_ALIAS(PKCS7_simple_smimecap) | 135 | LCRYPTO_ALIAS(PKCS7_simple_smimecap); |
136 | 136 | ||
137 | int | 137 | int |
138 | PKCS7_add_attrib_content_type(PKCS7_SIGNER_INFO *si, ASN1_OBJECT *coid) | 138 | PKCS7_add_attrib_content_type(PKCS7_SIGNER_INFO *si, ASN1_OBJECT *coid) |
@@ -144,7 +144,7 @@ PKCS7_add_attrib_content_type(PKCS7_SIGNER_INFO *si, ASN1_OBJECT *coid) | |||
144 | return PKCS7_add_signed_attribute(si, NID_pkcs9_contentType, | 144 | return PKCS7_add_signed_attribute(si, NID_pkcs9_contentType, |
145 | V_ASN1_OBJECT, coid); | 145 | V_ASN1_OBJECT, coid); |
146 | } | 146 | } |
147 | LCRYPTO_ALIAS(PKCS7_add_attrib_content_type) | 147 | LCRYPTO_ALIAS(PKCS7_add_attrib_content_type); |
148 | 148 | ||
149 | int | 149 | int |
150 | PKCS7_add0_attrib_signing_time(PKCS7_SIGNER_INFO *si, ASN1_TIME *t) | 150 | PKCS7_add0_attrib_signing_time(PKCS7_SIGNER_INFO *si, ASN1_TIME *t) |
@@ -156,7 +156,7 @@ PKCS7_add0_attrib_signing_time(PKCS7_SIGNER_INFO *si, ASN1_TIME *t) | |||
156 | return PKCS7_add_signed_attribute(si, NID_pkcs9_signingTime, | 156 | return PKCS7_add_signed_attribute(si, NID_pkcs9_signingTime, |
157 | V_ASN1_UTCTIME, t); | 157 | V_ASN1_UTCTIME, t); |
158 | } | 158 | } |
159 | LCRYPTO_ALIAS(PKCS7_add0_attrib_signing_time) | 159 | LCRYPTO_ALIAS(PKCS7_add0_attrib_signing_time); |
160 | 160 | ||
161 | int | 161 | int |
162 | PKCS7_add1_attrib_digest(PKCS7_SIGNER_INFO *si, const unsigned char *md, | 162 | PKCS7_add1_attrib_digest(PKCS7_SIGNER_INFO *si, const unsigned char *md, |
@@ -175,4 +175,4 @@ PKCS7_add1_attrib_digest(PKCS7_SIGNER_INFO *si, const unsigned char *md, | |||
175 | } | 175 | } |
176 | return 1; | 176 | return 1; |
177 | } | 177 | } |
178 | LCRYPTO_ALIAS(PKCS7_add1_attrib_digest) | 178 | LCRYPTO_ALIAS(PKCS7_add1_attrib_digest); |
diff --git a/src/lib/libcrypto/pkcs7/pk7_doit.c b/src/lib/libcrypto/pkcs7/pk7_doit.c index 3e2d4c2119..1fcc37a983 100644 --- a/src/lib/libcrypto/pkcs7/pk7_doit.c +++ b/src/lib/libcrypto/pkcs7/pk7_doit.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pk7_doit.c,v 1.50 2022/12/26 07:18:52 jmc Exp $ */ | 1 | /* $OpenBSD: pk7_doit.c,v 1.51 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -404,7 +404,7 @@ err: | |||
404 | } | 404 | } |
405 | return (out); | 405 | return (out); |
406 | } | 406 | } |
407 | LCRYPTO_ALIAS(PKCS7_dataInit) | 407 | LCRYPTO_ALIAS(PKCS7_dataInit); |
408 | 408 | ||
409 | static int | 409 | static int |
410 | pkcs7_cmp_ri(PKCS7_RECIP_INFO *ri, X509 *pcert) | 410 | pkcs7_cmp_ri(PKCS7_RECIP_INFO *ri, X509 *pcert) |
@@ -630,7 +630,7 @@ err: | |||
630 | } | 630 | } |
631 | return (out); | 631 | return (out); |
632 | } | 632 | } |
633 | LCRYPTO_ALIAS(PKCS7_dataDecode) | 633 | LCRYPTO_ALIAS(PKCS7_dataDecode); |
634 | 634 | ||
635 | static BIO * | 635 | static BIO * |
636 | PKCS7_find_digest(EVP_MD_CTX **pmd, BIO *bio, int nid) | 636 | PKCS7_find_digest(EVP_MD_CTX **pmd, BIO *bio, int nid) |
@@ -859,7 +859,7 @@ err: | |||
859 | EVP_MD_CTX_cleanup(&ctx_tmp); | 859 | EVP_MD_CTX_cleanup(&ctx_tmp); |
860 | return (ret); | 860 | return (ret); |
861 | } | 861 | } |
862 | LCRYPTO_ALIAS(PKCS7_dataFinal) | 862 | LCRYPTO_ALIAS(PKCS7_dataFinal); |
863 | 863 | ||
864 | int | 864 | int |
865 | PKCS7_SIGNER_INFO_sign(PKCS7_SIGNER_INFO *si) | 865 | PKCS7_SIGNER_INFO_sign(PKCS7_SIGNER_INFO *si) |
@@ -918,7 +918,7 @@ err: | |||
918 | EVP_MD_CTX_cleanup(&mctx); | 918 | EVP_MD_CTX_cleanup(&mctx); |
919 | return 0; | 919 | return 0; |
920 | } | 920 | } |
921 | LCRYPTO_ALIAS(PKCS7_SIGNER_INFO_sign) | 921 | LCRYPTO_ALIAS(PKCS7_SIGNER_INFO_sign); |
922 | 922 | ||
923 | int | 923 | int |
924 | PKCS7_dataVerify(X509_STORE *cert_store, X509_STORE_CTX *ctx, BIO *bio, | 924 | PKCS7_dataVerify(X509_STORE *cert_store, X509_STORE_CTX *ctx, BIO *bio, |
@@ -980,7 +980,7 @@ err: | |||
980 | 980 | ||
981 | return ret; | 981 | return ret; |
982 | } | 982 | } |
983 | LCRYPTO_ALIAS(PKCS7_dataVerify) | 983 | LCRYPTO_ALIAS(PKCS7_dataVerify); |
984 | 984 | ||
985 | int | 985 | int |
986 | PKCS7_signatureVerify(BIO *bio, PKCS7 *p7, PKCS7_SIGNER_INFO *si, X509 *x509) | 986 | PKCS7_signatureVerify(BIO *bio, PKCS7 *p7, PKCS7_SIGNER_INFO *si, X509 *x509) |
@@ -1087,7 +1087,7 @@ err: | |||
1087 | EVP_MD_CTX_cleanup(&mdc_tmp); | 1087 | EVP_MD_CTX_cleanup(&mdc_tmp); |
1088 | return (ret); | 1088 | return (ret); |
1089 | } | 1089 | } |
1090 | LCRYPTO_ALIAS(PKCS7_signatureVerify) | 1090 | LCRYPTO_ALIAS(PKCS7_signatureVerify); |
1091 | 1091 | ||
1092 | PKCS7_ISSUER_AND_SERIAL * | 1092 | PKCS7_ISSUER_AND_SERIAL * |
1093 | PKCS7_get_issuer_and_serial(PKCS7 *p7, int idx) | 1093 | PKCS7_get_issuer_and_serial(PKCS7 *p7, int idx) |
@@ -1110,21 +1110,21 @@ PKCS7_get_issuer_and_serial(PKCS7 *p7, int idx) | |||
1110 | ri = sk_PKCS7_RECIP_INFO_value(rsk, idx); | 1110 | ri = sk_PKCS7_RECIP_INFO_value(rsk, idx); |
1111 | return (ri->issuer_and_serial); | 1111 | return (ri->issuer_and_serial); |
1112 | } | 1112 | } |
1113 | LCRYPTO_ALIAS(PKCS7_get_issuer_and_serial) | 1113 | LCRYPTO_ALIAS(PKCS7_get_issuer_and_serial); |
1114 | 1114 | ||
1115 | ASN1_TYPE * | 1115 | ASN1_TYPE * |
1116 | PKCS7_get_signed_attribute(PKCS7_SIGNER_INFO *si, int nid) | 1116 | PKCS7_get_signed_attribute(PKCS7_SIGNER_INFO *si, int nid) |
1117 | { | 1117 | { |
1118 | return (get_attribute(si->auth_attr, nid)); | 1118 | return (get_attribute(si->auth_attr, nid)); |
1119 | } | 1119 | } |
1120 | LCRYPTO_ALIAS(PKCS7_get_signed_attribute) | 1120 | LCRYPTO_ALIAS(PKCS7_get_signed_attribute); |
1121 | 1121 | ||
1122 | ASN1_TYPE * | 1122 | ASN1_TYPE * |
1123 | PKCS7_get_attribute(PKCS7_SIGNER_INFO *si, int nid) | 1123 | PKCS7_get_attribute(PKCS7_SIGNER_INFO *si, int nid) |
1124 | { | 1124 | { |
1125 | return (get_attribute(si->unauth_attr, nid)); | 1125 | return (get_attribute(si->unauth_attr, nid)); |
1126 | } | 1126 | } |
1127 | LCRYPTO_ALIAS(PKCS7_get_attribute) | 1127 | LCRYPTO_ALIAS(PKCS7_get_attribute); |
1128 | 1128 | ||
1129 | static ASN1_TYPE * | 1129 | static ASN1_TYPE * |
1130 | get_attribute(STACK_OF(X509_ATTRIBUTE) *sk, int nid) | 1130 | get_attribute(STACK_OF(X509_ATTRIBUTE) *sk, int nid) |
@@ -1155,7 +1155,7 @@ PKCS7_digest_from_attributes(STACK_OF(X509_ATTRIBUTE) *sk) | |||
1155 | return NULL; | 1155 | return NULL; |
1156 | return astype->value.octet_string; | 1156 | return astype->value.octet_string; |
1157 | } | 1157 | } |
1158 | LCRYPTO_ALIAS(PKCS7_digest_from_attributes) | 1158 | LCRYPTO_ALIAS(PKCS7_digest_from_attributes); |
1159 | 1159 | ||
1160 | int | 1160 | int |
1161 | PKCS7_set_signed_attributes(PKCS7_SIGNER_INFO *p7si, | 1161 | PKCS7_set_signed_attributes(PKCS7_SIGNER_INFO *p7si, |
@@ -1177,7 +1177,7 @@ PKCS7_set_signed_attributes(PKCS7_SIGNER_INFO *p7si, | |||
1177 | } | 1177 | } |
1178 | return (1); | 1178 | return (1); |
1179 | } | 1179 | } |
1180 | LCRYPTO_ALIAS(PKCS7_set_signed_attributes) | 1180 | LCRYPTO_ALIAS(PKCS7_set_signed_attributes); |
1181 | 1181 | ||
1182 | int | 1182 | int |
1183 | PKCS7_set_attributes(PKCS7_SIGNER_INFO *p7si, STACK_OF(X509_ATTRIBUTE) *sk) | 1183 | PKCS7_set_attributes(PKCS7_SIGNER_INFO *p7si, STACK_OF(X509_ATTRIBUTE) *sk) |
@@ -1198,7 +1198,7 @@ PKCS7_set_attributes(PKCS7_SIGNER_INFO *p7si, STACK_OF(X509_ATTRIBUTE) *sk) | |||
1198 | } | 1198 | } |
1199 | return (1); | 1199 | return (1); |
1200 | } | 1200 | } |
1201 | LCRYPTO_ALIAS(PKCS7_set_attributes) | 1201 | LCRYPTO_ALIAS(PKCS7_set_attributes); |
1202 | 1202 | ||
1203 | int | 1203 | int |
1204 | PKCS7_add_signed_attribute(PKCS7_SIGNER_INFO *p7si, int nid, int atrtype, | 1204 | PKCS7_add_signed_attribute(PKCS7_SIGNER_INFO *p7si, int nid, int atrtype, |
@@ -1206,14 +1206,14 @@ PKCS7_add_signed_attribute(PKCS7_SIGNER_INFO *p7si, int nid, int atrtype, | |||
1206 | { | 1206 | { |
1207 | return (add_attribute(&(p7si->auth_attr), nid, atrtype, value)); | 1207 | return (add_attribute(&(p7si->auth_attr), nid, atrtype, value)); |
1208 | } | 1208 | } |
1209 | LCRYPTO_ALIAS(PKCS7_add_signed_attribute) | 1209 | LCRYPTO_ALIAS(PKCS7_add_signed_attribute); |
1210 | 1210 | ||
1211 | int | 1211 | int |
1212 | PKCS7_add_attribute(PKCS7_SIGNER_INFO *p7si, int nid, int atrtype, void *value) | 1212 | PKCS7_add_attribute(PKCS7_SIGNER_INFO *p7si, int nid, int atrtype, void *value) |
1213 | { | 1213 | { |
1214 | return (add_attribute(&(p7si->unauth_attr), nid, atrtype, value)); | 1214 | return (add_attribute(&(p7si->unauth_attr), nid, atrtype, value)); |
1215 | } | 1215 | } |
1216 | LCRYPTO_ALIAS(PKCS7_add_attribute) | 1216 | LCRYPTO_ALIAS(PKCS7_add_attribute); |
1217 | 1217 | ||
1218 | static int | 1218 | static int |
1219 | add_attribute(STACK_OF(X509_ATTRIBUTE) **sk, int nid, int atrtype, void *value) | 1219 | add_attribute(STACK_OF(X509_ATTRIBUTE) **sk, int nid, int atrtype, void *value) |
diff --git a/src/lib/libcrypto/pkcs7/pk7_lib.c b/src/lib/libcrypto/pkcs7/pk7_lib.c index efb6343f54..6eda698c94 100644 --- a/src/lib/libcrypto/pkcs7/pk7_lib.c +++ b/src/lib/libcrypto/pkcs7/pk7_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pk7_lib.c,v 1.25 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: pk7_lib.c,v 1.26 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -109,7 +109,7 @@ PKCS7_ctrl(PKCS7 *p7, int cmd, long larg, char *parg) | |||
109 | } | 109 | } |
110 | return (ret); | 110 | return (ret); |
111 | } | 111 | } |
112 | LCRYPTO_ALIAS(PKCS7_ctrl) | 112 | LCRYPTO_ALIAS(PKCS7_ctrl); |
113 | 113 | ||
114 | int | 114 | int |
115 | PKCS7_content_new(PKCS7 *p7, int type) | 115 | PKCS7_content_new(PKCS7 *p7, int type) |
@@ -129,7 +129,7 @@ err: | |||
129 | PKCS7_free(ret); | 129 | PKCS7_free(ret); |
130 | return (0); | 130 | return (0); |
131 | } | 131 | } |
132 | LCRYPTO_ALIAS(PKCS7_content_new) | 132 | LCRYPTO_ALIAS(PKCS7_content_new); |
133 | 133 | ||
134 | int | 134 | int |
135 | PKCS7_set_content(PKCS7 *p7, PKCS7 *p7_data) | 135 | PKCS7_set_content(PKCS7 *p7, PKCS7 *p7_data) |
@@ -160,7 +160,7 @@ PKCS7_set_content(PKCS7 *p7, PKCS7 *p7_data) | |||
160 | err: | 160 | err: |
161 | return (0); | 161 | return (0); |
162 | } | 162 | } |
163 | LCRYPTO_ALIAS(PKCS7_set_content) | 163 | LCRYPTO_ALIAS(PKCS7_set_content); |
164 | 164 | ||
165 | int | 165 | int |
166 | PKCS7_set_type(PKCS7 *p7, int type) | 166 | PKCS7_set_type(PKCS7 *p7, int type) |
@@ -230,7 +230,7 @@ PKCS7_set_type(PKCS7 *p7, int type) | |||
230 | err: | 230 | err: |
231 | return (0); | 231 | return (0); |
232 | } | 232 | } |
233 | LCRYPTO_ALIAS(PKCS7_set_type) | 233 | LCRYPTO_ALIAS(PKCS7_set_type); |
234 | 234 | ||
235 | int | 235 | int |
236 | PKCS7_set0_type_other(PKCS7 *p7, int type, ASN1_TYPE *other) | 236 | PKCS7_set0_type_other(PKCS7 *p7, int type, ASN1_TYPE *other) |
@@ -239,7 +239,7 @@ PKCS7_set0_type_other(PKCS7 *p7, int type, ASN1_TYPE *other) | |||
239 | p7->d.other = other; | 239 | p7->d.other = other; |
240 | return 1; | 240 | return 1; |
241 | } | 241 | } |
242 | LCRYPTO_ALIAS(PKCS7_set0_type_other) | 242 | LCRYPTO_ALIAS(PKCS7_set0_type_other); |
243 | 243 | ||
244 | int | 244 | int |
245 | PKCS7_add_signer(PKCS7 *p7, PKCS7_SIGNER_INFO *psi) | 245 | PKCS7_add_signer(PKCS7 *p7, PKCS7_SIGNER_INFO *psi) |
@@ -295,7 +295,7 @@ PKCS7_add_signer(PKCS7 *p7, PKCS7_SIGNER_INFO *psi) | |||
295 | return 0; | 295 | return 0; |
296 | return (1); | 296 | return (1); |
297 | } | 297 | } |
298 | LCRYPTO_ALIAS(PKCS7_add_signer) | 298 | LCRYPTO_ALIAS(PKCS7_add_signer); |
299 | 299 | ||
300 | int | 300 | int |
301 | PKCS7_add_certificate(PKCS7 *p7, X509 *x509) | 301 | PKCS7_add_certificate(PKCS7 *p7, X509 *x509) |
@@ -329,7 +329,7 @@ PKCS7_add_certificate(PKCS7 *p7, X509 *x509) | |||
329 | } | 329 | } |
330 | return (1); | 330 | return (1); |
331 | } | 331 | } |
332 | LCRYPTO_ALIAS(PKCS7_add_certificate) | 332 | LCRYPTO_ALIAS(PKCS7_add_certificate); |
333 | 333 | ||
334 | int | 334 | int |
335 | PKCS7_add_crl(PKCS7 *p7, X509_CRL *crl) | 335 | PKCS7_add_crl(PKCS7 *p7, X509_CRL *crl) |
@@ -364,7 +364,7 @@ PKCS7_add_crl(PKCS7 *p7, X509_CRL *crl) | |||
364 | } | 364 | } |
365 | return (1); | 365 | return (1); |
366 | } | 366 | } |
367 | LCRYPTO_ALIAS(PKCS7_add_crl) | 367 | LCRYPTO_ALIAS(PKCS7_add_crl); |
368 | 368 | ||
369 | int | 369 | int |
370 | PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, | 370 | PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, |
@@ -409,7 +409,7 @@ PKCS7_SIGNER_INFO_set(PKCS7_SIGNER_INFO *p7i, X509 *x509, EVP_PKEY *pkey, | |||
409 | err: | 409 | err: |
410 | return 0; | 410 | return 0; |
411 | } | 411 | } |
412 | LCRYPTO_ALIAS(PKCS7_SIGNER_INFO_set) | 412 | LCRYPTO_ALIAS(PKCS7_SIGNER_INFO_set); |
413 | 413 | ||
414 | PKCS7_SIGNER_INFO * | 414 | PKCS7_SIGNER_INFO * |
415 | PKCS7_add_signature(PKCS7 *p7, X509 *x509, EVP_PKEY *pkey, const EVP_MD *dgst) | 415 | PKCS7_add_signature(PKCS7 *p7, X509 *x509, EVP_PKEY *pkey, const EVP_MD *dgst) |
@@ -439,7 +439,7 @@ err: | |||
439 | PKCS7_SIGNER_INFO_free(si); | 439 | PKCS7_SIGNER_INFO_free(si); |
440 | return (NULL); | 440 | return (NULL); |
441 | } | 441 | } |
442 | LCRYPTO_ALIAS(PKCS7_add_signature) | 442 | LCRYPTO_ALIAS(PKCS7_add_signature); |
443 | 443 | ||
444 | int | 444 | int |
445 | PKCS7_set_digest(PKCS7 *p7, const EVP_MD *md) | 445 | PKCS7_set_digest(PKCS7 *p7, const EVP_MD *md) |
@@ -457,7 +457,7 @@ PKCS7_set_digest(PKCS7 *p7, const EVP_MD *md) | |||
457 | PKCS7error(PKCS7_R_WRONG_CONTENT_TYPE); | 457 | PKCS7error(PKCS7_R_WRONG_CONTENT_TYPE); |
458 | return 1; | 458 | return 1; |
459 | } | 459 | } |
460 | LCRYPTO_ALIAS(PKCS7_set_digest) | 460 | LCRYPTO_ALIAS(PKCS7_set_digest); |
461 | 461 | ||
462 | STACK_OF(PKCS7_SIGNER_INFO) * | 462 | STACK_OF(PKCS7_SIGNER_INFO) * |
463 | PKCS7_get_signer_info(PKCS7 *p7) | 463 | PKCS7_get_signer_info(PKCS7 *p7) |
@@ -471,7 +471,7 @@ PKCS7_get_signer_info(PKCS7 *p7) | |||
471 | } else | 471 | } else |
472 | return (NULL); | 472 | return (NULL); |
473 | } | 473 | } |
474 | LCRYPTO_ALIAS(PKCS7_get_signer_info) | 474 | LCRYPTO_ALIAS(PKCS7_get_signer_info); |
475 | 475 | ||
476 | void | 476 | void |
477 | PKCS7_SIGNER_INFO_get0_algs(PKCS7_SIGNER_INFO *si, EVP_PKEY **pk, | 477 | PKCS7_SIGNER_INFO_get0_algs(PKCS7_SIGNER_INFO *si, EVP_PKEY **pk, |
@@ -484,7 +484,7 @@ PKCS7_SIGNER_INFO_get0_algs(PKCS7_SIGNER_INFO *si, EVP_PKEY **pk, | |||
484 | if (psig) | 484 | if (psig) |
485 | *psig = si->digest_enc_alg; | 485 | *psig = si->digest_enc_alg; |
486 | } | 486 | } |
487 | LCRYPTO_ALIAS(PKCS7_SIGNER_INFO_get0_algs) | 487 | LCRYPTO_ALIAS(PKCS7_SIGNER_INFO_get0_algs); |
488 | 488 | ||
489 | void | 489 | void |
490 | PKCS7_RECIP_INFO_get0_alg(PKCS7_RECIP_INFO *ri, X509_ALGOR **penc) | 490 | PKCS7_RECIP_INFO_get0_alg(PKCS7_RECIP_INFO *ri, X509_ALGOR **penc) |
@@ -492,7 +492,7 @@ PKCS7_RECIP_INFO_get0_alg(PKCS7_RECIP_INFO *ri, X509_ALGOR **penc) | |||
492 | if (penc) | 492 | if (penc) |
493 | *penc = ri->key_enc_algor; | 493 | *penc = ri->key_enc_algor; |
494 | } | 494 | } |
495 | LCRYPTO_ALIAS(PKCS7_RECIP_INFO_get0_alg) | 495 | LCRYPTO_ALIAS(PKCS7_RECIP_INFO_get0_alg); |
496 | 496 | ||
497 | PKCS7_RECIP_INFO * | 497 | PKCS7_RECIP_INFO * |
498 | PKCS7_add_recipient(PKCS7 *p7, X509 *x509) | 498 | PKCS7_add_recipient(PKCS7 *p7, X509 *x509) |
@@ -511,7 +511,7 @@ err: | |||
511 | PKCS7_RECIP_INFO_free(ri); | 511 | PKCS7_RECIP_INFO_free(ri); |
512 | return NULL; | 512 | return NULL; |
513 | } | 513 | } |
514 | LCRYPTO_ALIAS(PKCS7_add_recipient) | 514 | LCRYPTO_ALIAS(PKCS7_add_recipient); |
515 | 515 | ||
516 | int | 516 | int |
517 | PKCS7_add_recipient_info(PKCS7 *p7, PKCS7_RECIP_INFO *ri) | 517 | PKCS7_add_recipient_info(PKCS7 *p7, PKCS7_RECIP_INFO *ri) |
@@ -536,7 +536,7 @@ PKCS7_add_recipient_info(PKCS7 *p7, PKCS7_RECIP_INFO *ri) | |||
536 | return 0; | 536 | return 0; |
537 | return (1); | 537 | return (1); |
538 | } | 538 | } |
539 | LCRYPTO_ALIAS(PKCS7_add_recipient_info) | 539 | LCRYPTO_ALIAS(PKCS7_add_recipient_info); |
540 | 540 | ||
541 | int | 541 | int |
542 | PKCS7_RECIP_INFO_set(PKCS7_RECIP_INFO *p7i, X509 *x509) | 542 | PKCS7_RECIP_INFO_set(PKCS7_RECIP_INFO *p7i, X509 *x509) |
@@ -583,7 +583,7 @@ err: | |||
583 | EVP_PKEY_free(pkey); | 583 | EVP_PKEY_free(pkey); |
584 | return 0; | 584 | return 0; |
585 | } | 585 | } |
586 | LCRYPTO_ALIAS(PKCS7_RECIP_INFO_set) | 586 | LCRYPTO_ALIAS(PKCS7_RECIP_INFO_set); |
587 | 587 | ||
588 | X509 * | 588 | X509 * |
589 | PKCS7_cert_from_signer_info(PKCS7 *p7, PKCS7_SIGNER_INFO *si) | 589 | PKCS7_cert_from_signer_info(PKCS7 *p7, PKCS7_SIGNER_INFO *si) |
@@ -595,7 +595,7 @@ PKCS7_cert_from_signer_info(PKCS7 *p7, PKCS7_SIGNER_INFO *si) | |||
595 | else | 595 | else |
596 | return (NULL); | 596 | return (NULL); |
597 | } | 597 | } |
598 | LCRYPTO_ALIAS(PKCS7_cert_from_signer_info) | 598 | LCRYPTO_ALIAS(PKCS7_cert_from_signer_info); |
599 | 599 | ||
600 | int | 600 | int |
601 | PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) | 601 | PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) |
@@ -626,7 +626,7 @@ PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) | |||
626 | ec->cipher = cipher; | 626 | ec->cipher = cipher; |
627 | return 1; | 627 | return 1; |
628 | } | 628 | } |
629 | LCRYPTO_ALIAS(PKCS7_set_cipher) | 629 | LCRYPTO_ALIAS(PKCS7_set_cipher); |
630 | 630 | ||
631 | int | 631 | int |
632 | PKCS7_stream(unsigned char ***boundary, PKCS7 *p7) | 632 | PKCS7_stream(unsigned char ***boundary, PKCS7 *p7) |
@@ -671,4 +671,4 @@ PKCS7_stream(unsigned char ***boundary, PKCS7 *p7) | |||
671 | 671 | ||
672 | return 1; | 672 | return 1; |
673 | } | 673 | } |
674 | LCRYPTO_ALIAS(PKCS7_stream) | 674 | LCRYPTO_ALIAS(PKCS7_stream); |
diff --git a/src/lib/libcrypto/pkcs7/pk7_mime.c b/src/lib/libcrypto/pkcs7/pk7_mime.c index bf7d94584b..d5bc031e69 100644 --- a/src/lib/libcrypto/pkcs7/pk7_mime.c +++ b/src/lib/libcrypto/pkcs7/pk7_mime.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pk7_mime.c,v 1.14 2022/11/12 12:11:14 beck Exp $ */ | 1 | /* $OpenBSD: pk7_mime.c,v 1.15 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -66,7 +66,7 @@ i2d_PKCS7_bio_stream(BIO *out, PKCS7 *p7, BIO *in, int flags) | |||
66 | return i2d_ASN1_bio_stream(out, (ASN1_VALUE *)p7, in, flags, | 66 | return i2d_ASN1_bio_stream(out, (ASN1_VALUE *)p7, in, flags, |
67 | &PKCS7_it); | 67 | &PKCS7_it); |
68 | } | 68 | } |
69 | LCRYPTO_ALIAS(i2d_PKCS7_bio_stream) | 69 | LCRYPTO_ALIAS(i2d_PKCS7_bio_stream); |
70 | 70 | ||
71 | int | 71 | int |
72 | PEM_write_bio_PKCS7_stream(BIO *out, PKCS7 *p7, BIO *in, int flags) | 72 | PEM_write_bio_PKCS7_stream(BIO *out, PKCS7 *p7, BIO *in, int flags) |
@@ -74,7 +74,7 @@ PEM_write_bio_PKCS7_stream(BIO *out, PKCS7 *p7, BIO *in, int flags) | |||
74 | return PEM_write_bio_ASN1_stream(out, (ASN1_VALUE *) p7, in, flags, | 74 | return PEM_write_bio_ASN1_stream(out, (ASN1_VALUE *) p7, in, flags, |
75 | "PKCS7", &PKCS7_it); | 75 | "PKCS7", &PKCS7_it); |
76 | } | 76 | } |
77 | LCRYPTO_ALIAS(PEM_write_bio_PKCS7_stream) | 77 | LCRYPTO_ALIAS(PEM_write_bio_PKCS7_stream); |
78 | 78 | ||
79 | int | 79 | int |
80 | SMIME_write_PKCS7(BIO *bio, PKCS7 *p7, BIO *data, int flags) | 80 | SMIME_write_PKCS7(BIO *bio, PKCS7 *p7, BIO *data, int flags) |
@@ -92,11 +92,11 @@ SMIME_write_PKCS7(BIO *bio, PKCS7 *p7, BIO *data, int flags) | |||
92 | return SMIME_write_ASN1(bio, (ASN1_VALUE *)p7, data, flags, | 92 | return SMIME_write_ASN1(bio, (ASN1_VALUE *)p7, data, flags, |
93 | ctype_nid, NID_undef, mdalgs, &PKCS7_it); | 93 | ctype_nid, NID_undef, mdalgs, &PKCS7_it); |
94 | } | 94 | } |
95 | LCRYPTO_ALIAS(SMIME_write_PKCS7) | 95 | LCRYPTO_ALIAS(SMIME_write_PKCS7); |
96 | 96 | ||
97 | PKCS7 * | 97 | PKCS7 * |
98 | SMIME_read_PKCS7(BIO *bio, BIO **bcont) | 98 | SMIME_read_PKCS7(BIO *bio, BIO **bcont) |
99 | { | 99 | { |
100 | return (PKCS7 *)SMIME_read_ASN1(bio, bcont, &PKCS7_it); | 100 | return (PKCS7 *)SMIME_read_ASN1(bio, bcont, &PKCS7_it); |
101 | } | 101 | } |
102 | LCRYPTO_ALIAS(SMIME_read_PKCS7) | 102 | LCRYPTO_ALIAS(SMIME_read_PKCS7); |
diff --git a/src/lib/libcrypto/pkcs7/pk7_smime.c b/src/lib/libcrypto/pkcs7/pk7_smime.c index 4324cf384b..c113ac3954 100644 --- a/src/lib/libcrypto/pkcs7/pk7_smime.c +++ b/src/lib/libcrypto/pkcs7/pk7_smime.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pk7_smime.c,v 1.25 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: pk7_smime.c,v 1.26 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -111,7 +111,7 @@ err: | |||
111 | PKCS7_free(p7); | 111 | PKCS7_free(p7); |
112 | return NULL; | 112 | return NULL; |
113 | } | 113 | } |
114 | LCRYPTO_ALIAS(PKCS7_sign) | 114 | LCRYPTO_ALIAS(PKCS7_sign); |
115 | 115 | ||
116 | int | 116 | int |
117 | PKCS7_final(PKCS7 *p7, BIO *data, int flags) | 117 | PKCS7_final(PKCS7 *p7, BIO *data, int flags) |
@@ -140,7 +140,7 @@ err: | |||
140 | 140 | ||
141 | return ret; | 141 | return ret; |
142 | } | 142 | } |
143 | LCRYPTO_ALIAS(PKCS7_final) | 143 | LCRYPTO_ALIAS(PKCS7_final); |
144 | 144 | ||
145 | /* Check to see if a cipher exists and if so add S/MIME capabilities */ | 145 | /* Check to see if a cipher exists and if so add S/MIME capabilities */ |
146 | 146 | ||
@@ -223,7 +223,7 @@ err: | |||
223 | sk_X509_ALGOR_pop_free(smcap, X509_ALGOR_free); | 223 | sk_X509_ALGOR_pop_free(smcap, X509_ALGOR_free); |
224 | return NULL; | 224 | return NULL; |
225 | } | 225 | } |
226 | LCRYPTO_ALIAS(PKCS7_sign_add_signer) | 226 | LCRYPTO_ALIAS(PKCS7_sign_add_signer); |
227 | 227 | ||
228 | /* Search for a digest matching SignerInfo digest type and if found | 228 | /* Search for a digest matching SignerInfo digest type and if found |
229 | * copy across. | 229 | * copy across. |
@@ -426,7 +426,7 @@ err: | |||
426 | 426 | ||
427 | return ret; | 427 | return ret; |
428 | } | 428 | } |
429 | LCRYPTO_ALIAS(PKCS7_verify) | 429 | LCRYPTO_ALIAS(PKCS7_verify); |
430 | 430 | ||
431 | STACK_OF(X509) * | 431 | STACK_OF(X509) * |
432 | PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags) | 432 | PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags) |
@@ -485,7 +485,7 @@ PKCS7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags) | |||
485 | } | 485 | } |
486 | return signers; | 486 | return signers; |
487 | } | 487 | } |
488 | LCRYPTO_ALIAS(PKCS7_get0_signers) | 488 | LCRYPTO_ALIAS(PKCS7_get0_signers); |
489 | 489 | ||
490 | /* Build a complete PKCS#7 enveloped data */ | 490 | /* Build a complete PKCS#7 enveloped data */ |
491 | 491 | ||
@@ -529,7 +529,7 @@ err: | |||
529 | PKCS7_free(p7); | 529 | PKCS7_free(p7); |
530 | return NULL; | 530 | return NULL; |
531 | } | 531 | } |
532 | LCRYPTO_ALIAS(PKCS7_encrypt) | 532 | LCRYPTO_ALIAS(PKCS7_encrypt); |
533 | 533 | ||
534 | int | 534 | int |
535 | PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) | 535 | PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) |
@@ -596,4 +596,4 @@ PKCS7_decrypt(PKCS7 *p7, EVP_PKEY *pkey, X509 *cert, BIO *data, int flags) | |||
596 | return ret; | 596 | return ret; |
597 | } | 597 | } |
598 | } | 598 | } |
599 | LCRYPTO_ALIAS(PKCS7_decrypt) | 599 | LCRYPTO_ALIAS(PKCS7_decrypt); |
diff --git a/src/lib/libcrypto/pkcs7/pkcs7err.c b/src/lib/libcrypto/pkcs7/pkcs7err.c index d2eab2d7f6..d3ca0ec6df 100644 --- a/src/lib/libcrypto/pkcs7/pkcs7err.c +++ b/src/lib/libcrypto/pkcs7/pkcs7err.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pkcs7err.c,v 1.14 2022/11/12 12:11:14 beck Exp $ */ | 1 | /* $OpenBSD: pkcs7err.c,v 1.15 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2007 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2007 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -140,4 +140,4 @@ ERR_load_PKCS7_strings(void) | |||
140 | } | 140 | } |
141 | #endif | 141 | #endif |
142 | } | 142 | } |
143 | LCRYPTO_ALIAS(ERR_load_PKCS7_strings) | 143 | LCRYPTO_ALIAS(ERR_load_PKCS7_strings); |
diff --git a/src/lib/libcrypto/stack/stack.c b/src/lib/libcrypto/stack/stack.c index c99941aa46..bc5b2f6e83 100644 --- a/src/lib/libcrypto/stack/stack.c +++ b/src/lib/libcrypto/stack/stack.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: stack.c,v 1.21 2022/11/11 19:18:55 beck Exp $ */ | 1 | /* $OpenBSD: stack.c,v 1.22 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -79,7 +79,7 @@ int | |||
79 | 79 | ||
80 | return old; | 80 | return old; |
81 | } | 81 | } |
82 | LCRYPTO_ALIAS(sk_set_cmp_func) | 82 | LCRYPTO_ALIAS(sk_set_cmp_func); |
83 | 83 | ||
84 | _STACK * | 84 | _STACK * |
85 | sk_dup(_STACK *sk) | 85 | sk_dup(_STACK *sk) |
@@ -106,14 +106,14 @@ err: | |||
106 | sk_free(ret); | 106 | sk_free(ret); |
107 | return (NULL); | 107 | return (NULL); |
108 | } | 108 | } |
109 | LCRYPTO_ALIAS(sk_dup) | 109 | LCRYPTO_ALIAS(sk_dup); |
110 | 110 | ||
111 | _STACK * | 111 | _STACK * |
112 | sk_new_null(void) | 112 | sk_new_null(void) |
113 | { | 113 | { |
114 | return sk_new((int (*)(const void *, const void *))0); | 114 | return sk_new((int (*)(const void *, const void *))0); |
115 | } | 115 | } |
116 | LCRYPTO_ALIAS(sk_new_null) | 116 | LCRYPTO_ALIAS(sk_new_null); |
117 | 117 | ||
118 | _STACK * | 118 | _STACK * |
119 | sk_new(int (*c)(const void *, const void *)) | 119 | sk_new(int (*c)(const void *, const void *)) |
@@ -137,7 +137,7 @@ err: | |||
137 | free(ret); | 137 | free(ret); |
138 | return (NULL); | 138 | return (NULL); |
139 | } | 139 | } |
140 | LCRYPTO_ALIAS(sk_new) | 140 | LCRYPTO_ALIAS(sk_new); |
141 | 141 | ||
142 | int | 142 | int |
143 | sk_insert(_STACK *st, void *data, int loc) | 143 | sk_insert(_STACK *st, void *data, int loc) |
@@ -164,7 +164,7 @@ sk_insert(_STACK *st, void *data, int loc) | |||
164 | st->sorted = 0; | 164 | st->sorted = 0; |
165 | return (st->num); | 165 | return (st->num); |
166 | } | 166 | } |
167 | LCRYPTO_ALIAS(sk_insert) | 167 | LCRYPTO_ALIAS(sk_insert); |
168 | 168 | ||
169 | void * | 169 | void * |
170 | sk_delete_ptr(_STACK *st, void *p) | 170 | sk_delete_ptr(_STACK *st, void *p) |
@@ -176,7 +176,7 @@ sk_delete_ptr(_STACK *st, void *p) | |||
176 | return (sk_delete(st, i)); | 176 | return (sk_delete(st, i)); |
177 | return (NULL); | 177 | return (NULL); |
178 | } | 178 | } |
179 | LCRYPTO_ALIAS(sk_delete_ptr) | 179 | LCRYPTO_ALIAS(sk_delete_ptr); |
180 | 180 | ||
181 | void * | 181 | void * |
182 | sk_delete(_STACK *st, int loc) | 182 | sk_delete(_STACK *st, int loc) |
@@ -194,7 +194,7 @@ sk_delete(_STACK *st, int loc) | |||
194 | st->num--; | 194 | st->num--; |
195 | return (ret); | 195 | return (ret); |
196 | } | 196 | } |
197 | LCRYPTO_ALIAS(sk_delete) | 197 | LCRYPTO_ALIAS(sk_delete); |
198 | 198 | ||
199 | static int | 199 | static int |
200 | internal_find(_STACK *st, void *data, int ret_val_options) | 200 | internal_find(_STACK *st, void *data, int ret_val_options) |
@@ -226,28 +226,28 @@ sk_find(_STACK *st, void *data) | |||
226 | { | 226 | { |
227 | return internal_find(st, data, OBJ_BSEARCH_FIRST_VALUE_ON_MATCH); | 227 | return internal_find(st, data, OBJ_BSEARCH_FIRST_VALUE_ON_MATCH); |
228 | } | 228 | } |
229 | LCRYPTO_ALIAS(sk_find) | 229 | LCRYPTO_ALIAS(sk_find); |
230 | 230 | ||
231 | int | 231 | int |
232 | sk_find_ex(_STACK *st, void *data) | 232 | sk_find_ex(_STACK *st, void *data) |
233 | { | 233 | { |
234 | return internal_find(st, data, OBJ_BSEARCH_VALUE_ON_NOMATCH); | 234 | return internal_find(st, data, OBJ_BSEARCH_VALUE_ON_NOMATCH); |
235 | } | 235 | } |
236 | LCRYPTO_ALIAS(sk_find_ex) | 236 | LCRYPTO_ALIAS(sk_find_ex); |
237 | 237 | ||
238 | int | 238 | int |
239 | sk_push(_STACK *st, void *data) | 239 | sk_push(_STACK *st, void *data) |
240 | { | 240 | { |
241 | return (sk_insert(st, data, st->num)); | 241 | return (sk_insert(st, data, st->num)); |
242 | } | 242 | } |
243 | LCRYPTO_ALIAS(sk_push) | 243 | LCRYPTO_ALIAS(sk_push); |
244 | 244 | ||
245 | int | 245 | int |
246 | sk_unshift(_STACK *st, void *data) | 246 | sk_unshift(_STACK *st, void *data) |
247 | { | 247 | { |
248 | return (sk_insert(st, data, 0)); | 248 | return (sk_insert(st, data, 0)); |
249 | } | 249 | } |
250 | LCRYPTO_ALIAS(sk_unshift) | 250 | LCRYPTO_ALIAS(sk_unshift); |
251 | 251 | ||
252 | void * | 252 | void * |
253 | sk_shift(_STACK *st) | 253 | sk_shift(_STACK *st) |
@@ -258,7 +258,7 @@ sk_shift(_STACK *st) | |||
258 | return (NULL); | 258 | return (NULL); |
259 | return (sk_delete(st, 0)); | 259 | return (sk_delete(st, 0)); |
260 | } | 260 | } |
261 | LCRYPTO_ALIAS(sk_shift) | 261 | LCRYPTO_ALIAS(sk_shift); |
262 | 262 | ||
263 | void * | 263 | void * |
264 | sk_pop(_STACK *st) | 264 | sk_pop(_STACK *st) |
@@ -269,7 +269,7 @@ sk_pop(_STACK *st) | |||
269 | return (NULL); | 269 | return (NULL); |
270 | return (sk_delete(st, st->num - 1)); | 270 | return (sk_delete(st, st->num - 1)); |
271 | } | 271 | } |
272 | LCRYPTO_ALIAS(sk_pop) | 272 | LCRYPTO_ALIAS(sk_pop); |
273 | 273 | ||
274 | void | 274 | void |
275 | sk_zero(_STACK *st) | 275 | sk_zero(_STACK *st) |
@@ -281,7 +281,7 @@ sk_zero(_STACK *st) | |||
281 | memset(st->data, 0, sizeof(st->data)*st->num); | 281 | memset(st->data, 0, sizeof(st->data)*st->num); |
282 | st->num = 0; | 282 | st->num = 0; |
283 | } | 283 | } |
284 | LCRYPTO_ALIAS(sk_zero) | 284 | LCRYPTO_ALIAS(sk_zero); |
285 | 285 | ||
286 | void | 286 | void |
287 | sk_pop_free(_STACK *st, void (*func)(void *)) | 287 | sk_pop_free(_STACK *st, void (*func)(void *)) |
@@ -295,7 +295,7 @@ sk_pop_free(_STACK *st, void (*func)(void *)) | |||
295 | func(st->data[i]); | 295 | func(st->data[i]); |
296 | sk_free(st); | 296 | sk_free(st); |
297 | } | 297 | } |
298 | LCRYPTO_ALIAS(sk_pop_free) | 298 | LCRYPTO_ALIAS(sk_pop_free); |
299 | 299 | ||
300 | void | 300 | void |
301 | sk_free(_STACK *st) | 301 | sk_free(_STACK *st) |
@@ -305,7 +305,7 @@ sk_free(_STACK *st) | |||
305 | free(st->data); | 305 | free(st->data); |
306 | free(st); | 306 | free(st); |
307 | } | 307 | } |
308 | LCRYPTO_ALIAS(sk_free) | 308 | LCRYPTO_ALIAS(sk_free); |
309 | 309 | ||
310 | int | 310 | int |
311 | sk_num(const _STACK *st) | 311 | sk_num(const _STACK *st) |
@@ -314,7 +314,7 @@ sk_num(const _STACK *st) | |||
314 | return -1; | 314 | return -1; |
315 | return st->num; | 315 | return st->num; |
316 | } | 316 | } |
317 | LCRYPTO_ALIAS(sk_num) | 317 | LCRYPTO_ALIAS(sk_num); |
318 | 318 | ||
319 | void * | 319 | void * |
320 | sk_value(const _STACK *st, int i) | 320 | sk_value(const _STACK *st, int i) |
@@ -323,7 +323,7 @@ sk_value(const _STACK *st, int i) | |||
323 | return NULL; | 323 | return NULL; |
324 | return st->data[i]; | 324 | return st->data[i]; |
325 | } | 325 | } |
326 | LCRYPTO_ALIAS(sk_value) | 326 | LCRYPTO_ALIAS(sk_value); |
327 | 327 | ||
328 | void * | 328 | void * |
329 | sk_set(_STACK *st, int i, void *value) | 329 | sk_set(_STACK *st, int i, void *value) |
@@ -333,7 +333,7 @@ sk_set(_STACK *st, int i, void *value) | |||
333 | st->sorted = 0; | 333 | st->sorted = 0; |
334 | return (st->data[i] = value); | 334 | return (st->data[i] = value); |
335 | } | 335 | } |
336 | LCRYPTO_ALIAS(sk_set) | 336 | LCRYPTO_ALIAS(sk_set); |
337 | 337 | ||
338 | void | 338 | void |
339 | sk_sort(_STACK *st) | 339 | sk_sort(_STACK *st) |
@@ -351,7 +351,7 @@ sk_sort(_STACK *st) | |||
351 | st->sorted = 1; | 351 | st->sorted = 1; |
352 | } | 352 | } |
353 | } | 353 | } |
354 | LCRYPTO_ALIAS(sk_sort) | 354 | LCRYPTO_ALIAS(sk_sort); |
355 | 355 | ||
356 | int | 356 | int |
357 | sk_is_sorted(const _STACK *st) | 357 | sk_is_sorted(const _STACK *st) |
@@ -360,4 +360,4 @@ sk_is_sorted(const _STACK *st) | |||
360 | return 1; | 360 | return 1; |
361 | return st->sorted; | 361 | return st->sorted; |
362 | } | 362 | } |
363 | LCRYPTO_ALIAS(sk_is_sorted) | 363 | LCRYPTO_ALIAS(sk_is_sorted); |
diff --git a/src/lib/libcrypto/ui/ui_err.c b/src/lib/libcrypto/ui/ui_err.c index a1207fb0c3..3f875da776 100644 --- a/src/lib/libcrypto/ui/ui_err.c +++ b/src/lib/libcrypto/ui/ui_err.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ui_err.c,v 1.11 2022/11/12 13:16:10 beck Exp $ */ | 1 | /* $OpenBSD: ui_err.c,v 1.12 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2006 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2006 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -93,4 +93,4 @@ ERR_load_UI_strings(void) | |||
93 | } | 93 | } |
94 | #endif | 94 | #endif |
95 | } | 95 | } |
96 | LCRYPTO_ALIAS(ERR_load_UI_strings) | 96 | LCRYPTO_ALIAS(ERR_load_UI_strings); |
diff --git a/src/lib/libcrypto/ui/ui_lib.c b/src/lib/libcrypto/ui/ui_lib.c index 546540ad83..73d899afcc 100644 --- a/src/lib/libcrypto/ui/ui_lib.c +++ b/src/lib/libcrypto/ui/ui_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ui_lib.c,v 1.50 2022/12/23 02:31:56 jsing Exp $ */ | 1 | /* $OpenBSD: ui_lib.c,v 1.51 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Richard Levitte (richard@levitte.org) for the OpenSSL | 2 | /* Written by Richard Levitte (richard@levitte.org) for the OpenSSL |
3 | * project 2001. | 3 | * project 2001. |
4 | */ | 4 | */ |
@@ -73,7 +73,7 @@ UI_new(void) | |||
73 | { | 73 | { |
74 | return (UI_new_method(NULL)); | 74 | return (UI_new_method(NULL)); |
75 | } | 75 | } |
76 | LCRYPTO_ALIAS(UI_new) | 76 | LCRYPTO_ALIAS(UI_new); |
77 | 77 | ||
78 | UI * | 78 | UI * |
79 | UI_new_method(const UI_METHOD *method) | 79 | UI_new_method(const UI_METHOD *method) |
@@ -90,7 +90,7 @@ UI_new_method(const UI_METHOD *method) | |||
90 | 90 | ||
91 | return ret; | 91 | return ret; |
92 | } | 92 | } |
93 | LCRYPTO_ALIAS(UI_new_method) | 93 | LCRYPTO_ALIAS(UI_new_method); |
94 | 94 | ||
95 | static void | 95 | static void |
96 | free_string(UI_STRING *uis) | 96 | free_string(UI_STRING *uis) |
@@ -122,7 +122,7 @@ UI_free(UI *ui) | |||
122 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_UI, ui, &ui->ex_data); | 122 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_UI, ui, &ui->ex_data); |
123 | free(ui); | 123 | free(ui); |
124 | } | 124 | } |
125 | LCRYPTO_ALIAS(UI_free) | 125 | LCRYPTO_ALIAS(UI_free); |
126 | 126 | ||
127 | static int | 127 | static int |
128 | allocate_string_stack(UI *ui) | 128 | allocate_string_stack(UI *ui) |
@@ -269,7 +269,7 @@ UI_add_input_string(UI *ui, const char *prompt, int flags, char *result_buf, | |||
269 | return general_allocate_string(ui, prompt, 0, UIT_PROMPT, flags, | 269 | return general_allocate_string(ui, prompt, 0, UIT_PROMPT, flags, |
270 | result_buf, minsize, maxsize, NULL); | 270 | result_buf, minsize, maxsize, NULL); |
271 | } | 271 | } |
272 | LCRYPTO_ALIAS(UI_add_input_string) | 272 | LCRYPTO_ALIAS(UI_add_input_string); |
273 | 273 | ||
274 | /* Same as UI_add_input_string(), excepts it takes a copy of the prompt. */ | 274 | /* Same as UI_add_input_string(), excepts it takes a copy of the prompt. */ |
275 | int | 275 | int |
@@ -279,7 +279,7 @@ UI_dup_input_string(UI *ui, const char *prompt, int flags, char *result_buf, | |||
279 | return general_allocate_string(ui, prompt, 1, UIT_PROMPT, flags, | 279 | return general_allocate_string(ui, prompt, 1, UIT_PROMPT, flags, |
280 | result_buf, minsize, maxsize, NULL); | 280 | result_buf, minsize, maxsize, NULL); |
281 | } | 281 | } |
282 | LCRYPTO_ALIAS(UI_dup_input_string) | 282 | LCRYPTO_ALIAS(UI_dup_input_string); |
283 | 283 | ||
284 | int | 284 | int |
285 | UI_add_verify_string(UI *ui, const char *prompt, int flags, char *result_buf, | 285 | UI_add_verify_string(UI *ui, const char *prompt, int flags, char *result_buf, |
@@ -288,7 +288,7 @@ UI_add_verify_string(UI *ui, const char *prompt, int flags, char *result_buf, | |||
288 | return general_allocate_string(ui, prompt, 0, UIT_VERIFY, flags, | 288 | return general_allocate_string(ui, prompt, 0, UIT_VERIFY, flags, |
289 | result_buf, minsize, maxsize, test_buf); | 289 | result_buf, minsize, maxsize, test_buf); |
290 | } | 290 | } |
291 | LCRYPTO_ALIAS(UI_add_verify_string) | 291 | LCRYPTO_ALIAS(UI_add_verify_string); |
292 | 292 | ||
293 | int | 293 | int |
294 | UI_dup_verify_string(UI *ui, const char *prompt, int flags, | 294 | UI_dup_verify_string(UI *ui, const char *prompt, int flags, |
@@ -297,7 +297,7 @@ UI_dup_verify_string(UI *ui, const char *prompt, int flags, | |||
297 | return general_allocate_string(ui, prompt, 1, UIT_VERIFY, flags, | 297 | return general_allocate_string(ui, prompt, 1, UIT_VERIFY, flags, |
298 | result_buf, minsize, maxsize, test_buf); | 298 | result_buf, minsize, maxsize, test_buf); |
299 | } | 299 | } |
300 | LCRYPTO_ALIAS(UI_dup_verify_string) | 300 | LCRYPTO_ALIAS(UI_dup_verify_string); |
301 | 301 | ||
302 | int | 302 | int |
303 | UI_add_input_boolean(UI *ui, const char *prompt, const char *action_desc, | 303 | UI_add_input_boolean(UI *ui, const char *prompt, const char *action_desc, |
@@ -306,7 +306,7 @@ UI_add_input_boolean(UI *ui, const char *prompt, const char *action_desc, | |||
306 | return general_allocate_boolean(ui, prompt, action_desc, ok_chars, | 306 | return general_allocate_boolean(ui, prompt, action_desc, ok_chars, |
307 | cancel_chars, 0, UIT_BOOLEAN, flags, result_buf); | 307 | cancel_chars, 0, UIT_BOOLEAN, flags, result_buf); |
308 | } | 308 | } |
309 | LCRYPTO_ALIAS(UI_add_input_boolean) | 309 | LCRYPTO_ALIAS(UI_add_input_boolean); |
310 | 310 | ||
311 | int | 311 | int |
312 | UI_dup_input_boolean(UI *ui, const char *prompt, const char *action_desc, | 312 | UI_dup_input_boolean(UI *ui, const char *prompt, const char *action_desc, |
@@ -315,7 +315,7 @@ UI_dup_input_boolean(UI *ui, const char *prompt, const char *action_desc, | |||
315 | return general_allocate_boolean(ui, prompt, action_desc, ok_chars, | 315 | return general_allocate_boolean(ui, prompt, action_desc, ok_chars, |
316 | cancel_chars, 1, UIT_BOOLEAN, flags, result_buf); | 316 | cancel_chars, 1, UIT_BOOLEAN, flags, result_buf); |
317 | } | 317 | } |
318 | LCRYPTO_ALIAS(UI_dup_input_boolean) | 318 | LCRYPTO_ALIAS(UI_dup_input_boolean); |
319 | 319 | ||
320 | int | 320 | int |
321 | UI_add_info_string(UI *ui, const char *text) | 321 | UI_add_info_string(UI *ui, const char *text) |
@@ -323,7 +323,7 @@ UI_add_info_string(UI *ui, const char *text) | |||
323 | return general_allocate_string(ui, text, 0, UIT_INFO, 0, NULL, 0, 0, | 323 | return general_allocate_string(ui, text, 0, UIT_INFO, 0, NULL, 0, 0, |
324 | NULL); | 324 | NULL); |
325 | } | 325 | } |
326 | LCRYPTO_ALIAS(UI_add_info_string) | 326 | LCRYPTO_ALIAS(UI_add_info_string); |
327 | 327 | ||
328 | int | 328 | int |
329 | UI_dup_info_string(UI *ui, const char *text) | 329 | UI_dup_info_string(UI *ui, const char *text) |
@@ -331,7 +331,7 @@ UI_dup_info_string(UI *ui, const char *text) | |||
331 | return general_allocate_string(ui, text, 1, UIT_INFO, 0, NULL, 0, 0, | 331 | return general_allocate_string(ui, text, 1, UIT_INFO, 0, NULL, 0, 0, |
332 | NULL); | 332 | NULL); |
333 | } | 333 | } |
334 | LCRYPTO_ALIAS(UI_dup_info_string) | 334 | LCRYPTO_ALIAS(UI_dup_info_string); |
335 | 335 | ||
336 | int | 336 | int |
337 | UI_add_error_string(UI *ui, const char *text) | 337 | UI_add_error_string(UI *ui, const char *text) |
@@ -339,7 +339,7 @@ UI_add_error_string(UI *ui, const char *text) | |||
339 | return general_allocate_string(ui, text, 0, UIT_ERROR, 0, NULL, 0, 0, | 339 | return general_allocate_string(ui, text, 0, UIT_ERROR, 0, NULL, 0, 0, |
340 | NULL); | 340 | NULL); |
341 | } | 341 | } |
342 | LCRYPTO_ALIAS(UI_add_error_string) | 342 | LCRYPTO_ALIAS(UI_add_error_string); |
343 | 343 | ||
344 | int | 344 | int |
345 | UI_dup_error_string(UI *ui, const char *text) | 345 | UI_dup_error_string(UI *ui, const char *text) |
@@ -347,7 +347,7 @@ UI_dup_error_string(UI *ui, const char *text) | |||
347 | return general_allocate_string(ui, text, 1, UIT_ERROR, 0, NULL, 0, 0, | 347 | return general_allocate_string(ui, text, 1, UIT_ERROR, 0, NULL, 0, 0, |
348 | NULL); | 348 | NULL); |
349 | } | 349 | } |
350 | LCRYPTO_ALIAS(UI_dup_error_string) | 350 | LCRYPTO_ALIAS(UI_dup_error_string); |
351 | 351 | ||
352 | char * | 352 | char * |
353 | UI_construct_prompt(UI *ui, const char *object_desc, const char *object_name) | 353 | UI_construct_prompt(UI *ui, const char *object_desc, const char *object_name) |
@@ -372,7 +372,7 @@ UI_construct_prompt(UI *ui, const char *object_desc, const char *object_name) | |||
372 | 372 | ||
373 | return prompt; | 373 | return prompt; |
374 | } | 374 | } |
375 | LCRYPTO_ALIAS(UI_construct_prompt) | 375 | LCRYPTO_ALIAS(UI_construct_prompt); |
376 | 376 | ||
377 | void * | 377 | void * |
378 | UI_add_user_data(UI *ui, void *user_data) | 378 | UI_add_user_data(UI *ui, void *user_data) |
@@ -383,14 +383,14 @@ UI_add_user_data(UI *ui, void *user_data) | |||
383 | 383 | ||
384 | return old_data; | 384 | return old_data; |
385 | } | 385 | } |
386 | LCRYPTO_ALIAS(UI_add_user_data) | 386 | LCRYPTO_ALIAS(UI_add_user_data); |
387 | 387 | ||
388 | void * | 388 | void * |
389 | UI_get0_user_data(UI *ui) | 389 | UI_get0_user_data(UI *ui) |
390 | { | 390 | { |
391 | return ui->user_data; | 391 | return ui->user_data; |
392 | } | 392 | } |
393 | LCRYPTO_ALIAS(UI_get0_user_data) | 393 | LCRYPTO_ALIAS(UI_get0_user_data); |
394 | 394 | ||
395 | const char * | 395 | const char * |
396 | UI_get0_result(UI *ui, int i) | 396 | UI_get0_result(UI *ui, int i) |
@@ -405,7 +405,7 @@ UI_get0_result(UI *ui, int i) | |||
405 | } | 405 | } |
406 | return UI_get0_result_string(sk_UI_STRING_value(ui->strings, i)); | 406 | return UI_get0_result_string(sk_UI_STRING_value(ui->strings, i)); |
407 | } | 407 | } |
408 | LCRYPTO_ALIAS(UI_get0_result) | 408 | LCRYPTO_ALIAS(UI_get0_result); |
409 | 409 | ||
410 | static int | 410 | static int |
411 | print_error(const char *str, size_t len, void *arg) | 411 | print_error(const char *str, size_t len, void *arg) |
@@ -479,7 +479,7 @@ UI_process(UI *ui) | |||
479 | return -1; | 479 | return -1; |
480 | return ok; | 480 | return ok; |
481 | } | 481 | } |
482 | LCRYPTO_ALIAS(UI_process) | 482 | LCRYPTO_ALIAS(UI_process); |
483 | 483 | ||
484 | int | 484 | int |
485 | UI_ctrl(UI *ui, int cmd, long i, void *p, void (*f) (void)) | 485 | UI_ctrl(UI *ui, int cmd, long i, void *p, void (*f) (void)) |
@@ -507,7 +507,7 @@ UI_ctrl(UI *ui, int cmd, long i, void *p, void (*f) (void)) | |||
507 | UIerror(UI_R_UNKNOWN_CONTROL_COMMAND); | 507 | UIerror(UI_R_UNKNOWN_CONTROL_COMMAND); |
508 | return -1; | 508 | return -1; |
509 | } | 509 | } |
510 | LCRYPTO_ALIAS(UI_ctrl) | 510 | LCRYPTO_ALIAS(UI_ctrl); |
511 | 511 | ||
512 | int | 512 | int |
513 | UI_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | 513 | UI_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, |
@@ -516,28 +516,28 @@ UI_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | |||
516 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_UI, argl, argp, | 516 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_UI, argl, argp, |
517 | new_func, dup_func, free_func); | 517 | new_func, dup_func, free_func); |
518 | } | 518 | } |
519 | LCRYPTO_ALIAS(UI_get_ex_new_index) | 519 | LCRYPTO_ALIAS(UI_get_ex_new_index); |
520 | 520 | ||
521 | int | 521 | int |
522 | UI_set_ex_data(UI *r, int idx, void *arg) | 522 | UI_set_ex_data(UI *r, int idx, void *arg) |
523 | { | 523 | { |
524 | return (CRYPTO_set_ex_data(&r->ex_data, idx, arg)); | 524 | return (CRYPTO_set_ex_data(&r->ex_data, idx, arg)); |
525 | } | 525 | } |
526 | LCRYPTO_ALIAS(UI_set_ex_data) | 526 | LCRYPTO_ALIAS(UI_set_ex_data); |
527 | 527 | ||
528 | void * | 528 | void * |
529 | UI_get_ex_data(UI *r, int idx) | 529 | UI_get_ex_data(UI *r, int idx) |
530 | { | 530 | { |
531 | return (CRYPTO_get_ex_data(&r->ex_data, idx)); | 531 | return (CRYPTO_get_ex_data(&r->ex_data, idx)); |
532 | } | 532 | } |
533 | LCRYPTO_ALIAS(UI_get_ex_data) | 533 | LCRYPTO_ALIAS(UI_get_ex_data); |
534 | 534 | ||
535 | void | 535 | void |
536 | UI_set_default_method(const UI_METHOD *method) | 536 | UI_set_default_method(const UI_METHOD *method) |
537 | { | 537 | { |
538 | default_UI_meth = method; | 538 | default_UI_meth = method; |
539 | } | 539 | } |
540 | LCRYPTO_ALIAS(UI_set_default_method) | 540 | LCRYPTO_ALIAS(UI_set_default_method); |
541 | 541 | ||
542 | const UI_METHOD * | 542 | const UI_METHOD * |
543 | UI_get_default_method(void) | 543 | UI_get_default_method(void) |
@@ -547,14 +547,14 @@ UI_get_default_method(void) | |||
547 | 547 | ||
548 | return default_UI_meth; | 548 | return default_UI_meth; |
549 | } | 549 | } |
550 | LCRYPTO_ALIAS(UI_get_default_method) | 550 | LCRYPTO_ALIAS(UI_get_default_method); |
551 | 551 | ||
552 | const UI_METHOD * | 552 | const UI_METHOD * |
553 | UI_get_method(UI *ui) | 553 | UI_get_method(UI *ui) |
554 | { | 554 | { |
555 | return ui->meth; | 555 | return ui->meth; |
556 | } | 556 | } |
557 | LCRYPTO_ALIAS(UI_get_method) | 557 | LCRYPTO_ALIAS(UI_get_method); |
558 | 558 | ||
559 | const UI_METHOD * | 559 | const UI_METHOD * |
560 | UI_set_method(UI *ui, const UI_METHOD *method) | 560 | UI_set_method(UI *ui, const UI_METHOD *method) |
@@ -563,7 +563,7 @@ UI_set_method(UI *ui, const UI_METHOD *method) | |||
563 | 563 | ||
564 | return ui->meth; | 564 | return ui->meth; |
565 | } | 565 | } |
566 | LCRYPTO_ALIAS(UI_set_method) | 566 | LCRYPTO_ALIAS(UI_set_method); |
567 | 567 | ||
568 | UI_METHOD * | 568 | UI_METHOD * |
569 | UI_create_method(const char *name) | 569 | UI_create_method(const char *name) |
@@ -585,7 +585,7 @@ UI_create_method(const char *name) | |||
585 | 585 | ||
586 | return NULL; | 586 | return NULL; |
587 | } | 587 | } |
588 | LCRYPTO_ALIAS(UI_create_method) | 588 | LCRYPTO_ALIAS(UI_create_method); |
589 | 589 | ||
590 | void | 590 | void |
591 | UI_destroy_method(UI_METHOD *method) | 591 | UI_destroy_method(UI_METHOD *method) |
@@ -596,7 +596,7 @@ UI_destroy_method(UI_METHOD *method) | |||
596 | free(method->name); | 596 | free(method->name); |
597 | free(method); | 597 | free(method); |
598 | } | 598 | } |
599 | LCRYPTO_ALIAS(UI_destroy_method) | 599 | LCRYPTO_ALIAS(UI_destroy_method); |
600 | 600 | ||
601 | int | 601 | int |
602 | UI_method_set_opener(UI_METHOD *method, int (*opener)(UI *ui)) | 602 | UI_method_set_opener(UI_METHOD *method, int (*opener)(UI *ui)) |
@@ -608,7 +608,7 @@ UI_method_set_opener(UI_METHOD *method, int (*opener)(UI *ui)) | |||
608 | 608 | ||
609 | return 0; | 609 | return 0; |
610 | } | 610 | } |
611 | LCRYPTO_ALIAS(UI_method_set_opener) | 611 | LCRYPTO_ALIAS(UI_method_set_opener); |
612 | 612 | ||
613 | int | 613 | int |
614 | UI_method_set_writer(UI_METHOD *method, int (*writer)(UI *ui, UI_STRING *uis)) | 614 | UI_method_set_writer(UI_METHOD *method, int (*writer)(UI *ui, UI_STRING *uis)) |
@@ -620,7 +620,7 @@ UI_method_set_writer(UI_METHOD *method, int (*writer)(UI *ui, UI_STRING *uis)) | |||
620 | 620 | ||
621 | return 0; | 621 | return 0; |
622 | } | 622 | } |
623 | LCRYPTO_ALIAS(UI_method_set_writer) | 623 | LCRYPTO_ALIAS(UI_method_set_writer); |
624 | 624 | ||
625 | int | 625 | int |
626 | UI_method_set_flusher(UI_METHOD *method, int (*flusher)(UI *ui)) | 626 | UI_method_set_flusher(UI_METHOD *method, int (*flusher)(UI *ui)) |
@@ -632,7 +632,7 @@ UI_method_set_flusher(UI_METHOD *method, int (*flusher)(UI *ui)) | |||
632 | 632 | ||
633 | return 0; | 633 | return 0; |
634 | } | 634 | } |
635 | LCRYPTO_ALIAS(UI_method_set_flusher) | 635 | LCRYPTO_ALIAS(UI_method_set_flusher); |
636 | 636 | ||
637 | int | 637 | int |
638 | UI_method_set_reader(UI_METHOD *method, int (*reader)(UI *ui, UI_STRING *uis)) | 638 | UI_method_set_reader(UI_METHOD *method, int (*reader)(UI *ui, UI_STRING *uis)) |
@@ -644,7 +644,7 @@ UI_method_set_reader(UI_METHOD *method, int (*reader)(UI *ui, UI_STRING *uis)) | |||
644 | 644 | ||
645 | return 0; | 645 | return 0; |
646 | } | 646 | } |
647 | LCRYPTO_ALIAS(UI_method_set_reader) | 647 | LCRYPTO_ALIAS(UI_method_set_reader); |
648 | 648 | ||
649 | int | 649 | int |
650 | UI_method_set_closer(UI_METHOD *method, int (*closer)(UI *ui)) | 650 | UI_method_set_closer(UI_METHOD *method, int (*closer)(UI *ui)) |
@@ -656,7 +656,7 @@ UI_method_set_closer(UI_METHOD *method, int (*closer)(UI *ui)) | |||
656 | 656 | ||
657 | return 0; | 657 | return 0; |
658 | } | 658 | } |
659 | LCRYPTO_ALIAS(UI_method_set_closer) | 659 | LCRYPTO_ALIAS(UI_method_set_closer); |
660 | 660 | ||
661 | int | 661 | int |
662 | UI_method_set_prompt_constructor(UI_METHOD *method, | 662 | UI_method_set_prompt_constructor(UI_METHOD *method, |
@@ -670,7 +670,7 @@ UI_method_set_prompt_constructor(UI_METHOD *method, | |||
670 | 670 | ||
671 | return 0; | 671 | return 0; |
672 | } | 672 | } |
673 | LCRYPTO_ALIAS(UI_method_set_prompt_constructor) | 673 | LCRYPTO_ALIAS(UI_method_set_prompt_constructor); |
674 | 674 | ||
675 | int | 675 | int |
676 | (*UI_method_get_opener(const UI_METHOD * method))(UI *) | 676 | (*UI_method_get_opener(const UI_METHOD * method))(UI *) |
@@ -680,7 +680,7 @@ int | |||
680 | 680 | ||
681 | return method->ui_open_session; | 681 | return method->ui_open_session; |
682 | } | 682 | } |
683 | LCRYPTO_ALIAS(UI_method_get_opener) | 683 | LCRYPTO_ALIAS(UI_method_get_opener); |
684 | 684 | ||
685 | int | 685 | int |
686 | (*UI_method_get_writer(const UI_METHOD *method))(UI *, UI_STRING *) | 686 | (*UI_method_get_writer(const UI_METHOD *method))(UI *, UI_STRING *) |
@@ -690,7 +690,7 @@ int | |||
690 | 690 | ||
691 | return method->ui_write_string; | 691 | return method->ui_write_string; |
692 | } | 692 | } |
693 | LCRYPTO_ALIAS(UI_method_get_writer) | 693 | LCRYPTO_ALIAS(UI_method_get_writer); |
694 | 694 | ||
695 | int | 695 | int |
696 | (*UI_method_get_flusher(const UI_METHOD *method)) (UI *) | 696 | (*UI_method_get_flusher(const UI_METHOD *method)) (UI *) |
@@ -700,7 +700,7 @@ int | |||
700 | 700 | ||
701 | return method->ui_flush; | 701 | return method->ui_flush; |
702 | } | 702 | } |
703 | LCRYPTO_ALIAS(UI_method_get_flusher) | 703 | LCRYPTO_ALIAS(UI_method_get_flusher); |
704 | 704 | ||
705 | int | 705 | int |
706 | (*UI_method_get_reader(const UI_METHOD *method))(UI *, UI_STRING *) | 706 | (*UI_method_get_reader(const UI_METHOD *method))(UI *, UI_STRING *) |
@@ -710,7 +710,7 @@ int | |||
710 | 710 | ||
711 | return method->ui_read_string; | 711 | return method->ui_read_string; |
712 | } | 712 | } |
713 | LCRYPTO_ALIAS(UI_method_get_reader) | 713 | LCRYPTO_ALIAS(UI_method_get_reader); |
714 | 714 | ||
715 | int | 715 | int |
716 | (*UI_method_get_closer(const UI_METHOD *method))(UI *) | 716 | (*UI_method_get_closer(const UI_METHOD *method))(UI *) |
@@ -720,7 +720,7 @@ int | |||
720 | 720 | ||
721 | return method->ui_close_session; | 721 | return method->ui_close_session; |
722 | } | 722 | } |
723 | LCRYPTO_ALIAS(UI_method_get_closer) | 723 | LCRYPTO_ALIAS(UI_method_get_closer); |
724 | 724 | ||
725 | char * | 725 | char * |
726 | (*UI_method_get_prompt_constructor(const UI_METHOD *method))(UI *, const char *, | 726 | (*UI_method_get_prompt_constructor(const UI_METHOD *method))(UI *, const char *, |
@@ -731,7 +731,7 @@ char * | |||
731 | 731 | ||
732 | return method->ui_construct_prompt; | 732 | return method->ui_construct_prompt; |
733 | } | 733 | } |
734 | LCRYPTO_ALIAS(UI_method_get_prompt_constructor) | 734 | LCRYPTO_ALIAS(UI_method_get_prompt_constructor); |
735 | 735 | ||
736 | enum UI_string_types | 736 | enum UI_string_types |
737 | UI_get_string_type(UI_STRING *uis) | 737 | UI_get_string_type(UI_STRING *uis) |
@@ -741,7 +741,7 @@ UI_get_string_type(UI_STRING *uis) | |||
741 | 741 | ||
742 | return uis->type; | 742 | return uis->type; |
743 | } | 743 | } |
744 | LCRYPTO_ALIAS(UI_get_string_type) | 744 | LCRYPTO_ALIAS(UI_get_string_type); |
745 | 745 | ||
746 | int | 746 | int |
747 | UI_get_input_flags(UI_STRING *uis) | 747 | UI_get_input_flags(UI_STRING *uis) |
@@ -751,7 +751,7 @@ UI_get_input_flags(UI_STRING *uis) | |||
751 | 751 | ||
752 | return uis->input_flags; | 752 | return uis->input_flags; |
753 | } | 753 | } |
754 | LCRYPTO_ALIAS(UI_get_input_flags) | 754 | LCRYPTO_ALIAS(UI_get_input_flags); |
755 | 755 | ||
756 | const char * | 756 | const char * |
757 | UI_get0_output_string(UI_STRING *uis) | 757 | UI_get0_output_string(UI_STRING *uis) |
@@ -761,7 +761,7 @@ UI_get0_output_string(UI_STRING *uis) | |||
761 | 761 | ||
762 | return uis->out_string; | 762 | return uis->out_string; |
763 | } | 763 | } |
764 | LCRYPTO_ALIAS(UI_get0_output_string) | 764 | LCRYPTO_ALIAS(UI_get0_output_string); |
765 | 765 | ||
766 | const char * | 766 | const char * |
767 | UI_get0_action_string(UI_STRING *uis) | 767 | UI_get0_action_string(UI_STRING *uis) |
@@ -777,7 +777,7 @@ UI_get0_action_string(UI_STRING *uis) | |||
777 | return NULL; | 777 | return NULL; |
778 | } | 778 | } |
779 | } | 779 | } |
780 | LCRYPTO_ALIAS(UI_get0_action_string) | 780 | LCRYPTO_ALIAS(UI_get0_action_string); |
781 | 781 | ||
782 | const char * | 782 | const char * |
783 | UI_get0_result_string(UI_STRING *uis) | 783 | UI_get0_result_string(UI_STRING *uis) |
@@ -793,7 +793,7 @@ UI_get0_result_string(UI_STRING *uis) | |||
793 | return NULL; | 793 | return NULL; |
794 | } | 794 | } |
795 | } | 795 | } |
796 | LCRYPTO_ALIAS(UI_get0_result_string) | 796 | LCRYPTO_ALIAS(UI_get0_result_string); |
797 | 797 | ||
798 | const char * | 798 | const char * |
799 | UI_get0_test_string(UI_STRING *uis) | 799 | UI_get0_test_string(UI_STRING *uis) |
@@ -808,7 +808,7 @@ UI_get0_test_string(UI_STRING *uis) | |||
808 | return NULL; | 808 | return NULL; |
809 | } | 809 | } |
810 | } | 810 | } |
811 | LCRYPTO_ALIAS(UI_get0_test_string) | 811 | LCRYPTO_ALIAS(UI_get0_test_string); |
812 | 812 | ||
813 | int | 813 | int |
814 | UI_get_result_minsize(UI_STRING *uis) | 814 | UI_get_result_minsize(UI_STRING *uis) |
@@ -824,7 +824,7 @@ UI_get_result_minsize(UI_STRING *uis) | |||
824 | return -1; | 824 | return -1; |
825 | } | 825 | } |
826 | } | 826 | } |
827 | LCRYPTO_ALIAS(UI_get_result_minsize) | 827 | LCRYPTO_ALIAS(UI_get_result_minsize); |
828 | 828 | ||
829 | int | 829 | int |
830 | UI_get_result_maxsize(UI_STRING *uis) | 830 | UI_get_result_maxsize(UI_STRING *uis) |
@@ -840,7 +840,7 @@ UI_get_result_maxsize(UI_STRING *uis) | |||
840 | return -1; | 840 | return -1; |
841 | } | 841 | } |
842 | } | 842 | } |
843 | LCRYPTO_ALIAS(UI_get_result_maxsize) | 843 | LCRYPTO_ALIAS(UI_get_result_maxsize); |
844 | 844 | ||
845 | int | 845 | int |
846 | UI_set_result(UI *ui, UI_STRING *uis, const char *result) | 846 | UI_set_result(UI *ui, UI_STRING *uis, const char *result) |
@@ -904,4 +904,4 @@ UI_set_result(UI *ui, UI_STRING *uis, const char *result) | |||
904 | } | 904 | } |
905 | return 0; | 905 | return 0; |
906 | } | 906 | } |
907 | LCRYPTO_ALIAS(UI_set_result) | 907 | LCRYPTO_ALIAS(UI_set_result); |
diff --git a/src/lib/libcrypto/ui/ui_null.c b/src/lib/libcrypto/ui/ui_null.c index 7bb7a90b2f..cbc9a5025b 100644 --- a/src/lib/libcrypto/ui/ui_null.c +++ b/src/lib/libcrypto/ui/ui_null.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ui_null.c,v 1.1 2022/12/17 21:59:39 tb Exp $ */ | 1 | /* $OpenBSD: ui_null.c,v 1.2 2023/02/16 08:38:17 tb Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Written by Theo Buehler. Public domain. | 4 | * Written by Theo Buehler. Public domain. |
@@ -15,4 +15,4 @@ UI_null(void) | |||
15 | { | 15 | { |
16 | return &ui_null; | 16 | return &ui_null; |
17 | } | 17 | } |
18 | LCRYPTO_ALIAS(UI_null) | 18 | LCRYPTO_ALIAS(UI_null); |
diff --git a/src/lib/libcrypto/ui/ui_openssl.c b/src/lib/libcrypto/ui/ui_openssl.c index 0d2e6f1ac8..0b91700571 100644 --- a/src/lib/libcrypto/ui/ui_openssl.c +++ b/src/lib/libcrypto/ui/ui_openssl.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ui_openssl.c,v 1.27 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: ui_openssl.c,v 1.28 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Richard Levitte (richard@levitte.org) and others | 2 | /* Written by Richard Levitte (richard@levitte.org) and others |
3 | * for the OpenSSL project 2001. | 3 | * for the OpenSSL project 2001. |
4 | */ | 4 | */ |
@@ -167,7 +167,7 @@ UI_OpenSSL(void) | |||
167 | { | 167 | { |
168 | return &ui_openssl; | 168 | return &ui_openssl; |
169 | } | 169 | } |
170 | LCRYPTO_ALIAS(UI_OpenSSL) | 170 | LCRYPTO_ALIAS(UI_OpenSSL); |
171 | 171 | ||
172 | /* The following function makes sure that info and error strings are printed | 172 | /* The following function makes sure that info and error strings are printed |
173 | before any prompt. */ | 173 | before any prompt. */ |
diff --git a/src/lib/libcrypto/ui/ui_util.c b/src/lib/libcrypto/ui/ui_util.c index 5e7048531c..4fa4058cd4 100644 --- a/src/lib/libcrypto/ui/ui_util.c +++ b/src/lib/libcrypto/ui/ui_util.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ui_util.c,v 1.13 2022/12/23 02:20:28 jsing Exp $ */ | 1 | /* $OpenBSD: ui_util.c,v 1.14 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 2001-2002 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 2001-2002 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -70,7 +70,7 @@ UI_UTIL_read_pw_string(char *buf, int length, const char *prompt, int verify) | |||
70 | explicit_bzero(buff, BUFSIZ); | 70 | explicit_bzero(buff, BUFSIZ); |
71 | return (ret); | 71 | return (ret); |
72 | } | 72 | } |
73 | LCRYPTO_ALIAS(UI_UTIL_read_pw_string) | 73 | LCRYPTO_ALIAS(UI_UTIL_read_pw_string); |
74 | 74 | ||
75 | int | 75 | int |
76 | UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt, int verify) | 76 | UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt, int verify) |
@@ -95,4 +95,4 @@ UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt, int verify) | |||
95 | ok = 0; | 95 | ok = 0; |
96 | return (ok); | 96 | return (ok); |
97 | } | 97 | } |
98 | LCRYPTO_ALIAS(UI_UTIL_read_pw) | 98 | LCRYPTO_ALIAS(UI_UTIL_read_pw); |
diff --git a/src/lib/libcrypto/x509/by_dir.c b/src/lib/libcrypto/x509/by_dir.c index 341c252ea9..9fa6a10048 100644 --- a/src/lib/libcrypto/x509/by_dir.c +++ b/src/lib/libcrypto/x509/by_dir.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: by_dir.c,v 1.43 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: by_dir.c,v 1.44 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -117,7 +117,7 @@ X509_LOOKUP_hash_dir(void) | |||
117 | { | 117 | { |
118 | return &x509_dir_lookup; | 118 | return &x509_dir_lookup; |
119 | } | 119 | } |
120 | LCRYPTO_ALIAS(X509_LOOKUP_hash_dir) | 120 | LCRYPTO_ALIAS(X509_LOOKUP_hash_dir); |
121 | 121 | ||
122 | static int | 122 | static int |
123 | dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl, | 123 | dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl, |
diff --git a/src/lib/libcrypto/x509/by_file.c b/src/lib/libcrypto/x509/by_file.c index 70a2a62a97..606f4c8d0c 100644 --- a/src/lib/libcrypto/x509/by_file.c +++ b/src/lib/libcrypto/x509/by_file.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: by_file.c,v 1.27 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: by_file.c,v 1.28 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -89,7 +89,7 @@ X509_LOOKUP_file(void) | |||
89 | { | 89 | { |
90 | return &x509_file_lookup; | 90 | return &x509_file_lookup; |
91 | } | 91 | } |
92 | LCRYPTO_ALIAS(X509_LOOKUP_file) | 92 | LCRYPTO_ALIAS(X509_LOOKUP_file); |
93 | 93 | ||
94 | static int | 94 | static int |
95 | by_file_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl, | 95 | by_file_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl, |
@@ -174,7 +174,7 @@ err: | |||
174 | BIO_free(in); | 174 | BIO_free(in); |
175 | return ret; | 175 | return ret; |
176 | } | 176 | } |
177 | LCRYPTO_ALIAS(X509_load_cert_file) | 177 | LCRYPTO_ALIAS(X509_load_cert_file); |
178 | 178 | ||
179 | int | 179 | int |
180 | X509_load_crl_file(X509_LOOKUP *ctx, const char *file, int type) | 180 | X509_load_crl_file(X509_LOOKUP *ctx, const char *file, int type) |
@@ -231,7 +231,7 @@ err: | |||
231 | BIO_free(in); | 231 | BIO_free(in); |
232 | return ret; | 232 | return ret; |
233 | } | 233 | } |
234 | LCRYPTO_ALIAS(X509_load_crl_file) | 234 | LCRYPTO_ALIAS(X509_load_crl_file); |
235 | 235 | ||
236 | int | 236 | int |
237 | X509_load_cert_crl_file(X509_LOOKUP *ctx, const char *file, int type) | 237 | X509_load_cert_crl_file(X509_LOOKUP *ctx, const char *file, int type) |
@@ -270,4 +270,4 @@ X509_load_cert_crl_file(X509_LOOKUP *ctx, const char *file, int type) | |||
270 | sk_X509_INFO_pop_free(inf, X509_INFO_free); | 270 | sk_X509_INFO_pop_free(inf, X509_INFO_free); |
271 | return count; | 271 | return count; |
272 | } | 272 | } |
273 | LCRYPTO_ALIAS(X509_load_cert_crl_file) | 273 | LCRYPTO_ALIAS(X509_load_cert_crl_file); |
diff --git a/src/lib/libcrypto/x509/by_mem.c b/src/lib/libcrypto/x509/by_mem.c index 8f0a93fce3..579eecd36d 100644 --- a/src/lib/libcrypto/x509/by_mem.c +++ b/src/lib/libcrypto/x509/by_mem.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: by_mem.c,v 1.7 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: by_mem.c,v 1.8 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -90,7 +90,7 @@ X509_LOOKUP_mem(void) | |||
90 | { | 90 | { |
91 | return (&x509_mem_lookup); | 91 | return (&x509_mem_lookup); |
92 | } | 92 | } |
93 | LCRYPTO_ALIAS(X509_LOOKUP_mem) | 93 | LCRYPTO_ALIAS(X509_LOOKUP_mem); |
94 | 94 | ||
95 | static int | 95 | static int |
96 | by_mem_ctrl(X509_LOOKUP *lu, int cmd, const char *buf, | 96 | by_mem_ctrl(X509_LOOKUP *lu, int cmd, const char *buf, |
diff --git a/src/lib/libcrypto/x509/pcy_lib.c b/src/lib/libcrypto/x509/pcy_lib.c index e4b06e988b..e4d3fd9fa8 100644 --- a/src/lib/libcrypto/x509/pcy_lib.c +++ b/src/lib/libcrypto/x509/pcy_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pcy_lib.c,v 1.2 2022/11/14 17:48:49 beck Exp $ */ | 1 | /* $OpenBSD: pcy_lib.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2004. | 3 | * project 2004. |
4 | */ | 4 | */ |
@@ -72,7 +72,7 @@ X509_policy_tree_level_count(const X509_POLICY_TREE *tree) | |||
72 | return 0; | 72 | return 0; |
73 | return tree->nlevel; | 73 | return tree->nlevel; |
74 | } | 74 | } |
75 | LCRYPTO_ALIAS(X509_policy_tree_level_count) | 75 | LCRYPTO_ALIAS(X509_policy_tree_level_count); |
76 | 76 | ||
77 | X509_POLICY_LEVEL * | 77 | X509_POLICY_LEVEL * |
78 | X509_policy_tree_get0_level(const X509_POLICY_TREE *tree, int i) | 78 | X509_policy_tree_get0_level(const X509_POLICY_TREE *tree, int i) |
@@ -81,7 +81,7 @@ X509_policy_tree_get0_level(const X509_POLICY_TREE *tree, int i) | |||
81 | return NULL; | 81 | return NULL; |
82 | return tree->levels + i; | 82 | return tree->levels + i; |
83 | } | 83 | } |
84 | LCRYPTO_ALIAS(X509_policy_tree_get0_level) | 84 | LCRYPTO_ALIAS(X509_policy_tree_get0_level); |
85 | 85 | ||
86 | STACK_OF(X509_POLICY_NODE) * | 86 | STACK_OF(X509_POLICY_NODE) * |
87 | X509_policy_tree_get0_policies(const X509_POLICY_TREE *tree) | 87 | X509_policy_tree_get0_policies(const X509_POLICY_TREE *tree) |
@@ -90,7 +90,7 @@ X509_policy_tree_get0_policies(const X509_POLICY_TREE *tree) | |||
90 | return NULL; | 90 | return NULL; |
91 | return tree->auth_policies; | 91 | return tree->auth_policies; |
92 | } | 92 | } |
93 | LCRYPTO_ALIAS(X509_policy_tree_get0_policies) | 93 | LCRYPTO_ALIAS(X509_policy_tree_get0_policies); |
94 | 94 | ||
95 | STACK_OF(X509_POLICY_NODE) * | 95 | STACK_OF(X509_POLICY_NODE) * |
96 | X509_policy_tree_get0_user_policies(const X509_POLICY_TREE *tree) | 96 | X509_policy_tree_get0_user_policies(const X509_POLICY_TREE *tree) |
@@ -102,7 +102,7 @@ X509_policy_tree_get0_user_policies(const X509_POLICY_TREE *tree) | |||
102 | else | 102 | else |
103 | return tree->user_policies; | 103 | return tree->user_policies; |
104 | } | 104 | } |
105 | LCRYPTO_ALIAS(X509_policy_tree_get0_user_policies) | 105 | LCRYPTO_ALIAS(X509_policy_tree_get0_user_policies); |
106 | 106 | ||
107 | /* X509_POLICY_LEVEL stuff */ | 107 | /* X509_POLICY_LEVEL stuff */ |
108 | 108 | ||
@@ -120,7 +120,7 @@ X509_policy_level_node_count(X509_POLICY_LEVEL *level) | |||
120 | n += sk_X509_POLICY_NODE_num(level->nodes); | 120 | n += sk_X509_POLICY_NODE_num(level->nodes); |
121 | return n; | 121 | return n; |
122 | } | 122 | } |
123 | LCRYPTO_ALIAS(X509_policy_level_node_count) | 123 | LCRYPTO_ALIAS(X509_policy_level_node_count); |
124 | 124 | ||
125 | X509_POLICY_NODE * | 125 | X509_POLICY_NODE * |
126 | X509_policy_level_get0_node(X509_POLICY_LEVEL *level, int i) | 126 | X509_policy_level_get0_node(X509_POLICY_LEVEL *level, int i) |
@@ -134,7 +134,7 @@ X509_policy_level_get0_node(X509_POLICY_LEVEL *level, int i) | |||
134 | } | 134 | } |
135 | return sk_X509_POLICY_NODE_value(level->nodes, i); | 135 | return sk_X509_POLICY_NODE_value(level->nodes, i); |
136 | } | 136 | } |
137 | LCRYPTO_ALIAS(X509_policy_level_get0_node) | 137 | LCRYPTO_ALIAS(X509_policy_level_get0_node); |
138 | 138 | ||
139 | /* X509_POLICY_NODE stuff */ | 139 | /* X509_POLICY_NODE stuff */ |
140 | 140 | ||
@@ -145,7 +145,7 @@ X509_policy_node_get0_policy(const X509_POLICY_NODE *node) | |||
145 | return NULL; | 145 | return NULL; |
146 | return node->data->valid_policy; | 146 | return node->data->valid_policy; |
147 | } | 147 | } |
148 | LCRYPTO_ALIAS(X509_policy_node_get0_policy) | 148 | LCRYPTO_ALIAS(X509_policy_node_get0_policy); |
149 | 149 | ||
150 | STACK_OF(POLICYQUALINFO) * | 150 | STACK_OF(POLICYQUALINFO) * |
151 | X509_policy_node_get0_qualifiers(const X509_POLICY_NODE *node) | 151 | X509_policy_node_get0_qualifiers(const X509_POLICY_NODE *node) |
@@ -154,7 +154,7 @@ X509_policy_node_get0_qualifiers(const X509_POLICY_NODE *node) | |||
154 | return NULL; | 154 | return NULL; |
155 | return node->data->qualifier_set; | 155 | return node->data->qualifier_set; |
156 | } | 156 | } |
157 | LCRYPTO_ALIAS(X509_policy_node_get0_qualifiers) | 157 | LCRYPTO_ALIAS(X509_policy_node_get0_qualifiers); |
158 | 158 | ||
159 | const X509_POLICY_NODE * | 159 | const X509_POLICY_NODE * |
160 | X509_policy_node_get0_parent(const X509_POLICY_NODE *node) | 160 | X509_policy_node_get0_parent(const X509_POLICY_NODE *node) |
@@ -163,4 +163,4 @@ X509_policy_node_get0_parent(const X509_POLICY_NODE *node) | |||
163 | return NULL; | 163 | return NULL; |
164 | return node->parent; | 164 | return node->parent; |
165 | } | 165 | } |
166 | LCRYPTO_ALIAS(X509_policy_node_get0_parent) | 166 | LCRYPTO_ALIAS(X509_policy_node_get0_parent); |
diff --git a/src/lib/libcrypto/x509/pcy_tree.c b/src/lib/libcrypto/x509/pcy_tree.c index 050503bdf3..56e05910cd 100644 --- a/src/lib/libcrypto/x509/pcy_tree.c +++ b/src/lib/libcrypto/x509/pcy_tree.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pcy_tree.c,v 1.5 2022/12/26 07:18:53 jmc Exp $ */ | 1 | /* $OpenBSD: pcy_tree.c,v 1.6 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2004. | 3 | * project 2004. |
4 | */ | 4 | */ |
@@ -657,7 +657,7 @@ X509_policy_tree_free(X509_POLICY_TREE *tree) | |||
657 | free(tree->levels); | 657 | free(tree->levels); |
658 | free(tree); | 658 | free(tree); |
659 | } | 659 | } |
660 | LCRYPTO_ALIAS(X509_policy_tree_free) | 660 | LCRYPTO_ALIAS(X509_policy_tree_free); |
661 | 661 | ||
662 | /* Application policy checking function. | 662 | /* Application policy checking function. |
663 | * Return codes: | 663 | * Return codes: |
@@ -770,4 +770,4 @@ error: | |||
770 | 770 | ||
771 | return 0; | 771 | return 0; |
772 | } | 772 | } |
773 | LCRYPTO_ALIAS(X509_policy_check) | 773 | LCRYPTO_ALIAS(X509_policy_check); |
diff --git a/src/lib/libcrypto/x509/x509_addr.c b/src/lib/libcrypto/x509/x509_addr.c index 510ea4e697..2d8cc0b318 100644 --- a/src/lib/libcrypto/x509/x509_addr.c +++ b/src/lib/libcrypto/x509/x509_addr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_addr.c,v 1.85 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: x509_addr.c,v 1.86 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Contributed to the OpenSSL Project by the American Registry for | 3 | * Contributed to the OpenSSL Project by the American Registry for |
4 | * Internet Numbers ("ARIN"). | 4 | * Internet Numbers ("ARIN"). |
@@ -215,28 +215,28 @@ d2i_IPAddressRange(IPAddressRange **a, const unsigned char **in, long len) | |||
215 | return (IPAddressRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 215 | return (IPAddressRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
216 | &IPAddressRange_it); | 216 | &IPAddressRange_it); |
217 | } | 217 | } |
218 | LCRYPTO_ALIAS(d2i_IPAddressRange) | 218 | LCRYPTO_ALIAS(d2i_IPAddressRange); |
219 | 219 | ||
220 | int | 220 | int |
221 | i2d_IPAddressRange(IPAddressRange *a, unsigned char **out) | 221 | i2d_IPAddressRange(IPAddressRange *a, unsigned char **out) |
222 | { | 222 | { |
223 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressRange_it); | 223 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressRange_it); |
224 | } | 224 | } |
225 | LCRYPTO_ALIAS(i2d_IPAddressRange) | 225 | LCRYPTO_ALIAS(i2d_IPAddressRange); |
226 | 226 | ||
227 | IPAddressRange * | 227 | IPAddressRange * |
228 | IPAddressRange_new(void) | 228 | IPAddressRange_new(void) |
229 | { | 229 | { |
230 | return (IPAddressRange *)ASN1_item_new(&IPAddressRange_it); | 230 | return (IPAddressRange *)ASN1_item_new(&IPAddressRange_it); |
231 | } | 231 | } |
232 | LCRYPTO_ALIAS(IPAddressRange_new) | 232 | LCRYPTO_ALIAS(IPAddressRange_new); |
233 | 233 | ||
234 | void | 234 | void |
235 | IPAddressRange_free(IPAddressRange *a) | 235 | IPAddressRange_free(IPAddressRange *a) |
236 | { | 236 | { |
237 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressRange_it); | 237 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressRange_it); |
238 | } | 238 | } |
239 | LCRYPTO_ALIAS(IPAddressRange_free) | 239 | LCRYPTO_ALIAS(IPAddressRange_free); |
240 | 240 | ||
241 | IPAddressOrRange * | 241 | IPAddressOrRange * |
242 | d2i_IPAddressOrRange(IPAddressOrRange **a, const unsigned char **in, long len) | 242 | d2i_IPAddressOrRange(IPAddressOrRange **a, const unsigned char **in, long len) |
@@ -244,28 +244,28 @@ d2i_IPAddressOrRange(IPAddressOrRange **a, const unsigned char **in, long len) | |||
244 | return (IPAddressOrRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 244 | return (IPAddressOrRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
245 | &IPAddressOrRange_it); | 245 | &IPAddressOrRange_it); |
246 | } | 246 | } |
247 | LCRYPTO_ALIAS(d2i_IPAddressOrRange) | 247 | LCRYPTO_ALIAS(d2i_IPAddressOrRange); |
248 | 248 | ||
249 | int | 249 | int |
250 | i2d_IPAddressOrRange(IPAddressOrRange *a, unsigned char **out) | 250 | i2d_IPAddressOrRange(IPAddressOrRange *a, unsigned char **out) |
251 | { | 251 | { |
252 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressOrRange_it); | 252 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressOrRange_it); |
253 | } | 253 | } |
254 | LCRYPTO_ALIAS(i2d_IPAddressOrRange) | 254 | LCRYPTO_ALIAS(i2d_IPAddressOrRange); |
255 | 255 | ||
256 | IPAddressOrRange * | 256 | IPAddressOrRange * |
257 | IPAddressOrRange_new(void) | 257 | IPAddressOrRange_new(void) |
258 | { | 258 | { |
259 | return (IPAddressOrRange *)ASN1_item_new(&IPAddressOrRange_it); | 259 | return (IPAddressOrRange *)ASN1_item_new(&IPAddressOrRange_it); |
260 | } | 260 | } |
261 | LCRYPTO_ALIAS(IPAddressOrRange_new) | 261 | LCRYPTO_ALIAS(IPAddressOrRange_new); |
262 | 262 | ||
263 | void | 263 | void |
264 | IPAddressOrRange_free(IPAddressOrRange *a) | 264 | IPAddressOrRange_free(IPAddressOrRange *a) |
265 | { | 265 | { |
266 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressOrRange_it); | 266 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressOrRange_it); |
267 | } | 267 | } |
268 | LCRYPTO_ALIAS(IPAddressOrRange_free) | 268 | LCRYPTO_ALIAS(IPAddressOrRange_free); |
269 | 269 | ||
270 | IPAddressChoice * | 270 | IPAddressChoice * |
271 | d2i_IPAddressChoice(IPAddressChoice **a, const unsigned char **in, long len) | 271 | d2i_IPAddressChoice(IPAddressChoice **a, const unsigned char **in, long len) |
@@ -273,28 +273,28 @@ d2i_IPAddressChoice(IPAddressChoice **a, const unsigned char **in, long len) | |||
273 | return (IPAddressChoice *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 273 | return (IPAddressChoice *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
274 | &IPAddressChoice_it); | 274 | &IPAddressChoice_it); |
275 | } | 275 | } |
276 | LCRYPTO_ALIAS(d2i_IPAddressChoice) | 276 | LCRYPTO_ALIAS(d2i_IPAddressChoice); |
277 | 277 | ||
278 | int | 278 | int |
279 | i2d_IPAddressChoice(IPAddressChoice *a, unsigned char **out) | 279 | i2d_IPAddressChoice(IPAddressChoice *a, unsigned char **out) |
280 | { | 280 | { |
281 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressChoice_it); | 281 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressChoice_it); |
282 | } | 282 | } |
283 | LCRYPTO_ALIAS(i2d_IPAddressChoice) | 283 | LCRYPTO_ALIAS(i2d_IPAddressChoice); |
284 | 284 | ||
285 | IPAddressChoice * | 285 | IPAddressChoice * |
286 | IPAddressChoice_new(void) | 286 | IPAddressChoice_new(void) |
287 | { | 287 | { |
288 | return (IPAddressChoice *)ASN1_item_new(&IPAddressChoice_it); | 288 | return (IPAddressChoice *)ASN1_item_new(&IPAddressChoice_it); |
289 | } | 289 | } |
290 | LCRYPTO_ALIAS(IPAddressChoice_new) | 290 | LCRYPTO_ALIAS(IPAddressChoice_new); |
291 | 291 | ||
292 | void | 292 | void |
293 | IPAddressChoice_free(IPAddressChoice *a) | 293 | IPAddressChoice_free(IPAddressChoice *a) |
294 | { | 294 | { |
295 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressChoice_it); | 295 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressChoice_it); |
296 | } | 296 | } |
297 | LCRYPTO_ALIAS(IPAddressChoice_free) | 297 | LCRYPTO_ALIAS(IPAddressChoice_free); |
298 | 298 | ||
299 | IPAddressFamily * | 299 | IPAddressFamily * |
300 | d2i_IPAddressFamily(IPAddressFamily **a, const unsigned char **in, long len) | 300 | d2i_IPAddressFamily(IPAddressFamily **a, const unsigned char **in, long len) |
@@ -302,28 +302,28 @@ d2i_IPAddressFamily(IPAddressFamily **a, const unsigned char **in, long len) | |||
302 | return (IPAddressFamily *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 302 | return (IPAddressFamily *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
303 | &IPAddressFamily_it); | 303 | &IPAddressFamily_it); |
304 | } | 304 | } |
305 | LCRYPTO_ALIAS(d2i_IPAddressFamily) | 305 | LCRYPTO_ALIAS(d2i_IPAddressFamily); |
306 | 306 | ||
307 | int | 307 | int |
308 | i2d_IPAddressFamily(IPAddressFamily *a, unsigned char **out) | 308 | i2d_IPAddressFamily(IPAddressFamily *a, unsigned char **out) |
309 | { | 309 | { |
310 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressFamily_it); | 310 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressFamily_it); |
311 | } | 311 | } |
312 | LCRYPTO_ALIAS(i2d_IPAddressFamily) | 312 | LCRYPTO_ALIAS(i2d_IPAddressFamily); |
313 | 313 | ||
314 | IPAddressFamily * | 314 | IPAddressFamily * |
315 | IPAddressFamily_new(void) | 315 | IPAddressFamily_new(void) |
316 | { | 316 | { |
317 | return (IPAddressFamily *)ASN1_item_new(&IPAddressFamily_it); | 317 | return (IPAddressFamily *)ASN1_item_new(&IPAddressFamily_it); |
318 | } | 318 | } |
319 | LCRYPTO_ALIAS(IPAddressFamily_new) | 319 | LCRYPTO_ALIAS(IPAddressFamily_new); |
320 | 320 | ||
321 | void | 321 | void |
322 | IPAddressFamily_free(IPAddressFamily *a) | 322 | IPAddressFamily_free(IPAddressFamily *a) |
323 | { | 323 | { |
324 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressFamily_it); | 324 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressFamily_it); |
325 | } | 325 | } |
326 | LCRYPTO_ALIAS(IPAddressFamily_free) | 326 | LCRYPTO_ALIAS(IPAddressFamily_free); |
327 | 327 | ||
328 | /* | 328 | /* |
329 | * Convenience accessors for IPAddressFamily. | 329 | * Convenience accessors for IPAddressFamily. |
@@ -534,7 +534,7 @@ X509v3_addr_get_afi(const IPAddressFamily *af) | |||
534 | 534 | ||
535 | return afi; | 535 | return afi; |
536 | } | 536 | } |
537 | LCRYPTO_ALIAS(X509v3_addr_get_afi) | 537 | LCRYPTO_ALIAS(X509v3_addr_get_afi); |
538 | 538 | ||
539 | /* | 539 | /* |
540 | * Expand the bitstring form (RFC 3779, section 2.1.2) of an address into | 540 | * Expand the bitstring form (RFC 3779, section 2.1.2) of an address into |
@@ -1110,7 +1110,7 @@ X509v3_addr_add_inherit(IPAddrBlocks *addr, const unsigned afi, | |||
1110 | 1110 | ||
1111 | return IPAddressFamily_set_inheritance(af); | 1111 | return IPAddressFamily_set_inheritance(af); |
1112 | } | 1112 | } |
1113 | LCRYPTO_ALIAS(X509v3_addr_add_inherit) | 1113 | LCRYPTO_ALIAS(X509v3_addr_add_inherit); |
1114 | 1114 | ||
1115 | /* | 1115 | /* |
1116 | * Construct an IPAddressOrRange sequence, or return an existing one. | 1116 | * Construct an IPAddressOrRange sequence, or return an existing one. |
@@ -1174,7 +1174,7 @@ X509v3_addr_add_prefix(IPAddrBlocks *addr, const unsigned afi, | |||
1174 | 1174 | ||
1175 | return 1; | 1175 | return 1; |
1176 | } | 1176 | } |
1177 | LCRYPTO_ALIAS(X509v3_addr_add_prefix) | 1177 | LCRYPTO_ALIAS(X509v3_addr_add_prefix); |
1178 | 1178 | ||
1179 | /* | 1179 | /* |
1180 | * Add a range. | 1180 | * Add a range. |
@@ -1202,7 +1202,7 @@ X509v3_addr_add_range(IPAddrBlocks *addr, const unsigned afi, | |||
1202 | 1202 | ||
1203 | return 1; | 1203 | return 1; |
1204 | } | 1204 | } |
1205 | LCRYPTO_ALIAS(X509v3_addr_add_range) | 1205 | LCRYPTO_ALIAS(X509v3_addr_add_range); |
1206 | 1206 | ||
1207 | static int | 1207 | static int |
1208 | extract_min_max_bitstr(IPAddressOrRange *aor, ASN1_BIT_STRING **out_min, | 1208 | extract_min_max_bitstr(IPAddressOrRange *aor, ASN1_BIT_STRING **out_min, |
@@ -1262,7 +1262,7 @@ X509v3_addr_get_range(IPAddressOrRange *aor, const unsigned afi, | |||
1262 | 1262 | ||
1263 | return afi_len; | 1263 | return afi_len; |
1264 | } | 1264 | } |
1265 | LCRYPTO_ALIAS(X509v3_addr_get_range) | 1265 | LCRYPTO_ALIAS(X509v3_addr_get_range); |
1266 | 1266 | ||
1267 | /* | 1267 | /* |
1268 | * Check whether an IPAddrBLocks is in canonical form. | 1268 | * Check whether an IPAddrBLocks is in canonical form. |
@@ -1381,7 +1381,7 @@ X509v3_addr_is_canonical(IPAddrBlocks *addr) | |||
1381 | */ | 1381 | */ |
1382 | return 1; | 1382 | return 1; |
1383 | } | 1383 | } |
1384 | LCRYPTO_ALIAS(X509v3_addr_is_canonical) | 1384 | LCRYPTO_ALIAS(X509v3_addr_is_canonical); |
1385 | 1385 | ||
1386 | /* | 1386 | /* |
1387 | * Whack an IPAddressOrRanges into canonical form. | 1387 | * Whack an IPAddressOrRanges into canonical form. |
@@ -1488,7 +1488,7 @@ X509v3_addr_canonize(IPAddrBlocks *addr) | |||
1488 | 1488 | ||
1489 | return X509v3_addr_is_canonical(addr); | 1489 | return X509v3_addr_is_canonical(addr); |
1490 | } | 1490 | } |
1491 | LCRYPTO_ALIAS(X509v3_addr_canonize) | 1491 | LCRYPTO_ALIAS(X509v3_addr_canonize); |
1492 | 1492 | ||
1493 | /* | 1493 | /* |
1494 | * v2i handler for the IPAddrBlocks extension. | 1494 | * v2i handler for the IPAddrBlocks extension. |
@@ -1732,7 +1732,7 @@ X509v3_addr_inherits(IPAddrBlocks *addr) | |||
1732 | 1732 | ||
1733 | return 0; | 1733 | return 0; |
1734 | } | 1734 | } |
1735 | LCRYPTO_ALIAS(X509v3_addr_inherits) | 1735 | LCRYPTO_ALIAS(X509v3_addr_inherits); |
1736 | 1736 | ||
1737 | /* | 1737 | /* |
1738 | * Figure out whether parent contains child. | 1738 | * Figure out whether parent contains child. |
@@ -1816,7 +1816,7 @@ X509v3_addr_subset(IPAddrBlocks *child, IPAddrBlocks *parent) | |||
1816 | } | 1816 | } |
1817 | return 1; | 1817 | return 1; |
1818 | } | 1818 | } |
1819 | LCRYPTO_ALIAS(X509v3_addr_subset) | 1819 | LCRYPTO_ALIAS(X509v3_addr_subset); |
1820 | 1820 | ||
1821 | static int | 1821 | static int |
1822 | verify_error(X509_STORE_CTX *ctx, X509 *cert, int error, int depth) | 1822 | verify_error(X509_STORE_CTX *ctx, X509 *cert, int error, int depth) |
@@ -2022,7 +2022,7 @@ X509v3_addr_validate_path(X509_STORE_CTX *ctx) | |||
2022 | } | 2022 | } |
2023 | return addr_validate_path_internal(ctx, ctx->chain, NULL); | 2023 | return addr_validate_path_internal(ctx, ctx->chain, NULL); |
2024 | } | 2024 | } |
2025 | LCRYPTO_ALIAS(X509v3_addr_validate_path) | 2025 | LCRYPTO_ALIAS(X509v3_addr_validate_path); |
2026 | 2026 | ||
2027 | /* | 2027 | /* |
2028 | * RFC 3779 2.3 path validation of an extension. | 2028 | * RFC 3779 2.3 path validation of an extension. |
@@ -2040,6 +2040,6 @@ X509v3_addr_validate_resource_set(STACK_OF(X509) *chain, IPAddrBlocks *ext, | |||
2040 | return 0; | 2040 | return 0; |
2041 | return addr_validate_path_internal(NULL, chain, ext); | 2041 | return addr_validate_path_internal(NULL, chain, ext); |
2042 | } | 2042 | } |
2043 | LCRYPTO_ALIAS(X509v3_addr_validate_resource_set) | 2043 | LCRYPTO_ALIAS(X509v3_addr_validate_resource_set); |
2044 | 2044 | ||
2045 | #endif /* OPENSSL_NO_RFC3779 */ | 2045 | #endif /* OPENSSL_NO_RFC3779 */ |
diff --git a/src/lib/libcrypto/x509/x509_akeya.c b/src/lib/libcrypto/x509/x509_akeya.c index 969cad1c3e..52eca42cff 100644 --- a/src/lib/libcrypto/x509/x509_akeya.c +++ b/src/lib/libcrypto/x509/x509_akeya.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_akeya.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_akeya.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -104,25 +104,25 @@ d2i_AUTHORITY_KEYID(AUTHORITY_KEYID **a, const unsigned char **in, long len) | |||
104 | return (AUTHORITY_KEYID *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 104 | return (AUTHORITY_KEYID *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
105 | &AUTHORITY_KEYID_it); | 105 | &AUTHORITY_KEYID_it); |
106 | } | 106 | } |
107 | LCRYPTO_ALIAS(d2i_AUTHORITY_KEYID) | 107 | LCRYPTO_ALIAS(d2i_AUTHORITY_KEYID); |
108 | 108 | ||
109 | int | 109 | int |
110 | i2d_AUTHORITY_KEYID(AUTHORITY_KEYID *a, unsigned char **out) | 110 | i2d_AUTHORITY_KEYID(AUTHORITY_KEYID *a, unsigned char **out) |
111 | { | 111 | { |
112 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &AUTHORITY_KEYID_it); | 112 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &AUTHORITY_KEYID_it); |
113 | } | 113 | } |
114 | LCRYPTO_ALIAS(i2d_AUTHORITY_KEYID) | 114 | LCRYPTO_ALIAS(i2d_AUTHORITY_KEYID); |
115 | 115 | ||
116 | AUTHORITY_KEYID * | 116 | AUTHORITY_KEYID * |
117 | AUTHORITY_KEYID_new(void) | 117 | AUTHORITY_KEYID_new(void) |
118 | { | 118 | { |
119 | return (AUTHORITY_KEYID *)ASN1_item_new(&AUTHORITY_KEYID_it); | 119 | return (AUTHORITY_KEYID *)ASN1_item_new(&AUTHORITY_KEYID_it); |
120 | } | 120 | } |
121 | LCRYPTO_ALIAS(AUTHORITY_KEYID_new) | 121 | LCRYPTO_ALIAS(AUTHORITY_KEYID_new); |
122 | 122 | ||
123 | void | 123 | void |
124 | AUTHORITY_KEYID_free(AUTHORITY_KEYID *a) | 124 | AUTHORITY_KEYID_free(AUTHORITY_KEYID *a) |
125 | { | 125 | { |
126 | ASN1_item_free((ASN1_VALUE *)a, &AUTHORITY_KEYID_it); | 126 | ASN1_item_free((ASN1_VALUE *)a, &AUTHORITY_KEYID_it); |
127 | } | 127 | } |
128 | LCRYPTO_ALIAS(AUTHORITY_KEYID_free) | 128 | LCRYPTO_ALIAS(AUTHORITY_KEYID_free); |
diff --git a/src/lib/libcrypto/x509/x509_alt.c b/src/lib/libcrypto/x509/x509_alt.c index 137a1c1c11..c4c5fcabe7 100644 --- a/src/lib/libcrypto/x509/x509_alt.c +++ b/src/lib/libcrypto/x509/x509_alt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_alt.c,v 1.14 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_alt.c,v 1.15 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -152,7 +152,7 @@ i2v_GENERAL_NAMES(X509V3_EXT_METHOD *method, GENERAL_NAMES *gens, | |||
152 | 152 | ||
153 | return NULL; | 153 | return NULL; |
154 | } | 154 | } |
155 | LCRYPTO_ALIAS(i2v_GENERAL_NAMES) | 155 | LCRYPTO_ALIAS(i2v_GENERAL_NAMES); |
156 | 156 | ||
157 | STACK_OF(CONF_VALUE) * | 157 | STACK_OF(CONF_VALUE) * |
158 | i2v_GENERAL_NAME(X509V3_EXT_METHOD *method, GENERAL_NAME *gen, | 158 | i2v_GENERAL_NAME(X509V3_EXT_METHOD *method, GENERAL_NAME *gen, |
@@ -245,7 +245,7 @@ i2v_GENERAL_NAME(X509V3_EXT_METHOD *method, GENERAL_NAME *gen, | |||
245 | 245 | ||
246 | return NULL; | 246 | return NULL; |
247 | } | 247 | } |
248 | LCRYPTO_ALIAS(i2v_GENERAL_NAME) | 248 | LCRYPTO_ALIAS(i2v_GENERAL_NAME); |
249 | 249 | ||
250 | int | 250 | int |
251 | GENERAL_NAME_print(BIO *out, GENERAL_NAME *gen) | 251 | GENERAL_NAME_print(BIO *out, GENERAL_NAME *gen) |
@@ -312,7 +312,7 @@ GENERAL_NAME_print(BIO *out, GENERAL_NAME *gen) | |||
312 | } | 312 | } |
313 | return 1; | 313 | return 1; |
314 | } | 314 | } |
315 | LCRYPTO_ALIAS(GENERAL_NAME_print) | 315 | LCRYPTO_ALIAS(GENERAL_NAME_print); |
316 | 316 | ||
317 | static GENERAL_NAMES * | 317 | static GENERAL_NAMES * |
318 | v2i_issuer_alt(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | 318 | v2i_issuer_alt(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
@@ -515,7 +515,7 @@ err: | |||
515 | sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free); | 515 | sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free); |
516 | return NULL; | 516 | return NULL; |
517 | } | 517 | } |
518 | LCRYPTO_ALIAS(v2i_GENERAL_NAMES) | 518 | LCRYPTO_ALIAS(v2i_GENERAL_NAMES); |
519 | 519 | ||
520 | GENERAL_NAME * | 520 | GENERAL_NAME * |
521 | v2i_GENERAL_NAME(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | 521 | v2i_GENERAL_NAME(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
@@ -523,7 +523,7 @@ v2i_GENERAL_NAME(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
523 | { | 523 | { |
524 | return v2i_GENERAL_NAME_ex(NULL, method, ctx, cnf, 0); | 524 | return v2i_GENERAL_NAME_ex(NULL, method, ctx, cnf, 0); |
525 | } | 525 | } |
526 | LCRYPTO_ALIAS(v2i_GENERAL_NAME) | 526 | LCRYPTO_ALIAS(v2i_GENERAL_NAME); |
527 | 527 | ||
528 | GENERAL_NAME * | 528 | GENERAL_NAME * |
529 | a2i_GENERAL_NAME(GENERAL_NAME *out, const X509V3_EXT_METHOD *method, | 529 | a2i_GENERAL_NAME(GENERAL_NAME *out, const X509V3_EXT_METHOD *method, |
@@ -614,7 +614,7 @@ err: | |||
614 | GENERAL_NAME_free(gen); | 614 | GENERAL_NAME_free(gen); |
615 | return NULL; | 615 | return NULL; |
616 | } | 616 | } |
617 | LCRYPTO_ALIAS(a2i_GENERAL_NAME) | 617 | LCRYPTO_ALIAS(a2i_GENERAL_NAME); |
618 | 618 | ||
619 | GENERAL_NAME * | 619 | GENERAL_NAME * |
620 | v2i_GENERAL_NAME_ex(GENERAL_NAME *out, const X509V3_EXT_METHOD *method, | 620 | v2i_GENERAL_NAME_ex(GENERAL_NAME *out, const X509V3_EXT_METHOD *method, |
@@ -718,7 +718,7 @@ v2i_GENERAL_NAME_ex(GENERAL_NAME *out, const X509V3_EXT_METHOD *method, | |||
718 | GENERAL_NAME_free(ret); | 718 | GENERAL_NAME_free(ret); |
719 | return NULL; | 719 | return NULL; |
720 | } | 720 | } |
721 | LCRYPTO_ALIAS(v2i_GENERAL_NAME_ex) | 721 | LCRYPTO_ALIAS(v2i_GENERAL_NAME_ex); |
722 | 722 | ||
723 | static int | 723 | static int |
724 | do_othername(GENERAL_NAME *gen, const char *value, X509V3_CTX *ctx) | 724 | do_othername(GENERAL_NAME *gen, const char *value, X509V3_CTX *ctx) |
diff --git a/src/lib/libcrypto/x509/x509_asid.c b/src/lib/libcrypto/x509/x509_asid.c index 3a37b002f2..cc36cc1a56 100644 --- a/src/lib/libcrypto/x509/x509_asid.c +++ b/src/lib/libcrypto/x509/x509_asid.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_asid.c,v 1.38 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: x509_asid.c,v 1.39 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Contributed to the OpenSSL Project by the American Registry for | 3 | * Contributed to the OpenSSL Project by the American Registry for |
4 | * Internet Numbers ("ARIN"). | 4 | * Internet Numbers ("ARIN"). |
@@ -191,28 +191,28 @@ d2i_ASRange(ASRange **a, const unsigned char **in, long len) | |||
191 | return (ASRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 191 | return (ASRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
192 | &ASRange_it); | 192 | &ASRange_it); |
193 | } | 193 | } |
194 | LCRYPTO_ALIAS(d2i_ASRange) | 194 | LCRYPTO_ALIAS(d2i_ASRange); |
195 | 195 | ||
196 | int | 196 | int |
197 | i2d_ASRange(ASRange *a, unsigned char **out) | 197 | i2d_ASRange(ASRange *a, unsigned char **out) |
198 | { | 198 | { |
199 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASRange_it); | 199 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASRange_it); |
200 | } | 200 | } |
201 | LCRYPTO_ALIAS(i2d_ASRange) | 201 | LCRYPTO_ALIAS(i2d_ASRange); |
202 | 202 | ||
203 | ASRange * | 203 | ASRange * |
204 | ASRange_new(void) | 204 | ASRange_new(void) |
205 | { | 205 | { |
206 | return (ASRange *)ASN1_item_new(&ASRange_it); | 206 | return (ASRange *)ASN1_item_new(&ASRange_it); |
207 | } | 207 | } |
208 | LCRYPTO_ALIAS(ASRange_new) | 208 | LCRYPTO_ALIAS(ASRange_new); |
209 | 209 | ||
210 | void | 210 | void |
211 | ASRange_free(ASRange *a) | 211 | ASRange_free(ASRange *a) |
212 | { | 212 | { |
213 | ASN1_item_free((ASN1_VALUE *)a, &ASRange_it); | 213 | ASN1_item_free((ASN1_VALUE *)a, &ASRange_it); |
214 | } | 214 | } |
215 | LCRYPTO_ALIAS(ASRange_free) | 215 | LCRYPTO_ALIAS(ASRange_free); |
216 | 216 | ||
217 | ASIdOrRange * | 217 | ASIdOrRange * |
218 | d2i_ASIdOrRange(ASIdOrRange **a, const unsigned char **in, long len) | 218 | d2i_ASIdOrRange(ASIdOrRange **a, const unsigned char **in, long len) |
@@ -220,28 +220,28 @@ d2i_ASIdOrRange(ASIdOrRange **a, const unsigned char **in, long len) | |||
220 | return (ASIdOrRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 220 | return (ASIdOrRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
221 | &ASIdOrRange_it); | 221 | &ASIdOrRange_it); |
222 | } | 222 | } |
223 | LCRYPTO_ALIAS(d2i_ASIdOrRange) | 223 | LCRYPTO_ALIAS(d2i_ASIdOrRange); |
224 | 224 | ||
225 | int | 225 | int |
226 | i2d_ASIdOrRange(ASIdOrRange *a, unsigned char **out) | 226 | i2d_ASIdOrRange(ASIdOrRange *a, unsigned char **out) |
227 | { | 227 | { |
228 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASIdOrRange_it); | 228 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASIdOrRange_it); |
229 | } | 229 | } |
230 | LCRYPTO_ALIAS(i2d_ASIdOrRange) | 230 | LCRYPTO_ALIAS(i2d_ASIdOrRange); |
231 | 231 | ||
232 | ASIdOrRange * | 232 | ASIdOrRange * |
233 | ASIdOrRange_new(void) | 233 | ASIdOrRange_new(void) |
234 | { | 234 | { |
235 | return (ASIdOrRange *)ASN1_item_new(&ASIdOrRange_it); | 235 | return (ASIdOrRange *)ASN1_item_new(&ASIdOrRange_it); |
236 | } | 236 | } |
237 | LCRYPTO_ALIAS(ASIdOrRange_new) | 237 | LCRYPTO_ALIAS(ASIdOrRange_new); |
238 | 238 | ||
239 | void | 239 | void |
240 | ASIdOrRange_free(ASIdOrRange *a) | 240 | ASIdOrRange_free(ASIdOrRange *a) |
241 | { | 241 | { |
242 | ASN1_item_free((ASN1_VALUE *)a, &ASIdOrRange_it); | 242 | ASN1_item_free((ASN1_VALUE *)a, &ASIdOrRange_it); |
243 | } | 243 | } |
244 | LCRYPTO_ALIAS(ASIdOrRange_free) | 244 | LCRYPTO_ALIAS(ASIdOrRange_free); |
245 | 245 | ||
246 | ASIdentifierChoice * | 246 | ASIdentifierChoice * |
247 | d2i_ASIdentifierChoice(ASIdentifierChoice **a, const unsigned char **in, | 247 | d2i_ASIdentifierChoice(ASIdentifierChoice **a, const unsigned char **in, |
@@ -250,28 +250,28 @@ d2i_ASIdentifierChoice(ASIdentifierChoice **a, const unsigned char **in, | |||
250 | return (ASIdentifierChoice *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 250 | return (ASIdentifierChoice *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
251 | &ASIdentifierChoice_it); | 251 | &ASIdentifierChoice_it); |
252 | } | 252 | } |
253 | LCRYPTO_ALIAS(d2i_ASIdentifierChoice) | 253 | LCRYPTO_ALIAS(d2i_ASIdentifierChoice); |
254 | 254 | ||
255 | int | 255 | int |
256 | i2d_ASIdentifierChoice(ASIdentifierChoice *a, unsigned char **out) | 256 | i2d_ASIdentifierChoice(ASIdentifierChoice *a, unsigned char **out) |
257 | { | 257 | { |
258 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASIdentifierChoice_it); | 258 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASIdentifierChoice_it); |
259 | } | 259 | } |
260 | LCRYPTO_ALIAS(i2d_ASIdentifierChoice) | 260 | LCRYPTO_ALIAS(i2d_ASIdentifierChoice); |
261 | 261 | ||
262 | ASIdentifierChoice * | 262 | ASIdentifierChoice * |
263 | ASIdentifierChoice_new(void) | 263 | ASIdentifierChoice_new(void) |
264 | { | 264 | { |
265 | return (ASIdentifierChoice *)ASN1_item_new(&ASIdentifierChoice_it); | 265 | return (ASIdentifierChoice *)ASN1_item_new(&ASIdentifierChoice_it); |
266 | } | 266 | } |
267 | LCRYPTO_ALIAS(ASIdentifierChoice_new) | 267 | LCRYPTO_ALIAS(ASIdentifierChoice_new); |
268 | 268 | ||
269 | void | 269 | void |
270 | ASIdentifierChoice_free(ASIdentifierChoice *a) | 270 | ASIdentifierChoice_free(ASIdentifierChoice *a) |
271 | { | 271 | { |
272 | ASN1_item_free((ASN1_VALUE *)a, &ASIdentifierChoice_it); | 272 | ASN1_item_free((ASN1_VALUE *)a, &ASIdentifierChoice_it); |
273 | } | 273 | } |
274 | LCRYPTO_ALIAS(ASIdentifierChoice_free) | 274 | LCRYPTO_ALIAS(ASIdentifierChoice_free); |
275 | 275 | ||
276 | ASIdentifiers * | 276 | ASIdentifiers * |
277 | d2i_ASIdentifiers(ASIdentifiers **a, const unsigned char **in, long len) | 277 | d2i_ASIdentifiers(ASIdentifiers **a, const unsigned char **in, long len) |
@@ -279,28 +279,28 @@ d2i_ASIdentifiers(ASIdentifiers **a, const unsigned char **in, long len) | |||
279 | return (ASIdentifiers *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 279 | return (ASIdentifiers *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
280 | &ASIdentifiers_it); | 280 | &ASIdentifiers_it); |
281 | } | 281 | } |
282 | LCRYPTO_ALIAS(d2i_ASIdentifiers) | 282 | LCRYPTO_ALIAS(d2i_ASIdentifiers); |
283 | 283 | ||
284 | int | 284 | int |
285 | i2d_ASIdentifiers(ASIdentifiers *a, unsigned char **out) | 285 | i2d_ASIdentifiers(ASIdentifiers *a, unsigned char **out) |
286 | { | 286 | { |
287 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASIdentifiers_it); | 287 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASIdentifiers_it); |
288 | } | 288 | } |
289 | LCRYPTO_ALIAS(i2d_ASIdentifiers) | 289 | LCRYPTO_ALIAS(i2d_ASIdentifiers); |
290 | 290 | ||
291 | ASIdentifiers * | 291 | ASIdentifiers * |
292 | ASIdentifiers_new(void) | 292 | ASIdentifiers_new(void) |
293 | { | 293 | { |
294 | return (ASIdentifiers *)ASN1_item_new(&ASIdentifiers_it); | 294 | return (ASIdentifiers *)ASN1_item_new(&ASIdentifiers_it); |
295 | } | 295 | } |
296 | LCRYPTO_ALIAS(ASIdentifiers_new) | 296 | LCRYPTO_ALIAS(ASIdentifiers_new); |
297 | 297 | ||
298 | void | 298 | void |
299 | ASIdentifiers_free(ASIdentifiers *a) | 299 | ASIdentifiers_free(ASIdentifiers *a) |
300 | { | 300 | { |
301 | ASN1_item_free((ASN1_VALUE *)a, &ASIdentifiers_it); | 301 | ASN1_item_free((ASN1_VALUE *)a, &ASIdentifiers_it); |
302 | } | 302 | } |
303 | LCRYPTO_ALIAS(ASIdentifiers_free) | 303 | LCRYPTO_ALIAS(ASIdentifiers_free); |
304 | 304 | ||
305 | /* | 305 | /* |
306 | * i2r method for an ASIdentifierChoice. | 306 | * i2r method for an ASIdentifierChoice. |
@@ -428,7 +428,7 @@ X509v3_asid_add_inherit(ASIdentifiers *asid, int which) | |||
428 | } | 428 | } |
429 | return (*choice)->type == ASIdentifierChoice_inherit; | 429 | return (*choice)->type == ASIdentifierChoice_inherit; |
430 | } | 430 | } |
431 | LCRYPTO_ALIAS(X509v3_asid_add_inherit) | 431 | LCRYPTO_ALIAS(X509v3_asid_add_inherit); |
432 | 432 | ||
433 | /* | 433 | /* |
434 | * Add an ID or range to an ASIdentifierChoice. | 434 | * Add an ID or range to an ASIdentifierChoice. |
@@ -483,7 +483,7 @@ X509v3_asid_add_id_or_range(ASIdentifiers *asid, int which, ASN1_INTEGER *min, | |||
483 | ASIdOrRange_free(aor); | 483 | ASIdOrRange_free(aor); |
484 | return 0; | 484 | return 0; |
485 | } | 485 | } |
486 | LCRYPTO_ALIAS(X509v3_asid_add_id_or_range) | 486 | LCRYPTO_ALIAS(X509v3_asid_add_id_or_range); |
487 | 487 | ||
488 | /* | 488 | /* |
489 | * Extract min and max values from an ASIdOrRange. | 489 | * Extract min and max values from an ASIdOrRange. |
@@ -612,7 +612,7 @@ X509v3_asid_is_canonical(ASIdentifiers *asid) | |||
612 | (ASIdentifierChoice_is_canonical(asid->asnum) && | 612 | (ASIdentifierChoice_is_canonical(asid->asnum) && |
613 | ASIdentifierChoice_is_canonical(asid->rdi))); | 613 | ASIdentifierChoice_is_canonical(asid->rdi))); |
614 | } | 614 | } |
615 | LCRYPTO_ALIAS(X509v3_asid_is_canonical) | 615 | LCRYPTO_ALIAS(X509v3_asid_is_canonical); |
616 | 616 | ||
617 | /* | 617 | /* |
618 | * Whack an ASIdentifierChoice into canonical form. | 618 | * Whack an ASIdentifierChoice into canonical form. |
@@ -780,7 +780,7 @@ X509v3_asid_canonize(ASIdentifiers *asid) | |||
780 | 780 | ||
781 | return ASIdentifierChoice_canonize(asid->rdi); | 781 | return ASIdentifierChoice_canonize(asid->rdi); |
782 | } | 782 | } |
783 | LCRYPTO_ALIAS(X509v3_asid_canonize) | 783 | LCRYPTO_ALIAS(X509v3_asid_canonize); |
784 | 784 | ||
785 | /* | 785 | /* |
786 | * v2i method for an ASIdentifier extension. | 786 | * v2i method for an ASIdentifier extension. |
@@ -939,7 +939,7 @@ X509v3_asid_inherits(ASIdentifiers *asid) | |||
939 | 939 | ||
940 | return 0; | 940 | return 0; |
941 | } | 941 | } |
942 | LCRYPTO_ALIAS(X509v3_asid_inherits) | 942 | LCRYPTO_ALIAS(X509v3_asid_inherits); |
943 | 943 | ||
944 | /* | 944 | /* |
945 | * Figure out whether parent contains child. | 945 | * Figure out whether parent contains child. |
@@ -1013,7 +1013,7 @@ X509v3_asid_subset(ASIdentifiers *child, ASIdentifiers *parent) | |||
1013 | 1013 | ||
1014 | return 1; | 1014 | return 1; |
1015 | } | 1015 | } |
1016 | LCRYPTO_ALIAS(X509v3_asid_subset) | 1016 | LCRYPTO_ALIAS(X509v3_asid_subset); |
1017 | 1017 | ||
1018 | /* | 1018 | /* |
1019 | * Validation error handling via callback. | 1019 | * Validation error handling via callback. |
@@ -1181,7 +1181,7 @@ X509v3_asid_validate_path(X509_STORE_CTX *ctx) | |||
1181 | } | 1181 | } |
1182 | return asid_validate_path_internal(ctx, ctx->chain, NULL); | 1182 | return asid_validate_path_internal(ctx, ctx->chain, NULL); |
1183 | } | 1183 | } |
1184 | LCRYPTO_ALIAS(X509v3_asid_validate_path) | 1184 | LCRYPTO_ALIAS(X509v3_asid_validate_path); |
1185 | 1185 | ||
1186 | /* | 1186 | /* |
1187 | * RFC 3779 3.3 path validation of an extension. | 1187 | * RFC 3779 3.3 path validation of an extension. |
@@ -1199,6 +1199,6 @@ X509v3_asid_validate_resource_set(STACK_OF(X509) *chain, ASIdentifiers *ext, | |||
1199 | return 0; | 1199 | return 0; |
1200 | return asid_validate_path_internal(NULL, chain, ext); | 1200 | return asid_validate_path_internal(NULL, chain, ext); |
1201 | } | 1201 | } |
1202 | LCRYPTO_ALIAS(X509v3_asid_validate_resource_set) | 1202 | LCRYPTO_ALIAS(X509v3_asid_validate_resource_set); |
1203 | 1203 | ||
1204 | #endif /* OPENSSL_NO_RFC3779 */ | 1204 | #endif /* OPENSSL_NO_RFC3779 */ |
diff --git a/src/lib/libcrypto/x509/x509_att.c b/src/lib/libcrypto/x509/x509_att.c index e769418fd3..0c9d55f74f 100644 --- a/src/lib/libcrypto/x509/x509_att.c +++ b/src/lib/libcrypto/x509/x509_att.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_att.c,v 1.21 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: x509_att.c,v 1.22 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -73,7 +73,7 @@ X509at_get_attr_count(const STACK_OF(X509_ATTRIBUTE) *x) | |||
73 | { | 73 | { |
74 | return sk_X509_ATTRIBUTE_num(x); | 74 | return sk_X509_ATTRIBUTE_num(x); |
75 | } | 75 | } |
76 | LCRYPTO_ALIAS(X509at_get_attr_count) | 76 | LCRYPTO_ALIAS(X509at_get_attr_count); |
77 | 77 | ||
78 | int | 78 | int |
79 | X509at_get_attr_by_NID(const STACK_OF(X509_ATTRIBUTE) *x, int nid, int lastpos) | 79 | X509at_get_attr_by_NID(const STACK_OF(X509_ATTRIBUTE) *x, int nid, int lastpos) |
@@ -85,7 +85,7 @@ X509at_get_attr_by_NID(const STACK_OF(X509_ATTRIBUTE) *x, int nid, int lastpos) | |||
85 | return (-2); | 85 | return (-2); |
86 | return (X509at_get_attr_by_OBJ(x, obj, lastpos)); | 86 | return (X509at_get_attr_by_OBJ(x, obj, lastpos)); |
87 | } | 87 | } |
88 | LCRYPTO_ALIAS(X509at_get_attr_by_NID) | 88 | LCRYPTO_ALIAS(X509at_get_attr_by_NID); |
89 | 89 | ||
90 | int | 90 | int |
91 | X509at_get_attr_by_OBJ(const STACK_OF(X509_ATTRIBUTE) *sk, | 91 | X509at_get_attr_by_OBJ(const STACK_OF(X509_ATTRIBUTE) *sk, |
@@ -107,7 +107,7 @@ X509at_get_attr_by_OBJ(const STACK_OF(X509_ATTRIBUTE) *sk, | |||
107 | } | 107 | } |
108 | return (-1); | 108 | return (-1); |
109 | } | 109 | } |
110 | LCRYPTO_ALIAS(X509at_get_attr_by_OBJ) | 110 | LCRYPTO_ALIAS(X509at_get_attr_by_OBJ); |
111 | 111 | ||
112 | X509_ATTRIBUTE * | 112 | X509_ATTRIBUTE * |
113 | X509at_get_attr(const STACK_OF(X509_ATTRIBUTE) *x, int loc) | 113 | X509at_get_attr(const STACK_OF(X509_ATTRIBUTE) *x, int loc) |
@@ -117,7 +117,7 @@ X509at_get_attr(const STACK_OF(X509_ATTRIBUTE) *x, int loc) | |||
117 | else | 117 | else |
118 | return sk_X509_ATTRIBUTE_value(x, loc); | 118 | return sk_X509_ATTRIBUTE_value(x, loc); |
119 | } | 119 | } |
120 | LCRYPTO_ALIAS(X509at_get_attr) | 120 | LCRYPTO_ALIAS(X509at_get_attr); |
121 | 121 | ||
122 | X509_ATTRIBUTE * | 122 | X509_ATTRIBUTE * |
123 | X509at_delete_attr(STACK_OF(X509_ATTRIBUTE) *x, int loc) | 123 | X509at_delete_attr(STACK_OF(X509_ATTRIBUTE) *x, int loc) |
@@ -129,7 +129,7 @@ X509at_delete_attr(STACK_OF(X509_ATTRIBUTE) *x, int loc) | |||
129 | ret = sk_X509_ATTRIBUTE_delete(x, loc); | 129 | ret = sk_X509_ATTRIBUTE_delete(x, loc); |
130 | return (ret); | 130 | return (ret); |
131 | } | 131 | } |
132 | LCRYPTO_ALIAS(X509at_delete_attr) | 132 | LCRYPTO_ALIAS(X509at_delete_attr); |
133 | 133 | ||
134 | STACK_OF(X509_ATTRIBUTE) * | 134 | STACK_OF(X509_ATTRIBUTE) * |
135 | X509at_add1_attr(STACK_OF(X509_ATTRIBUTE) **x, X509_ATTRIBUTE *attr) | 135 | X509at_add1_attr(STACK_OF(X509_ATTRIBUTE) **x, X509_ATTRIBUTE *attr) |
@@ -165,7 +165,7 @@ err2: | |||
165 | sk_X509_ATTRIBUTE_free(sk); | 165 | sk_X509_ATTRIBUTE_free(sk); |
166 | return (NULL); | 166 | return (NULL); |
167 | } | 167 | } |
168 | LCRYPTO_ALIAS(X509at_add1_attr) | 168 | LCRYPTO_ALIAS(X509at_add1_attr); |
169 | 169 | ||
170 | STACK_OF(X509_ATTRIBUTE) * | 170 | STACK_OF(X509_ATTRIBUTE) * |
171 | X509at_add1_attr_by_OBJ(STACK_OF(X509_ATTRIBUTE) **x, const ASN1_OBJECT *obj, | 171 | X509at_add1_attr_by_OBJ(STACK_OF(X509_ATTRIBUTE) **x, const ASN1_OBJECT *obj, |
@@ -181,7 +181,7 @@ X509at_add1_attr_by_OBJ(STACK_OF(X509_ATTRIBUTE) **x, const ASN1_OBJECT *obj, | |||
181 | X509_ATTRIBUTE_free(attr); | 181 | X509_ATTRIBUTE_free(attr); |
182 | return ret; | 182 | return ret; |
183 | } | 183 | } |
184 | LCRYPTO_ALIAS(X509at_add1_attr_by_OBJ) | 184 | LCRYPTO_ALIAS(X509at_add1_attr_by_OBJ); |
185 | 185 | ||
186 | STACK_OF(X509_ATTRIBUTE) * | 186 | STACK_OF(X509_ATTRIBUTE) * |
187 | X509at_add1_attr_by_NID(STACK_OF(X509_ATTRIBUTE) **x, int nid, int type, | 187 | X509at_add1_attr_by_NID(STACK_OF(X509_ATTRIBUTE) **x, int nid, int type, |
@@ -197,7 +197,7 @@ X509at_add1_attr_by_NID(STACK_OF(X509_ATTRIBUTE) **x, int nid, int type, | |||
197 | X509_ATTRIBUTE_free(attr); | 197 | X509_ATTRIBUTE_free(attr); |
198 | return ret; | 198 | return ret; |
199 | } | 199 | } |
200 | LCRYPTO_ALIAS(X509at_add1_attr_by_NID) | 200 | LCRYPTO_ALIAS(X509at_add1_attr_by_NID); |
201 | 201 | ||
202 | STACK_OF(X509_ATTRIBUTE) * | 202 | STACK_OF(X509_ATTRIBUTE) * |
203 | X509at_add1_attr_by_txt(STACK_OF(X509_ATTRIBUTE) **x, const char *attrname, | 203 | X509at_add1_attr_by_txt(STACK_OF(X509_ATTRIBUTE) **x, const char *attrname, |
@@ -213,7 +213,7 @@ X509at_add1_attr_by_txt(STACK_OF(X509_ATTRIBUTE) **x, const char *attrname, | |||
213 | X509_ATTRIBUTE_free(attr); | 213 | X509_ATTRIBUTE_free(attr); |
214 | return ret; | 214 | return ret; |
215 | } | 215 | } |
216 | LCRYPTO_ALIAS(X509at_add1_attr_by_txt) | 216 | LCRYPTO_ALIAS(X509at_add1_attr_by_txt); |
217 | 217 | ||
218 | void * | 218 | void * |
219 | X509at_get0_data_by_OBJ(STACK_OF(X509_ATTRIBUTE) *x, const ASN1_OBJECT *obj, | 219 | X509at_get0_data_by_OBJ(STACK_OF(X509_ATTRIBUTE) *x, const ASN1_OBJECT *obj, |
@@ -232,7 +232,7 @@ X509at_get0_data_by_OBJ(STACK_OF(X509_ATTRIBUTE) *x, const ASN1_OBJECT *obj, | |||
232 | return NULL; | 232 | return NULL; |
233 | return X509_ATTRIBUTE_get0_data(at, 0, type, NULL); | 233 | return X509_ATTRIBUTE_get0_data(at, 0, type, NULL); |
234 | } | 234 | } |
235 | LCRYPTO_ALIAS(X509at_get0_data_by_OBJ) | 235 | LCRYPTO_ALIAS(X509at_get0_data_by_OBJ); |
236 | 236 | ||
237 | X509_ATTRIBUTE * | 237 | X509_ATTRIBUTE * |
238 | X509_ATTRIBUTE_create_by_NID(X509_ATTRIBUTE **attr, int nid, int atrtype, | 238 | X509_ATTRIBUTE_create_by_NID(X509_ATTRIBUTE **attr, int nid, int atrtype, |
@@ -251,7 +251,7 @@ X509_ATTRIBUTE_create_by_NID(X509_ATTRIBUTE **attr, int nid, int atrtype, | |||
251 | ASN1_OBJECT_free(obj); | 251 | ASN1_OBJECT_free(obj); |
252 | return (ret); | 252 | return (ret); |
253 | } | 253 | } |
254 | LCRYPTO_ALIAS(X509_ATTRIBUTE_create_by_NID) | 254 | LCRYPTO_ALIAS(X509_ATTRIBUTE_create_by_NID); |
255 | 255 | ||
256 | X509_ATTRIBUTE * | 256 | X509_ATTRIBUTE * |
257 | X509_ATTRIBUTE_create_by_OBJ(X509_ATTRIBUTE **attr, const ASN1_OBJECT *obj, | 257 | X509_ATTRIBUTE_create_by_OBJ(X509_ATTRIBUTE **attr, const ASN1_OBJECT *obj, |
@@ -281,7 +281,7 @@ err: | |||
281 | X509_ATTRIBUTE_free(ret); | 281 | X509_ATTRIBUTE_free(ret); |
282 | return (NULL); | 282 | return (NULL); |
283 | } | 283 | } |
284 | LCRYPTO_ALIAS(X509_ATTRIBUTE_create_by_OBJ) | 284 | LCRYPTO_ALIAS(X509_ATTRIBUTE_create_by_OBJ); |
285 | 285 | ||
286 | X509_ATTRIBUTE * | 286 | X509_ATTRIBUTE * |
287 | X509_ATTRIBUTE_create_by_txt(X509_ATTRIBUTE **attr, const char *atrname, | 287 | X509_ATTRIBUTE_create_by_txt(X509_ATTRIBUTE **attr, const char *atrname, |
@@ -300,7 +300,7 @@ X509_ATTRIBUTE_create_by_txt(X509_ATTRIBUTE **attr, const char *atrname, | |||
300 | ASN1_OBJECT_free(obj); | 300 | ASN1_OBJECT_free(obj); |
301 | return nattr; | 301 | return nattr; |
302 | } | 302 | } |
303 | LCRYPTO_ALIAS(X509_ATTRIBUTE_create_by_txt) | 303 | LCRYPTO_ALIAS(X509_ATTRIBUTE_create_by_txt); |
304 | 304 | ||
305 | int | 305 | int |
306 | X509_ATTRIBUTE_set1_object(X509_ATTRIBUTE *attr, const ASN1_OBJECT *obj) | 306 | X509_ATTRIBUTE_set1_object(X509_ATTRIBUTE *attr, const ASN1_OBJECT *obj) |
@@ -311,7 +311,7 @@ X509_ATTRIBUTE_set1_object(X509_ATTRIBUTE *attr, const ASN1_OBJECT *obj) | |||
311 | attr->object = OBJ_dup(obj); | 311 | attr->object = OBJ_dup(obj); |
312 | return attr->object != NULL; | 312 | return attr->object != NULL; |
313 | } | 313 | } |
314 | LCRYPTO_ALIAS(X509_ATTRIBUTE_set1_object) | 314 | LCRYPTO_ALIAS(X509_ATTRIBUTE_set1_object); |
315 | 315 | ||
316 | int | 316 | int |
317 | X509_ATTRIBUTE_set1_data(X509_ATTRIBUTE *attr, int attrtype, const void *data, | 317 | X509_ATTRIBUTE_set1_data(X509_ATTRIBUTE *attr, int attrtype, const void *data, |
@@ -365,7 +365,7 @@ err: | |||
365 | X509error(ERR_R_MALLOC_FAILURE); | 365 | X509error(ERR_R_MALLOC_FAILURE); |
366 | return 0; | 366 | return 0; |
367 | } | 367 | } |
368 | LCRYPTO_ALIAS(X509_ATTRIBUTE_set1_data) | 368 | LCRYPTO_ALIAS(X509_ATTRIBUTE_set1_data); |
369 | 369 | ||
370 | int | 370 | int |
371 | X509_ATTRIBUTE_count(const X509_ATTRIBUTE *attr) | 371 | X509_ATTRIBUTE_count(const X509_ATTRIBUTE *attr) |
@@ -375,7 +375,7 @@ X509_ATTRIBUTE_count(const X509_ATTRIBUTE *attr) | |||
375 | 375 | ||
376 | return sk_ASN1_TYPE_num(attr->set); | 376 | return sk_ASN1_TYPE_num(attr->set); |
377 | } | 377 | } |
378 | LCRYPTO_ALIAS(X509_ATTRIBUTE_count) | 378 | LCRYPTO_ALIAS(X509_ATTRIBUTE_count); |
379 | 379 | ||
380 | ASN1_OBJECT * | 380 | ASN1_OBJECT * |
381 | X509_ATTRIBUTE_get0_object(X509_ATTRIBUTE *attr) | 381 | X509_ATTRIBUTE_get0_object(X509_ATTRIBUTE *attr) |
@@ -384,7 +384,7 @@ X509_ATTRIBUTE_get0_object(X509_ATTRIBUTE *attr) | |||
384 | return (NULL); | 384 | return (NULL); |
385 | return (attr->object); | 385 | return (attr->object); |
386 | } | 386 | } |
387 | LCRYPTO_ALIAS(X509_ATTRIBUTE_get0_object) | 387 | LCRYPTO_ALIAS(X509_ATTRIBUTE_get0_object); |
388 | 388 | ||
389 | void * | 389 | void * |
390 | X509_ATTRIBUTE_get0_data(X509_ATTRIBUTE *attr, int idx, int atrtype, void *data) | 390 | X509_ATTRIBUTE_get0_data(X509_ATTRIBUTE *attr, int idx, int atrtype, void *data) |
@@ -400,7 +400,7 @@ X509_ATTRIBUTE_get0_data(X509_ATTRIBUTE *attr, int idx, int atrtype, void *data) | |||
400 | } | 400 | } |
401 | return ttmp->value.ptr; | 401 | return ttmp->value.ptr; |
402 | } | 402 | } |
403 | LCRYPTO_ALIAS(X509_ATTRIBUTE_get0_data) | 403 | LCRYPTO_ALIAS(X509_ATTRIBUTE_get0_data); |
404 | 404 | ||
405 | ASN1_TYPE * | 405 | ASN1_TYPE * |
406 | X509_ATTRIBUTE_get0_type(X509_ATTRIBUTE *attr, int idx) | 406 | X509_ATTRIBUTE_get0_type(X509_ATTRIBUTE *attr, int idx) |
@@ -410,4 +410,4 @@ X509_ATTRIBUTE_get0_type(X509_ATTRIBUTE *attr, int idx) | |||
410 | 410 | ||
411 | return sk_ASN1_TYPE_value(attr->set, idx); | 411 | return sk_ASN1_TYPE_value(attr->set, idx); |
412 | } | 412 | } |
413 | LCRYPTO_ALIAS(X509_ATTRIBUTE_get0_type) | 413 | LCRYPTO_ALIAS(X509_ATTRIBUTE_get0_type); |
diff --git a/src/lib/libcrypto/x509/x509_bcons.c b/src/lib/libcrypto/x509/x509_bcons.c index 8a9c1e419a..a39ae0aae0 100644 --- a/src/lib/libcrypto/x509/x509_bcons.c +++ b/src/lib/libcrypto/x509/x509_bcons.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_bcons.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_bcons.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -121,28 +121,28 @@ d2i_BASIC_CONSTRAINTS(BASIC_CONSTRAINTS **a, const unsigned char **in, long len) | |||
121 | return (BASIC_CONSTRAINTS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 121 | return (BASIC_CONSTRAINTS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
122 | &BASIC_CONSTRAINTS_it); | 122 | &BASIC_CONSTRAINTS_it); |
123 | } | 123 | } |
124 | LCRYPTO_ALIAS(d2i_BASIC_CONSTRAINTS) | 124 | LCRYPTO_ALIAS(d2i_BASIC_CONSTRAINTS); |
125 | 125 | ||
126 | int | 126 | int |
127 | i2d_BASIC_CONSTRAINTS(BASIC_CONSTRAINTS *a, unsigned char **out) | 127 | i2d_BASIC_CONSTRAINTS(BASIC_CONSTRAINTS *a, unsigned char **out) |
128 | { | 128 | { |
129 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &BASIC_CONSTRAINTS_it); | 129 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &BASIC_CONSTRAINTS_it); |
130 | } | 130 | } |
131 | LCRYPTO_ALIAS(i2d_BASIC_CONSTRAINTS) | 131 | LCRYPTO_ALIAS(i2d_BASIC_CONSTRAINTS); |
132 | 132 | ||
133 | BASIC_CONSTRAINTS * | 133 | BASIC_CONSTRAINTS * |
134 | BASIC_CONSTRAINTS_new(void) | 134 | BASIC_CONSTRAINTS_new(void) |
135 | { | 135 | { |
136 | return (BASIC_CONSTRAINTS *)ASN1_item_new(&BASIC_CONSTRAINTS_it); | 136 | return (BASIC_CONSTRAINTS *)ASN1_item_new(&BASIC_CONSTRAINTS_it); |
137 | } | 137 | } |
138 | LCRYPTO_ALIAS(BASIC_CONSTRAINTS_new) | 138 | LCRYPTO_ALIAS(BASIC_CONSTRAINTS_new); |
139 | 139 | ||
140 | void | 140 | void |
141 | BASIC_CONSTRAINTS_free(BASIC_CONSTRAINTS *a) | 141 | BASIC_CONSTRAINTS_free(BASIC_CONSTRAINTS *a) |
142 | { | 142 | { |
143 | ASN1_item_free((ASN1_VALUE *)a, &BASIC_CONSTRAINTS_it); | 143 | ASN1_item_free((ASN1_VALUE *)a, &BASIC_CONSTRAINTS_it); |
144 | } | 144 | } |
145 | LCRYPTO_ALIAS(BASIC_CONSTRAINTS_free) | 145 | LCRYPTO_ALIAS(BASIC_CONSTRAINTS_free); |
146 | 146 | ||
147 | 147 | ||
148 | static STACK_OF(CONF_VALUE) * | 148 | static STACK_OF(CONF_VALUE) * |
diff --git a/src/lib/libcrypto/x509/x509_bitst.c b/src/lib/libcrypto/x509/x509_bitst.c index bea089e31c..cacbe8efe7 100644 --- a/src/lib/libcrypto/x509/x509_bitst.c +++ b/src/lib/libcrypto/x509/x509_bitst.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_bitst.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_bitst.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -148,7 +148,7 @@ i2v_ASN1_BIT_STRING(X509V3_EXT_METHOD *method, ASN1_BIT_STRING *bits, | |||
148 | 148 | ||
149 | return NULL; | 149 | return NULL; |
150 | } | 150 | } |
151 | LCRYPTO_ALIAS(i2v_ASN1_BIT_STRING) | 151 | LCRYPTO_ALIAS(i2v_ASN1_BIT_STRING); |
152 | 152 | ||
153 | ASN1_BIT_STRING * | 153 | ASN1_BIT_STRING * |
154 | v2i_ASN1_BIT_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | 154 | v2i_ASN1_BIT_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
@@ -186,4 +186,4 @@ v2i_ASN1_BIT_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
186 | } | 186 | } |
187 | return bs; | 187 | return bs; |
188 | } | 188 | } |
189 | LCRYPTO_ALIAS(v2i_ASN1_BIT_STRING) | 189 | LCRYPTO_ALIAS(v2i_ASN1_BIT_STRING); |
diff --git a/src/lib/libcrypto/x509/x509_cmp.c b/src/lib/libcrypto/x509/x509_cmp.c index b76c9ea660..3ee4fd4a5d 100644 --- a/src/lib/libcrypto/x509/x509_cmp.c +++ b/src/lib/libcrypto/x509/x509_cmp.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_cmp.c,v 1.41 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: x509_cmp.c,v 1.42 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -84,7 +84,7 @@ X509_issuer_and_serial_cmp(const X509 *a, const X509 *b) | |||
84 | return (i); | 84 | return (i); |
85 | return (X509_NAME_cmp(ai->issuer, bi->issuer)); | 85 | return (X509_NAME_cmp(ai->issuer, bi->issuer)); |
86 | } | 86 | } |
87 | LCRYPTO_ALIAS(X509_issuer_and_serial_cmp) | 87 | LCRYPTO_ALIAS(X509_issuer_and_serial_cmp); |
88 | 88 | ||
89 | #ifndef OPENSSL_NO_MD5 | 89 | #ifndef OPENSSL_NO_MD5 |
90 | unsigned long | 90 | unsigned long |
@@ -120,7 +120,7 @@ err: | |||
120 | free(f); | 120 | free(f); |
121 | return (ret); | 121 | return (ret); |
122 | } | 122 | } |
123 | LCRYPTO_ALIAS(X509_issuer_and_serial_hash) | 123 | LCRYPTO_ALIAS(X509_issuer_and_serial_hash); |
124 | #endif | 124 | #endif |
125 | 125 | ||
126 | int | 126 | int |
@@ -128,21 +128,21 @@ X509_issuer_name_cmp(const X509 *a, const X509 *b) | |||
128 | { | 128 | { |
129 | return (X509_NAME_cmp(a->cert_info->issuer, b->cert_info->issuer)); | 129 | return (X509_NAME_cmp(a->cert_info->issuer, b->cert_info->issuer)); |
130 | } | 130 | } |
131 | LCRYPTO_ALIAS(X509_issuer_name_cmp) | 131 | LCRYPTO_ALIAS(X509_issuer_name_cmp); |
132 | 132 | ||
133 | int | 133 | int |
134 | X509_subject_name_cmp(const X509 *a, const X509 *b) | 134 | X509_subject_name_cmp(const X509 *a, const X509 *b) |
135 | { | 135 | { |
136 | return (X509_NAME_cmp(a->cert_info->subject, b->cert_info->subject)); | 136 | return (X509_NAME_cmp(a->cert_info->subject, b->cert_info->subject)); |
137 | } | 137 | } |
138 | LCRYPTO_ALIAS(X509_subject_name_cmp) | 138 | LCRYPTO_ALIAS(X509_subject_name_cmp); |
139 | 139 | ||
140 | int | 140 | int |
141 | X509_CRL_cmp(const X509_CRL *a, const X509_CRL *b) | 141 | X509_CRL_cmp(const X509_CRL *a, const X509_CRL *b) |
142 | { | 142 | { |
143 | return (X509_NAME_cmp(a->crl->issuer, b->crl->issuer)); | 143 | return (X509_NAME_cmp(a->crl->issuer, b->crl->issuer)); |
144 | } | 144 | } |
145 | LCRYPTO_ALIAS(X509_CRL_cmp) | 145 | LCRYPTO_ALIAS(X509_CRL_cmp); |
146 | 146 | ||
147 | #ifndef OPENSSL_NO_SHA | 147 | #ifndef OPENSSL_NO_SHA |
148 | int | 148 | int |
@@ -150,7 +150,7 @@ X509_CRL_match(const X509_CRL *a, const X509_CRL *b) | |||
150 | { | 150 | { |
151 | return memcmp(a->hash, b->hash, X509_CRL_HASH_LEN); | 151 | return memcmp(a->hash, b->hash, X509_CRL_HASH_LEN); |
152 | } | 152 | } |
153 | LCRYPTO_ALIAS(X509_CRL_match) | 153 | LCRYPTO_ALIAS(X509_CRL_match); |
154 | #endif | 154 | #endif |
155 | 155 | ||
156 | X509_NAME * | 156 | X509_NAME * |
@@ -158,14 +158,14 @@ X509_get_issuer_name(const X509 *a) | |||
158 | { | 158 | { |
159 | return (a->cert_info->issuer); | 159 | return (a->cert_info->issuer); |
160 | } | 160 | } |
161 | LCRYPTO_ALIAS(X509_get_issuer_name) | 161 | LCRYPTO_ALIAS(X509_get_issuer_name); |
162 | 162 | ||
163 | unsigned long | 163 | unsigned long |
164 | X509_issuer_name_hash(X509 *x) | 164 | X509_issuer_name_hash(X509 *x) |
165 | { | 165 | { |
166 | return (X509_NAME_hash(x->cert_info->issuer)); | 166 | return (X509_NAME_hash(x->cert_info->issuer)); |
167 | } | 167 | } |
168 | LCRYPTO_ALIAS(X509_issuer_name_hash) | 168 | LCRYPTO_ALIAS(X509_issuer_name_hash); |
169 | 169 | ||
170 | #ifndef OPENSSL_NO_MD5 | 170 | #ifndef OPENSSL_NO_MD5 |
171 | unsigned long | 171 | unsigned long |
@@ -173,7 +173,7 @@ X509_issuer_name_hash_old(X509 *x) | |||
173 | { | 173 | { |
174 | return (X509_NAME_hash_old(x->cert_info->issuer)); | 174 | return (X509_NAME_hash_old(x->cert_info->issuer)); |
175 | } | 175 | } |
176 | LCRYPTO_ALIAS(X509_issuer_name_hash_old) | 176 | LCRYPTO_ALIAS(X509_issuer_name_hash_old); |
177 | #endif | 177 | #endif |
178 | 178 | ||
179 | X509_NAME * | 179 | X509_NAME * |
@@ -181,28 +181,28 @@ X509_get_subject_name(const X509 *a) | |||
181 | { | 181 | { |
182 | return (a->cert_info->subject); | 182 | return (a->cert_info->subject); |
183 | } | 183 | } |
184 | LCRYPTO_ALIAS(X509_get_subject_name) | 184 | LCRYPTO_ALIAS(X509_get_subject_name); |
185 | 185 | ||
186 | ASN1_INTEGER * | 186 | ASN1_INTEGER * |
187 | X509_get_serialNumber(X509 *a) | 187 | X509_get_serialNumber(X509 *a) |
188 | { | 188 | { |
189 | return (a->cert_info->serialNumber); | 189 | return (a->cert_info->serialNumber); |
190 | } | 190 | } |
191 | LCRYPTO_ALIAS(X509_get_serialNumber) | 191 | LCRYPTO_ALIAS(X509_get_serialNumber); |
192 | 192 | ||
193 | const ASN1_INTEGER * | 193 | const ASN1_INTEGER * |
194 | X509_get0_serialNumber(const X509 *a) | 194 | X509_get0_serialNumber(const X509 *a) |
195 | { | 195 | { |
196 | return (a->cert_info->serialNumber); | 196 | return (a->cert_info->serialNumber); |
197 | } | 197 | } |
198 | LCRYPTO_ALIAS(X509_get0_serialNumber) | 198 | LCRYPTO_ALIAS(X509_get0_serialNumber); |
199 | 199 | ||
200 | unsigned long | 200 | unsigned long |
201 | X509_subject_name_hash(X509 *x) | 201 | X509_subject_name_hash(X509 *x) |
202 | { | 202 | { |
203 | return (X509_NAME_hash(x->cert_info->subject)); | 203 | return (X509_NAME_hash(x->cert_info->subject)); |
204 | } | 204 | } |
205 | LCRYPTO_ALIAS(X509_subject_name_hash) | 205 | LCRYPTO_ALIAS(X509_subject_name_hash); |
206 | 206 | ||
207 | #ifndef OPENSSL_NO_MD5 | 207 | #ifndef OPENSSL_NO_MD5 |
208 | unsigned long | 208 | unsigned long |
@@ -210,7 +210,7 @@ X509_subject_name_hash_old(X509 *x) | |||
210 | { | 210 | { |
211 | return (X509_NAME_hash_old(x->cert_info->subject)); | 211 | return (X509_NAME_hash_old(x->cert_info->subject)); |
212 | } | 212 | } |
213 | LCRYPTO_ALIAS(X509_subject_name_hash_old) | 213 | LCRYPTO_ALIAS(X509_subject_name_hash_old); |
214 | #endif | 214 | #endif |
215 | 215 | ||
216 | #ifndef OPENSSL_NO_SHA | 216 | #ifndef OPENSSL_NO_SHA |
@@ -232,7 +232,7 @@ X509_cmp(const X509 *a, const X509 *b) | |||
232 | 232 | ||
233 | return memcmp(a->hash, b->hash, X509_CERT_HASH_LEN); | 233 | return memcmp(a->hash, b->hash, X509_CERT_HASH_LEN); |
234 | } | 234 | } |
235 | LCRYPTO_ALIAS(X509_cmp) | 235 | LCRYPTO_ALIAS(X509_cmp); |
236 | #endif | 236 | #endif |
237 | 237 | ||
238 | int | 238 | int |
@@ -256,7 +256,7 @@ X509_NAME_cmp(const X509_NAME *a, const X509_NAME *b) | |||
256 | return ret; | 256 | return ret; |
257 | return memcmp(a->canon_enc, b->canon_enc, a->canon_enclen); | 257 | return memcmp(a->canon_enc, b->canon_enc, a->canon_enclen); |
258 | } | 258 | } |
259 | LCRYPTO_ALIAS(X509_NAME_cmp) | 259 | LCRYPTO_ALIAS(X509_NAME_cmp); |
260 | 260 | ||
261 | unsigned long | 261 | unsigned long |
262 | X509_NAME_hash(X509_NAME *x) | 262 | X509_NAME_hash(X509_NAME *x) |
@@ -275,7 +275,7 @@ X509_NAME_hash(X509_NAME *x) | |||
275 | 0xffffffffL; | 275 | 0xffffffffL; |
276 | return (ret); | 276 | return (ret); |
277 | } | 277 | } |
278 | LCRYPTO_ALIAS(X509_NAME_hash) | 278 | LCRYPTO_ALIAS(X509_NAME_hash); |
279 | 279 | ||
280 | 280 | ||
281 | #ifndef OPENSSL_NO_MD5 | 281 | #ifndef OPENSSL_NO_MD5 |
@@ -304,7 +304,7 @@ X509_NAME_hash_old(X509_NAME *x) | |||
304 | 304 | ||
305 | return (ret); | 305 | return (ret); |
306 | } | 306 | } |
307 | LCRYPTO_ALIAS(X509_NAME_hash_old) | 307 | LCRYPTO_ALIAS(X509_NAME_hash_old); |
308 | #endif | 308 | #endif |
309 | 309 | ||
310 | /* Search a stack of X509 for a match */ | 310 | /* Search a stack of X509 for a match */ |
@@ -330,7 +330,7 @@ X509_find_by_issuer_and_serial(STACK_OF(X509) *sk, X509_NAME *name, | |||
330 | } | 330 | } |
331 | return (NULL); | 331 | return (NULL); |
332 | } | 332 | } |
333 | LCRYPTO_ALIAS(X509_find_by_issuer_and_serial) | 333 | LCRYPTO_ALIAS(X509_find_by_issuer_and_serial); |
334 | 334 | ||
335 | X509 * | 335 | X509 * |
336 | X509_find_by_subject(STACK_OF(X509) *sk, X509_NAME *name) | 336 | X509_find_by_subject(STACK_OF(X509) *sk, X509_NAME *name) |
@@ -345,7 +345,7 @@ X509_find_by_subject(STACK_OF(X509) *sk, X509_NAME *name) | |||
345 | } | 345 | } |
346 | return (NULL); | 346 | return (NULL); |
347 | } | 347 | } |
348 | LCRYPTO_ALIAS(X509_find_by_subject) | 348 | LCRYPTO_ALIAS(X509_find_by_subject); |
349 | 349 | ||
350 | EVP_PKEY * | 350 | EVP_PKEY * |
351 | X509_get_pubkey(X509 *x) | 351 | X509_get_pubkey(X509 *x) |
@@ -354,7 +354,7 @@ X509_get_pubkey(X509 *x) | |||
354 | return (NULL); | 354 | return (NULL); |
355 | return (X509_PUBKEY_get(x->cert_info->key)); | 355 | return (X509_PUBKEY_get(x->cert_info->key)); |
356 | } | 356 | } |
357 | LCRYPTO_ALIAS(X509_get_pubkey) | 357 | LCRYPTO_ALIAS(X509_get_pubkey); |
358 | 358 | ||
359 | EVP_PKEY * | 359 | EVP_PKEY * |
360 | X509_get0_pubkey(const X509 *x) | 360 | X509_get0_pubkey(const X509 *x) |
@@ -363,7 +363,7 @@ X509_get0_pubkey(const X509 *x) | |||
363 | return (NULL); | 363 | return (NULL); |
364 | return (X509_PUBKEY_get0(x->cert_info->key)); | 364 | return (X509_PUBKEY_get0(x->cert_info->key)); |
365 | } | 365 | } |
366 | LCRYPTO_ALIAS(X509_get0_pubkey) | 366 | LCRYPTO_ALIAS(X509_get0_pubkey); |
367 | 367 | ||
368 | ASN1_BIT_STRING * | 368 | ASN1_BIT_STRING * |
369 | X509_get0_pubkey_bitstr(const X509 *x) | 369 | X509_get0_pubkey_bitstr(const X509 *x) |
@@ -372,7 +372,7 @@ X509_get0_pubkey_bitstr(const X509 *x) | |||
372 | return NULL; | 372 | return NULL; |
373 | return x->cert_info->key->public_key; | 373 | return x->cert_info->key->public_key; |
374 | } | 374 | } |
375 | LCRYPTO_ALIAS(X509_get0_pubkey_bitstr) | 375 | LCRYPTO_ALIAS(X509_get0_pubkey_bitstr); |
376 | 376 | ||
377 | int | 377 | int |
378 | X509_check_private_key(const X509 *x, const EVP_PKEY *k) | 378 | X509_check_private_key(const X509 *x, const EVP_PKEY *k) |
@@ -403,7 +403,7 @@ X509_check_private_key(const X509 *x, const EVP_PKEY *k) | |||
403 | return 1; | 403 | return 1; |
404 | return 0; | 404 | return 0; |
405 | } | 405 | } |
406 | LCRYPTO_ALIAS(X509_check_private_key) | 406 | LCRYPTO_ALIAS(X509_check_private_key); |
407 | 407 | ||
408 | /* | 408 | /* |
409 | * Not strictly speaking an "up_ref" as a STACK doesn't have a reference | 409 | * Not strictly speaking an "up_ref" as a STACK doesn't have a reference |
@@ -422,4 +422,4 @@ X509_chain_up_ref(STACK_OF(X509) *chain) | |||
422 | 422 | ||
423 | return ret; | 423 | return ret; |
424 | } | 424 | } |
425 | LCRYPTO_ALIAS(X509_chain_up_ref) | 425 | LCRYPTO_ALIAS(X509_chain_up_ref); |
diff --git a/src/lib/libcrypto/x509/x509_conf.c b/src/lib/libcrypto/x509/x509_conf.c index 2b3274d04d..189bf64405 100644 --- a/src/lib/libcrypto/x509/x509_conf.c +++ b/src/lib/libcrypto/x509/x509_conf.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_conf.c,v 1.4 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: x509_conf.c,v 1.5 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -104,7 +104,7 @@ X509V3_EXT_nconf(CONF *conf, X509V3_CTX *ctx, const char *name, | |||
104 | } | 104 | } |
105 | return ret; | 105 | return ret; |
106 | } | 106 | } |
107 | LCRYPTO_ALIAS(X509V3_EXT_nconf) | 107 | LCRYPTO_ALIAS(X509V3_EXT_nconf); |
108 | 108 | ||
109 | /* CONF *conf: Config file */ | 109 | /* CONF *conf: Config file */ |
110 | /* char *value: Value */ | 110 | /* char *value: Value */ |
@@ -121,7 +121,7 @@ X509V3_EXT_nconf_nid(CONF *conf, X509V3_CTX *ctx, int ext_nid, | |||
121 | value, crit, ext_type, ctx); | 121 | value, crit, ext_type, ctx); |
122 | return do_ext_nconf(conf, ctx, ext_nid, crit, value); | 122 | return do_ext_nconf(conf, ctx, ext_nid, crit, value); |
123 | } | 123 | } |
124 | LCRYPTO_ALIAS(X509V3_EXT_nconf_nid) | 124 | LCRYPTO_ALIAS(X509V3_EXT_nconf_nid); |
125 | 125 | ||
126 | /* CONF *conf: Config file */ | 126 | /* CONF *conf: Config file */ |
127 | /* char *value: Value */ | 127 | /* char *value: Value */ |
@@ -240,7 +240,7 @@ X509V3_EXT_i2d(int ext_nid, int crit, void *ext_struc) | |||
240 | } | 240 | } |
241 | return do_ext_i2d(method, ext_nid, crit, ext_struc); | 241 | return do_ext_i2d(method, ext_nid, crit, ext_struc); |
242 | } | 242 | } |
243 | LCRYPTO_ALIAS(X509V3_EXT_i2d) | 243 | LCRYPTO_ALIAS(X509V3_EXT_i2d); |
244 | 244 | ||
245 | /* Check the extension string for critical flag */ | 245 | /* Check the extension string for critical flag */ |
246 | static int | 246 | static int |
@@ -367,7 +367,7 @@ X509V3_EXT_add_nconf_sk(CONF *conf, X509V3_CTX *ctx, const char *section, | |||
367 | } | 367 | } |
368 | return 1; | 368 | return 1; |
369 | } | 369 | } |
370 | LCRYPTO_ALIAS(X509V3_EXT_add_nconf_sk) | 370 | LCRYPTO_ALIAS(X509V3_EXT_add_nconf_sk); |
371 | 371 | ||
372 | /* Convenience functions to add extensions to a certificate, CRL and request */ | 372 | /* Convenience functions to add extensions to a certificate, CRL and request */ |
373 | 373 | ||
@@ -381,7 +381,7 @@ X509V3_EXT_add_nconf(CONF *conf, X509V3_CTX *ctx, const char *section, | |||
381 | sk = &cert->cert_info->extensions; | 381 | sk = &cert->cert_info->extensions; |
382 | return X509V3_EXT_add_nconf_sk(conf, ctx, section, sk); | 382 | return X509V3_EXT_add_nconf_sk(conf, ctx, section, sk); |
383 | } | 383 | } |
384 | LCRYPTO_ALIAS(X509V3_EXT_add_nconf) | 384 | LCRYPTO_ALIAS(X509V3_EXT_add_nconf); |
385 | 385 | ||
386 | /* Same as above but for a CRL */ | 386 | /* Same as above but for a CRL */ |
387 | 387 | ||
@@ -395,7 +395,7 @@ X509V3_EXT_CRL_add_nconf(CONF *conf, X509V3_CTX *ctx, const char *section, | |||
395 | sk = &crl->crl->extensions; | 395 | sk = &crl->crl->extensions; |
396 | return X509V3_EXT_add_nconf_sk(conf, ctx, section, sk); | 396 | return X509V3_EXT_add_nconf_sk(conf, ctx, section, sk); |
397 | } | 397 | } |
398 | LCRYPTO_ALIAS(X509V3_EXT_CRL_add_nconf) | 398 | LCRYPTO_ALIAS(X509V3_EXT_CRL_add_nconf); |
399 | 399 | ||
400 | /* Add extensions to certificate request */ | 400 | /* Add extensions to certificate request */ |
401 | 401 | ||
@@ -415,7 +415,7 @@ X509V3_EXT_REQ_add_nconf(CONF *conf, X509V3_CTX *ctx, const char *section, | |||
415 | sk_X509_EXTENSION_pop_free(extlist, X509_EXTENSION_free); | 415 | sk_X509_EXTENSION_pop_free(extlist, X509_EXTENSION_free); |
416 | return i; | 416 | return i; |
417 | } | 417 | } |
418 | LCRYPTO_ALIAS(X509V3_EXT_REQ_add_nconf) | 418 | LCRYPTO_ALIAS(X509V3_EXT_REQ_add_nconf); |
419 | 419 | ||
420 | /* Config database functions */ | 420 | /* Config database functions */ |
421 | 421 | ||
@@ -428,7 +428,7 @@ X509V3_get_string(X509V3_CTX *ctx, const char *name, const char *section) | |||
428 | } | 428 | } |
429 | return ctx->db_meth->get_string(ctx->db, name, section); | 429 | return ctx->db_meth->get_string(ctx->db, name, section); |
430 | } | 430 | } |
431 | LCRYPTO_ALIAS(X509V3_get_string) | 431 | LCRYPTO_ALIAS(X509V3_get_string); |
432 | 432 | ||
433 | STACK_OF(CONF_VALUE) * | 433 | STACK_OF(CONF_VALUE) * |
434 | X509V3_get_section(X509V3_CTX *ctx, const char *section) | 434 | X509V3_get_section(X509V3_CTX *ctx, const char *section) |
@@ -439,7 +439,7 @@ X509V3_get_section(X509V3_CTX *ctx, const char *section) | |||
439 | } | 439 | } |
440 | return ctx->db_meth->get_section(ctx->db, section); | 440 | return ctx->db_meth->get_section(ctx->db, section); |
441 | } | 441 | } |
442 | LCRYPTO_ALIAS(X509V3_get_section) | 442 | LCRYPTO_ALIAS(X509V3_get_section); |
443 | 443 | ||
444 | void | 444 | void |
445 | X509V3_string_free(X509V3_CTX *ctx, char *str) | 445 | X509V3_string_free(X509V3_CTX *ctx, char *str) |
@@ -449,7 +449,7 @@ X509V3_string_free(X509V3_CTX *ctx, char *str) | |||
449 | if (ctx->db_meth->free_string) | 449 | if (ctx->db_meth->free_string) |
450 | ctx->db_meth->free_string(ctx->db, str); | 450 | ctx->db_meth->free_string(ctx->db, str); |
451 | } | 451 | } |
452 | LCRYPTO_ALIAS(X509V3_string_free) | 452 | LCRYPTO_ALIAS(X509V3_string_free); |
453 | 453 | ||
454 | void | 454 | void |
455 | X509V3_section_free(X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *section) | 455 | X509V3_section_free(X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *section) |
@@ -459,7 +459,7 @@ X509V3_section_free(X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *section) | |||
459 | if (ctx->db_meth->free_section) | 459 | if (ctx->db_meth->free_section) |
460 | ctx->db_meth->free_section(ctx->db, section); | 460 | ctx->db_meth->free_section(ctx->db, section); |
461 | } | 461 | } |
462 | LCRYPTO_ALIAS(X509V3_section_free) | 462 | LCRYPTO_ALIAS(X509V3_section_free); |
463 | 463 | ||
464 | static char * | 464 | static char * |
465 | nconf_get_string(void *db, const char *section, const char *value) | 465 | nconf_get_string(void *db, const char *section, const char *value) |
@@ -486,7 +486,7 @@ X509V3_set_nconf(X509V3_CTX *ctx, CONF *conf) | |||
486 | ctx->db_meth = &nconf_method; | 486 | ctx->db_meth = &nconf_method; |
487 | ctx->db = conf; | 487 | ctx->db = conf; |
488 | } | 488 | } |
489 | LCRYPTO_ALIAS(X509V3_set_nconf) | 489 | LCRYPTO_ALIAS(X509V3_set_nconf); |
490 | 490 | ||
491 | void | 491 | void |
492 | X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, | 492 | X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, |
@@ -498,7 +498,7 @@ X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, | |||
498 | ctx->subject_req = req; | 498 | ctx->subject_req = req; |
499 | ctx->flags = flags; | 499 | ctx->flags = flags; |
500 | } | 500 | } |
501 | LCRYPTO_ALIAS(X509V3_set_ctx) | 501 | LCRYPTO_ALIAS(X509V3_set_ctx); |
502 | 502 | ||
503 | /* Old conf compatibility functions */ | 503 | /* Old conf compatibility functions */ |
504 | 504 | ||
@@ -511,7 +511,7 @@ X509V3_EXT_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, const char *name, | |||
511 | CONF_set_nconf(&ctmp, conf); | 511 | CONF_set_nconf(&ctmp, conf); |
512 | return X509V3_EXT_nconf(&ctmp, ctx, name, value); | 512 | return X509V3_EXT_nconf(&ctmp, ctx, name, value); |
513 | } | 513 | } |
514 | LCRYPTO_ALIAS(X509V3_EXT_conf) | 514 | LCRYPTO_ALIAS(X509V3_EXT_conf); |
515 | 515 | ||
516 | /* LHASH *conf: Config file */ | 516 | /* LHASH *conf: Config file */ |
517 | /* char *value: Value */ | 517 | /* char *value: Value */ |
@@ -524,7 +524,7 @@ X509V3_EXT_conf_nid(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, int ext_nid, | |||
524 | CONF_set_nconf(&ctmp, conf); | 524 | CONF_set_nconf(&ctmp, conf); |
525 | return X509V3_EXT_nconf_nid(&ctmp, ctx, ext_nid, value); | 525 | return X509V3_EXT_nconf_nid(&ctmp, ctx, ext_nid, value); |
526 | } | 526 | } |
527 | LCRYPTO_ALIAS(X509V3_EXT_conf_nid) | 527 | LCRYPTO_ALIAS(X509V3_EXT_conf_nid); |
528 | 528 | ||
529 | static char * | 529 | static char * |
530 | conf_lhash_get_string(void *db, const char *section, const char *value) | 530 | conf_lhash_get_string(void *db, const char *section, const char *value) |
@@ -551,7 +551,7 @@ X509V3_set_conf_lhash(X509V3_CTX *ctx, LHASH_OF(CONF_VALUE) *lhash) | |||
551 | ctx->db_meth = &conf_lhash_method; | 551 | ctx->db_meth = &conf_lhash_method; |
552 | ctx->db = lhash; | 552 | ctx->db = lhash; |
553 | } | 553 | } |
554 | LCRYPTO_ALIAS(X509V3_set_conf_lhash) | 554 | LCRYPTO_ALIAS(X509V3_set_conf_lhash); |
555 | 555 | ||
556 | int | 556 | int |
557 | X509V3_EXT_add_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, | 557 | X509V3_EXT_add_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, |
@@ -562,7 +562,7 @@ X509V3_EXT_add_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, | |||
562 | CONF_set_nconf(&ctmp, conf); | 562 | CONF_set_nconf(&ctmp, conf); |
563 | return X509V3_EXT_add_nconf(&ctmp, ctx, section, cert); | 563 | return X509V3_EXT_add_nconf(&ctmp, ctx, section, cert); |
564 | } | 564 | } |
565 | LCRYPTO_ALIAS(X509V3_EXT_add_conf) | 565 | LCRYPTO_ALIAS(X509V3_EXT_add_conf); |
566 | 566 | ||
567 | /* Same as above but for a CRL */ | 567 | /* Same as above but for a CRL */ |
568 | 568 | ||
@@ -575,7 +575,7 @@ X509V3_EXT_CRL_add_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, | |||
575 | CONF_set_nconf(&ctmp, conf); | 575 | CONF_set_nconf(&ctmp, conf); |
576 | return X509V3_EXT_CRL_add_nconf(&ctmp, ctx, section, crl); | 576 | return X509V3_EXT_CRL_add_nconf(&ctmp, ctx, section, crl); |
577 | } | 577 | } |
578 | LCRYPTO_ALIAS(X509V3_EXT_CRL_add_conf) | 578 | LCRYPTO_ALIAS(X509V3_EXT_CRL_add_conf); |
579 | 579 | ||
580 | /* Add extensions to certificate request */ | 580 | /* Add extensions to certificate request */ |
581 | 581 | ||
@@ -588,4 +588,4 @@ X509V3_EXT_REQ_add_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, | |||
588 | CONF_set_nconf(&ctmp, conf); | 588 | CONF_set_nconf(&ctmp, conf); |
589 | return X509V3_EXT_REQ_add_nconf(&ctmp, ctx, section, req); | 589 | return X509V3_EXT_REQ_add_nconf(&ctmp, ctx, section, req); |
590 | } | 590 | } |
591 | LCRYPTO_ALIAS(X509V3_EXT_REQ_add_conf) | 591 | LCRYPTO_ALIAS(X509V3_EXT_REQ_add_conf); |
diff --git a/src/lib/libcrypto/x509/x509_cpols.c b/src/lib/libcrypto/x509/x509_cpols.c index 12e4a55c47..3f106c691d 100644 --- a/src/lib/libcrypto/x509/x509_cpols.c +++ b/src/lib/libcrypto/x509/x509_cpols.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_cpols.c,v 1.6 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: x509_cpols.c,v 1.7 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -125,28 +125,28 @@ d2i_CERTIFICATEPOLICIES(CERTIFICATEPOLICIES **a, const unsigned char **in, long | |||
125 | return (CERTIFICATEPOLICIES *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 125 | return (CERTIFICATEPOLICIES *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
126 | &CERTIFICATEPOLICIES_it); | 126 | &CERTIFICATEPOLICIES_it); |
127 | } | 127 | } |
128 | LCRYPTO_ALIAS(d2i_CERTIFICATEPOLICIES) | 128 | LCRYPTO_ALIAS(d2i_CERTIFICATEPOLICIES); |
129 | 129 | ||
130 | int | 130 | int |
131 | i2d_CERTIFICATEPOLICIES(CERTIFICATEPOLICIES *a, unsigned char **out) | 131 | i2d_CERTIFICATEPOLICIES(CERTIFICATEPOLICIES *a, unsigned char **out) |
132 | { | 132 | { |
133 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &CERTIFICATEPOLICIES_it); | 133 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &CERTIFICATEPOLICIES_it); |
134 | } | 134 | } |
135 | LCRYPTO_ALIAS(i2d_CERTIFICATEPOLICIES) | 135 | LCRYPTO_ALIAS(i2d_CERTIFICATEPOLICIES); |
136 | 136 | ||
137 | CERTIFICATEPOLICIES * | 137 | CERTIFICATEPOLICIES * |
138 | CERTIFICATEPOLICIES_new(void) | 138 | CERTIFICATEPOLICIES_new(void) |
139 | { | 139 | { |
140 | return (CERTIFICATEPOLICIES *)ASN1_item_new(&CERTIFICATEPOLICIES_it); | 140 | return (CERTIFICATEPOLICIES *)ASN1_item_new(&CERTIFICATEPOLICIES_it); |
141 | } | 141 | } |
142 | LCRYPTO_ALIAS(CERTIFICATEPOLICIES_new) | 142 | LCRYPTO_ALIAS(CERTIFICATEPOLICIES_new); |
143 | 143 | ||
144 | void | 144 | void |
145 | CERTIFICATEPOLICIES_free(CERTIFICATEPOLICIES *a) | 145 | CERTIFICATEPOLICIES_free(CERTIFICATEPOLICIES *a) |
146 | { | 146 | { |
147 | ASN1_item_free((ASN1_VALUE *)a, &CERTIFICATEPOLICIES_it); | 147 | ASN1_item_free((ASN1_VALUE *)a, &CERTIFICATEPOLICIES_it); |
148 | } | 148 | } |
149 | LCRYPTO_ALIAS(CERTIFICATEPOLICIES_free) | 149 | LCRYPTO_ALIAS(CERTIFICATEPOLICIES_free); |
150 | 150 | ||
151 | static const ASN1_TEMPLATE POLICYINFO_seq_tt[] = { | 151 | static const ASN1_TEMPLATE POLICYINFO_seq_tt[] = { |
152 | { | 152 | { |
@@ -182,28 +182,28 @@ d2i_POLICYINFO(POLICYINFO **a, const unsigned char **in, long len) | |||
182 | return (POLICYINFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 182 | return (POLICYINFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
183 | &POLICYINFO_it); | 183 | &POLICYINFO_it); |
184 | } | 184 | } |
185 | LCRYPTO_ALIAS(d2i_POLICYINFO) | 185 | LCRYPTO_ALIAS(d2i_POLICYINFO); |
186 | 186 | ||
187 | int | 187 | int |
188 | i2d_POLICYINFO(POLICYINFO *a, unsigned char **out) | 188 | i2d_POLICYINFO(POLICYINFO *a, unsigned char **out) |
189 | { | 189 | { |
190 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &POLICYINFO_it); | 190 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &POLICYINFO_it); |
191 | } | 191 | } |
192 | LCRYPTO_ALIAS(i2d_POLICYINFO) | 192 | LCRYPTO_ALIAS(i2d_POLICYINFO); |
193 | 193 | ||
194 | POLICYINFO * | 194 | POLICYINFO * |
195 | POLICYINFO_new(void) | 195 | POLICYINFO_new(void) |
196 | { | 196 | { |
197 | return (POLICYINFO *)ASN1_item_new(&POLICYINFO_it); | 197 | return (POLICYINFO *)ASN1_item_new(&POLICYINFO_it); |
198 | } | 198 | } |
199 | LCRYPTO_ALIAS(POLICYINFO_new) | 199 | LCRYPTO_ALIAS(POLICYINFO_new); |
200 | 200 | ||
201 | void | 201 | void |
202 | POLICYINFO_free(POLICYINFO *a) | 202 | POLICYINFO_free(POLICYINFO *a) |
203 | { | 203 | { |
204 | ASN1_item_free((ASN1_VALUE *)a, &POLICYINFO_it); | 204 | ASN1_item_free((ASN1_VALUE *)a, &POLICYINFO_it); |
205 | } | 205 | } |
206 | LCRYPTO_ALIAS(POLICYINFO_free) | 206 | LCRYPTO_ALIAS(POLICYINFO_free); |
207 | 207 | ||
208 | static const ASN1_TEMPLATE policydefault_tt = { | 208 | static const ASN1_TEMPLATE policydefault_tt = { |
209 | .flags = 0, | 209 | .flags = 0, |
@@ -281,28 +281,28 @@ d2i_POLICYQUALINFO(POLICYQUALINFO **a, const unsigned char **in, long len) | |||
281 | return (POLICYQUALINFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 281 | return (POLICYQUALINFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
282 | &POLICYQUALINFO_it); | 282 | &POLICYQUALINFO_it); |
283 | } | 283 | } |
284 | LCRYPTO_ALIAS(d2i_POLICYQUALINFO) | 284 | LCRYPTO_ALIAS(d2i_POLICYQUALINFO); |
285 | 285 | ||
286 | int | 286 | int |
287 | i2d_POLICYQUALINFO(POLICYQUALINFO *a, unsigned char **out) | 287 | i2d_POLICYQUALINFO(POLICYQUALINFO *a, unsigned char **out) |
288 | { | 288 | { |
289 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &POLICYQUALINFO_it); | 289 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &POLICYQUALINFO_it); |
290 | } | 290 | } |
291 | LCRYPTO_ALIAS(i2d_POLICYQUALINFO) | 291 | LCRYPTO_ALIAS(i2d_POLICYQUALINFO); |
292 | 292 | ||
293 | POLICYQUALINFO * | 293 | POLICYQUALINFO * |
294 | POLICYQUALINFO_new(void) | 294 | POLICYQUALINFO_new(void) |
295 | { | 295 | { |
296 | return (POLICYQUALINFO *)ASN1_item_new(&POLICYQUALINFO_it); | 296 | return (POLICYQUALINFO *)ASN1_item_new(&POLICYQUALINFO_it); |
297 | } | 297 | } |
298 | LCRYPTO_ALIAS(POLICYQUALINFO_new) | 298 | LCRYPTO_ALIAS(POLICYQUALINFO_new); |
299 | 299 | ||
300 | void | 300 | void |
301 | POLICYQUALINFO_free(POLICYQUALINFO *a) | 301 | POLICYQUALINFO_free(POLICYQUALINFO *a) |
302 | { | 302 | { |
303 | ASN1_item_free((ASN1_VALUE *)a, &POLICYQUALINFO_it); | 303 | ASN1_item_free((ASN1_VALUE *)a, &POLICYQUALINFO_it); |
304 | } | 304 | } |
305 | LCRYPTO_ALIAS(POLICYQUALINFO_free) | 305 | LCRYPTO_ALIAS(POLICYQUALINFO_free); |
306 | 306 | ||
307 | static const ASN1_TEMPLATE USERNOTICE_seq_tt[] = { | 307 | static const ASN1_TEMPLATE USERNOTICE_seq_tt[] = { |
308 | { | 308 | { |
@@ -338,28 +338,28 @@ d2i_USERNOTICE(USERNOTICE **a, const unsigned char **in, long len) | |||
338 | return (USERNOTICE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 338 | return (USERNOTICE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
339 | &USERNOTICE_it); | 339 | &USERNOTICE_it); |
340 | } | 340 | } |
341 | LCRYPTO_ALIAS(d2i_USERNOTICE) | 341 | LCRYPTO_ALIAS(d2i_USERNOTICE); |
342 | 342 | ||
343 | int | 343 | int |
344 | i2d_USERNOTICE(USERNOTICE *a, unsigned char **out) | 344 | i2d_USERNOTICE(USERNOTICE *a, unsigned char **out) |
345 | { | 345 | { |
346 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &USERNOTICE_it); | 346 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &USERNOTICE_it); |
347 | } | 347 | } |
348 | LCRYPTO_ALIAS(i2d_USERNOTICE) | 348 | LCRYPTO_ALIAS(i2d_USERNOTICE); |
349 | 349 | ||
350 | USERNOTICE * | 350 | USERNOTICE * |
351 | USERNOTICE_new(void) | 351 | USERNOTICE_new(void) |
352 | { | 352 | { |
353 | return (USERNOTICE *)ASN1_item_new(&USERNOTICE_it); | 353 | return (USERNOTICE *)ASN1_item_new(&USERNOTICE_it); |
354 | } | 354 | } |
355 | LCRYPTO_ALIAS(USERNOTICE_new) | 355 | LCRYPTO_ALIAS(USERNOTICE_new); |
356 | 356 | ||
357 | void | 357 | void |
358 | USERNOTICE_free(USERNOTICE *a) | 358 | USERNOTICE_free(USERNOTICE *a) |
359 | { | 359 | { |
360 | ASN1_item_free((ASN1_VALUE *)a, &USERNOTICE_it); | 360 | ASN1_item_free((ASN1_VALUE *)a, &USERNOTICE_it); |
361 | } | 361 | } |
362 | LCRYPTO_ALIAS(USERNOTICE_free) | 362 | LCRYPTO_ALIAS(USERNOTICE_free); |
363 | 363 | ||
364 | static const ASN1_TEMPLATE NOTICEREF_seq_tt[] = { | 364 | static const ASN1_TEMPLATE NOTICEREF_seq_tt[] = { |
365 | { | 365 | { |
@@ -395,28 +395,28 @@ d2i_NOTICEREF(NOTICEREF **a, const unsigned char **in, long len) | |||
395 | return (NOTICEREF *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 395 | return (NOTICEREF *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
396 | &NOTICEREF_it); | 396 | &NOTICEREF_it); |
397 | } | 397 | } |
398 | LCRYPTO_ALIAS(d2i_NOTICEREF) | 398 | LCRYPTO_ALIAS(d2i_NOTICEREF); |
399 | 399 | ||
400 | int | 400 | int |
401 | i2d_NOTICEREF(NOTICEREF *a, unsigned char **out) | 401 | i2d_NOTICEREF(NOTICEREF *a, unsigned char **out) |
402 | { | 402 | { |
403 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &NOTICEREF_it); | 403 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &NOTICEREF_it); |
404 | } | 404 | } |
405 | LCRYPTO_ALIAS(i2d_NOTICEREF) | 405 | LCRYPTO_ALIAS(i2d_NOTICEREF); |
406 | 406 | ||
407 | NOTICEREF * | 407 | NOTICEREF * |
408 | NOTICEREF_new(void) | 408 | NOTICEREF_new(void) |
409 | { | 409 | { |
410 | return (NOTICEREF *)ASN1_item_new(&NOTICEREF_it); | 410 | return (NOTICEREF *)ASN1_item_new(&NOTICEREF_it); |
411 | } | 411 | } |
412 | LCRYPTO_ALIAS(NOTICEREF_new) | 412 | LCRYPTO_ALIAS(NOTICEREF_new); |
413 | 413 | ||
414 | void | 414 | void |
415 | NOTICEREF_free(NOTICEREF *a) | 415 | NOTICEREF_free(NOTICEREF *a) |
416 | { | 416 | { |
417 | ASN1_item_free((ASN1_VALUE *)a, &NOTICEREF_it); | 417 | ASN1_item_free((ASN1_VALUE *)a, &NOTICEREF_it); |
418 | } | 418 | } |
419 | LCRYPTO_ALIAS(NOTICEREF_free) | 419 | LCRYPTO_ALIAS(NOTICEREF_free); |
420 | 420 | ||
421 | static STACK_OF(POLICYINFO) * | 421 | static STACK_OF(POLICYINFO) * |
422 | r2i_certpol(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *value) | 422 | r2i_certpol(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *value) |
@@ -782,4 +782,4 @@ X509_POLICY_NODE_print(BIO *out, X509_POLICY_NODE *node, int indent) | |||
782 | else | 782 | else |
783 | BIO_printf(out, "%*sNo Qualifiers\n", indent + 2, ""); | 783 | BIO_printf(out, "%*sNo Qualifiers\n", indent + 2, ""); |
784 | } | 784 | } |
785 | LCRYPTO_ALIAS(X509_POLICY_NODE_print) | 785 | LCRYPTO_ALIAS(X509_POLICY_NODE_print); |
diff --git a/src/lib/libcrypto/x509/x509_crld.c b/src/lib/libcrypto/x509/x509_crld.c index ef9c82bb3f..7887ccd644 100644 --- a/src/lib/libcrypto/x509/x509_crld.c +++ b/src/lib/libcrypto/x509/x509_crld.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_crld.c,v 1.4 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: x509_crld.c,v 1.5 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -426,28 +426,28 @@ d2i_DIST_POINT_NAME(DIST_POINT_NAME **a, const unsigned char **in, long len) | |||
426 | return (DIST_POINT_NAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 426 | return (DIST_POINT_NAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
427 | &DIST_POINT_NAME_it); | 427 | &DIST_POINT_NAME_it); |
428 | } | 428 | } |
429 | LCRYPTO_ALIAS(d2i_DIST_POINT_NAME) | 429 | LCRYPTO_ALIAS(d2i_DIST_POINT_NAME); |
430 | 430 | ||
431 | int | 431 | int |
432 | i2d_DIST_POINT_NAME(DIST_POINT_NAME *a, unsigned char **out) | 432 | i2d_DIST_POINT_NAME(DIST_POINT_NAME *a, unsigned char **out) |
433 | { | 433 | { |
434 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &DIST_POINT_NAME_it); | 434 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &DIST_POINT_NAME_it); |
435 | } | 435 | } |
436 | LCRYPTO_ALIAS(i2d_DIST_POINT_NAME) | 436 | LCRYPTO_ALIAS(i2d_DIST_POINT_NAME); |
437 | 437 | ||
438 | DIST_POINT_NAME * | 438 | DIST_POINT_NAME * |
439 | DIST_POINT_NAME_new(void) | 439 | DIST_POINT_NAME_new(void) |
440 | { | 440 | { |
441 | return (DIST_POINT_NAME *)ASN1_item_new(&DIST_POINT_NAME_it); | 441 | return (DIST_POINT_NAME *)ASN1_item_new(&DIST_POINT_NAME_it); |
442 | } | 442 | } |
443 | LCRYPTO_ALIAS(DIST_POINT_NAME_new) | 443 | LCRYPTO_ALIAS(DIST_POINT_NAME_new); |
444 | 444 | ||
445 | void | 445 | void |
446 | DIST_POINT_NAME_free(DIST_POINT_NAME *a) | 446 | DIST_POINT_NAME_free(DIST_POINT_NAME *a) |
447 | { | 447 | { |
448 | ASN1_item_free((ASN1_VALUE *)a, &DIST_POINT_NAME_it); | 448 | ASN1_item_free((ASN1_VALUE *)a, &DIST_POINT_NAME_it); |
449 | } | 449 | } |
450 | LCRYPTO_ALIAS(DIST_POINT_NAME_free) | 450 | LCRYPTO_ALIAS(DIST_POINT_NAME_free); |
451 | 451 | ||
452 | static const ASN1_TEMPLATE DIST_POINT_seq_tt[] = { | 452 | static const ASN1_TEMPLATE DIST_POINT_seq_tt[] = { |
453 | { | 453 | { |
@@ -490,28 +490,28 @@ d2i_DIST_POINT(DIST_POINT **a, const unsigned char **in, long len) | |||
490 | return (DIST_POINT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 490 | return (DIST_POINT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
491 | &DIST_POINT_it); | 491 | &DIST_POINT_it); |
492 | } | 492 | } |
493 | LCRYPTO_ALIAS(d2i_DIST_POINT) | 493 | LCRYPTO_ALIAS(d2i_DIST_POINT); |
494 | 494 | ||
495 | int | 495 | int |
496 | i2d_DIST_POINT(DIST_POINT *a, unsigned char **out) | 496 | i2d_DIST_POINT(DIST_POINT *a, unsigned char **out) |
497 | { | 497 | { |
498 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &DIST_POINT_it); | 498 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &DIST_POINT_it); |
499 | } | 499 | } |
500 | LCRYPTO_ALIAS(i2d_DIST_POINT) | 500 | LCRYPTO_ALIAS(i2d_DIST_POINT); |
501 | 501 | ||
502 | DIST_POINT * | 502 | DIST_POINT * |
503 | DIST_POINT_new(void) | 503 | DIST_POINT_new(void) |
504 | { | 504 | { |
505 | return (DIST_POINT *)ASN1_item_new(&DIST_POINT_it); | 505 | return (DIST_POINT *)ASN1_item_new(&DIST_POINT_it); |
506 | } | 506 | } |
507 | LCRYPTO_ALIAS(DIST_POINT_new) | 507 | LCRYPTO_ALIAS(DIST_POINT_new); |
508 | 508 | ||
509 | void | 509 | void |
510 | DIST_POINT_free(DIST_POINT *a) | 510 | DIST_POINT_free(DIST_POINT *a) |
511 | { | 511 | { |
512 | ASN1_item_free((ASN1_VALUE *)a, &DIST_POINT_it); | 512 | ASN1_item_free((ASN1_VALUE *)a, &DIST_POINT_it); |
513 | } | 513 | } |
514 | LCRYPTO_ALIAS(DIST_POINT_free) | 514 | LCRYPTO_ALIAS(DIST_POINT_free); |
515 | 515 | ||
516 | static const ASN1_TEMPLATE CRL_DIST_POINTS_item_tt = { | 516 | static const ASN1_TEMPLATE CRL_DIST_POINTS_item_tt = { |
517 | .flags = ASN1_TFLG_SEQUENCE_OF, | 517 | .flags = ASN1_TFLG_SEQUENCE_OF, |
@@ -538,28 +538,28 @@ d2i_CRL_DIST_POINTS(CRL_DIST_POINTS **a, const unsigned char **in, long len) | |||
538 | return (CRL_DIST_POINTS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 538 | return (CRL_DIST_POINTS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
539 | &CRL_DIST_POINTS_it); | 539 | &CRL_DIST_POINTS_it); |
540 | } | 540 | } |
541 | LCRYPTO_ALIAS(d2i_CRL_DIST_POINTS) | 541 | LCRYPTO_ALIAS(d2i_CRL_DIST_POINTS); |
542 | 542 | ||
543 | int | 543 | int |
544 | i2d_CRL_DIST_POINTS(CRL_DIST_POINTS *a, unsigned char **out) | 544 | i2d_CRL_DIST_POINTS(CRL_DIST_POINTS *a, unsigned char **out) |
545 | { | 545 | { |
546 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &CRL_DIST_POINTS_it); | 546 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &CRL_DIST_POINTS_it); |
547 | } | 547 | } |
548 | LCRYPTO_ALIAS(i2d_CRL_DIST_POINTS) | 548 | LCRYPTO_ALIAS(i2d_CRL_DIST_POINTS); |
549 | 549 | ||
550 | CRL_DIST_POINTS * | 550 | CRL_DIST_POINTS * |
551 | CRL_DIST_POINTS_new(void) | 551 | CRL_DIST_POINTS_new(void) |
552 | { | 552 | { |
553 | return (CRL_DIST_POINTS *)ASN1_item_new(&CRL_DIST_POINTS_it); | 553 | return (CRL_DIST_POINTS *)ASN1_item_new(&CRL_DIST_POINTS_it); |
554 | } | 554 | } |
555 | LCRYPTO_ALIAS(CRL_DIST_POINTS_new) | 555 | LCRYPTO_ALIAS(CRL_DIST_POINTS_new); |
556 | 556 | ||
557 | void | 557 | void |
558 | CRL_DIST_POINTS_free(CRL_DIST_POINTS *a) | 558 | CRL_DIST_POINTS_free(CRL_DIST_POINTS *a) |
559 | { | 559 | { |
560 | ASN1_item_free((ASN1_VALUE *)a, &CRL_DIST_POINTS_it); | 560 | ASN1_item_free((ASN1_VALUE *)a, &CRL_DIST_POINTS_it); |
561 | } | 561 | } |
562 | LCRYPTO_ALIAS(CRL_DIST_POINTS_free) | 562 | LCRYPTO_ALIAS(CRL_DIST_POINTS_free); |
563 | 563 | ||
564 | static const ASN1_TEMPLATE ISSUING_DIST_POINT_seq_tt[] = { | 564 | static const ASN1_TEMPLATE ISSUING_DIST_POINT_seq_tt[] = { |
565 | { | 565 | { |
@@ -623,28 +623,28 @@ d2i_ISSUING_DIST_POINT(ISSUING_DIST_POINT **a, const unsigned char **in, long le | |||
623 | return (ISSUING_DIST_POINT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 623 | return (ISSUING_DIST_POINT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
624 | &ISSUING_DIST_POINT_it); | 624 | &ISSUING_DIST_POINT_it); |
625 | } | 625 | } |
626 | LCRYPTO_ALIAS(d2i_ISSUING_DIST_POINT) | 626 | LCRYPTO_ALIAS(d2i_ISSUING_DIST_POINT); |
627 | 627 | ||
628 | int | 628 | int |
629 | i2d_ISSUING_DIST_POINT(ISSUING_DIST_POINT *a, unsigned char **out) | 629 | i2d_ISSUING_DIST_POINT(ISSUING_DIST_POINT *a, unsigned char **out) |
630 | { | 630 | { |
631 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ISSUING_DIST_POINT_it); | 631 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ISSUING_DIST_POINT_it); |
632 | } | 632 | } |
633 | LCRYPTO_ALIAS(i2d_ISSUING_DIST_POINT) | 633 | LCRYPTO_ALIAS(i2d_ISSUING_DIST_POINT); |
634 | 634 | ||
635 | ISSUING_DIST_POINT * | 635 | ISSUING_DIST_POINT * |
636 | ISSUING_DIST_POINT_new(void) | 636 | ISSUING_DIST_POINT_new(void) |
637 | { | 637 | { |
638 | return (ISSUING_DIST_POINT *)ASN1_item_new(&ISSUING_DIST_POINT_it); | 638 | return (ISSUING_DIST_POINT *)ASN1_item_new(&ISSUING_DIST_POINT_it); |
639 | } | 639 | } |
640 | LCRYPTO_ALIAS(ISSUING_DIST_POINT_new) | 640 | LCRYPTO_ALIAS(ISSUING_DIST_POINT_new); |
641 | 641 | ||
642 | void | 642 | void |
643 | ISSUING_DIST_POINT_free(ISSUING_DIST_POINT *a) | 643 | ISSUING_DIST_POINT_free(ISSUING_DIST_POINT *a) |
644 | { | 644 | { |
645 | ASN1_item_free((ASN1_VALUE *)a, &ISSUING_DIST_POINT_it); | 645 | ASN1_item_free((ASN1_VALUE *)a, &ISSUING_DIST_POINT_it); |
646 | } | 646 | } |
647 | LCRYPTO_ALIAS(ISSUING_DIST_POINT_free) | 647 | LCRYPTO_ALIAS(ISSUING_DIST_POINT_free); |
648 | 648 | ||
649 | static int i2r_idp(const X509V3_EXT_METHOD *method, void *pidp, BIO *out, | 649 | static int i2r_idp(const X509V3_EXT_METHOD *method, void *pidp, BIO *out, |
650 | int indent); | 650 | int indent); |
@@ -825,4 +825,4 @@ DIST_POINT_set_dpname(DIST_POINT_NAME *dpn, X509_NAME *iname) | |||
825 | } | 825 | } |
826 | return 1; | 826 | return 1; |
827 | } | 827 | } |
828 | LCRYPTO_ALIAS(DIST_POINT_set_dpname) | 828 | LCRYPTO_ALIAS(DIST_POINT_set_dpname); |
diff --git a/src/lib/libcrypto/x509/x509_d2.c b/src/lib/libcrypto/x509/x509_d2.c index 522062a694..bf358ec299 100644 --- a/src/lib/libcrypto/x509/x509_d2.c +++ b/src/lib/libcrypto/x509/x509_d2.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_d2.c,v 1.11 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_d2.c,v 1.12 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -83,7 +83,7 @@ X509_STORE_set_default_paths(X509_STORE *ctx) | |||
83 | 83 | ||
84 | return (1); | 84 | return (1); |
85 | } | 85 | } |
86 | LCRYPTO_ALIAS(X509_STORE_set_default_paths) | 86 | LCRYPTO_ALIAS(X509_STORE_set_default_paths); |
87 | 87 | ||
88 | int | 88 | int |
89 | X509_STORE_load_locations(X509_STORE *ctx, const char *file, const char *path) | 89 | X509_STORE_load_locations(X509_STORE *ctx, const char *file, const char *path) |
@@ -108,7 +108,7 @@ X509_STORE_load_locations(X509_STORE *ctx, const char *file, const char *path) | |||
108 | return (0); | 108 | return (0); |
109 | return (1); | 109 | return (1); |
110 | } | 110 | } |
111 | LCRYPTO_ALIAS(X509_STORE_load_locations) | 111 | LCRYPTO_ALIAS(X509_STORE_load_locations); |
112 | 112 | ||
113 | int | 113 | int |
114 | X509_STORE_load_mem(X509_STORE *ctx, void *buf, int len) | 114 | X509_STORE_load_mem(X509_STORE *ctx, void *buf, int len) |
@@ -128,4 +128,4 @@ X509_STORE_load_mem(X509_STORE *ctx, void *buf, int len) | |||
128 | 128 | ||
129 | return (1); | 129 | return (1); |
130 | } | 130 | } |
131 | LCRYPTO_ALIAS(X509_STORE_load_mem) | 131 | LCRYPTO_ALIAS(X509_STORE_load_mem); |
diff --git a/src/lib/libcrypto/x509/x509_def.c b/src/lib/libcrypto/x509/x509_def.c index 0d8900a526..f85781afdd 100644 --- a/src/lib/libcrypto/x509/x509_def.c +++ b/src/lib/libcrypto/x509/x509_def.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_def.c,v 1.6 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_def.c,v 1.7 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -66,39 +66,39 @@ X509_get_default_private_dir(void) | |||
66 | { | 66 | { |
67 | return (X509_PRIVATE_DIR); | 67 | return (X509_PRIVATE_DIR); |
68 | } | 68 | } |
69 | LCRYPTO_ALIAS(X509_get_default_private_dir) | 69 | LCRYPTO_ALIAS(X509_get_default_private_dir); |
70 | 70 | ||
71 | const char * | 71 | const char * |
72 | X509_get_default_cert_area(void) | 72 | X509_get_default_cert_area(void) |
73 | { | 73 | { |
74 | return (X509_CERT_AREA); | 74 | return (X509_CERT_AREA); |
75 | } | 75 | } |
76 | LCRYPTO_ALIAS(X509_get_default_cert_area) | 76 | LCRYPTO_ALIAS(X509_get_default_cert_area); |
77 | 77 | ||
78 | const char * | 78 | const char * |
79 | X509_get_default_cert_dir(void) | 79 | X509_get_default_cert_dir(void) |
80 | { | 80 | { |
81 | return (X509_CERT_DIR); | 81 | return (X509_CERT_DIR); |
82 | } | 82 | } |
83 | LCRYPTO_ALIAS(X509_get_default_cert_dir) | 83 | LCRYPTO_ALIAS(X509_get_default_cert_dir); |
84 | 84 | ||
85 | const char * | 85 | const char * |
86 | X509_get_default_cert_file(void) | 86 | X509_get_default_cert_file(void) |
87 | { | 87 | { |
88 | return (X509_CERT_FILE); | 88 | return (X509_CERT_FILE); |
89 | } | 89 | } |
90 | LCRYPTO_ALIAS(X509_get_default_cert_file) | 90 | LCRYPTO_ALIAS(X509_get_default_cert_file); |
91 | 91 | ||
92 | const char * | 92 | const char * |
93 | X509_get_default_cert_dir_env(void) | 93 | X509_get_default_cert_dir_env(void) |
94 | { | 94 | { |
95 | return (X509_CERT_DIR_EVP); | 95 | return (X509_CERT_DIR_EVP); |
96 | } | 96 | } |
97 | LCRYPTO_ALIAS(X509_get_default_cert_dir_env) | 97 | LCRYPTO_ALIAS(X509_get_default_cert_dir_env); |
98 | 98 | ||
99 | const char * | 99 | const char * |
100 | X509_get_default_cert_file_env(void) | 100 | X509_get_default_cert_file_env(void) |
101 | { | 101 | { |
102 | return (X509_CERT_FILE_EVP); | 102 | return (X509_CERT_FILE_EVP); |
103 | } | 103 | } |
104 | LCRYPTO_ALIAS(X509_get_default_cert_file_env) | 104 | LCRYPTO_ALIAS(X509_get_default_cert_file_env); |
diff --git a/src/lib/libcrypto/x509/x509_enum.c b/src/lib/libcrypto/x509/x509_enum.c index f0ab60a4b0..432239e0fe 100644 --- a/src/lib/libcrypto/x509/x509_enum.c +++ b/src/lib/libcrypto/x509/x509_enum.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_enum.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_enum.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -105,4 +105,4 @@ i2s_ASN1_ENUMERATED_TABLE(X509V3_EXT_METHOD *method, const ASN1_ENUMERATED *e) | |||
105 | } | 105 | } |
106 | return i2s_ASN1_ENUMERATED(method, e); | 106 | return i2s_ASN1_ENUMERATED(method, e); |
107 | } | 107 | } |
108 | LCRYPTO_ALIAS(i2s_ASN1_ENUMERATED_TABLE) | 108 | LCRYPTO_ALIAS(i2s_ASN1_ENUMERATED_TABLE); |
diff --git a/src/lib/libcrypto/x509/x509_err.c b/src/lib/libcrypto/x509/x509_err.c index c83655046a..272d2894d8 100644 --- a/src/lib/libcrypto/x509/x509_err.c +++ b/src/lib/libcrypto/x509/x509_err.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_err.c,v 1.18 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_err.c,v 1.19 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2006 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2006 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -191,7 +191,7 @@ ERR_load_X509_strings(void) | |||
191 | } | 191 | } |
192 | #endif | 192 | #endif |
193 | } | 193 | } |
194 | LCRYPTO_ALIAS(ERR_load_X509_strings) | 194 | LCRYPTO_ALIAS(ERR_load_X509_strings); |
195 | 195 | ||
196 | 196 | ||
197 | void | 197 | void |
@@ -204,4 +204,4 @@ ERR_load_X509V3_strings(void) | |||
204 | } | 204 | } |
205 | #endif | 205 | #endif |
206 | } | 206 | } |
207 | LCRYPTO_ALIAS(ERR_load_X509V3_strings) | 207 | LCRYPTO_ALIAS(ERR_load_X509V3_strings); |
diff --git a/src/lib/libcrypto/x509/x509_ext.c b/src/lib/libcrypto/x509/x509_ext.c index c173b7c687..ce316d25bd 100644 --- a/src/lib/libcrypto/x509/x509_ext.c +++ b/src/lib/libcrypto/x509/x509_ext.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_ext.c,v 1.15 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: x509_ext.c,v 1.16 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -72,49 +72,49 @@ X509_CRL_get_ext_count(const X509_CRL *x) | |||
72 | { | 72 | { |
73 | return (X509v3_get_ext_count(x->crl->extensions)); | 73 | return (X509v3_get_ext_count(x->crl->extensions)); |
74 | } | 74 | } |
75 | LCRYPTO_ALIAS(X509_CRL_get_ext_count) | 75 | LCRYPTO_ALIAS(X509_CRL_get_ext_count); |
76 | 76 | ||
77 | int | 77 | int |
78 | X509_CRL_get_ext_by_NID(const X509_CRL *x, int nid, int lastpos) | 78 | X509_CRL_get_ext_by_NID(const X509_CRL *x, int nid, int lastpos) |
79 | { | 79 | { |
80 | return (X509v3_get_ext_by_NID(x->crl->extensions, nid, lastpos)); | 80 | return (X509v3_get_ext_by_NID(x->crl->extensions, nid, lastpos)); |
81 | } | 81 | } |
82 | LCRYPTO_ALIAS(X509_CRL_get_ext_by_NID) | 82 | LCRYPTO_ALIAS(X509_CRL_get_ext_by_NID); |
83 | 83 | ||
84 | int | 84 | int |
85 | X509_CRL_get_ext_by_OBJ(const X509_CRL *x, const ASN1_OBJECT *obj, int lastpos) | 85 | X509_CRL_get_ext_by_OBJ(const X509_CRL *x, const ASN1_OBJECT *obj, int lastpos) |
86 | { | 86 | { |
87 | return (X509v3_get_ext_by_OBJ(x->crl->extensions, obj, lastpos)); | 87 | return (X509v3_get_ext_by_OBJ(x->crl->extensions, obj, lastpos)); |
88 | } | 88 | } |
89 | LCRYPTO_ALIAS(X509_CRL_get_ext_by_OBJ) | 89 | LCRYPTO_ALIAS(X509_CRL_get_ext_by_OBJ); |
90 | 90 | ||
91 | int | 91 | int |
92 | X509_CRL_get_ext_by_critical(const X509_CRL *x, int crit, int lastpos) | 92 | X509_CRL_get_ext_by_critical(const X509_CRL *x, int crit, int lastpos) |
93 | { | 93 | { |
94 | return (X509v3_get_ext_by_critical(x->crl->extensions, crit, lastpos)); | 94 | return (X509v3_get_ext_by_critical(x->crl->extensions, crit, lastpos)); |
95 | } | 95 | } |
96 | LCRYPTO_ALIAS(X509_CRL_get_ext_by_critical) | 96 | LCRYPTO_ALIAS(X509_CRL_get_ext_by_critical); |
97 | 97 | ||
98 | X509_EXTENSION * | 98 | X509_EXTENSION * |
99 | X509_CRL_get_ext(const X509_CRL *x, int loc) | 99 | X509_CRL_get_ext(const X509_CRL *x, int loc) |
100 | { | 100 | { |
101 | return (X509v3_get_ext(x->crl->extensions, loc)); | 101 | return (X509v3_get_ext(x->crl->extensions, loc)); |
102 | } | 102 | } |
103 | LCRYPTO_ALIAS(X509_CRL_get_ext) | 103 | LCRYPTO_ALIAS(X509_CRL_get_ext); |
104 | 104 | ||
105 | X509_EXTENSION * | 105 | X509_EXTENSION * |
106 | X509_CRL_delete_ext(X509_CRL *x, int loc) | 106 | X509_CRL_delete_ext(X509_CRL *x, int loc) |
107 | { | 107 | { |
108 | return (X509v3_delete_ext(x->crl->extensions, loc)); | 108 | return (X509v3_delete_ext(x->crl->extensions, loc)); |
109 | } | 109 | } |
110 | LCRYPTO_ALIAS(X509_CRL_delete_ext) | 110 | LCRYPTO_ALIAS(X509_CRL_delete_ext); |
111 | 111 | ||
112 | void * | 112 | void * |
113 | X509_CRL_get_ext_d2i(const X509_CRL *x, int nid, int *crit, int *idx) | 113 | X509_CRL_get_ext_d2i(const X509_CRL *x, int nid, int *crit, int *idx) |
114 | { | 114 | { |
115 | return X509V3_get_d2i(x->crl->extensions, nid, crit, idx); | 115 | return X509V3_get_d2i(x->crl->extensions, nid, crit, idx); |
116 | } | 116 | } |
117 | LCRYPTO_ALIAS(X509_CRL_get_ext_d2i) | 117 | LCRYPTO_ALIAS(X509_CRL_get_ext_d2i); |
118 | 118 | ||
119 | int | 119 | int |
120 | X509_CRL_add1_ext_i2d(X509_CRL *x, int nid, void *value, int crit, | 120 | X509_CRL_add1_ext_i2d(X509_CRL *x, int nid, void *value, int crit, |
@@ -122,35 +122,35 @@ X509_CRL_add1_ext_i2d(X509_CRL *x, int nid, void *value, int crit, | |||
122 | { | 122 | { |
123 | return X509V3_add1_i2d(&x->crl->extensions, nid, value, crit, flags); | 123 | return X509V3_add1_i2d(&x->crl->extensions, nid, value, crit, flags); |
124 | } | 124 | } |
125 | LCRYPTO_ALIAS(X509_CRL_add1_ext_i2d) | 125 | LCRYPTO_ALIAS(X509_CRL_add1_ext_i2d); |
126 | 126 | ||
127 | int | 127 | int |
128 | X509_CRL_add_ext(X509_CRL *x, X509_EXTENSION *ex, int loc) | 128 | X509_CRL_add_ext(X509_CRL *x, X509_EXTENSION *ex, int loc) |
129 | { | 129 | { |
130 | return (X509v3_add_ext(&(x->crl->extensions), ex, loc) != NULL); | 130 | return (X509v3_add_ext(&(x->crl->extensions), ex, loc) != NULL); |
131 | } | 131 | } |
132 | LCRYPTO_ALIAS(X509_CRL_add_ext) | 132 | LCRYPTO_ALIAS(X509_CRL_add_ext); |
133 | 133 | ||
134 | int | 134 | int |
135 | X509_get_ext_count(const X509 *x) | 135 | X509_get_ext_count(const X509 *x) |
136 | { | 136 | { |
137 | return (X509v3_get_ext_count(x->cert_info->extensions)); | 137 | return (X509v3_get_ext_count(x->cert_info->extensions)); |
138 | } | 138 | } |
139 | LCRYPTO_ALIAS(X509_get_ext_count) | 139 | LCRYPTO_ALIAS(X509_get_ext_count); |
140 | 140 | ||
141 | int | 141 | int |
142 | X509_get_ext_by_NID(const X509 *x, int nid, int lastpos) | 142 | X509_get_ext_by_NID(const X509 *x, int nid, int lastpos) |
143 | { | 143 | { |
144 | return (X509v3_get_ext_by_NID(x->cert_info->extensions, nid, lastpos)); | 144 | return (X509v3_get_ext_by_NID(x->cert_info->extensions, nid, lastpos)); |
145 | } | 145 | } |
146 | LCRYPTO_ALIAS(X509_get_ext_by_NID) | 146 | LCRYPTO_ALIAS(X509_get_ext_by_NID); |
147 | 147 | ||
148 | int | 148 | int |
149 | X509_get_ext_by_OBJ(const X509 *x, const ASN1_OBJECT *obj, int lastpos) | 149 | X509_get_ext_by_OBJ(const X509 *x, const ASN1_OBJECT *obj, int lastpos) |
150 | { | 150 | { |
151 | return (X509v3_get_ext_by_OBJ(x->cert_info->extensions, obj, lastpos)); | 151 | return (X509v3_get_ext_by_OBJ(x->cert_info->extensions, obj, lastpos)); |
152 | } | 152 | } |
153 | LCRYPTO_ALIAS(X509_get_ext_by_OBJ) | 153 | LCRYPTO_ALIAS(X509_get_ext_by_OBJ); |
154 | 154 | ||
155 | int | 155 | int |
156 | X509_get_ext_by_critical(const X509 *x, int crit, int lastpos) | 156 | X509_get_ext_by_critical(const X509 *x, int crit, int lastpos) |
@@ -158,35 +158,35 @@ X509_get_ext_by_critical(const X509 *x, int crit, int lastpos) | |||
158 | return (X509v3_get_ext_by_critical(x->cert_info->extensions, crit, | 158 | return (X509v3_get_ext_by_critical(x->cert_info->extensions, crit, |
159 | lastpos)); | 159 | lastpos)); |
160 | } | 160 | } |
161 | LCRYPTO_ALIAS(X509_get_ext_by_critical) | 161 | LCRYPTO_ALIAS(X509_get_ext_by_critical); |
162 | 162 | ||
163 | X509_EXTENSION * | 163 | X509_EXTENSION * |
164 | X509_get_ext(const X509 *x, int loc) | 164 | X509_get_ext(const X509 *x, int loc) |
165 | { | 165 | { |
166 | return (X509v3_get_ext(x->cert_info->extensions, loc)); | 166 | return (X509v3_get_ext(x->cert_info->extensions, loc)); |
167 | } | 167 | } |
168 | LCRYPTO_ALIAS(X509_get_ext) | 168 | LCRYPTO_ALIAS(X509_get_ext); |
169 | 169 | ||
170 | X509_EXTENSION * | 170 | X509_EXTENSION * |
171 | X509_delete_ext(X509 *x, int loc) | 171 | X509_delete_ext(X509 *x, int loc) |
172 | { | 172 | { |
173 | return (X509v3_delete_ext(x->cert_info->extensions, loc)); | 173 | return (X509v3_delete_ext(x->cert_info->extensions, loc)); |
174 | } | 174 | } |
175 | LCRYPTO_ALIAS(X509_delete_ext) | 175 | LCRYPTO_ALIAS(X509_delete_ext); |
176 | 176 | ||
177 | int | 177 | int |
178 | X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc) | 178 | X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc) |
179 | { | 179 | { |
180 | return (X509v3_add_ext(&(x->cert_info->extensions), ex, loc) != NULL); | 180 | return (X509v3_add_ext(&(x->cert_info->extensions), ex, loc) != NULL); |
181 | } | 181 | } |
182 | LCRYPTO_ALIAS(X509_add_ext) | 182 | LCRYPTO_ALIAS(X509_add_ext); |
183 | 183 | ||
184 | void * | 184 | void * |
185 | X509_get_ext_d2i(const X509 *x, int nid, int *crit, int *idx) | 185 | X509_get_ext_d2i(const X509 *x, int nid, int *crit, int *idx) |
186 | { | 186 | { |
187 | return X509V3_get_d2i(x->cert_info->extensions, nid, crit, idx); | 187 | return X509V3_get_d2i(x->cert_info->extensions, nid, crit, idx); |
188 | } | 188 | } |
189 | LCRYPTO_ALIAS(X509_get_ext_d2i) | 189 | LCRYPTO_ALIAS(X509_get_ext_d2i); |
190 | 190 | ||
191 | int | 191 | int |
192 | X509_add1_ext_i2d(X509 *x, int nid, void *value, int crit, unsigned long flags) | 192 | X509_add1_ext_i2d(X509 *x, int nid, void *value, int crit, unsigned long flags) |
@@ -194,21 +194,21 @@ X509_add1_ext_i2d(X509 *x, int nid, void *value, int crit, unsigned long flags) | |||
194 | return X509V3_add1_i2d(&x->cert_info->extensions, nid, value, crit, | 194 | return X509V3_add1_i2d(&x->cert_info->extensions, nid, value, crit, |
195 | flags); | 195 | flags); |
196 | } | 196 | } |
197 | LCRYPTO_ALIAS(X509_add1_ext_i2d) | 197 | LCRYPTO_ALIAS(X509_add1_ext_i2d); |
198 | 198 | ||
199 | int | 199 | int |
200 | X509_REVOKED_get_ext_count(const X509_REVOKED *x) | 200 | X509_REVOKED_get_ext_count(const X509_REVOKED *x) |
201 | { | 201 | { |
202 | return (X509v3_get_ext_count(x->extensions)); | 202 | return (X509v3_get_ext_count(x->extensions)); |
203 | } | 203 | } |
204 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_count) | 204 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_count); |
205 | 205 | ||
206 | int | 206 | int |
207 | X509_REVOKED_get_ext_by_NID(const X509_REVOKED *x, int nid, int lastpos) | 207 | X509_REVOKED_get_ext_by_NID(const X509_REVOKED *x, int nid, int lastpos) |
208 | { | 208 | { |
209 | return (X509v3_get_ext_by_NID(x->extensions, nid, lastpos)); | 209 | return (X509v3_get_ext_by_NID(x->extensions, nid, lastpos)); |
210 | } | 210 | } |
211 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_by_NID) | 211 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_by_NID); |
212 | 212 | ||
213 | int | 213 | int |
214 | X509_REVOKED_get_ext_by_OBJ(const X509_REVOKED *x, const ASN1_OBJECT *obj, | 214 | X509_REVOKED_get_ext_by_OBJ(const X509_REVOKED *x, const ASN1_OBJECT *obj, |
@@ -216,42 +216,42 @@ X509_REVOKED_get_ext_by_OBJ(const X509_REVOKED *x, const ASN1_OBJECT *obj, | |||
216 | { | 216 | { |
217 | return (X509v3_get_ext_by_OBJ(x->extensions, obj, lastpos)); | 217 | return (X509v3_get_ext_by_OBJ(x->extensions, obj, lastpos)); |
218 | } | 218 | } |
219 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_by_OBJ) | 219 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_by_OBJ); |
220 | 220 | ||
221 | int | 221 | int |
222 | X509_REVOKED_get_ext_by_critical(const X509_REVOKED *x, int crit, int lastpos) | 222 | X509_REVOKED_get_ext_by_critical(const X509_REVOKED *x, int crit, int lastpos) |
223 | { | 223 | { |
224 | return (X509v3_get_ext_by_critical(x->extensions, crit, lastpos)); | 224 | return (X509v3_get_ext_by_critical(x->extensions, crit, lastpos)); |
225 | } | 225 | } |
226 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_by_critical) | 226 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_by_critical); |
227 | 227 | ||
228 | X509_EXTENSION * | 228 | X509_EXTENSION * |
229 | X509_REVOKED_get_ext(const X509_REVOKED *x, int loc) | 229 | X509_REVOKED_get_ext(const X509_REVOKED *x, int loc) |
230 | { | 230 | { |
231 | return (X509v3_get_ext(x->extensions, loc)); | 231 | return (X509v3_get_ext(x->extensions, loc)); |
232 | } | 232 | } |
233 | LCRYPTO_ALIAS(X509_REVOKED_get_ext) | 233 | LCRYPTO_ALIAS(X509_REVOKED_get_ext); |
234 | 234 | ||
235 | X509_EXTENSION * | 235 | X509_EXTENSION * |
236 | X509_REVOKED_delete_ext(X509_REVOKED *x, int loc) | 236 | X509_REVOKED_delete_ext(X509_REVOKED *x, int loc) |
237 | { | 237 | { |
238 | return (X509v3_delete_ext(x->extensions, loc)); | 238 | return (X509v3_delete_ext(x->extensions, loc)); |
239 | } | 239 | } |
240 | LCRYPTO_ALIAS(X509_REVOKED_delete_ext) | 240 | LCRYPTO_ALIAS(X509_REVOKED_delete_ext); |
241 | 241 | ||
242 | int | 242 | int |
243 | X509_REVOKED_add_ext(X509_REVOKED *x, X509_EXTENSION *ex, int loc) | 243 | X509_REVOKED_add_ext(X509_REVOKED *x, X509_EXTENSION *ex, int loc) |
244 | { | 244 | { |
245 | return (X509v3_add_ext(&(x->extensions), ex, loc) != NULL); | 245 | return (X509v3_add_ext(&(x->extensions), ex, loc) != NULL); |
246 | } | 246 | } |
247 | LCRYPTO_ALIAS(X509_REVOKED_add_ext) | 247 | LCRYPTO_ALIAS(X509_REVOKED_add_ext); |
248 | 248 | ||
249 | void * | 249 | void * |
250 | X509_REVOKED_get_ext_d2i(const X509_REVOKED *x, int nid, int *crit, int *idx) | 250 | X509_REVOKED_get_ext_d2i(const X509_REVOKED *x, int nid, int *crit, int *idx) |
251 | { | 251 | { |
252 | return X509V3_get_d2i(x->extensions, nid, crit, idx); | 252 | return X509V3_get_d2i(x->extensions, nid, crit, idx); |
253 | } | 253 | } |
254 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_d2i) | 254 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_d2i); |
255 | 255 | ||
256 | int | 256 | int |
257 | X509_REVOKED_add1_ext_i2d(X509_REVOKED *x, int nid, void *value, int crit, | 257 | X509_REVOKED_add1_ext_i2d(X509_REVOKED *x, int nid, void *value, int crit, |
@@ -259,4 +259,4 @@ X509_REVOKED_add1_ext_i2d(X509_REVOKED *x, int nid, void *value, int crit, | |||
259 | { | 259 | { |
260 | return X509V3_add1_i2d(&x->extensions, nid, value, crit, flags); | 260 | return X509V3_add1_i2d(&x->extensions, nid, value, crit, flags); |
261 | } | 261 | } |
262 | LCRYPTO_ALIAS(X509_REVOKED_add1_ext_i2d) | 262 | LCRYPTO_ALIAS(X509_REVOKED_add1_ext_i2d); |
diff --git a/src/lib/libcrypto/x509/x509_extku.c b/src/lib/libcrypto/x509/x509_extku.c index cfdb23df75..94032f624e 100644 --- a/src/lib/libcrypto/x509/x509_extku.c +++ b/src/lib/libcrypto/x509/x509_extku.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_extku.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_extku.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -128,28 +128,28 @@ d2i_EXTENDED_KEY_USAGE(EXTENDED_KEY_USAGE **a, const unsigned char **in, long le | |||
128 | return (EXTENDED_KEY_USAGE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 128 | return (EXTENDED_KEY_USAGE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
129 | &EXTENDED_KEY_USAGE_it); | 129 | &EXTENDED_KEY_USAGE_it); |
130 | } | 130 | } |
131 | LCRYPTO_ALIAS(d2i_EXTENDED_KEY_USAGE) | 131 | LCRYPTO_ALIAS(d2i_EXTENDED_KEY_USAGE); |
132 | 132 | ||
133 | int | 133 | int |
134 | i2d_EXTENDED_KEY_USAGE(EXTENDED_KEY_USAGE *a, unsigned char **out) | 134 | i2d_EXTENDED_KEY_USAGE(EXTENDED_KEY_USAGE *a, unsigned char **out) |
135 | { | 135 | { |
136 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &EXTENDED_KEY_USAGE_it); | 136 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &EXTENDED_KEY_USAGE_it); |
137 | } | 137 | } |
138 | LCRYPTO_ALIAS(i2d_EXTENDED_KEY_USAGE) | 138 | LCRYPTO_ALIAS(i2d_EXTENDED_KEY_USAGE); |
139 | 139 | ||
140 | EXTENDED_KEY_USAGE * | 140 | EXTENDED_KEY_USAGE * |
141 | EXTENDED_KEY_USAGE_new(void) | 141 | EXTENDED_KEY_USAGE_new(void) |
142 | { | 142 | { |
143 | return (EXTENDED_KEY_USAGE *)ASN1_item_new(&EXTENDED_KEY_USAGE_it); | 143 | return (EXTENDED_KEY_USAGE *)ASN1_item_new(&EXTENDED_KEY_USAGE_it); |
144 | } | 144 | } |
145 | LCRYPTO_ALIAS(EXTENDED_KEY_USAGE_new) | 145 | LCRYPTO_ALIAS(EXTENDED_KEY_USAGE_new); |
146 | 146 | ||
147 | void | 147 | void |
148 | EXTENDED_KEY_USAGE_free(EXTENDED_KEY_USAGE *a) | 148 | EXTENDED_KEY_USAGE_free(EXTENDED_KEY_USAGE *a) |
149 | { | 149 | { |
150 | ASN1_item_free((ASN1_VALUE *)a, &EXTENDED_KEY_USAGE_it); | 150 | ASN1_item_free((ASN1_VALUE *)a, &EXTENDED_KEY_USAGE_it); |
151 | } | 151 | } |
152 | LCRYPTO_ALIAS(EXTENDED_KEY_USAGE_free) | 152 | LCRYPTO_ALIAS(EXTENDED_KEY_USAGE_free); |
153 | 153 | ||
154 | static STACK_OF(CONF_VALUE) * | 154 | static STACK_OF(CONF_VALUE) * |
155 | i2v_EXTENDED_KEY_USAGE(const X509V3_EXT_METHOD *method, void *a, | 155 | i2v_EXTENDED_KEY_USAGE(const X509V3_EXT_METHOD *method, void *a, |
diff --git a/src/lib/libcrypto/x509/x509_genn.c b/src/lib/libcrypto/x509/x509_genn.c index 395d487f8f..0c03396e0d 100644 --- a/src/lib/libcrypto/x509/x509_genn.c +++ b/src/lib/libcrypto/x509/x509_genn.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_genn.c,v 1.4 2023/02/07 15:46:58 tb Exp $ */ | 1 | /* $OpenBSD: x509_genn.c,v 1.5 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -98,28 +98,28 @@ d2i_OTHERNAME(OTHERNAME **a, const unsigned char **in, long len) | |||
98 | return (OTHERNAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 98 | return (OTHERNAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
99 | &OTHERNAME_it); | 99 | &OTHERNAME_it); |
100 | } | 100 | } |
101 | LCRYPTO_ALIAS(d2i_OTHERNAME) | 101 | LCRYPTO_ALIAS(d2i_OTHERNAME); |
102 | 102 | ||
103 | int | 103 | int |
104 | i2d_OTHERNAME(OTHERNAME *a, unsigned char **out) | 104 | i2d_OTHERNAME(OTHERNAME *a, unsigned char **out) |
105 | { | 105 | { |
106 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &OTHERNAME_it); | 106 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &OTHERNAME_it); |
107 | } | 107 | } |
108 | LCRYPTO_ALIAS(i2d_OTHERNAME) | 108 | LCRYPTO_ALIAS(i2d_OTHERNAME); |
109 | 109 | ||
110 | OTHERNAME * | 110 | OTHERNAME * |
111 | OTHERNAME_new(void) | 111 | OTHERNAME_new(void) |
112 | { | 112 | { |
113 | return (OTHERNAME *)ASN1_item_new(&OTHERNAME_it); | 113 | return (OTHERNAME *)ASN1_item_new(&OTHERNAME_it); |
114 | } | 114 | } |
115 | LCRYPTO_ALIAS(OTHERNAME_new) | 115 | LCRYPTO_ALIAS(OTHERNAME_new); |
116 | 116 | ||
117 | void | 117 | void |
118 | OTHERNAME_free(OTHERNAME *a) | 118 | OTHERNAME_free(OTHERNAME *a) |
119 | { | 119 | { |
120 | ASN1_item_free((ASN1_VALUE *)a, &OTHERNAME_it); | 120 | ASN1_item_free((ASN1_VALUE *)a, &OTHERNAME_it); |
121 | } | 121 | } |
122 | LCRYPTO_ALIAS(OTHERNAME_free) | 122 | LCRYPTO_ALIAS(OTHERNAME_free); |
123 | 123 | ||
124 | /* Uses explicit tagging since DIRECTORYSTRING is a CHOICE type */ | 124 | /* Uses explicit tagging since DIRECTORYSTRING is a CHOICE type */ |
125 | static const ASN1_TEMPLATE EDIPARTYNAME_seq_tt[] = { | 125 | static const ASN1_TEMPLATE EDIPARTYNAME_seq_tt[] = { |
@@ -156,28 +156,28 @@ d2i_EDIPARTYNAME(EDIPARTYNAME **a, const unsigned char **in, long len) | |||
156 | return (EDIPARTYNAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 156 | return (EDIPARTYNAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
157 | &EDIPARTYNAME_it); | 157 | &EDIPARTYNAME_it); |
158 | } | 158 | } |
159 | LCRYPTO_ALIAS(d2i_EDIPARTYNAME) | 159 | LCRYPTO_ALIAS(d2i_EDIPARTYNAME); |
160 | 160 | ||
161 | int | 161 | int |
162 | i2d_EDIPARTYNAME(EDIPARTYNAME *a, unsigned char **out) | 162 | i2d_EDIPARTYNAME(EDIPARTYNAME *a, unsigned char **out) |
163 | { | 163 | { |
164 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &EDIPARTYNAME_it); | 164 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &EDIPARTYNAME_it); |
165 | } | 165 | } |
166 | LCRYPTO_ALIAS(i2d_EDIPARTYNAME) | 166 | LCRYPTO_ALIAS(i2d_EDIPARTYNAME); |
167 | 167 | ||
168 | EDIPARTYNAME * | 168 | EDIPARTYNAME * |
169 | EDIPARTYNAME_new(void) | 169 | EDIPARTYNAME_new(void) |
170 | { | 170 | { |
171 | return (EDIPARTYNAME *)ASN1_item_new(&EDIPARTYNAME_it); | 171 | return (EDIPARTYNAME *)ASN1_item_new(&EDIPARTYNAME_it); |
172 | } | 172 | } |
173 | LCRYPTO_ALIAS(EDIPARTYNAME_new) | 173 | LCRYPTO_ALIAS(EDIPARTYNAME_new); |
174 | 174 | ||
175 | void | 175 | void |
176 | EDIPARTYNAME_free(EDIPARTYNAME *a) | 176 | EDIPARTYNAME_free(EDIPARTYNAME *a) |
177 | { | 177 | { |
178 | ASN1_item_free((ASN1_VALUE *)a, &EDIPARTYNAME_it); | 178 | ASN1_item_free((ASN1_VALUE *)a, &EDIPARTYNAME_it); |
179 | } | 179 | } |
180 | LCRYPTO_ALIAS(EDIPARTYNAME_free) | 180 | LCRYPTO_ALIAS(EDIPARTYNAME_free); |
181 | 181 | ||
182 | static const ASN1_TEMPLATE GENERAL_NAME_ch_tt[] = { | 182 | static const ASN1_TEMPLATE GENERAL_NAME_ch_tt[] = { |
183 | { | 183 | { |
@@ -264,28 +264,28 @@ d2i_GENERAL_NAME(GENERAL_NAME **a, const unsigned char **in, long len) | |||
264 | return (GENERAL_NAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 264 | return (GENERAL_NAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
265 | &GENERAL_NAME_it); | 265 | &GENERAL_NAME_it); |
266 | } | 266 | } |
267 | LCRYPTO_ALIAS(d2i_GENERAL_NAME) | 267 | LCRYPTO_ALIAS(d2i_GENERAL_NAME); |
268 | 268 | ||
269 | int | 269 | int |
270 | i2d_GENERAL_NAME(GENERAL_NAME *a, unsigned char **out) | 270 | i2d_GENERAL_NAME(GENERAL_NAME *a, unsigned char **out) |
271 | { | 271 | { |
272 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &GENERAL_NAME_it); | 272 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &GENERAL_NAME_it); |
273 | } | 273 | } |
274 | LCRYPTO_ALIAS(i2d_GENERAL_NAME) | 274 | LCRYPTO_ALIAS(i2d_GENERAL_NAME); |
275 | 275 | ||
276 | GENERAL_NAME * | 276 | GENERAL_NAME * |
277 | GENERAL_NAME_new(void) | 277 | GENERAL_NAME_new(void) |
278 | { | 278 | { |
279 | return (GENERAL_NAME *)ASN1_item_new(&GENERAL_NAME_it); | 279 | return (GENERAL_NAME *)ASN1_item_new(&GENERAL_NAME_it); |
280 | } | 280 | } |
281 | LCRYPTO_ALIAS(GENERAL_NAME_new) | 281 | LCRYPTO_ALIAS(GENERAL_NAME_new); |
282 | 282 | ||
283 | void | 283 | void |
284 | GENERAL_NAME_free(GENERAL_NAME *a) | 284 | GENERAL_NAME_free(GENERAL_NAME *a) |
285 | { | 285 | { |
286 | ASN1_item_free((ASN1_VALUE *)a, &GENERAL_NAME_it); | 286 | ASN1_item_free((ASN1_VALUE *)a, &GENERAL_NAME_it); |
287 | } | 287 | } |
288 | LCRYPTO_ALIAS(GENERAL_NAME_free) | 288 | LCRYPTO_ALIAS(GENERAL_NAME_free); |
289 | 289 | ||
290 | static const ASN1_TEMPLATE GENERAL_NAMES_item_tt = { | 290 | static const ASN1_TEMPLATE GENERAL_NAMES_item_tt = { |
291 | .flags = ASN1_TFLG_SEQUENCE_OF, | 291 | .flags = ASN1_TFLG_SEQUENCE_OF, |
@@ -312,35 +312,35 @@ d2i_GENERAL_NAMES(GENERAL_NAMES **a, const unsigned char **in, long len) | |||
312 | return (GENERAL_NAMES *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 312 | return (GENERAL_NAMES *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
313 | &GENERAL_NAMES_it); | 313 | &GENERAL_NAMES_it); |
314 | } | 314 | } |
315 | LCRYPTO_ALIAS(d2i_GENERAL_NAMES) | 315 | LCRYPTO_ALIAS(d2i_GENERAL_NAMES); |
316 | 316 | ||
317 | int | 317 | int |
318 | i2d_GENERAL_NAMES(GENERAL_NAMES *a, unsigned char **out) | 318 | i2d_GENERAL_NAMES(GENERAL_NAMES *a, unsigned char **out) |
319 | { | 319 | { |
320 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &GENERAL_NAMES_it); | 320 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &GENERAL_NAMES_it); |
321 | } | 321 | } |
322 | LCRYPTO_ALIAS(i2d_GENERAL_NAMES) | 322 | LCRYPTO_ALIAS(i2d_GENERAL_NAMES); |
323 | 323 | ||
324 | GENERAL_NAMES * | 324 | GENERAL_NAMES * |
325 | GENERAL_NAMES_new(void) | 325 | GENERAL_NAMES_new(void) |
326 | { | 326 | { |
327 | return (GENERAL_NAMES *)ASN1_item_new(&GENERAL_NAMES_it); | 327 | return (GENERAL_NAMES *)ASN1_item_new(&GENERAL_NAMES_it); |
328 | } | 328 | } |
329 | LCRYPTO_ALIAS(GENERAL_NAMES_new) | 329 | LCRYPTO_ALIAS(GENERAL_NAMES_new); |
330 | 330 | ||
331 | void | 331 | void |
332 | GENERAL_NAMES_free(GENERAL_NAMES *a) | 332 | GENERAL_NAMES_free(GENERAL_NAMES *a) |
333 | { | 333 | { |
334 | ASN1_item_free((ASN1_VALUE *)a, &GENERAL_NAMES_it); | 334 | ASN1_item_free((ASN1_VALUE *)a, &GENERAL_NAMES_it); |
335 | } | 335 | } |
336 | LCRYPTO_ALIAS(GENERAL_NAMES_free) | 336 | LCRYPTO_ALIAS(GENERAL_NAMES_free); |
337 | 337 | ||
338 | GENERAL_NAME * | 338 | GENERAL_NAME * |
339 | GENERAL_NAME_dup(GENERAL_NAME *a) | 339 | GENERAL_NAME_dup(GENERAL_NAME *a) |
340 | { | 340 | { |
341 | return ASN1_item_dup(&GENERAL_NAME_it, a); | 341 | return ASN1_item_dup(&GENERAL_NAME_it, a); |
342 | } | 342 | } |
343 | LCRYPTO_ALIAS(GENERAL_NAME_dup) | 343 | LCRYPTO_ALIAS(GENERAL_NAME_dup); |
344 | 344 | ||
345 | static int | 345 | static int |
346 | EDIPARTYNAME_cmp(const EDIPARTYNAME *a, const EDIPARTYNAME *b) | 346 | EDIPARTYNAME_cmp(const EDIPARTYNAME *a, const EDIPARTYNAME *b) |
@@ -415,7 +415,7 @@ GENERAL_NAME_cmp(GENERAL_NAME *a, GENERAL_NAME *b) | |||
415 | } | 415 | } |
416 | return result; | 416 | return result; |
417 | } | 417 | } |
418 | LCRYPTO_ALIAS(GENERAL_NAME_cmp) | 418 | LCRYPTO_ALIAS(GENERAL_NAME_cmp); |
419 | 419 | ||
420 | /* Returns 0 if they are equal, != 0 otherwise. */ | 420 | /* Returns 0 if they are equal, != 0 otherwise. */ |
421 | int | 421 | int |
@@ -432,7 +432,7 @@ OTHERNAME_cmp(OTHERNAME *a, OTHERNAME *b) | |||
432 | result = ASN1_TYPE_cmp(a->value, b->value); | 432 | result = ASN1_TYPE_cmp(a->value, b->value); |
433 | return result; | 433 | return result; |
434 | } | 434 | } |
435 | LCRYPTO_ALIAS(OTHERNAME_cmp) | 435 | LCRYPTO_ALIAS(OTHERNAME_cmp); |
436 | 436 | ||
437 | void | 437 | void |
438 | GENERAL_NAME_set0_value(GENERAL_NAME *a, int type, void *value) | 438 | GENERAL_NAME_set0_value(GENERAL_NAME *a, int type, void *value) |
@@ -470,7 +470,7 @@ GENERAL_NAME_set0_value(GENERAL_NAME *a, int type, void *value) | |||
470 | } | 470 | } |
471 | a->type = type; | 471 | a->type = type; |
472 | } | 472 | } |
473 | LCRYPTO_ALIAS(GENERAL_NAME_set0_value) | 473 | LCRYPTO_ALIAS(GENERAL_NAME_set0_value); |
474 | 474 | ||
475 | void * | 475 | void * |
476 | GENERAL_NAME_get0_value(GENERAL_NAME *a, int *ptype) | 476 | GENERAL_NAME_get0_value(GENERAL_NAME *a, int *ptype) |
@@ -505,7 +505,7 @@ GENERAL_NAME_get0_value(GENERAL_NAME *a, int *ptype) | |||
505 | return NULL; | 505 | return NULL; |
506 | } | 506 | } |
507 | } | 507 | } |
508 | LCRYPTO_ALIAS(GENERAL_NAME_get0_value) | 508 | LCRYPTO_ALIAS(GENERAL_NAME_get0_value); |
509 | 509 | ||
510 | int | 510 | int |
511 | GENERAL_NAME_set0_othername(GENERAL_NAME *gen, ASN1_OBJECT *oid, | 511 | GENERAL_NAME_set0_othername(GENERAL_NAME *gen, ASN1_OBJECT *oid, |
@@ -521,7 +521,7 @@ GENERAL_NAME_set0_othername(GENERAL_NAME *gen, ASN1_OBJECT *oid, | |||
521 | GENERAL_NAME_set0_value(gen, GEN_OTHERNAME, oth); | 521 | GENERAL_NAME_set0_value(gen, GEN_OTHERNAME, oth); |
522 | return 1; | 522 | return 1; |
523 | } | 523 | } |
524 | LCRYPTO_ALIAS(GENERAL_NAME_set0_othername) | 524 | LCRYPTO_ALIAS(GENERAL_NAME_set0_othername); |
525 | 525 | ||
526 | int | 526 | int |
527 | GENERAL_NAME_get0_otherName(GENERAL_NAME *gen, ASN1_OBJECT **poid, | 527 | GENERAL_NAME_get0_otherName(GENERAL_NAME *gen, ASN1_OBJECT **poid, |
@@ -535,4 +535,4 @@ GENERAL_NAME_get0_otherName(GENERAL_NAME *gen, ASN1_OBJECT **poid, | |||
535 | *pvalue = gen->d.otherName->value; | 535 | *pvalue = gen->d.otherName->value; |
536 | return 1; | 536 | return 1; |
537 | } | 537 | } |
538 | LCRYPTO_ALIAS(GENERAL_NAME_get0_otherName) | 538 | LCRYPTO_ALIAS(GENERAL_NAME_get0_otherName); |
diff --git a/src/lib/libcrypto/x509/x509_info.c b/src/lib/libcrypto/x509/x509_info.c index 6c7fd13601..a3d4d1bcc7 100644 --- a/src/lib/libcrypto/x509/x509_info.c +++ b/src/lib/libcrypto/x509/x509_info.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_info.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_info.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -139,28 +139,28 @@ d2i_ACCESS_DESCRIPTION(ACCESS_DESCRIPTION **a, const unsigned char **in, long le | |||
139 | return (ACCESS_DESCRIPTION *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 139 | return (ACCESS_DESCRIPTION *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
140 | &ACCESS_DESCRIPTION_it); | 140 | &ACCESS_DESCRIPTION_it); |
141 | } | 141 | } |
142 | LCRYPTO_ALIAS(d2i_ACCESS_DESCRIPTION) | 142 | LCRYPTO_ALIAS(d2i_ACCESS_DESCRIPTION); |
143 | 143 | ||
144 | int | 144 | int |
145 | i2d_ACCESS_DESCRIPTION(ACCESS_DESCRIPTION *a, unsigned char **out) | 145 | i2d_ACCESS_DESCRIPTION(ACCESS_DESCRIPTION *a, unsigned char **out) |
146 | { | 146 | { |
147 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ACCESS_DESCRIPTION_it); | 147 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ACCESS_DESCRIPTION_it); |
148 | } | 148 | } |
149 | LCRYPTO_ALIAS(i2d_ACCESS_DESCRIPTION) | 149 | LCRYPTO_ALIAS(i2d_ACCESS_DESCRIPTION); |
150 | 150 | ||
151 | ACCESS_DESCRIPTION * | 151 | ACCESS_DESCRIPTION * |
152 | ACCESS_DESCRIPTION_new(void) | 152 | ACCESS_DESCRIPTION_new(void) |
153 | { | 153 | { |
154 | return (ACCESS_DESCRIPTION *)ASN1_item_new(&ACCESS_DESCRIPTION_it); | 154 | return (ACCESS_DESCRIPTION *)ASN1_item_new(&ACCESS_DESCRIPTION_it); |
155 | } | 155 | } |
156 | LCRYPTO_ALIAS(ACCESS_DESCRIPTION_new) | 156 | LCRYPTO_ALIAS(ACCESS_DESCRIPTION_new); |
157 | 157 | ||
158 | void | 158 | void |
159 | ACCESS_DESCRIPTION_free(ACCESS_DESCRIPTION *a) | 159 | ACCESS_DESCRIPTION_free(ACCESS_DESCRIPTION *a) |
160 | { | 160 | { |
161 | ASN1_item_free((ASN1_VALUE *)a, &ACCESS_DESCRIPTION_it); | 161 | ASN1_item_free((ASN1_VALUE *)a, &ACCESS_DESCRIPTION_it); |
162 | } | 162 | } |
163 | LCRYPTO_ALIAS(ACCESS_DESCRIPTION_free) | 163 | LCRYPTO_ALIAS(ACCESS_DESCRIPTION_free); |
164 | 164 | ||
165 | static const ASN1_TEMPLATE AUTHORITY_INFO_ACCESS_item_tt = { | 165 | static const ASN1_TEMPLATE AUTHORITY_INFO_ACCESS_item_tt = { |
166 | .flags = ASN1_TFLG_SEQUENCE_OF, | 166 | .flags = ASN1_TFLG_SEQUENCE_OF, |
@@ -187,28 +187,28 @@ d2i_AUTHORITY_INFO_ACCESS(AUTHORITY_INFO_ACCESS **a, const unsigned char **in, l | |||
187 | return (AUTHORITY_INFO_ACCESS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 187 | return (AUTHORITY_INFO_ACCESS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
188 | &AUTHORITY_INFO_ACCESS_it); | 188 | &AUTHORITY_INFO_ACCESS_it); |
189 | } | 189 | } |
190 | LCRYPTO_ALIAS(d2i_AUTHORITY_INFO_ACCESS) | 190 | LCRYPTO_ALIAS(d2i_AUTHORITY_INFO_ACCESS); |
191 | 191 | ||
192 | int | 192 | int |
193 | i2d_AUTHORITY_INFO_ACCESS(AUTHORITY_INFO_ACCESS *a, unsigned char **out) | 193 | i2d_AUTHORITY_INFO_ACCESS(AUTHORITY_INFO_ACCESS *a, unsigned char **out) |
194 | { | 194 | { |
195 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &AUTHORITY_INFO_ACCESS_it); | 195 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &AUTHORITY_INFO_ACCESS_it); |
196 | } | 196 | } |
197 | LCRYPTO_ALIAS(i2d_AUTHORITY_INFO_ACCESS) | 197 | LCRYPTO_ALIAS(i2d_AUTHORITY_INFO_ACCESS); |
198 | 198 | ||
199 | AUTHORITY_INFO_ACCESS * | 199 | AUTHORITY_INFO_ACCESS * |
200 | AUTHORITY_INFO_ACCESS_new(void) | 200 | AUTHORITY_INFO_ACCESS_new(void) |
201 | { | 201 | { |
202 | return (AUTHORITY_INFO_ACCESS *)ASN1_item_new(&AUTHORITY_INFO_ACCESS_it); | 202 | return (AUTHORITY_INFO_ACCESS *)ASN1_item_new(&AUTHORITY_INFO_ACCESS_it); |
203 | } | 203 | } |
204 | LCRYPTO_ALIAS(AUTHORITY_INFO_ACCESS_new) | 204 | LCRYPTO_ALIAS(AUTHORITY_INFO_ACCESS_new); |
205 | 205 | ||
206 | void | 206 | void |
207 | AUTHORITY_INFO_ACCESS_free(AUTHORITY_INFO_ACCESS *a) | 207 | AUTHORITY_INFO_ACCESS_free(AUTHORITY_INFO_ACCESS *a) |
208 | { | 208 | { |
209 | ASN1_item_free((ASN1_VALUE *)a, &AUTHORITY_INFO_ACCESS_it); | 209 | ASN1_item_free((ASN1_VALUE *)a, &AUTHORITY_INFO_ACCESS_it); |
210 | } | 210 | } |
211 | LCRYPTO_ALIAS(AUTHORITY_INFO_ACCESS_free) | 211 | LCRYPTO_ALIAS(AUTHORITY_INFO_ACCESS_free); |
212 | 212 | ||
213 | static STACK_OF(CONF_VALUE) * | 213 | static STACK_OF(CONF_VALUE) * |
214 | i2v_AUTHORITY_INFO_ACCESS(X509V3_EXT_METHOD *method, | 214 | i2v_AUTHORITY_INFO_ACCESS(X509V3_EXT_METHOD *method, |
@@ -314,4 +314,4 @@ i2a_ACCESS_DESCRIPTION(BIO *bp, const ACCESS_DESCRIPTION* a) | |||
314 | i2a_ASN1_OBJECT(bp, a->method); | 314 | i2a_ASN1_OBJECT(bp, a->method); |
315 | return 2; | 315 | return 2; |
316 | } | 316 | } |
317 | LCRYPTO_ALIAS(i2a_ACCESS_DESCRIPTION) | 317 | LCRYPTO_ALIAS(i2a_ACCESS_DESCRIPTION); |
diff --git a/src/lib/libcrypto/x509/x509_lib.c b/src/lib/libcrypto/x509/x509_lib.c index f27e3315aa..97d54edd3f 100644 --- a/src/lib/libcrypto/x509/x509_lib.c +++ b/src/lib/libcrypto/x509/x509_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_lib.c,v 1.6 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: x509_lib.c,v 1.7 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -85,7 +85,7 @@ X509V3_EXT_add(X509V3_EXT_METHOD *ext) | |||
85 | } | 85 | } |
86 | return 1; | 86 | return 1; |
87 | } | 87 | } |
88 | LCRYPTO_ALIAS(X509V3_EXT_add) | 88 | LCRYPTO_ALIAS(X509V3_EXT_add); |
89 | 89 | ||
90 | static int | 90 | static int |
91 | ext_cmp(const X509V3_EXT_METHOD * const *a, const X509V3_EXT_METHOD * const *b) | 91 | ext_cmp(const X509V3_EXT_METHOD * const *a, const X509V3_EXT_METHOD * const *b) |
@@ -133,7 +133,7 @@ X509V3_EXT_get_nid(int nid) | |||
133 | return NULL; | 133 | return NULL; |
134 | return sk_X509V3_EXT_METHOD_value(ext_list, idx); | 134 | return sk_X509V3_EXT_METHOD_value(ext_list, idx); |
135 | } | 135 | } |
136 | LCRYPTO_ALIAS(X509V3_EXT_get_nid) | 136 | LCRYPTO_ALIAS(X509V3_EXT_get_nid); |
137 | 137 | ||
138 | const X509V3_EXT_METHOD * | 138 | const X509V3_EXT_METHOD * |
139 | X509V3_EXT_get(X509_EXTENSION *ext) | 139 | X509V3_EXT_get(X509_EXTENSION *ext) |
@@ -144,7 +144,7 @@ X509V3_EXT_get(X509_EXTENSION *ext) | |||
144 | return NULL; | 144 | return NULL; |
145 | return X509V3_EXT_get_nid(nid); | 145 | return X509V3_EXT_get_nid(nid); |
146 | } | 146 | } |
147 | LCRYPTO_ALIAS(X509V3_EXT_get) | 147 | LCRYPTO_ALIAS(X509V3_EXT_get); |
148 | 148 | ||
149 | int | 149 | int |
150 | X509V3_EXT_add_list(X509V3_EXT_METHOD *extlist) | 150 | X509V3_EXT_add_list(X509V3_EXT_METHOD *extlist) |
@@ -154,7 +154,7 @@ X509V3_EXT_add_list(X509V3_EXT_METHOD *extlist) | |||
154 | return 0; | 154 | return 0; |
155 | return 1; | 155 | return 1; |
156 | } | 156 | } |
157 | LCRYPTO_ALIAS(X509V3_EXT_add_list) | 157 | LCRYPTO_ALIAS(X509V3_EXT_add_list); |
158 | 158 | ||
159 | int | 159 | int |
160 | X509V3_EXT_add_alias(int nid_to, int nid_from) | 160 | X509V3_EXT_add_alias(int nid_to, int nid_from) |
@@ -179,7 +179,7 @@ X509V3_EXT_add_alias(int nid_to, int nid_from) | |||
179 | } | 179 | } |
180 | return 1; | 180 | return 1; |
181 | } | 181 | } |
182 | LCRYPTO_ALIAS(X509V3_EXT_add_alias) | 182 | LCRYPTO_ALIAS(X509V3_EXT_add_alias); |
183 | 183 | ||
184 | void | 184 | void |
185 | X509V3_EXT_cleanup(void) | 185 | X509V3_EXT_cleanup(void) |
@@ -187,7 +187,7 @@ X509V3_EXT_cleanup(void) | |||
187 | sk_X509V3_EXT_METHOD_pop_free(ext_list, ext_list_free); | 187 | sk_X509V3_EXT_METHOD_pop_free(ext_list, ext_list_free); |
188 | ext_list = NULL; | 188 | ext_list = NULL; |
189 | } | 189 | } |
190 | LCRYPTO_ALIAS(X509V3_EXT_cleanup) | 190 | LCRYPTO_ALIAS(X509V3_EXT_cleanup); |
191 | 191 | ||
192 | static void | 192 | static void |
193 | ext_list_free(X509V3_EXT_METHOD *ext) | 193 | ext_list_free(X509V3_EXT_METHOD *ext) |
@@ -205,7 +205,7 @@ X509V3_add_standard_extensions(void) | |||
205 | { | 205 | { |
206 | return 1; | 206 | return 1; |
207 | } | 207 | } |
208 | LCRYPTO_ALIAS(X509V3_add_standard_extensions) | 208 | LCRYPTO_ALIAS(X509V3_add_standard_extensions); |
209 | 209 | ||
210 | /* Return an extension internal structure */ | 210 | /* Return an extension internal structure */ |
211 | 211 | ||
@@ -223,7 +223,7 @@ X509V3_EXT_d2i(X509_EXTENSION *ext) | |||
223 | method->it); | 223 | method->it); |
224 | return method->d2i(NULL, &p, ext->value->length); | 224 | return method->d2i(NULL, &p, ext->value->length); |
225 | } | 225 | } |
226 | LCRYPTO_ALIAS(X509V3_EXT_d2i) | 226 | LCRYPTO_ALIAS(X509V3_EXT_d2i); |
227 | 227 | ||
228 | /* Get critical flag and decoded version of extension from a NID. | 228 | /* Get critical flag and decoded version of extension from a NID. |
229 | * The "idx" variable returns the last found extension and can | 229 | * The "idx" variable returns the last found extension and can |
@@ -289,7 +289,7 @@ X509V3_get_d2i(const STACK_OF(X509_EXTENSION) *x, int nid, int *crit, int *idx) | |||
289 | *crit = -1; | 289 | *crit = -1; |
290 | return NULL; | 290 | return NULL; |
291 | } | 291 | } |
292 | LCRYPTO_ALIAS(X509V3_get_d2i) | 292 | LCRYPTO_ALIAS(X509V3_get_d2i); |
293 | 293 | ||
294 | /* This function is a general extension append, replace and delete utility. | 294 | /* This function is a general extension append, replace and delete utility. |
295 | * The precise operation is governed by the 'flags' value. The 'crit' and | 295 | * The precise operation is governed by the 'flags' value. The 'crit' and |
@@ -371,4 +371,4 @@ err: | |||
371 | X509V3error(errcode); | 371 | X509V3error(errcode); |
372 | return 0; | 372 | return 0; |
373 | } | 373 | } |
374 | LCRYPTO_ALIAS(X509V3_add1_i2d) | 374 | LCRYPTO_ALIAS(X509V3_add1_i2d); |
diff --git a/src/lib/libcrypto/x509/x509_lu.c b/src/lib/libcrypto/x509/x509_lu.c index 28cb85035b..65d11d9107 100644 --- a/src/lib/libcrypto/x509/x509_lu.c +++ b/src/lib/libcrypto/x509/x509_lu.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_lu.c,v 1.57 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: x509_lu.c,v 1.58 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -84,7 +84,7 @@ X509_LOOKUP_new(X509_LOOKUP_METHOD *method) | |||
84 | 84 | ||
85 | return lu; | 85 | return lu; |
86 | } | 86 | } |
87 | LCRYPTO_ALIAS(X509_LOOKUP_new) | 87 | LCRYPTO_ALIAS(X509_LOOKUP_new); |
88 | 88 | ||
89 | void | 89 | void |
90 | X509_LOOKUP_free(X509_LOOKUP *ctx) | 90 | X509_LOOKUP_free(X509_LOOKUP *ctx) |
@@ -95,7 +95,7 @@ X509_LOOKUP_free(X509_LOOKUP *ctx) | |||
95 | ctx->method->free(ctx); | 95 | ctx->method->free(ctx); |
96 | free(ctx); | 96 | free(ctx); |
97 | } | 97 | } |
98 | LCRYPTO_ALIAS(X509_LOOKUP_free) | 98 | LCRYPTO_ALIAS(X509_LOOKUP_free); |
99 | 99 | ||
100 | int | 100 | int |
101 | X509_LOOKUP_init(X509_LOOKUP *ctx) | 101 | X509_LOOKUP_init(X509_LOOKUP *ctx) |
@@ -106,7 +106,7 @@ X509_LOOKUP_init(X509_LOOKUP *ctx) | |||
106 | return 1; | 106 | return 1; |
107 | return ctx->method->init(ctx); | 107 | return ctx->method->init(ctx); |
108 | } | 108 | } |
109 | LCRYPTO_ALIAS(X509_LOOKUP_init) | 109 | LCRYPTO_ALIAS(X509_LOOKUP_init); |
110 | 110 | ||
111 | int | 111 | int |
112 | X509_LOOKUP_shutdown(X509_LOOKUP *ctx) | 112 | X509_LOOKUP_shutdown(X509_LOOKUP *ctx) |
@@ -117,7 +117,7 @@ X509_LOOKUP_shutdown(X509_LOOKUP *ctx) | |||
117 | return 1; | 117 | return 1; |
118 | return ctx->method->shutdown(ctx); | 118 | return ctx->method->shutdown(ctx); |
119 | } | 119 | } |
120 | LCRYPTO_ALIAS(X509_LOOKUP_shutdown) | 120 | LCRYPTO_ALIAS(X509_LOOKUP_shutdown); |
121 | 121 | ||
122 | int | 122 | int |
123 | X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl, | 123 | X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl, |
@@ -129,7 +129,7 @@ X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl, | |||
129 | return 1; | 129 | return 1; |
130 | return ctx->method->ctrl(ctx, cmd, argc, argl, ret); | 130 | return ctx->method->ctrl(ctx, cmd, argc, argl, ret); |
131 | } | 131 | } |
132 | LCRYPTO_ALIAS(X509_LOOKUP_ctrl) | 132 | LCRYPTO_ALIAS(X509_LOOKUP_ctrl); |
133 | 133 | ||
134 | int | 134 | int |
135 | X509_LOOKUP_by_subject(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, X509_NAME *name, | 135 | X509_LOOKUP_by_subject(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, X509_NAME *name, |
@@ -139,7 +139,7 @@ X509_LOOKUP_by_subject(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, X509_NAME *name, | |||
139 | return 0; | 139 | return 0; |
140 | return ctx->method->get_by_subject(ctx, type, name, ret); | 140 | return ctx->method->get_by_subject(ctx, type, name, ret); |
141 | } | 141 | } |
142 | LCRYPTO_ALIAS(X509_LOOKUP_by_subject) | 142 | LCRYPTO_ALIAS(X509_LOOKUP_by_subject); |
143 | 143 | ||
144 | int | 144 | int |
145 | X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, | 145 | X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, |
@@ -149,7 +149,7 @@ X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, | |||
149 | return 0; | 149 | return 0; |
150 | return ctx->method->get_by_issuer_serial(ctx, type, name, serial, ret); | 150 | return ctx->method->get_by_issuer_serial(ctx, type, name, serial, ret); |
151 | } | 151 | } |
152 | LCRYPTO_ALIAS(X509_LOOKUP_by_issuer_serial) | 152 | LCRYPTO_ALIAS(X509_LOOKUP_by_issuer_serial); |
153 | 153 | ||
154 | int | 154 | int |
155 | X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, | 155 | X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, |
@@ -159,7 +159,7 @@ X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, | |||
159 | return 0; | 159 | return 0; |
160 | return ctx->method->get_by_fingerprint(ctx, type, bytes, len, ret); | 160 | return ctx->method->get_by_fingerprint(ctx, type, bytes, len, ret); |
161 | } | 161 | } |
162 | LCRYPTO_ALIAS(X509_LOOKUP_by_fingerprint) | 162 | LCRYPTO_ALIAS(X509_LOOKUP_by_fingerprint); |
163 | 163 | ||
164 | int | 164 | int |
165 | X509_LOOKUP_by_alias(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, const char *str, | 165 | X509_LOOKUP_by_alias(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, const char *str, |
@@ -169,7 +169,7 @@ X509_LOOKUP_by_alias(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, const char *str, | |||
169 | return 0; | 169 | return 0; |
170 | return ctx->method->get_by_alias(ctx, type, str, len, ret); | 170 | return ctx->method->get_by_alias(ctx, type, str, len, ret); |
171 | } | 171 | } |
172 | LCRYPTO_ALIAS(X509_LOOKUP_by_alias) | 172 | LCRYPTO_ALIAS(X509_LOOKUP_by_alias); |
173 | 173 | ||
174 | static int | 174 | static int |
175 | x509_object_cmp(const X509_OBJECT * const *a, const X509_OBJECT * const *b) | 175 | x509_object_cmp(const X509_OBJECT * const *a, const X509_OBJECT * const *b) |
@@ -217,7 +217,7 @@ X509_STORE_new(void) | |||
217 | 217 | ||
218 | return NULL; | 218 | return NULL; |
219 | } | 219 | } |
220 | LCRYPTO_ALIAS(X509_STORE_new) | 220 | LCRYPTO_ALIAS(X509_STORE_new); |
221 | 221 | ||
222 | X509_OBJECT * | 222 | X509_OBJECT * |
223 | X509_OBJECT_new(void) | 223 | X509_OBJECT_new(void) |
@@ -233,7 +233,7 @@ X509_OBJECT_new(void) | |||
233 | 233 | ||
234 | return obj; | 234 | return obj; |
235 | } | 235 | } |
236 | LCRYPTO_ALIAS(X509_OBJECT_new) | 236 | LCRYPTO_ALIAS(X509_OBJECT_new); |
237 | 237 | ||
238 | void | 238 | void |
239 | X509_OBJECT_free(X509_OBJECT *a) | 239 | X509_OBJECT_free(X509_OBJECT *a) |
@@ -252,7 +252,7 @@ X509_OBJECT_free(X509_OBJECT *a) | |||
252 | 252 | ||
253 | free(a); | 253 | free(a); |
254 | } | 254 | } |
255 | LCRYPTO_ALIAS(X509_OBJECT_free) | 255 | LCRYPTO_ALIAS(X509_OBJECT_free); |
256 | 256 | ||
257 | void | 257 | void |
258 | X509_STORE_free(X509_STORE *store) | 258 | X509_STORE_free(X509_STORE *store) |
@@ -280,14 +280,14 @@ X509_STORE_free(X509_STORE *store) | |||
280 | X509_VERIFY_PARAM_free(store->param); | 280 | X509_VERIFY_PARAM_free(store->param); |
281 | free(store); | 281 | free(store); |
282 | } | 282 | } |
283 | LCRYPTO_ALIAS(X509_STORE_free) | 283 | LCRYPTO_ALIAS(X509_STORE_free); |
284 | 284 | ||
285 | int | 285 | int |
286 | X509_STORE_up_ref(X509_STORE *store) | 286 | X509_STORE_up_ref(X509_STORE *store) |
287 | { | 287 | { |
288 | return CRYPTO_add(&store->references, 1, CRYPTO_LOCK_X509_STORE) > 1; | 288 | return CRYPTO_add(&store->references, 1, CRYPTO_LOCK_X509_STORE) > 1; |
289 | } | 289 | } |
290 | LCRYPTO_ALIAS(X509_STORE_up_ref) | 290 | LCRYPTO_ALIAS(X509_STORE_up_ref); |
291 | 291 | ||
292 | X509_LOOKUP * | 292 | X509_LOOKUP * |
293 | X509_STORE_add_lookup(X509_STORE *store, X509_LOOKUP_METHOD *method) | 293 | X509_STORE_add_lookup(X509_STORE *store, X509_LOOKUP_METHOD *method) |
@@ -316,7 +316,7 @@ X509_STORE_add_lookup(X509_STORE *store, X509_LOOKUP_METHOD *method) | |||
316 | 316 | ||
317 | return lu; | 317 | return lu; |
318 | } | 318 | } |
319 | LCRYPTO_ALIAS(X509_STORE_add_lookup) | 319 | LCRYPTO_ALIAS(X509_STORE_add_lookup); |
320 | 320 | ||
321 | X509_OBJECT * | 321 | X509_OBJECT * |
322 | X509_STORE_CTX_get_obj_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type, | 322 | X509_STORE_CTX_get_obj_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type, |
@@ -333,7 +333,7 @@ X509_STORE_CTX_get_obj_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type, | |||
333 | 333 | ||
334 | return obj; | 334 | return obj; |
335 | } | 335 | } |
336 | LCRYPTO_ALIAS(X509_STORE_CTX_get_obj_by_subject) | 336 | LCRYPTO_ALIAS(X509_STORE_CTX_get_obj_by_subject); |
337 | 337 | ||
338 | int | 338 | int |
339 | X509_STORE_CTX_get_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type, | 339 | X509_STORE_CTX_get_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type, |
@@ -372,7 +372,7 @@ X509_STORE_CTX_get_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type, | |||
372 | 372 | ||
373 | return 1; | 373 | return 1; |
374 | } | 374 | } |
375 | LCRYPTO_ALIAS(X509_STORE_CTX_get_by_subject) | 375 | LCRYPTO_ALIAS(X509_STORE_CTX_get_by_subject); |
376 | 376 | ||
377 | /* Add obj to the store. Takes ownership of obj. */ | 377 | /* Add obj to the store. Takes ownership of obj. */ |
378 | static int | 378 | static int |
@@ -424,7 +424,7 @@ X509_STORE_add_cert(X509_STORE *store, X509 *x) | |||
424 | 424 | ||
425 | return X509_STORE_add_object(store, obj); | 425 | return X509_STORE_add_object(store, obj); |
426 | } | 426 | } |
427 | LCRYPTO_ALIAS(X509_STORE_add_cert) | 427 | LCRYPTO_ALIAS(X509_STORE_add_cert); |
428 | 428 | ||
429 | int | 429 | int |
430 | X509_STORE_add_crl(X509_STORE *store, X509_CRL *x) | 430 | X509_STORE_add_crl(X509_STORE *store, X509_CRL *x) |
@@ -447,7 +447,7 @@ X509_STORE_add_crl(X509_STORE *store, X509_CRL *x) | |||
447 | 447 | ||
448 | return X509_STORE_add_object(store, obj); | 448 | return X509_STORE_add_object(store, obj); |
449 | } | 449 | } |
450 | LCRYPTO_ALIAS(X509_STORE_add_crl) | 450 | LCRYPTO_ALIAS(X509_STORE_add_crl); |
451 | 451 | ||
452 | int | 452 | int |
453 | X509_OBJECT_up_ref_count(X509_OBJECT *a) | 453 | X509_OBJECT_up_ref_count(X509_OBJECT *a) |
@@ -460,14 +460,14 @@ X509_OBJECT_up_ref_count(X509_OBJECT *a) | |||
460 | } | 460 | } |
461 | return 1; | 461 | return 1; |
462 | } | 462 | } |
463 | LCRYPTO_ALIAS(X509_OBJECT_up_ref_count) | 463 | LCRYPTO_ALIAS(X509_OBJECT_up_ref_count); |
464 | 464 | ||
465 | X509_LOOKUP_TYPE | 465 | X509_LOOKUP_TYPE |
466 | X509_OBJECT_get_type(const X509_OBJECT *a) | 466 | X509_OBJECT_get_type(const X509_OBJECT *a) |
467 | { | 467 | { |
468 | return a->type; | 468 | return a->type; |
469 | } | 469 | } |
470 | LCRYPTO_ALIAS(X509_OBJECT_get_type) | 470 | LCRYPTO_ALIAS(X509_OBJECT_get_type); |
471 | 471 | ||
472 | static int | 472 | static int |
473 | x509_object_idx_cnt(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type, | 473 | x509_object_idx_cnt(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type, |
@@ -519,7 +519,7 @@ X509_OBJECT_idx_by_subject(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type, | |||
519 | { | 519 | { |
520 | return x509_object_idx_cnt(h, type, name, NULL); | 520 | return x509_object_idx_cnt(h, type, name, NULL); |
521 | } | 521 | } |
522 | LCRYPTO_ALIAS(X509_OBJECT_idx_by_subject) | 522 | LCRYPTO_ALIAS(X509_OBJECT_idx_by_subject); |
523 | 523 | ||
524 | X509_OBJECT * | 524 | X509_OBJECT * |
525 | X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type, | 525 | X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type, |
@@ -532,7 +532,7 @@ X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type, | |||
532 | return NULL; | 532 | return NULL; |
533 | return sk_X509_OBJECT_value(h, idx); | 533 | return sk_X509_OBJECT_value(h, idx); |
534 | } | 534 | } |
535 | LCRYPTO_ALIAS(X509_OBJECT_retrieve_by_subject) | 535 | LCRYPTO_ALIAS(X509_OBJECT_retrieve_by_subject); |
536 | 536 | ||
537 | X509 * | 537 | X509 * |
538 | X509_OBJECT_get0_X509(const X509_OBJECT *xo) | 538 | X509_OBJECT_get0_X509(const X509_OBJECT *xo) |
@@ -541,7 +541,7 @@ X509_OBJECT_get0_X509(const X509_OBJECT *xo) | |||
541 | return xo->data.x509; | 541 | return xo->data.x509; |
542 | return NULL; | 542 | return NULL; |
543 | } | 543 | } |
544 | LCRYPTO_ALIAS(X509_OBJECT_get0_X509) | 544 | LCRYPTO_ALIAS(X509_OBJECT_get0_X509); |
545 | 545 | ||
546 | X509_CRL * | 546 | X509_CRL * |
547 | X509_OBJECT_get0_X509_CRL(X509_OBJECT *xo) | 547 | X509_OBJECT_get0_X509_CRL(X509_OBJECT *xo) |
@@ -550,7 +550,7 @@ X509_OBJECT_get0_X509_CRL(X509_OBJECT *xo) | |||
550 | return xo->data.crl; | 550 | return xo->data.crl; |
551 | return NULL; | 551 | return NULL; |
552 | } | 552 | } |
553 | LCRYPTO_ALIAS(X509_OBJECT_get0_X509_CRL) | 553 | LCRYPTO_ALIAS(X509_OBJECT_get0_X509_CRL); |
554 | 554 | ||
555 | static STACK_OF(X509) * | 555 | static STACK_OF(X509) * |
556 | X509_get1_certs_from_cache(X509_STORE *store, X509_NAME *name) | 556 | X509_get1_certs_from_cache(X509_STORE *store, X509_NAME *name) |
@@ -614,7 +614,7 @@ X509_STORE_get1_certs(X509_STORE_CTX *ctx, X509_NAME *name) | |||
614 | 614 | ||
615 | return X509_get1_certs_from_cache(store, name); | 615 | return X509_get1_certs_from_cache(store, name); |
616 | } | 616 | } |
617 | LCRYPTO_ALIAS(X509_STORE_get1_certs) | 617 | LCRYPTO_ALIAS(X509_STORE_get1_certs); |
618 | 618 | ||
619 | STACK_OF(X509_CRL) * | 619 | STACK_OF(X509_CRL) * |
620 | X509_STORE_get1_crls(X509_STORE_CTX *ctx, X509_NAME *name) | 620 | X509_STORE_get1_crls(X509_STORE_CTX *ctx, X509_NAME *name) |
@@ -665,7 +665,7 @@ X509_STORE_get1_crls(X509_STORE_CTX *ctx, X509_NAME *name) | |||
665 | sk_X509_CRL_pop_free(sk, X509_CRL_free); | 665 | sk_X509_CRL_pop_free(sk, X509_CRL_free); |
666 | return NULL; | 666 | return NULL; |
667 | } | 667 | } |
668 | LCRYPTO_ALIAS(X509_STORE_get1_crls) | 668 | LCRYPTO_ALIAS(X509_STORE_get1_crls); |
669 | 669 | ||
670 | X509_OBJECT * | 670 | X509_OBJECT * |
671 | X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h, X509_OBJECT *x) | 671 | X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h, X509_OBJECT *x) |
@@ -694,7 +694,7 @@ X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h, X509_OBJECT *x) | |||
694 | } | 694 | } |
695 | return NULL; | 695 | return NULL; |
696 | } | 696 | } |
697 | LCRYPTO_ALIAS(X509_OBJECT_retrieve_match) | 697 | LCRYPTO_ALIAS(X509_OBJECT_retrieve_match); |
698 | 698 | ||
699 | /* Try to get issuer certificate from store. Due to limitations | 699 | /* Try to get issuer certificate from store. Due to limitations |
700 | * of the API this can only retrieve a single certificate matching | 700 | * of the API this can only retrieve a single certificate matching |
@@ -785,35 +785,35 @@ X509_STORE_CTX_get1_issuer(X509 **out_issuer, X509_STORE_CTX *ctx, X509 *x) | |||
785 | CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE); | 785 | CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE); |
786 | return ret; | 786 | return ret; |
787 | } | 787 | } |
788 | LCRYPTO_ALIAS(X509_STORE_CTX_get1_issuer) | 788 | LCRYPTO_ALIAS(X509_STORE_CTX_get1_issuer); |
789 | 789 | ||
790 | STACK_OF(X509_OBJECT) * | 790 | STACK_OF(X509_OBJECT) * |
791 | X509_STORE_get0_objects(X509_STORE *xs) | 791 | X509_STORE_get0_objects(X509_STORE *xs) |
792 | { | 792 | { |
793 | return xs->objs; | 793 | return xs->objs; |
794 | } | 794 | } |
795 | LCRYPTO_ALIAS(X509_STORE_get0_objects) | 795 | LCRYPTO_ALIAS(X509_STORE_get0_objects); |
796 | 796 | ||
797 | void * | 797 | void * |
798 | X509_STORE_get_ex_data(X509_STORE *xs, int idx) | 798 | X509_STORE_get_ex_data(X509_STORE *xs, int idx) |
799 | { | 799 | { |
800 | return CRYPTO_get_ex_data(&xs->ex_data, idx); | 800 | return CRYPTO_get_ex_data(&xs->ex_data, idx); |
801 | } | 801 | } |
802 | LCRYPTO_ALIAS(X509_STORE_get_ex_data) | 802 | LCRYPTO_ALIAS(X509_STORE_get_ex_data); |
803 | 803 | ||
804 | int | 804 | int |
805 | X509_STORE_set_ex_data(X509_STORE *xs, int idx, void *data) | 805 | X509_STORE_set_ex_data(X509_STORE *xs, int idx, void *data) |
806 | { | 806 | { |
807 | return CRYPTO_set_ex_data(&xs->ex_data, idx, data); | 807 | return CRYPTO_set_ex_data(&xs->ex_data, idx, data); |
808 | } | 808 | } |
809 | LCRYPTO_ALIAS(X509_STORE_set_ex_data) | 809 | LCRYPTO_ALIAS(X509_STORE_set_ex_data); |
810 | 810 | ||
811 | int | 811 | int |
812 | X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags) | 812 | X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags) |
813 | { | 813 | { |
814 | return X509_VERIFY_PARAM_set_flags(ctx->param, flags); | 814 | return X509_VERIFY_PARAM_set_flags(ctx->param, flags); |
815 | } | 815 | } |
816 | LCRYPTO_ALIAS(X509_STORE_set_flags) | 816 | LCRYPTO_ALIAS(X509_STORE_set_flags); |
817 | 817 | ||
818 | int | 818 | int |
819 | X509_STORE_set_depth(X509_STORE *ctx, int depth) | 819 | X509_STORE_set_depth(X509_STORE *ctx, int depth) |
@@ -821,60 +821,60 @@ X509_STORE_set_depth(X509_STORE *ctx, int depth) | |||
821 | X509_VERIFY_PARAM_set_depth(ctx->param, depth); | 821 | X509_VERIFY_PARAM_set_depth(ctx->param, depth); |
822 | return 1; | 822 | return 1; |
823 | } | 823 | } |
824 | LCRYPTO_ALIAS(X509_STORE_set_depth) | 824 | LCRYPTO_ALIAS(X509_STORE_set_depth); |
825 | 825 | ||
826 | int | 826 | int |
827 | X509_STORE_set_purpose(X509_STORE *ctx, int purpose) | 827 | X509_STORE_set_purpose(X509_STORE *ctx, int purpose) |
828 | { | 828 | { |
829 | return X509_VERIFY_PARAM_set_purpose(ctx->param, purpose); | 829 | return X509_VERIFY_PARAM_set_purpose(ctx->param, purpose); |
830 | } | 830 | } |
831 | LCRYPTO_ALIAS(X509_STORE_set_purpose) | 831 | LCRYPTO_ALIAS(X509_STORE_set_purpose); |
832 | 832 | ||
833 | int | 833 | int |
834 | X509_STORE_set_trust(X509_STORE *ctx, int trust) | 834 | X509_STORE_set_trust(X509_STORE *ctx, int trust) |
835 | { | 835 | { |
836 | return X509_VERIFY_PARAM_set_trust(ctx->param, trust); | 836 | return X509_VERIFY_PARAM_set_trust(ctx->param, trust); |
837 | } | 837 | } |
838 | LCRYPTO_ALIAS(X509_STORE_set_trust) | 838 | LCRYPTO_ALIAS(X509_STORE_set_trust); |
839 | 839 | ||
840 | int | 840 | int |
841 | X509_STORE_set1_param(X509_STORE *ctx, X509_VERIFY_PARAM *param) | 841 | X509_STORE_set1_param(X509_STORE *ctx, X509_VERIFY_PARAM *param) |
842 | { | 842 | { |
843 | return X509_VERIFY_PARAM_set1(ctx->param, param); | 843 | return X509_VERIFY_PARAM_set1(ctx->param, param); |
844 | } | 844 | } |
845 | LCRYPTO_ALIAS(X509_STORE_set1_param) | 845 | LCRYPTO_ALIAS(X509_STORE_set1_param); |
846 | 846 | ||
847 | X509_VERIFY_PARAM * | 847 | X509_VERIFY_PARAM * |
848 | X509_STORE_get0_param(X509_STORE *ctx) | 848 | X509_STORE_get0_param(X509_STORE *ctx) |
849 | { | 849 | { |
850 | return ctx->param; | 850 | return ctx->param; |
851 | } | 851 | } |
852 | LCRYPTO_ALIAS(X509_STORE_get0_param) | 852 | LCRYPTO_ALIAS(X509_STORE_get0_param); |
853 | 853 | ||
854 | void | 854 | void |
855 | X509_STORE_set_verify(X509_STORE *store, X509_STORE_CTX_verify_fn verify) | 855 | X509_STORE_set_verify(X509_STORE *store, X509_STORE_CTX_verify_fn verify) |
856 | { | 856 | { |
857 | store->verify = verify; | 857 | store->verify = verify; |
858 | } | 858 | } |
859 | LCRYPTO_ALIAS(X509_STORE_set_verify) | 859 | LCRYPTO_ALIAS(X509_STORE_set_verify); |
860 | 860 | ||
861 | X509_STORE_CTX_verify_fn | 861 | X509_STORE_CTX_verify_fn |
862 | X509_STORE_get_verify(X509_STORE *store) | 862 | X509_STORE_get_verify(X509_STORE *store) |
863 | { | 863 | { |
864 | return store->verify; | 864 | return store->verify; |
865 | } | 865 | } |
866 | LCRYPTO_ALIAS(X509_STORE_get_verify) | 866 | LCRYPTO_ALIAS(X509_STORE_get_verify); |
867 | 867 | ||
868 | void | 868 | void |
869 | X509_STORE_set_verify_cb(X509_STORE *store, X509_STORE_CTX_verify_cb verify_cb) | 869 | X509_STORE_set_verify_cb(X509_STORE *store, X509_STORE_CTX_verify_cb verify_cb) |
870 | { | 870 | { |
871 | store->verify_cb = verify_cb; | 871 | store->verify_cb = verify_cb; |
872 | } | 872 | } |
873 | LCRYPTO_ALIAS(X509_STORE_set_verify_cb) | 873 | LCRYPTO_ALIAS(X509_STORE_set_verify_cb); |
874 | 874 | ||
875 | X509_STORE_CTX_verify_cb | 875 | X509_STORE_CTX_verify_cb |
876 | X509_STORE_get_verify_cb(X509_STORE *store) | 876 | X509_STORE_get_verify_cb(X509_STORE *store) |
877 | { | 877 | { |
878 | return store->verify_cb; | 878 | return store->verify_cb; |
879 | } | 879 | } |
880 | LCRYPTO_ALIAS(X509_STORE_get_verify_cb) | 880 | LCRYPTO_ALIAS(X509_STORE_get_verify_cb); |
diff --git a/src/lib/libcrypto/x509/x509_ncons.c b/src/lib/libcrypto/x509/x509_ncons.c index c7e4e6ed9f..159e3c2563 100644 --- a/src/lib/libcrypto/x509/x509_ncons.c +++ b/src/lib/libcrypto/x509/x509_ncons.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_ncons.c,v 1.8 2022/12/26 07:18:53 jmc Exp $ */ | 1 | /* $OpenBSD: x509_ncons.c,v 1.9 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -165,28 +165,28 @@ GENERAL_SUBTREE_new(void) | |||
165 | { | 165 | { |
166 | return (GENERAL_SUBTREE*)ASN1_item_new(&GENERAL_SUBTREE_it); | 166 | return (GENERAL_SUBTREE*)ASN1_item_new(&GENERAL_SUBTREE_it); |
167 | } | 167 | } |
168 | LCRYPTO_ALIAS(GENERAL_SUBTREE_new) | 168 | LCRYPTO_ALIAS(GENERAL_SUBTREE_new); |
169 | 169 | ||
170 | void | 170 | void |
171 | GENERAL_SUBTREE_free(GENERAL_SUBTREE *a) | 171 | GENERAL_SUBTREE_free(GENERAL_SUBTREE *a) |
172 | { | 172 | { |
173 | ASN1_item_free((ASN1_VALUE *)a, &GENERAL_SUBTREE_it); | 173 | ASN1_item_free((ASN1_VALUE *)a, &GENERAL_SUBTREE_it); |
174 | } | 174 | } |
175 | LCRYPTO_ALIAS(GENERAL_SUBTREE_free) | 175 | LCRYPTO_ALIAS(GENERAL_SUBTREE_free); |
176 | 176 | ||
177 | NAME_CONSTRAINTS * | 177 | NAME_CONSTRAINTS * |
178 | NAME_CONSTRAINTS_new(void) | 178 | NAME_CONSTRAINTS_new(void) |
179 | { | 179 | { |
180 | return (NAME_CONSTRAINTS*)ASN1_item_new(&NAME_CONSTRAINTS_it); | 180 | return (NAME_CONSTRAINTS*)ASN1_item_new(&NAME_CONSTRAINTS_it); |
181 | } | 181 | } |
182 | LCRYPTO_ALIAS(NAME_CONSTRAINTS_new) | 182 | LCRYPTO_ALIAS(NAME_CONSTRAINTS_new); |
183 | 183 | ||
184 | void | 184 | void |
185 | NAME_CONSTRAINTS_free(NAME_CONSTRAINTS *a) | 185 | NAME_CONSTRAINTS_free(NAME_CONSTRAINTS *a) |
186 | { | 186 | { |
187 | ASN1_item_free((ASN1_VALUE *)a, &NAME_CONSTRAINTS_it); | 187 | ASN1_item_free((ASN1_VALUE *)a, &NAME_CONSTRAINTS_it); |
188 | } | 188 | } |
189 | LCRYPTO_ALIAS(NAME_CONSTRAINTS_free) | 189 | LCRYPTO_ALIAS(NAME_CONSTRAINTS_free); |
190 | 190 | ||
191 | static void * | 191 | static void * |
192 | v2i_NAME_CONSTRAINTS(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | 192 | v2i_NAME_CONSTRAINTS(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
@@ -353,7 +353,7 @@ NAME_CONSTRAINTS_check(X509 *x, NAME_CONSTRAINTS *nc) | |||
353 | } | 353 | } |
354 | return X509_V_OK; | 354 | return X509_V_OK; |
355 | } | 355 | } |
356 | LCRYPTO_ALIAS(NAME_CONSTRAINTS_check) | 356 | LCRYPTO_ALIAS(NAME_CONSTRAINTS_check); |
357 | static int | 357 | static int |
358 | nc_match(GENERAL_NAME *gen, NAME_CONSTRAINTS *nc) | 358 | nc_match(GENERAL_NAME *gen, NAME_CONSTRAINTS *nc) |
359 | { | 359 | { |
diff --git a/src/lib/libcrypto/x509/x509_obj.c b/src/lib/libcrypto/x509/x509_obj.c index f9323cf5bc..ea4ae6b98a 100644 --- a/src/lib/libcrypto/x509/x509_obj.c +++ b/src/lib/libcrypto/x509/x509_obj.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_obj.c,v 1.21 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509_obj.c,v 1.22 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -179,4 +179,4 @@ err: | |||
179 | BUF_MEM_free(b); | 179 | BUF_MEM_free(b); |
180 | return (NULL); | 180 | return (NULL); |
181 | } | 181 | } |
182 | LCRYPTO_ALIAS(X509_NAME_oneline) | 182 | LCRYPTO_ALIAS(X509_NAME_oneline); |
diff --git a/src/lib/libcrypto/x509/x509_pcia.c b/src/lib/libcrypto/x509/x509_pcia.c index fb14384e99..ec8d03a86b 100644 --- a/src/lib/libcrypto/x509/x509_pcia.c +++ b/src/lib/libcrypto/x509/x509_pcia.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_pcia.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_pcia.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Contributed to the OpenSSL Project 2004 | 2 | /* Contributed to the OpenSSL Project 2004 |
3 | * by Richard Levitte (richard@levitte.org) | 3 | * by Richard Levitte (richard@levitte.org) |
4 | */ | 4 | */ |
@@ -72,28 +72,28 @@ d2i_PROXY_POLICY(PROXY_POLICY **a, const unsigned char **in, long len) | |||
72 | return (PROXY_POLICY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 72 | return (PROXY_POLICY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
73 | &PROXY_POLICY_it); | 73 | &PROXY_POLICY_it); |
74 | } | 74 | } |
75 | LCRYPTO_ALIAS(d2i_PROXY_POLICY) | 75 | LCRYPTO_ALIAS(d2i_PROXY_POLICY); |
76 | 76 | ||
77 | int | 77 | int |
78 | i2d_PROXY_POLICY(PROXY_POLICY *a, unsigned char **out) | 78 | i2d_PROXY_POLICY(PROXY_POLICY *a, unsigned char **out) |
79 | { | 79 | { |
80 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PROXY_POLICY_it); | 80 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PROXY_POLICY_it); |
81 | } | 81 | } |
82 | LCRYPTO_ALIAS(i2d_PROXY_POLICY) | 82 | LCRYPTO_ALIAS(i2d_PROXY_POLICY); |
83 | 83 | ||
84 | PROXY_POLICY * | 84 | PROXY_POLICY * |
85 | PROXY_POLICY_new(void) | 85 | PROXY_POLICY_new(void) |
86 | { | 86 | { |
87 | return (PROXY_POLICY *)ASN1_item_new(&PROXY_POLICY_it); | 87 | return (PROXY_POLICY *)ASN1_item_new(&PROXY_POLICY_it); |
88 | } | 88 | } |
89 | LCRYPTO_ALIAS(PROXY_POLICY_new) | 89 | LCRYPTO_ALIAS(PROXY_POLICY_new); |
90 | 90 | ||
91 | void | 91 | void |
92 | PROXY_POLICY_free(PROXY_POLICY *a) | 92 | PROXY_POLICY_free(PROXY_POLICY *a) |
93 | { | 93 | { |
94 | ASN1_item_free((ASN1_VALUE *)a, &PROXY_POLICY_it); | 94 | ASN1_item_free((ASN1_VALUE *)a, &PROXY_POLICY_it); |
95 | } | 95 | } |
96 | LCRYPTO_ALIAS(PROXY_POLICY_free) | 96 | LCRYPTO_ALIAS(PROXY_POLICY_free); |
97 | 97 | ||
98 | static const ASN1_TEMPLATE PROXY_CERT_INFO_EXTENSION_seq_tt[] = { | 98 | static const ASN1_TEMPLATE PROXY_CERT_INFO_EXTENSION_seq_tt[] = { |
99 | { | 99 | { |
@@ -129,25 +129,25 @@ d2i_PROXY_CERT_INFO_EXTENSION(PROXY_CERT_INFO_EXTENSION **a, const unsigned char | |||
129 | return (PROXY_CERT_INFO_EXTENSION *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 129 | return (PROXY_CERT_INFO_EXTENSION *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
130 | &PROXY_CERT_INFO_EXTENSION_it); | 130 | &PROXY_CERT_INFO_EXTENSION_it); |
131 | } | 131 | } |
132 | LCRYPTO_ALIAS(d2i_PROXY_CERT_INFO_EXTENSION) | 132 | LCRYPTO_ALIAS(d2i_PROXY_CERT_INFO_EXTENSION); |
133 | 133 | ||
134 | int | 134 | int |
135 | i2d_PROXY_CERT_INFO_EXTENSION(PROXY_CERT_INFO_EXTENSION *a, unsigned char **out) | 135 | i2d_PROXY_CERT_INFO_EXTENSION(PROXY_CERT_INFO_EXTENSION *a, unsigned char **out) |
136 | { | 136 | { |
137 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PROXY_CERT_INFO_EXTENSION_it); | 137 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PROXY_CERT_INFO_EXTENSION_it); |
138 | } | 138 | } |
139 | LCRYPTO_ALIAS(i2d_PROXY_CERT_INFO_EXTENSION) | 139 | LCRYPTO_ALIAS(i2d_PROXY_CERT_INFO_EXTENSION); |
140 | 140 | ||
141 | PROXY_CERT_INFO_EXTENSION * | 141 | PROXY_CERT_INFO_EXTENSION * |
142 | PROXY_CERT_INFO_EXTENSION_new(void) | 142 | PROXY_CERT_INFO_EXTENSION_new(void) |
143 | { | 143 | { |
144 | return (PROXY_CERT_INFO_EXTENSION *)ASN1_item_new(&PROXY_CERT_INFO_EXTENSION_it); | 144 | return (PROXY_CERT_INFO_EXTENSION *)ASN1_item_new(&PROXY_CERT_INFO_EXTENSION_it); |
145 | } | 145 | } |
146 | LCRYPTO_ALIAS(PROXY_CERT_INFO_EXTENSION_new) | 146 | LCRYPTO_ALIAS(PROXY_CERT_INFO_EXTENSION_new); |
147 | 147 | ||
148 | void | 148 | void |
149 | PROXY_CERT_INFO_EXTENSION_free(PROXY_CERT_INFO_EXTENSION *a) | 149 | PROXY_CERT_INFO_EXTENSION_free(PROXY_CERT_INFO_EXTENSION *a) |
150 | { | 150 | { |
151 | ASN1_item_free((ASN1_VALUE *)a, &PROXY_CERT_INFO_EXTENSION_it); | 151 | ASN1_item_free((ASN1_VALUE *)a, &PROXY_CERT_INFO_EXTENSION_it); |
152 | } | 152 | } |
153 | LCRYPTO_ALIAS(PROXY_CERT_INFO_EXTENSION_free) | 153 | LCRYPTO_ALIAS(PROXY_CERT_INFO_EXTENSION_free); |
diff --git a/src/lib/libcrypto/x509/x509_pcons.c b/src/lib/libcrypto/x509/x509_pcons.c index 2448147fdb..0ee935540f 100644 --- a/src/lib/libcrypto/x509/x509_pcons.c +++ b/src/lib/libcrypto/x509/x509_pcons.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_pcons.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_pcons.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -121,14 +121,14 @@ POLICY_CONSTRAINTS_new(void) | |||
121 | { | 121 | { |
122 | return (POLICY_CONSTRAINTS*)ASN1_item_new(&POLICY_CONSTRAINTS_it); | 122 | return (POLICY_CONSTRAINTS*)ASN1_item_new(&POLICY_CONSTRAINTS_it); |
123 | } | 123 | } |
124 | LCRYPTO_ALIAS(POLICY_CONSTRAINTS_new) | 124 | LCRYPTO_ALIAS(POLICY_CONSTRAINTS_new); |
125 | 125 | ||
126 | void | 126 | void |
127 | POLICY_CONSTRAINTS_free(POLICY_CONSTRAINTS *a) | 127 | POLICY_CONSTRAINTS_free(POLICY_CONSTRAINTS *a) |
128 | { | 128 | { |
129 | ASN1_item_free((ASN1_VALUE *)a, &POLICY_CONSTRAINTS_it); | 129 | ASN1_item_free((ASN1_VALUE *)a, &POLICY_CONSTRAINTS_it); |
130 | } | 130 | } |
131 | LCRYPTO_ALIAS(POLICY_CONSTRAINTS_free) | 131 | LCRYPTO_ALIAS(POLICY_CONSTRAINTS_free); |
132 | 132 | ||
133 | static STACK_OF(CONF_VALUE) * | 133 | static STACK_OF(CONF_VALUE) * |
134 | i2v_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, void *a, | 134 | i2v_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, void *a, |
diff --git a/src/lib/libcrypto/x509/x509_pku.c b/src/lib/libcrypto/x509/x509_pku.c index f65d0dfc69..dd28077de1 100644 --- a/src/lib/libcrypto/x509/x509_pku.c +++ b/src/lib/libcrypto/x509/x509_pku.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_pku.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_pku.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -116,28 +116,28 @@ d2i_PKEY_USAGE_PERIOD(PKEY_USAGE_PERIOD **a, const unsigned char **in, long len) | |||
116 | return (PKEY_USAGE_PERIOD *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 116 | return (PKEY_USAGE_PERIOD *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
117 | &PKEY_USAGE_PERIOD_it); | 117 | &PKEY_USAGE_PERIOD_it); |
118 | } | 118 | } |
119 | LCRYPTO_ALIAS(d2i_PKEY_USAGE_PERIOD) | 119 | LCRYPTO_ALIAS(d2i_PKEY_USAGE_PERIOD); |
120 | 120 | ||
121 | int | 121 | int |
122 | i2d_PKEY_USAGE_PERIOD(PKEY_USAGE_PERIOD *a, unsigned char **out) | 122 | i2d_PKEY_USAGE_PERIOD(PKEY_USAGE_PERIOD *a, unsigned char **out) |
123 | { | 123 | { |
124 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKEY_USAGE_PERIOD_it); | 124 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKEY_USAGE_PERIOD_it); |
125 | } | 125 | } |
126 | LCRYPTO_ALIAS(i2d_PKEY_USAGE_PERIOD) | 126 | LCRYPTO_ALIAS(i2d_PKEY_USAGE_PERIOD); |
127 | 127 | ||
128 | PKEY_USAGE_PERIOD * | 128 | PKEY_USAGE_PERIOD * |
129 | PKEY_USAGE_PERIOD_new(void) | 129 | PKEY_USAGE_PERIOD_new(void) |
130 | { | 130 | { |
131 | return (PKEY_USAGE_PERIOD *)ASN1_item_new(&PKEY_USAGE_PERIOD_it); | 131 | return (PKEY_USAGE_PERIOD *)ASN1_item_new(&PKEY_USAGE_PERIOD_it); |
132 | } | 132 | } |
133 | LCRYPTO_ALIAS(PKEY_USAGE_PERIOD_new) | 133 | LCRYPTO_ALIAS(PKEY_USAGE_PERIOD_new); |
134 | 134 | ||
135 | void | 135 | void |
136 | PKEY_USAGE_PERIOD_free(PKEY_USAGE_PERIOD *a) | 136 | PKEY_USAGE_PERIOD_free(PKEY_USAGE_PERIOD *a) |
137 | { | 137 | { |
138 | ASN1_item_free((ASN1_VALUE *)a, &PKEY_USAGE_PERIOD_it); | 138 | ASN1_item_free((ASN1_VALUE *)a, &PKEY_USAGE_PERIOD_it); |
139 | } | 139 | } |
140 | LCRYPTO_ALIAS(PKEY_USAGE_PERIOD_free) | 140 | LCRYPTO_ALIAS(PKEY_USAGE_PERIOD_free); |
141 | 141 | ||
142 | static int | 142 | static int |
143 | i2r_PKEY_USAGE_PERIOD(X509V3_EXT_METHOD *method, PKEY_USAGE_PERIOD *usage, | 143 | i2r_PKEY_USAGE_PERIOD(X509V3_EXT_METHOD *method, PKEY_USAGE_PERIOD *usage, |
diff --git a/src/lib/libcrypto/x509/x509_pmaps.c b/src/lib/libcrypto/x509/x509_pmaps.c index 3bc4b9d637..39aebfee86 100644 --- a/src/lib/libcrypto/x509/x509_pmaps.c +++ b/src/lib/libcrypto/x509/x509_pmaps.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_pmaps.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_pmaps.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -137,14 +137,14 @@ POLICY_MAPPING_new(void) | |||
137 | { | 137 | { |
138 | return (POLICY_MAPPING*)ASN1_item_new(&POLICY_MAPPING_it); | 138 | return (POLICY_MAPPING*)ASN1_item_new(&POLICY_MAPPING_it); |
139 | } | 139 | } |
140 | LCRYPTO_ALIAS(POLICY_MAPPING_new) | 140 | LCRYPTO_ALIAS(POLICY_MAPPING_new); |
141 | 141 | ||
142 | void | 142 | void |
143 | POLICY_MAPPING_free(POLICY_MAPPING *a) | 143 | POLICY_MAPPING_free(POLICY_MAPPING *a) |
144 | { | 144 | { |
145 | ASN1_item_free((ASN1_VALUE *)a, &POLICY_MAPPING_it); | 145 | ASN1_item_free((ASN1_VALUE *)a, &POLICY_MAPPING_it); |
146 | } | 146 | } |
147 | LCRYPTO_ALIAS(POLICY_MAPPING_free) | 147 | LCRYPTO_ALIAS(POLICY_MAPPING_free); |
148 | 148 | ||
149 | static STACK_OF(CONF_VALUE) * | 149 | static STACK_OF(CONF_VALUE) * |
150 | i2v_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method, void *a, | 150 | i2v_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method, void *a, |
diff --git a/src/lib/libcrypto/x509/x509_prn.c b/src/lib/libcrypto/x509/x509_prn.c index 89cd555fc5..2d7afb9fcc 100644 --- a/src/lib/libcrypto/x509/x509_prn.c +++ b/src/lib/libcrypto/x509/x509_prn.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_prn.c,v 1.4 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509_prn.c,v 1.5 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -99,7 +99,7 @@ X509V3_EXT_val_prn(BIO *out, STACK_OF(CONF_VALUE) *val, int indent, int ml) | |||
99 | BIO_puts(out, "\n"); | 99 | BIO_puts(out, "\n"); |
100 | } | 100 | } |
101 | } | 101 | } |
102 | LCRYPTO_ALIAS(X509V3_EXT_val_prn) | 102 | LCRYPTO_ALIAS(X509V3_EXT_val_prn); |
103 | 103 | ||
104 | /* Main routine: print out a general extension */ | 104 | /* Main routine: print out a general extension */ |
105 | 105 | ||
@@ -153,7 +153,7 @@ err: | |||
153 | method->ext_free(ext_str); | 153 | method->ext_free(ext_str); |
154 | return ok; | 154 | return ok; |
155 | } | 155 | } |
156 | LCRYPTO_ALIAS(X509V3_EXT_print) | 156 | LCRYPTO_ALIAS(X509V3_EXT_print); |
157 | 157 | ||
158 | int | 158 | int |
159 | X509V3_extensions_print(BIO *bp, const char *title, | 159 | X509V3_extensions_print(BIO *bp, const char *title, |
@@ -189,7 +189,7 @@ X509V3_extensions_print(BIO *bp, const char *title, | |||
189 | } | 189 | } |
190 | return 1; | 190 | return 1; |
191 | } | 191 | } |
192 | LCRYPTO_ALIAS(X509V3_extensions_print) | 192 | LCRYPTO_ALIAS(X509V3_extensions_print); |
193 | 193 | ||
194 | static int | 194 | static int |
195 | unknown_ext_print(BIO *out, X509_EXTENSION *ext, unsigned long flag, | 195 | unknown_ext_print(BIO *out, X509_EXTENSION *ext, unsigned long flag, |
@@ -228,4 +228,4 @@ X509V3_EXT_print_fp(FILE *fp, X509_EXTENSION *ext, int flag, int indent) | |||
228 | BIO_free(bio_tmp); | 228 | BIO_free(bio_tmp); |
229 | return ret; | 229 | return ret; |
230 | } | 230 | } |
231 | LCRYPTO_ALIAS(X509V3_EXT_print_fp) | 231 | LCRYPTO_ALIAS(X509V3_EXT_print_fp); |
diff --git a/src/lib/libcrypto/x509/x509_purp.c b/src/lib/libcrypto/x509/x509_purp.c index 7ec986062f..63d1df2961 100644 --- a/src/lib/libcrypto/x509/x509_purp.c +++ b/src/lib/libcrypto/x509/x509_purp.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_purp.c,v 1.19 2023/01/20 22:00:47 job Exp $ */ | 1 | /* $OpenBSD: x509_purp.c,v 1.20 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2001. | 3 | * project 2001. |
4 | */ | 4 | */ |
@@ -140,7 +140,7 @@ X509_check_purpose(X509 *x, int id, int ca) | |||
140 | pt = X509_PURPOSE_get0(idx); | 140 | pt = X509_PURPOSE_get0(idx); |
141 | return pt->check_purpose(pt, x, ca); | 141 | return pt->check_purpose(pt, x, ca); |
142 | } | 142 | } |
143 | LCRYPTO_ALIAS(X509_check_purpose) | 143 | LCRYPTO_ALIAS(X509_check_purpose); |
144 | 144 | ||
145 | int | 145 | int |
146 | X509_PURPOSE_set(int *p, int purpose) | 146 | X509_PURPOSE_set(int *p, int purpose) |
@@ -152,7 +152,7 @@ X509_PURPOSE_set(int *p, int purpose) | |||
152 | *p = purpose; | 152 | *p = purpose; |
153 | return 1; | 153 | return 1; |
154 | } | 154 | } |
155 | LCRYPTO_ALIAS(X509_PURPOSE_set) | 155 | LCRYPTO_ALIAS(X509_PURPOSE_set); |
156 | 156 | ||
157 | int | 157 | int |
158 | X509_PURPOSE_get_count(void) | 158 | X509_PURPOSE_get_count(void) |
@@ -161,7 +161,7 @@ X509_PURPOSE_get_count(void) | |||
161 | return X509_PURPOSE_COUNT; | 161 | return X509_PURPOSE_COUNT; |
162 | return sk_X509_PURPOSE_num(xptable) + X509_PURPOSE_COUNT; | 162 | return sk_X509_PURPOSE_num(xptable) + X509_PURPOSE_COUNT; |
163 | } | 163 | } |
164 | LCRYPTO_ALIAS(X509_PURPOSE_get_count) | 164 | LCRYPTO_ALIAS(X509_PURPOSE_get_count); |
165 | 165 | ||
166 | X509_PURPOSE * | 166 | X509_PURPOSE * |
167 | X509_PURPOSE_get0(int idx) | 167 | X509_PURPOSE_get0(int idx) |
@@ -172,7 +172,7 @@ X509_PURPOSE_get0(int idx) | |||
172 | return xstandard + idx; | 172 | return xstandard + idx; |
173 | return sk_X509_PURPOSE_value(xptable, idx - X509_PURPOSE_COUNT); | 173 | return sk_X509_PURPOSE_value(xptable, idx - X509_PURPOSE_COUNT); |
174 | } | 174 | } |
175 | LCRYPTO_ALIAS(X509_PURPOSE_get0) | 175 | LCRYPTO_ALIAS(X509_PURPOSE_get0); |
176 | 176 | ||
177 | int | 177 | int |
178 | X509_PURPOSE_get_by_sname(const char *sname) | 178 | X509_PURPOSE_get_by_sname(const char *sname) |
@@ -187,7 +187,7 @@ X509_PURPOSE_get_by_sname(const char *sname) | |||
187 | } | 187 | } |
188 | return -1; | 188 | return -1; |
189 | } | 189 | } |
190 | LCRYPTO_ALIAS(X509_PURPOSE_get_by_sname) | 190 | LCRYPTO_ALIAS(X509_PURPOSE_get_by_sname); |
191 | 191 | ||
192 | int | 192 | int |
193 | X509_PURPOSE_get_by_id(int purpose) | 193 | X509_PURPOSE_get_by_id(int purpose) |
@@ -205,7 +205,7 @@ X509_PURPOSE_get_by_id(int purpose) | |||
205 | return -1; | 205 | return -1; |
206 | return idx + X509_PURPOSE_COUNT; | 206 | return idx + X509_PURPOSE_COUNT; |
207 | } | 207 | } |
208 | LCRYPTO_ALIAS(X509_PURPOSE_get_by_id) | 208 | LCRYPTO_ALIAS(X509_PURPOSE_get_by_id); |
209 | 209 | ||
210 | int | 210 | int |
211 | X509_PURPOSE_add(int id, int trust, int flags, | 211 | X509_PURPOSE_add(int id, int trust, int flags, |
@@ -280,7 +280,7 @@ err: | |||
280 | X509V3error(ERR_R_MALLOC_FAILURE); | 280 | X509V3error(ERR_R_MALLOC_FAILURE); |
281 | return 0; | 281 | return 0; |
282 | } | 282 | } |
283 | LCRYPTO_ALIAS(X509_PURPOSE_add) | 283 | LCRYPTO_ALIAS(X509_PURPOSE_add); |
284 | 284 | ||
285 | static void | 285 | static void |
286 | xptable_free(X509_PURPOSE *p) | 286 | xptable_free(X509_PURPOSE *p) |
@@ -302,35 +302,35 @@ X509_PURPOSE_cleanup(void) | |||
302 | sk_X509_PURPOSE_pop_free(xptable, xptable_free); | 302 | sk_X509_PURPOSE_pop_free(xptable, xptable_free); |
303 | xptable = NULL; | 303 | xptable = NULL; |
304 | } | 304 | } |
305 | LCRYPTO_ALIAS(X509_PURPOSE_cleanup) | 305 | LCRYPTO_ALIAS(X509_PURPOSE_cleanup); |
306 | 306 | ||
307 | int | 307 | int |
308 | X509_PURPOSE_get_id(const X509_PURPOSE *xp) | 308 | X509_PURPOSE_get_id(const X509_PURPOSE *xp) |
309 | { | 309 | { |
310 | return xp->purpose; | 310 | return xp->purpose; |
311 | } | 311 | } |
312 | LCRYPTO_ALIAS(X509_PURPOSE_get_id) | 312 | LCRYPTO_ALIAS(X509_PURPOSE_get_id); |
313 | 313 | ||
314 | char * | 314 | char * |
315 | X509_PURPOSE_get0_name(const X509_PURPOSE *xp) | 315 | X509_PURPOSE_get0_name(const X509_PURPOSE *xp) |
316 | { | 316 | { |
317 | return xp->name; | 317 | return xp->name; |
318 | } | 318 | } |
319 | LCRYPTO_ALIAS(X509_PURPOSE_get0_name) | 319 | LCRYPTO_ALIAS(X509_PURPOSE_get0_name); |
320 | 320 | ||
321 | char * | 321 | char * |
322 | X509_PURPOSE_get0_sname(const X509_PURPOSE *xp) | 322 | X509_PURPOSE_get0_sname(const X509_PURPOSE *xp) |
323 | { | 323 | { |
324 | return xp->sname; | 324 | return xp->sname; |
325 | } | 325 | } |
326 | LCRYPTO_ALIAS(X509_PURPOSE_get0_sname) | 326 | LCRYPTO_ALIAS(X509_PURPOSE_get0_sname); |
327 | 327 | ||
328 | int | 328 | int |
329 | X509_PURPOSE_get_trust(const X509_PURPOSE *xp) | 329 | X509_PURPOSE_get_trust(const X509_PURPOSE *xp) |
330 | { | 330 | { |
331 | return xp->trust; | 331 | return xp->trust; |
332 | } | 332 | } |
333 | LCRYPTO_ALIAS(X509_PURPOSE_get_trust) | 333 | LCRYPTO_ALIAS(X509_PURPOSE_get_trust); |
334 | 334 | ||
335 | static int | 335 | static int |
336 | nid_cmp(const int *a, const int *b) | 336 | nid_cmp(const int *a, const int *b) |
@@ -396,7 +396,7 @@ X509_supported_extension(X509_EXTENSION *ex) | |||
396 | return 1; | 396 | return 1; |
397 | return 0; | 397 | return 0; |
398 | } | 398 | } |
399 | LCRYPTO_ALIAS(X509_supported_extension) | 399 | LCRYPTO_ALIAS(X509_supported_extension); |
400 | 400 | ||
401 | static void | 401 | static void |
402 | setup_dp(X509 *x, DIST_POINT *dp) | 402 | setup_dp(X509 *x, DIST_POINT *dp) |
@@ -690,7 +690,7 @@ X509_check_ca(X509 *x) | |||
690 | 690 | ||
691 | return check_ca(x); | 691 | return check_ca(x); |
692 | } | 692 | } |
693 | LCRYPTO_ALIAS(X509_check_ca) | 693 | LCRYPTO_ALIAS(X509_check_ca); |
694 | 694 | ||
695 | /* Check SSL CA: common checks for SSL client and server */ | 695 | /* Check SSL CA: common checks for SSL client and server */ |
696 | static int | 696 | static int |
@@ -916,7 +916,7 @@ X509_check_issued(X509 *issuer, X509 *subject) | |||
916 | return X509_V_ERR_KEYUSAGE_NO_CERTSIGN; | 916 | return X509_V_ERR_KEYUSAGE_NO_CERTSIGN; |
917 | return X509_V_OK; | 917 | return X509_V_OK; |
918 | } | 918 | } |
919 | LCRYPTO_ALIAS(X509_check_issued) | 919 | LCRYPTO_ALIAS(X509_check_issued); |
920 | 920 | ||
921 | int | 921 | int |
922 | X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid) | 922 | X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid) |
@@ -956,7 +956,7 @@ X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid) | |||
956 | } | 956 | } |
957 | return X509_V_OK; | 957 | return X509_V_OK; |
958 | } | 958 | } |
959 | LCRYPTO_ALIAS(X509_check_akid) | 959 | LCRYPTO_ALIAS(X509_check_akid); |
960 | 960 | ||
961 | uint32_t | 961 | uint32_t |
962 | X509_get_extension_flags(X509 *x) | 962 | X509_get_extension_flags(X509 *x) |
@@ -967,7 +967,7 @@ X509_get_extension_flags(X509 *x) | |||
967 | 967 | ||
968 | return x->ex_flags; | 968 | return x->ex_flags; |
969 | } | 969 | } |
970 | LCRYPTO_ALIAS(X509_get_extension_flags) | 970 | LCRYPTO_ALIAS(X509_get_extension_flags); |
971 | 971 | ||
972 | uint32_t | 972 | uint32_t |
973 | X509_get_key_usage(X509 *x) | 973 | X509_get_key_usage(X509 *x) |
@@ -981,7 +981,7 @@ X509_get_key_usage(X509 *x) | |||
981 | 981 | ||
982 | return UINT32_MAX; | 982 | return UINT32_MAX; |
983 | } | 983 | } |
984 | LCRYPTO_ALIAS(X509_get_key_usage) | 984 | LCRYPTO_ALIAS(X509_get_key_usage); |
985 | 985 | ||
986 | uint32_t | 986 | uint32_t |
987 | X509_get_extended_key_usage(X509 *x) | 987 | X509_get_extended_key_usage(X509 *x) |
@@ -995,4 +995,4 @@ X509_get_extended_key_usage(X509 *x) | |||
995 | 995 | ||
996 | return UINT32_MAX; | 996 | return UINT32_MAX; |
997 | } | 997 | } |
998 | LCRYPTO_ALIAS(X509_get_extended_key_usage) | 998 | LCRYPTO_ALIAS(X509_get_extended_key_usage); |
diff --git a/src/lib/libcrypto/x509/x509_r2x.c b/src/lib/libcrypto/x509/x509_r2x.c index a8ffbdc65b..99c423d8c9 100644 --- a/src/lib/libcrypto/x509/x509_r2x.c +++ b/src/lib/libcrypto/x509/x509_r2x.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_r2x.c,v 1.15 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509_r2x.c,v 1.16 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -116,4 +116,4 @@ err: | |||
116 | X509_free(ret); | 116 | X509_free(ret); |
117 | return NULL; | 117 | return NULL; |
118 | } | 118 | } |
119 | LCRYPTO_ALIAS(X509_REQ_to_X509) | 119 | LCRYPTO_ALIAS(X509_REQ_to_X509); |
diff --git a/src/lib/libcrypto/x509/x509_req.c b/src/lib/libcrypto/x509/x509_req.c index 32415979e9..0fea7e68b4 100644 --- a/src/lib/libcrypto/x509/x509_req.c +++ b/src/lib/libcrypto/x509/x509_req.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_req.c,v 1.31 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509_req.c,v 1.32 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -115,7 +115,7 @@ err: | |||
115 | X509_REQ_free(ret); | 115 | X509_REQ_free(ret); |
116 | return (NULL); | 116 | return (NULL); |
117 | } | 117 | } |
118 | LCRYPTO_ALIAS(X509_to_X509_REQ) | 118 | LCRYPTO_ALIAS(X509_to_X509_REQ); |
119 | 119 | ||
120 | EVP_PKEY * | 120 | EVP_PKEY * |
121 | X509_REQ_get_pubkey(X509_REQ *req) | 121 | X509_REQ_get_pubkey(X509_REQ *req) |
@@ -124,7 +124,7 @@ X509_REQ_get_pubkey(X509_REQ *req) | |||
124 | return (NULL); | 124 | return (NULL); |
125 | return (X509_PUBKEY_get(req->req_info->pubkey)); | 125 | return (X509_PUBKEY_get(req->req_info->pubkey)); |
126 | } | 126 | } |
127 | LCRYPTO_ALIAS(X509_REQ_get_pubkey) | 127 | LCRYPTO_ALIAS(X509_REQ_get_pubkey); |
128 | 128 | ||
129 | EVP_PKEY * | 129 | EVP_PKEY * |
130 | X509_REQ_get0_pubkey(X509_REQ *req) | 130 | X509_REQ_get0_pubkey(X509_REQ *req) |
@@ -133,7 +133,7 @@ X509_REQ_get0_pubkey(X509_REQ *req) | |||
133 | return NULL; | 133 | return NULL; |
134 | return X509_PUBKEY_get0(req->req_info->pubkey); | 134 | return X509_PUBKEY_get0(req->req_info->pubkey); |
135 | } | 135 | } |
136 | LCRYPTO_ALIAS(X509_REQ_get0_pubkey) | 136 | LCRYPTO_ALIAS(X509_REQ_get0_pubkey); |
137 | 137 | ||
138 | int | 138 | int |
139 | X509_REQ_check_private_key(X509_REQ *x, EVP_PKEY *k) | 139 | X509_REQ_check_private_key(X509_REQ *x, EVP_PKEY *k) |
@@ -173,7 +173,7 @@ X509_REQ_check_private_key(X509_REQ *x, EVP_PKEY *k) | |||
173 | 173 | ||
174 | return (ok); | 174 | return (ok); |
175 | } | 175 | } |
176 | LCRYPTO_ALIAS(X509_REQ_check_private_key) | 176 | LCRYPTO_ALIAS(X509_REQ_check_private_key); |
177 | 177 | ||
178 | /* It seems several organisations had the same idea of including a list of | 178 | /* It seems several organisations had the same idea of including a list of |
179 | * extensions in a certificate request. There are at least two OIDs that are | 179 | * extensions in a certificate request. There are at least two OIDs that are |
@@ -197,21 +197,21 @@ X509_REQ_extension_nid(int req_nid) | |||
197 | return 1; | 197 | return 1; |
198 | } | 198 | } |
199 | } | 199 | } |
200 | LCRYPTO_ALIAS(X509_REQ_extension_nid) | 200 | LCRYPTO_ALIAS(X509_REQ_extension_nid); |
201 | 201 | ||
202 | int * | 202 | int * |
203 | X509_REQ_get_extension_nids(void) | 203 | X509_REQ_get_extension_nids(void) |
204 | { | 204 | { |
205 | return ext_nids; | 205 | return ext_nids; |
206 | } | 206 | } |
207 | LCRYPTO_ALIAS(X509_REQ_get_extension_nids) | 207 | LCRYPTO_ALIAS(X509_REQ_get_extension_nids); |
208 | 208 | ||
209 | void | 209 | void |
210 | X509_REQ_set_extension_nids(int *nids) | 210 | X509_REQ_set_extension_nids(int *nids) |
211 | { | 211 | { |
212 | ext_nids = nids; | 212 | ext_nids = nids; |
213 | } | 213 | } |
214 | LCRYPTO_ALIAS(X509_REQ_set_extension_nids) | 214 | LCRYPTO_ALIAS(X509_REQ_set_extension_nids); |
215 | 215 | ||
216 | STACK_OF(X509_EXTENSION) * | 216 | STACK_OF(X509_EXTENSION) * |
217 | X509_REQ_get_extensions(X509_REQ *req) | 217 | X509_REQ_get_extensions(X509_REQ *req) |
@@ -238,7 +238,7 @@ X509_REQ_get_extensions(X509_REQ *req) | |||
238 | p = ext->value.sequence->data; | 238 | p = ext->value.sequence->data; |
239 | return d2i_X509_EXTENSIONS(NULL, &p, ext->value.sequence->length); | 239 | return d2i_X509_EXTENSIONS(NULL, &p, ext->value.sequence->length); |
240 | } | 240 | } |
241 | LCRYPTO_ALIAS(X509_REQ_get_extensions) | 241 | LCRYPTO_ALIAS(X509_REQ_get_extensions); |
242 | 242 | ||
243 | /* | 243 | /* |
244 | * Add a STACK_OF extensions to a certificate request: allow alternative OIDs | 244 | * Add a STACK_OF extensions to a certificate request: allow alternative OIDs |
@@ -262,7 +262,7 @@ X509_REQ_add_extensions_nid(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts, | |||
262 | 262 | ||
263 | return rv; | 263 | return rv; |
264 | } | 264 | } |
265 | LCRYPTO_ALIAS(X509_REQ_add_extensions_nid) | 265 | LCRYPTO_ALIAS(X509_REQ_add_extensions_nid); |
266 | 266 | ||
267 | /* This is the normal usage: use the "official" OID */ | 267 | /* This is the normal usage: use the "official" OID */ |
268 | int | 268 | int |
@@ -270,7 +270,7 @@ X509_REQ_add_extensions(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts) | |||
270 | { | 270 | { |
271 | return X509_REQ_add_extensions_nid(req, exts, NID_ext_req); | 271 | return X509_REQ_add_extensions_nid(req, exts, NID_ext_req); |
272 | } | 272 | } |
273 | LCRYPTO_ALIAS(X509_REQ_add_extensions) | 273 | LCRYPTO_ALIAS(X509_REQ_add_extensions); |
274 | 274 | ||
275 | /* Request attribute functions */ | 275 | /* Request attribute functions */ |
276 | 276 | ||
@@ -279,14 +279,14 @@ X509_REQ_get_attr_count(const X509_REQ *req) | |||
279 | { | 279 | { |
280 | return X509at_get_attr_count(req->req_info->attributes); | 280 | return X509at_get_attr_count(req->req_info->attributes); |
281 | } | 281 | } |
282 | LCRYPTO_ALIAS(X509_REQ_get_attr_count) | 282 | LCRYPTO_ALIAS(X509_REQ_get_attr_count); |
283 | 283 | ||
284 | int | 284 | int |
285 | X509_REQ_get_attr_by_NID(const X509_REQ *req, int nid, int lastpos) | 285 | X509_REQ_get_attr_by_NID(const X509_REQ *req, int nid, int lastpos) |
286 | { | 286 | { |
287 | return X509at_get_attr_by_NID(req->req_info->attributes, nid, lastpos); | 287 | return X509at_get_attr_by_NID(req->req_info->attributes, nid, lastpos); |
288 | } | 288 | } |
289 | LCRYPTO_ALIAS(X509_REQ_get_attr_by_NID) | 289 | LCRYPTO_ALIAS(X509_REQ_get_attr_by_NID); |
290 | 290 | ||
291 | int | 291 | int |
292 | X509_REQ_get_attr_by_OBJ(const X509_REQ *req, const ASN1_OBJECT *obj, | 292 | X509_REQ_get_attr_by_OBJ(const X509_REQ *req, const ASN1_OBJECT *obj, |
@@ -294,21 +294,21 @@ X509_REQ_get_attr_by_OBJ(const X509_REQ *req, const ASN1_OBJECT *obj, | |||
294 | { | 294 | { |
295 | return X509at_get_attr_by_OBJ(req->req_info->attributes, obj, lastpos); | 295 | return X509at_get_attr_by_OBJ(req->req_info->attributes, obj, lastpos); |
296 | } | 296 | } |
297 | LCRYPTO_ALIAS(X509_REQ_get_attr_by_OBJ) | 297 | LCRYPTO_ALIAS(X509_REQ_get_attr_by_OBJ); |
298 | 298 | ||
299 | X509_ATTRIBUTE * | 299 | X509_ATTRIBUTE * |
300 | X509_REQ_get_attr(const X509_REQ *req, int loc) | 300 | X509_REQ_get_attr(const X509_REQ *req, int loc) |
301 | { | 301 | { |
302 | return X509at_get_attr(req->req_info->attributes, loc); | 302 | return X509at_get_attr(req->req_info->attributes, loc); |
303 | } | 303 | } |
304 | LCRYPTO_ALIAS(X509_REQ_get_attr) | 304 | LCRYPTO_ALIAS(X509_REQ_get_attr); |
305 | 305 | ||
306 | X509_ATTRIBUTE * | 306 | X509_ATTRIBUTE * |
307 | X509_REQ_delete_attr(X509_REQ *req, int loc) | 307 | X509_REQ_delete_attr(X509_REQ *req, int loc) |
308 | { | 308 | { |
309 | return X509at_delete_attr(req->req_info->attributes, loc); | 309 | return X509at_delete_attr(req->req_info->attributes, loc); |
310 | } | 310 | } |
311 | LCRYPTO_ALIAS(X509_REQ_delete_attr) | 311 | LCRYPTO_ALIAS(X509_REQ_delete_attr); |
312 | 312 | ||
313 | int | 313 | int |
314 | X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr) | 314 | X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr) |
@@ -317,7 +317,7 @@ X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr) | |||
317 | return 1; | 317 | return 1; |
318 | return 0; | 318 | return 0; |
319 | } | 319 | } |
320 | LCRYPTO_ALIAS(X509_REQ_add1_attr) | 320 | LCRYPTO_ALIAS(X509_REQ_add1_attr); |
321 | 321 | ||
322 | int | 322 | int |
323 | X509_REQ_add1_attr_by_OBJ(X509_REQ *req, const ASN1_OBJECT *obj, int type, | 323 | X509_REQ_add1_attr_by_OBJ(X509_REQ *req, const ASN1_OBJECT *obj, int type, |
@@ -328,7 +328,7 @@ X509_REQ_add1_attr_by_OBJ(X509_REQ *req, const ASN1_OBJECT *obj, int type, | |||
328 | return 1; | 328 | return 1; |
329 | return 0; | 329 | return 0; |
330 | } | 330 | } |
331 | LCRYPTO_ALIAS(X509_REQ_add1_attr_by_OBJ) | 331 | LCRYPTO_ALIAS(X509_REQ_add1_attr_by_OBJ); |
332 | 332 | ||
333 | int | 333 | int |
334 | X509_REQ_add1_attr_by_NID(X509_REQ *req, int nid, int type, | 334 | X509_REQ_add1_attr_by_NID(X509_REQ *req, int nid, int type, |
@@ -339,7 +339,7 @@ X509_REQ_add1_attr_by_NID(X509_REQ *req, int nid, int type, | |||
339 | return 1; | 339 | return 1; |
340 | return 0; | 340 | return 0; |
341 | } | 341 | } |
342 | LCRYPTO_ALIAS(X509_REQ_add1_attr_by_NID) | 342 | LCRYPTO_ALIAS(X509_REQ_add1_attr_by_NID); |
343 | 343 | ||
344 | int | 344 | int |
345 | X509_REQ_add1_attr_by_txt(X509_REQ *req, const char *attrname, int type, | 345 | X509_REQ_add1_attr_by_txt(X509_REQ *req, const char *attrname, int type, |
@@ -350,7 +350,7 @@ X509_REQ_add1_attr_by_txt(X509_REQ *req, const char *attrname, int type, | |||
350 | return 1; | 350 | return 1; |
351 | return 0; | 351 | return 0; |
352 | } | 352 | } |
353 | LCRYPTO_ALIAS(X509_REQ_add1_attr_by_txt) | 353 | LCRYPTO_ALIAS(X509_REQ_add1_attr_by_txt); |
354 | 354 | ||
355 | int | 355 | int |
356 | i2d_re_X509_REQ_tbs(X509_REQ *req, unsigned char **pp) | 356 | i2d_re_X509_REQ_tbs(X509_REQ *req, unsigned char **pp) |
@@ -358,4 +358,4 @@ i2d_re_X509_REQ_tbs(X509_REQ *req, unsigned char **pp) | |||
358 | req->req_info->enc.modified = 1; | 358 | req->req_info->enc.modified = 1; |
359 | return i2d_X509_REQ_INFO(req->req_info, pp); | 359 | return i2d_X509_REQ_INFO(req->req_info, pp); |
360 | } | 360 | } |
361 | LCRYPTO_ALIAS(i2d_re_X509_REQ_tbs) | 361 | LCRYPTO_ALIAS(i2d_re_X509_REQ_tbs); |
diff --git a/src/lib/libcrypto/x509/x509_set.c b/src/lib/libcrypto/x509/x509_set.c index f07f0ec5f2..e65ffb3b4d 100644 --- a/src/lib/libcrypto/x509/x509_set.c +++ b/src/lib/libcrypto/x509/x509_set.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_set.c,v 1.22 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509_set.c,v 1.23 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -70,14 +70,14 @@ X509_get0_extensions(const X509 *x) | |||
70 | { | 70 | { |
71 | return x->cert_info->extensions; | 71 | return x->cert_info->extensions; |
72 | } | 72 | } |
73 | LCRYPTO_ALIAS(X509_get0_extensions) | 73 | LCRYPTO_ALIAS(X509_get0_extensions); |
74 | 74 | ||
75 | const X509_ALGOR * | 75 | const X509_ALGOR * |
76 | X509_get0_tbs_sigalg(const X509 *x) | 76 | X509_get0_tbs_sigalg(const X509 *x) |
77 | { | 77 | { |
78 | return x->cert_info->signature; | 78 | return x->cert_info->signature; |
79 | } | 79 | } |
80 | LCRYPTO_ALIAS(X509_get0_tbs_sigalg) | 80 | LCRYPTO_ALIAS(X509_get0_tbs_sigalg); |
81 | 81 | ||
82 | int | 82 | int |
83 | X509_set_version(X509 *x, long version) | 83 | X509_set_version(X509 *x, long version) |
@@ -90,14 +90,14 @@ X509_set_version(X509 *x, long version) | |||
90 | } | 90 | } |
91 | return (ASN1_INTEGER_set(x->cert_info->version, version)); | 91 | return (ASN1_INTEGER_set(x->cert_info->version, version)); |
92 | } | 92 | } |
93 | LCRYPTO_ALIAS(X509_set_version) | 93 | LCRYPTO_ALIAS(X509_set_version); |
94 | 94 | ||
95 | long | 95 | long |
96 | X509_get_version(const X509 *x) | 96 | X509_get_version(const X509 *x) |
97 | { | 97 | { |
98 | return ASN1_INTEGER_get(x->cert_info->version); | 98 | return ASN1_INTEGER_get(x->cert_info->version); |
99 | } | 99 | } |
100 | LCRYPTO_ALIAS(X509_get_version) | 100 | LCRYPTO_ALIAS(X509_get_version); |
101 | 101 | ||
102 | int | 102 | int |
103 | X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial) | 103 | X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial) |
@@ -116,7 +116,7 @@ X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial) | |||
116 | } | 116 | } |
117 | return (in != NULL); | 117 | return (in != NULL); |
118 | } | 118 | } |
119 | LCRYPTO_ALIAS(X509_set_serialNumber) | 119 | LCRYPTO_ALIAS(X509_set_serialNumber); |
120 | 120 | ||
121 | int | 121 | int |
122 | X509_set_issuer_name(X509 *x, X509_NAME *name) | 122 | X509_set_issuer_name(X509 *x, X509_NAME *name) |
@@ -125,7 +125,7 @@ X509_set_issuer_name(X509 *x, X509_NAME *name) | |||
125 | return (0); | 125 | return (0); |
126 | return (X509_NAME_set(&x->cert_info->issuer, name)); | 126 | return (X509_NAME_set(&x->cert_info->issuer, name)); |
127 | } | 127 | } |
128 | LCRYPTO_ALIAS(X509_set_issuer_name) | 128 | LCRYPTO_ALIAS(X509_set_issuer_name); |
129 | 129 | ||
130 | int | 130 | int |
131 | X509_set_subject_name(X509 *x, X509_NAME *name) | 131 | X509_set_subject_name(X509 *x, X509_NAME *name) |
@@ -134,14 +134,14 @@ X509_set_subject_name(X509 *x, X509_NAME *name) | |||
134 | return (0); | 134 | return (0); |
135 | return (X509_NAME_set(&x->cert_info->subject, name)); | 135 | return (X509_NAME_set(&x->cert_info->subject, name)); |
136 | } | 136 | } |
137 | LCRYPTO_ALIAS(X509_set_subject_name) | 137 | LCRYPTO_ALIAS(X509_set_subject_name); |
138 | 138 | ||
139 | const ASN1_TIME * | 139 | const ASN1_TIME * |
140 | X509_get0_notBefore(const X509 *x) | 140 | X509_get0_notBefore(const X509 *x) |
141 | { | 141 | { |
142 | return X509_getm_notBefore(x); | 142 | return X509_getm_notBefore(x); |
143 | } | 143 | } |
144 | LCRYPTO_ALIAS(X509_get0_notBefore) | 144 | LCRYPTO_ALIAS(X509_get0_notBefore); |
145 | 145 | ||
146 | ASN1_TIME * | 146 | ASN1_TIME * |
147 | X509_getm_notBefore(const X509 *x) | 147 | X509_getm_notBefore(const X509 *x) |
@@ -150,7 +150,7 @@ X509_getm_notBefore(const X509 *x) | |||
150 | return (NULL); | 150 | return (NULL); |
151 | return x->cert_info->validity->notBefore; | 151 | return x->cert_info->validity->notBefore; |
152 | } | 152 | } |
153 | LCRYPTO_ALIAS(X509_getm_notBefore) | 153 | LCRYPTO_ALIAS(X509_getm_notBefore); |
154 | 154 | ||
155 | int | 155 | int |
156 | X509_set_notBefore(X509 *x, const ASN1_TIME *tm) | 156 | X509_set_notBefore(X509 *x, const ASN1_TIME *tm) |
@@ -169,21 +169,21 @@ X509_set_notBefore(X509 *x, const ASN1_TIME *tm) | |||
169 | } | 169 | } |
170 | return (in != NULL); | 170 | return (in != NULL); |
171 | } | 171 | } |
172 | LCRYPTO_ALIAS(X509_set_notBefore) | 172 | LCRYPTO_ALIAS(X509_set_notBefore); |
173 | 173 | ||
174 | int | 174 | int |
175 | X509_set1_notBefore(X509 *x, const ASN1_TIME *tm) | 175 | X509_set1_notBefore(X509 *x, const ASN1_TIME *tm) |
176 | { | 176 | { |
177 | return X509_set_notBefore(x, tm); | 177 | return X509_set_notBefore(x, tm); |
178 | } | 178 | } |
179 | LCRYPTO_ALIAS(X509_set1_notBefore) | 179 | LCRYPTO_ALIAS(X509_set1_notBefore); |
180 | 180 | ||
181 | const ASN1_TIME * | 181 | const ASN1_TIME * |
182 | X509_get0_notAfter(const X509 *x) | 182 | X509_get0_notAfter(const X509 *x) |
183 | { | 183 | { |
184 | return X509_getm_notAfter(x); | 184 | return X509_getm_notAfter(x); |
185 | } | 185 | } |
186 | LCRYPTO_ALIAS(X509_get0_notAfter) | 186 | LCRYPTO_ALIAS(X509_get0_notAfter); |
187 | 187 | ||
188 | ASN1_TIME * | 188 | ASN1_TIME * |
189 | X509_getm_notAfter(const X509 *x) | 189 | X509_getm_notAfter(const X509 *x) |
@@ -192,7 +192,7 @@ X509_getm_notAfter(const X509 *x) | |||
192 | return (NULL); | 192 | return (NULL); |
193 | return x->cert_info->validity->notAfter; | 193 | return x->cert_info->validity->notAfter; |
194 | } | 194 | } |
195 | LCRYPTO_ALIAS(X509_getm_notAfter) | 195 | LCRYPTO_ALIAS(X509_getm_notAfter); |
196 | 196 | ||
197 | int | 197 | int |
198 | X509_set_notAfter(X509 *x, const ASN1_TIME *tm) | 198 | X509_set_notAfter(X509 *x, const ASN1_TIME *tm) |
@@ -211,14 +211,14 @@ X509_set_notAfter(X509 *x, const ASN1_TIME *tm) | |||
211 | } | 211 | } |
212 | return (in != NULL); | 212 | return (in != NULL); |
213 | } | 213 | } |
214 | LCRYPTO_ALIAS(X509_set_notAfter) | 214 | LCRYPTO_ALIAS(X509_set_notAfter); |
215 | 215 | ||
216 | int | 216 | int |
217 | X509_set1_notAfter(X509 *x, const ASN1_TIME *tm) | 217 | X509_set1_notAfter(X509 *x, const ASN1_TIME *tm) |
218 | { | 218 | { |
219 | return X509_set_notAfter(x, tm); | 219 | return X509_set_notAfter(x, tm); |
220 | } | 220 | } |
221 | LCRYPTO_ALIAS(X509_set1_notAfter) | 221 | LCRYPTO_ALIAS(X509_set1_notAfter); |
222 | 222 | ||
223 | int | 223 | int |
224 | X509_set_pubkey(X509 *x, EVP_PKEY *pkey) | 224 | X509_set_pubkey(X509 *x, EVP_PKEY *pkey) |
@@ -227,18 +227,18 @@ X509_set_pubkey(X509 *x, EVP_PKEY *pkey) | |||
227 | return (0); | 227 | return (0); |
228 | return (X509_PUBKEY_set(&(x->cert_info->key), pkey)); | 228 | return (X509_PUBKEY_set(&(x->cert_info->key), pkey)); |
229 | } | 229 | } |
230 | LCRYPTO_ALIAS(X509_set_pubkey) | 230 | LCRYPTO_ALIAS(X509_set_pubkey); |
231 | 231 | ||
232 | int | 232 | int |
233 | X509_get_signature_type(const X509 *x) | 233 | X509_get_signature_type(const X509 *x) |
234 | { | 234 | { |
235 | return EVP_PKEY_type(OBJ_obj2nid(x->sig_alg->algorithm)); | 235 | return EVP_PKEY_type(OBJ_obj2nid(x->sig_alg->algorithm)); |
236 | } | 236 | } |
237 | LCRYPTO_ALIAS(X509_get_signature_type) | 237 | LCRYPTO_ALIAS(X509_get_signature_type); |
238 | 238 | ||
239 | X509_PUBKEY * | 239 | X509_PUBKEY * |
240 | X509_get_X509_PUBKEY(const X509 *x) | 240 | X509_get_X509_PUBKEY(const X509 *x) |
241 | { | 241 | { |
242 | return x->cert_info->key; | 242 | return x->cert_info->key; |
243 | } | 243 | } |
244 | LCRYPTO_ALIAS(X509_get_X509_PUBKEY) | 244 | LCRYPTO_ALIAS(X509_get_X509_PUBKEY); |
diff --git a/src/lib/libcrypto/x509/x509_skey.c b/src/lib/libcrypto/x509/x509_skey.c index d4212a64a1..245ba51586 100644 --- a/src/lib/libcrypto/x509/x509_skey.c +++ b/src/lib/libcrypto/x509/x509_skey.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_skey.c,v 1.4 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509_skey.c,v 1.5 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -89,7 +89,7 @@ i2s_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, const ASN1_OCTET_STRING *oct) | |||
89 | { | 89 | { |
90 | return hex_to_string(oct->data, oct->length); | 90 | return hex_to_string(oct->data, oct->length); |
91 | } | 91 | } |
92 | LCRYPTO_ALIAS(i2s_ASN1_OCTET_STRING) | 92 | LCRYPTO_ALIAS(i2s_ASN1_OCTET_STRING); |
93 | 93 | ||
94 | ASN1_OCTET_STRING * | 94 | ASN1_OCTET_STRING * |
95 | s2i_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | 95 | s2i_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
@@ -112,7 +112,7 @@ s2i_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
112 | 112 | ||
113 | return oct; | 113 | return oct; |
114 | } | 114 | } |
115 | LCRYPTO_ALIAS(s2i_ASN1_OCTET_STRING) | 115 | LCRYPTO_ALIAS(s2i_ASN1_OCTET_STRING); |
116 | 116 | ||
117 | static ASN1_OCTET_STRING * | 117 | static ASN1_OCTET_STRING * |
118 | s2i_skey_id(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *str) | 118 | s2i_skey_id(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *str) |
diff --git a/src/lib/libcrypto/x509/x509_sxnet.c b/src/lib/libcrypto/x509/x509_sxnet.c index 9c66a6b769..77c792d227 100644 --- a/src/lib/libcrypto/x509/x509_sxnet.c +++ b/src/lib/libcrypto/x509/x509_sxnet.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_sxnet.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_sxnet.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -131,28 +131,28 @@ d2i_SXNETID(SXNETID **a, const unsigned char **in, long len) | |||
131 | return (SXNETID *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 131 | return (SXNETID *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
132 | &SXNETID_it); | 132 | &SXNETID_it); |
133 | } | 133 | } |
134 | LCRYPTO_ALIAS(d2i_SXNETID) | 134 | LCRYPTO_ALIAS(d2i_SXNETID); |
135 | 135 | ||
136 | int | 136 | int |
137 | i2d_SXNETID(SXNETID *a, unsigned char **out) | 137 | i2d_SXNETID(SXNETID *a, unsigned char **out) |
138 | { | 138 | { |
139 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &SXNETID_it); | 139 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &SXNETID_it); |
140 | } | 140 | } |
141 | LCRYPTO_ALIAS(i2d_SXNETID) | 141 | LCRYPTO_ALIAS(i2d_SXNETID); |
142 | 142 | ||
143 | SXNETID * | 143 | SXNETID * |
144 | SXNETID_new(void) | 144 | SXNETID_new(void) |
145 | { | 145 | { |
146 | return (SXNETID *)ASN1_item_new(&SXNETID_it); | 146 | return (SXNETID *)ASN1_item_new(&SXNETID_it); |
147 | } | 147 | } |
148 | LCRYPTO_ALIAS(SXNETID_new) | 148 | LCRYPTO_ALIAS(SXNETID_new); |
149 | 149 | ||
150 | void | 150 | void |
151 | SXNETID_free(SXNETID *a) | 151 | SXNETID_free(SXNETID *a) |
152 | { | 152 | { |
153 | ASN1_item_free((ASN1_VALUE *)a, &SXNETID_it); | 153 | ASN1_item_free((ASN1_VALUE *)a, &SXNETID_it); |
154 | } | 154 | } |
155 | LCRYPTO_ALIAS(SXNETID_free) | 155 | LCRYPTO_ALIAS(SXNETID_free); |
156 | 156 | ||
157 | static const ASN1_TEMPLATE SXNET_seq_tt[] = { | 157 | static const ASN1_TEMPLATE SXNET_seq_tt[] = { |
158 | { | 158 | { |
@@ -188,28 +188,28 @@ d2i_SXNET(SXNET **a, const unsigned char **in, long len) | |||
188 | return (SXNET *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 188 | return (SXNET *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
189 | &SXNET_it); | 189 | &SXNET_it); |
190 | } | 190 | } |
191 | LCRYPTO_ALIAS(d2i_SXNET) | 191 | LCRYPTO_ALIAS(d2i_SXNET); |
192 | 192 | ||
193 | int | 193 | int |
194 | i2d_SXNET(SXNET *a, unsigned char **out) | 194 | i2d_SXNET(SXNET *a, unsigned char **out) |
195 | { | 195 | { |
196 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &SXNET_it); | 196 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &SXNET_it); |
197 | } | 197 | } |
198 | LCRYPTO_ALIAS(i2d_SXNET) | 198 | LCRYPTO_ALIAS(i2d_SXNET); |
199 | 199 | ||
200 | SXNET * | 200 | SXNET * |
201 | SXNET_new(void) | 201 | SXNET_new(void) |
202 | { | 202 | { |
203 | return (SXNET *)ASN1_item_new(&SXNET_it); | 203 | return (SXNET *)ASN1_item_new(&SXNET_it); |
204 | } | 204 | } |
205 | LCRYPTO_ALIAS(SXNET_new) | 205 | LCRYPTO_ALIAS(SXNET_new); |
206 | 206 | ||
207 | void | 207 | void |
208 | SXNET_free(SXNET *a) | 208 | SXNET_free(SXNET *a) |
209 | { | 209 | { |
210 | ASN1_item_free((ASN1_VALUE *)a, &SXNET_it); | 210 | ASN1_item_free((ASN1_VALUE *)a, &SXNET_it); |
211 | } | 211 | } |
212 | LCRYPTO_ALIAS(SXNET_free) | 212 | LCRYPTO_ALIAS(SXNET_free); |
213 | 213 | ||
214 | static int | 214 | static int |
215 | sxnet_i2r(X509V3_EXT_METHOD *method, SXNET *sx, BIO *out, int indent) | 215 | sxnet_i2r(X509V3_EXT_METHOD *method, SXNET *sx, BIO *out, int indent) |
@@ -271,7 +271,7 @@ SXNET_add_id_asc(SXNET **psx, const char *zone, const char *user, int userlen) | |||
271 | } | 271 | } |
272 | return SXNET_add_id_INTEGER(psx, izone, user, userlen); | 272 | return SXNET_add_id_INTEGER(psx, izone, user, userlen); |
273 | } | 273 | } |
274 | LCRYPTO_ALIAS(SXNET_add_id_asc) | 274 | LCRYPTO_ALIAS(SXNET_add_id_asc); |
275 | 275 | ||
276 | /* Add an id given the zone as an unsigned long */ | 276 | /* Add an id given the zone as an unsigned long */ |
277 | 277 | ||
@@ -289,7 +289,7 @@ SXNET_add_id_ulong(SXNET **psx, unsigned long lzone, const char *user, | |||
289 | } | 289 | } |
290 | return SXNET_add_id_INTEGER(psx, izone, user, userlen); | 290 | return SXNET_add_id_INTEGER(psx, izone, user, userlen); |
291 | } | 291 | } |
292 | LCRYPTO_ALIAS(SXNET_add_id_ulong) | 292 | LCRYPTO_ALIAS(SXNET_add_id_ulong); |
293 | 293 | ||
294 | /* Add an id given the zone as an ASN1_INTEGER. | 294 | /* Add an id given the zone as an ASN1_INTEGER. |
295 | * Note this version uses the passed integer and doesn't make a copy so don't | 295 | * Note this version uses the passed integer and doesn't make a copy so don't |
@@ -345,7 +345,7 @@ err: | |||
345 | *psx = NULL; | 345 | *psx = NULL; |
346 | return 0; | 346 | return 0; |
347 | } | 347 | } |
348 | LCRYPTO_ALIAS(SXNET_add_id_INTEGER) | 348 | LCRYPTO_ALIAS(SXNET_add_id_INTEGER); |
349 | 349 | ||
350 | ASN1_OCTET_STRING * | 350 | ASN1_OCTET_STRING * |
351 | SXNET_get_id_asc(SXNET *sx, const char *zone) | 351 | SXNET_get_id_asc(SXNET *sx, const char *zone) |
@@ -361,7 +361,7 @@ SXNET_get_id_asc(SXNET *sx, const char *zone) | |||
361 | ASN1_INTEGER_free(izone); | 361 | ASN1_INTEGER_free(izone); |
362 | return oct; | 362 | return oct; |
363 | } | 363 | } |
364 | LCRYPTO_ALIAS(SXNET_get_id_asc) | 364 | LCRYPTO_ALIAS(SXNET_get_id_asc); |
365 | 365 | ||
366 | ASN1_OCTET_STRING * | 366 | ASN1_OCTET_STRING * |
367 | SXNET_get_id_ulong(SXNET *sx, unsigned long lzone) | 367 | SXNET_get_id_ulong(SXNET *sx, unsigned long lzone) |
@@ -379,7 +379,7 @@ SXNET_get_id_ulong(SXNET *sx, unsigned long lzone) | |||
379 | ASN1_INTEGER_free(izone); | 379 | ASN1_INTEGER_free(izone); |
380 | return oct; | 380 | return oct; |
381 | } | 381 | } |
382 | LCRYPTO_ALIAS(SXNET_get_id_ulong) | 382 | LCRYPTO_ALIAS(SXNET_get_id_ulong); |
383 | 383 | ||
384 | ASN1_OCTET_STRING * | 384 | ASN1_OCTET_STRING * |
385 | SXNET_get_id_INTEGER(SXNET *sx, ASN1_INTEGER *zone) | 385 | SXNET_get_id_INTEGER(SXNET *sx, ASN1_INTEGER *zone) |
@@ -394,4 +394,4 @@ SXNET_get_id_INTEGER(SXNET *sx, ASN1_INTEGER *zone) | |||
394 | } | 394 | } |
395 | return NULL; | 395 | return NULL; |
396 | } | 396 | } |
397 | LCRYPTO_ALIAS(SXNET_get_id_INTEGER) | 397 | LCRYPTO_ALIAS(SXNET_get_id_INTEGER); |
diff --git a/src/lib/libcrypto/x509/x509_trs.c b/src/lib/libcrypto/x509/x509_trs.c index 10995801b1..e3265918a4 100644 --- a/src/lib/libcrypto/x509/x509_trs.c +++ b/src/lib/libcrypto/x509/x509_trs.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_trs.c,v 1.30 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509_trs.c,v 1.31 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -109,7 +109,7 @@ int | |||
109 | default_trust = trust; | 109 | default_trust = trust; |
110 | return oldtrust; | 110 | return oldtrust; |
111 | } | 111 | } |
112 | LCRYPTO_ALIAS(X509_TRUST_set_default) | 112 | LCRYPTO_ALIAS(X509_TRUST_set_default); |
113 | 113 | ||
114 | int | 114 | int |
115 | X509_check_trust(X509 *x, int id, int flags) | 115 | X509_check_trust(X509 *x, int id, int flags) |
@@ -141,7 +141,7 @@ X509_check_trust(X509 *x, int id, int flags) | |||
141 | pt = X509_TRUST_get0(idx); | 141 | pt = X509_TRUST_get0(idx); |
142 | return pt->check_trust(pt, x, flags); | 142 | return pt->check_trust(pt, x, flags); |
143 | } | 143 | } |
144 | LCRYPTO_ALIAS(X509_check_trust) | 144 | LCRYPTO_ALIAS(X509_check_trust); |
145 | 145 | ||
146 | int | 146 | int |
147 | X509_TRUST_get_count(void) | 147 | X509_TRUST_get_count(void) |
@@ -150,7 +150,7 @@ X509_TRUST_get_count(void) | |||
150 | return X509_TRUST_COUNT; | 150 | return X509_TRUST_COUNT; |
151 | return sk_X509_TRUST_num(trtable) + X509_TRUST_COUNT; | 151 | return sk_X509_TRUST_num(trtable) + X509_TRUST_COUNT; |
152 | } | 152 | } |
153 | LCRYPTO_ALIAS(X509_TRUST_get_count) | 153 | LCRYPTO_ALIAS(X509_TRUST_get_count); |
154 | 154 | ||
155 | X509_TRUST * | 155 | X509_TRUST * |
156 | X509_TRUST_get0(int idx) | 156 | X509_TRUST_get0(int idx) |
@@ -161,7 +161,7 @@ X509_TRUST_get0(int idx) | |||
161 | return trstandard + idx; | 161 | return trstandard + idx; |
162 | return sk_X509_TRUST_value(trtable, idx - X509_TRUST_COUNT); | 162 | return sk_X509_TRUST_value(trtable, idx - X509_TRUST_COUNT); |
163 | } | 163 | } |
164 | LCRYPTO_ALIAS(X509_TRUST_get0) | 164 | LCRYPTO_ALIAS(X509_TRUST_get0); |
165 | 165 | ||
166 | int | 166 | int |
167 | X509_TRUST_get_by_id(int id) | 167 | X509_TRUST_get_by_id(int id) |
@@ -179,7 +179,7 @@ X509_TRUST_get_by_id(int id) | |||
179 | return -1; | 179 | return -1; |
180 | return idx + X509_TRUST_COUNT; | 180 | return idx + X509_TRUST_COUNT; |
181 | } | 181 | } |
182 | LCRYPTO_ALIAS(X509_TRUST_get_by_id) | 182 | LCRYPTO_ALIAS(X509_TRUST_get_by_id); |
183 | 183 | ||
184 | int | 184 | int |
185 | X509_TRUST_set(int *t, int trust) | 185 | X509_TRUST_set(int *t, int trust) |
@@ -191,7 +191,7 @@ X509_TRUST_set(int *t, int trust) | |||
191 | *t = trust; | 191 | *t = trust; |
192 | return 1; | 192 | return 1; |
193 | } | 193 | } |
194 | LCRYPTO_ALIAS(X509_TRUST_set) | 194 | LCRYPTO_ALIAS(X509_TRUST_set); |
195 | 195 | ||
196 | int | 196 | int |
197 | X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), | 197 | X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), |
@@ -257,7 +257,7 @@ err: | |||
257 | X509error(ERR_R_MALLOC_FAILURE); | 257 | X509error(ERR_R_MALLOC_FAILURE); |
258 | return 0; | 258 | return 0; |
259 | } | 259 | } |
260 | LCRYPTO_ALIAS(X509_TRUST_add) | 260 | LCRYPTO_ALIAS(X509_TRUST_add); |
261 | 261 | ||
262 | static void | 262 | static void |
263 | trtable_free(X509_TRUST *p) | 263 | trtable_free(X509_TRUST *p) |
@@ -277,28 +277,28 @@ X509_TRUST_cleanup(void) | |||
277 | sk_X509_TRUST_pop_free(trtable, trtable_free); | 277 | sk_X509_TRUST_pop_free(trtable, trtable_free); |
278 | trtable = NULL; | 278 | trtable = NULL; |
279 | } | 279 | } |
280 | LCRYPTO_ALIAS(X509_TRUST_cleanup) | 280 | LCRYPTO_ALIAS(X509_TRUST_cleanup); |
281 | 281 | ||
282 | int | 282 | int |
283 | X509_TRUST_get_flags(const X509_TRUST *xp) | 283 | X509_TRUST_get_flags(const X509_TRUST *xp) |
284 | { | 284 | { |
285 | return xp->flags; | 285 | return xp->flags; |
286 | } | 286 | } |
287 | LCRYPTO_ALIAS(X509_TRUST_get_flags) | 287 | LCRYPTO_ALIAS(X509_TRUST_get_flags); |
288 | 288 | ||
289 | char * | 289 | char * |
290 | X509_TRUST_get0_name(const X509_TRUST *xp) | 290 | X509_TRUST_get0_name(const X509_TRUST *xp) |
291 | { | 291 | { |
292 | return xp->name; | 292 | return xp->name; |
293 | } | 293 | } |
294 | LCRYPTO_ALIAS(X509_TRUST_get0_name) | 294 | LCRYPTO_ALIAS(X509_TRUST_get0_name); |
295 | 295 | ||
296 | int | 296 | int |
297 | X509_TRUST_get_trust(const X509_TRUST *xp) | 297 | X509_TRUST_get_trust(const X509_TRUST *xp) |
298 | { | 298 | { |
299 | return xp->trust; | 299 | return xp->trust; |
300 | } | 300 | } |
301 | LCRYPTO_ALIAS(X509_TRUST_get_trust) | 301 | LCRYPTO_ALIAS(X509_TRUST_get_trust); |
302 | 302 | ||
303 | static int | 303 | static int |
304 | trust_1oidany(X509_TRUST *trust, X509 *x, int flags) | 304 | trust_1oidany(X509_TRUST *trust, X509 *x, int flags) |
diff --git a/src/lib/libcrypto/x509/x509_txt.c b/src/lib/libcrypto/x509/x509_txt.c index fb33fd7dc2..5f5bc5ae84 100644 --- a/src/lib/libcrypto/x509/x509_txt.c +++ b/src/lib/libcrypto/x509/x509_txt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_txt.c,v 1.27 2022/11/29 12:23:43 tb Exp $ */ | 1 | /* $OpenBSD: x509_txt.c,v 1.28 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -193,4 +193,4 @@ X509_verify_cert_error_string(long n) | |||
193 | return "Unknown certificate verification error"; | 193 | return "Unknown certificate verification error"; |
194 | } | 194 | } |
195 | } | 195 | } |
196 | LCRYPTO_ALIAS(X509_verify_cert_error_string) | 196 | LCRYPTO_ALIAS(X509_verify_cert_error_string); |
diff --git a/src/lib/libcrypto/x509/x509_utl.c b/src/lib/libcrypto/x509/x509_utl.c index aa18efe2c5..ec67ae093c 100644 --- a/src/lib/libcrypto/x509/x509_utl.c +++ b/src/lib/libcrypto/x509/x509_utl.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_utl.c,v 1.5 2022/12/26 07:18:53 jmc Exp $ */ | 1 | /* $OpenBSD: x509_utl.c,v 1.6 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -117,7 +117,7 @@ X509V3_add_value(const char *name, const char *value, | |||
117 | } | 117 | } |
118 | return 0; | 118 | return 0; |
119 | } | 119 | } |
120 | LCRYPTO_ALIAS(X509V3_add_value) | 120 | LCRYPTO_ALIAS(X509V3_add_value); |
121 | 121 | ||
122 | int | 122 | int |
123 | X509V3_add_value_uchar(const char *name, const unsigned char *value, | 123 | X509V3_add_value_uchar(const char *name, const unsigned char *value, |
@@ -125,7 +125,7 @@ X509V3_add_value_uchar(const char *name, const unsigned char *value, | |||
125 | { | 125 | { |
126 | return X509V3_add_value(name, (const char *)value, extlist); | 126 | return X509V3_add_value(name, (const char *)value, extlist); |
127 | } | 127 | } |
128 | LCRYPTO_ALIAS(X509V3_add_value_uchar) | 128 | LCRYPTO_ALIAS(X509V3_add_value_uchar); |
129 | 129 | ||
130 | /* Free function for STACK_OF(CONF_VALUE) */ | 130 | /* Free function for STACK_OF(CONF_VALUE) */ |
131 | 131 | ||
@@ -139,7 +139,7 @@ X509V3_conf_free(CONF_VALUE *conf) | |||
139 | free(conf->section); | 139 | free(conf->section); |
140 | free(conf); | 140 | free(conf); |
141 | } | 141 | } |
142 | LCRYPTO_ALIAS(X509V3_conf_free) | 142 | LCRYPTO_ALIAS(X509V3_conf_free); |
143 | 143 | ||
144 | int | 144 | int |
145 | X509V3_add_value_bool(const char *name, int asn1_bool, | 145 | X509V3_add_value_bool(const char *name, int asn1_bool, |
@@ -149,7 +149,7 @@ X509V3_add_value_bool(const char *name, int asn1_bool, | |||
149 | return X509V3_add_value(name, "TRUE", extlist); | 149 | return X509V3_add_value(name, "TRUE", extlist); |
150 | return X509V3_add_value(name, "FALSE", extlist); | 150 | return X509V3_add_value(name, "FALSE", extlist); |
151 | } | 151 | } |
152 | LCRYPTO_ALIAS(X509V3_add_value_bool) | 152 | LCRYPTO_ALIAS(X509V3_add_value_bool); |
153 | 153 | ||
154 | int | 154 | int |
155 | X509V3_add_value_bool_nf(const char *name, int asn1_bool, | 155 | X509V3_add_value_bool_nf(const char *name, int asn1_bool, |
@@ -159,7 +159,7 @@ X509V3_add_value_bool_nf(const char *name, int asn1_bool, | |||
159 | return X509V3_add_value(name, "TRUE", extlist); | 159 | return X509V3_add_value(name, "TRUE", extlist); |
160 | return 1; | 160 | return 1; |
161 | } | 161 | } |
162 | LCRYPTO_ALIAS(X509V3_add_value_bool_nf) | 162 | LCRYPTO_ALIAS(X509V3_add_value_bool_nf); |
163 | 163 | ||
164 | char * | 164 | char * |
165 | bn_to_string(const BIGNUM *bn) | 165 | bn_to_string(const BIGNUM *bn) |
@@ -202,7 +202,7 @@ i2s_ASN1_ENUMERATED(X509V3_EXT_METHOD *method, const ASN1_ENUMERATED *a) | |||
202 | BN_free(bntmp); | 202 | BN_free(bntmp); |
203 | return strtmp; | 203 | return strtmp; |
204 | } | 204 | } |
205 | LCRYPTO_ALIAS(i2s_ASN1_ENUMERATED) | 205 | LCRYPTO_ALIAS(i2s_ASN1_ENUMERATED); |
206 | 206 | ||
207 | char * | 207 | char * |
208 | i2s_ASN1_INTEGER(X509V3_EXT_METHOD *method, const ASN1_INTEGER *a) | 208 | i2s_ASN1_INTEGER(X509V3_EXT_METHOD *method, const ASN1_INTEGER *a) |
@@ -218,7 +218,7 @@ i2s_ASN1_INTEGER(X509V3_EXT_METHOD *method, const ASN1_INTEGER *a) | |||
218 | BN_free(bntmp); | 218 | BN_free(bntmp); |
219 | return strtmp; | 219 | return strtmp; |
220 | } | 220 | } |
221 | LCRYPTO_ALIAS(i2s_ASN1_INTEGER) | 221 | LCRYPTO_ALIAS(i2s_ASN1_INTEGER); |
222 | 222 | ||
223 | ASN1_INTEGER * | 223 | ASN1_INTEGER * |
224 | s2i_ASN1_INTEGER(X509V3_EXT_METHOD *method, const char *value) | 224 | s2i_ASN1_INTEGER(X509V3_EXT_METHOD *method, const char *value) |
@@ -269,7 +269,7 @@ s2i_ASN1_INTEGER(X509V3_EXT_METHOD *method, const char *value) | |||
269 | aint->type |= V_ASN1_NEG; | 269 | aint->type |= V_ASN1_NEG; |
270 | return aint; | 270 | return aint; |
271 | } | 271 | } |
272 | LCRYPTO_ALIAS(s2i_ASN1_INTEGER) | 272 | LCRYPTO_ALIAS(s2i_ASN1_INTEGER); |
273 | 273 | ||
274 | int | 274 | int |
275 | X509V3_add_value_int(const char *name, const ASN1_INTEGER *aint, | 275 | X509V3_add_value_int(const char *name, const ASN1_INTEGER *aint, |
@@ -286,7 +286,7 @@ X509V3_add_value_int(const char *name, const ASN1_INTEGER *aint, | |||
286 | free(strtmp); | 286 | free(strtmp); |
287 | return ret; | 287 | return ret; |
288 | } | 288 | } |
289 | LCRYPTO_ALIAS(X509V3_add_value_int) | 289 | LCRYPTO_ALIAS(X509V3_add_value_int); |
290 | 290 | ||
291 | int | 291 | int |
292 | X509V3_get_value_bool(const CONF_VALUE *value, int *asn1_bool) | 292 | X509V3_get_value_bool(const CONF_VALUE *value, int *asn1_bool) |
@@ -312,7 +312,7 @@ X509V3_get_value_bool(const CONF_VALUE *value, int *asn1_bool) | |||
312 | X509V3_conf_err(value); | 312 | X509V3_conf_err(value); |
313 | return 0; | 313 | return 0; |
314 | } | 314 | } |
315 | LCRYPTO_ALIAS(X509V3_get_value_bool) | 315 | LCRYPTO_ALIAS(X509V3_get_value_bool); |
316 | 316 | ||
317 | int | 317 | int |
318 | X509V3_get_value_int(const CONF_VALUE *value, ASN1_INTEGER **aint) | 318 | X509V3_get_value_int(const CONF_VALUE *value, ASN1_INTEGER **aint) |
@@ -326,7 +326,7 @@ X509V3_get_value_int(const CONF_VALUE *value, ASN1_INTEGER **aint) | |||
326 | *aint = itmp; | 326 | *aint = itmp; |
327 | return 1; | 327 | return 1; |
328 | } | 328 | } |
329 | LCRYPTO_ALIAS(X509V3_get_value_int) | 329 | LCRYPTO_ALIAS(X509V3_get_value_int); |
330 | 330 | ||
331 | #define HDR_NAME 1 | 331 | #define HDR_NAME 1 |
332 | #define HDR_VALUE 2 | 332 | #define HDR_VALUE 2 |
@@ -418,7 +418,7 @@ X509V3_parse_list(const char *line) | |||
418 | return NULL; | 418 | return NULL; |
419 | 419 | ||
420 | } | 420 | } |
421 | LCRYPTO_ALIAS(X509V3_parse_list) | 421 | LCRYPTO_ALIAS(X509V3_parse_list); |
422 | 422 | ||
423 | /* Delete leading and trailing spaces from a string */ | 423 | /* Delete leading and trailing spaces from a string */ |
424 | static char * | 424 | static char * |
@@ -470,7 +470,7 @@ hex_to_string(const unsigned char *buffer, long len) | |||
470 | q[-1] = 0; | 470 | q[-1] = 0; |
471 | return tmp; | 471 | return tmp; |
472 | } | 472 | } |
473 | LCRYPTO_ALIAS(hex_to_string) | 473 | LCRYPTO_ALIAS(hex_to_string); |
474 | 474 | ||
475 | /* Give a string of hex digits convert to | 475 | /* Give a string of hex digits convert to |
476 | * a buffer | 476 | * a buffer |
@@ -532,7 +532,7 @@ string_to_hex(const char *str, long *len) | |||
532 | X509V3error(X509V3_R_ILLEGAL_HEX_DIGIT); | 532 | X509V3error(X509V3_R_ILLEGAL_HEX_DIGIT); |
533 | return NULL; | 533 | return NULL; |
534 | } | 534 | } |
535 | LCRYPTO_ALIAS(string_to_hex) | 535 | LCRYPTO_ALIAS(string_to_hex); |
536 | 536 | ||
537 | /* V2I name comparison function: returns zero if 'name' matches | 537 | /* V2I name comparison function: returns zero if 'name' matches |
538 | * cmp or cmp.* | 538 | * cmp or cmp.* |
@@ -570,7 +570,7 @@ X509_get1_email(X509 *x) | |||
570 | sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free); | 570 | sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free); |
571 | return ret; | 571 | return ret; |
572 | } | 572 | } |
573 | LCRYPTO_ALIAS(X509_get1_email) | 573 | LCRYPTO_ALIAS(X509_get1_email); |
574 | 574 | ||
575 | STACK_OF(OPENSSL_STRING) * | 575 | STACK_OF(OPENSSL_STRING) * |
576 | X509_get1_ocsp(X509 *x) | 576 | X509_get1_ocsp(X509 *x) |
@@ -595,7 +595,7 @@ X509_get1_ocsp(X509 *x) | |||
595 | AUTHORITY_INFO_ACCESS_free(info); | 595 | AUTHORITY_INFO_ACCESS_free(info); |
596 | return ret; | 596 | return ret; |
597 | } | 597 | } |
598 | LCRYPTO_ALIAS(X509_get1_ocsp) | 598 | LCRYPTO_ALIAS(X509_get1_ocsp); |
599 | 599 | ||
600 | STACK_OF(OPENSSL_STRING) * | 600 | STACK_OF(OPENSSL_STRING) * |
601 | X509_REQ_get1_email(X509_REQ *x) | 601 | X509_REQ_get1_email(X509_REQ *x) |
@@ -611,7 +611,7 @@ X509_REQ_get1_email(X509_REQ *x) | |||
611 | sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free); | 611 | sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free); |
612 | return ret; | 612 | return ret; |
613 | } | 613 | } |
614 | LCRYPTO_ALIAS(X509_REQ_get1_email) | 614 | LCRYPTO_ALIAS(X509_REQ_get1_email); |
615 | 615 | ||
616 | 616 | ||
617 | static STACK_OF(OPENSSL_STRING) * | 617 | static STACK_OF(OPENSSL_STRING) * |
@@ -681,7 +681,7 @@ X509_email_free(STACK_OF(OPENSSL_STRING) *sk) | |||
681 | { | 681 | { |
682 | sk_OPENSSL_STRING_pop_free(sk, str_free); | 682 | sk_OPENSSL_STRING_pop_free(sk, str_free); |
683 | } | 683 | } |
684 | LCRYPTO_ALIAS(X509_email_free) | 684 | LCRYPTO_ALIAS(X509_email_free); |
685 | 685 | ||
686 | typedef int (*equal_fn)(const unsigned char *pattern, size_t pattern_len, | 686 | typedef int (*equal_fn)(const unsigned char *pattern, size_t pattern_len, |
687 | const unsigned char *subject, size_t subject_len, unsigned int flags); | 687 | const unsigned char *subject, size_t subject_len, unsigned int flags); |
@@ -1083,7 +1083,7 @@ X509_check_host(X509 *x, const char *chk, size_t chklen, unsigned int flags, | |||
1083 | return -2; | 1083 | return -2; |
1084 | return do_x509_check(x, chk, chklen, flags, GEN_DNS, peername); | 1084 | return do_x509_check(x, chk, chklen, flags, GEN_DNS, peername); |
1085 | } | 1085 | } |
1086 | LCRYPTO_ALIAS(X509_check_host) | 1086 | LCRYPTO_ALIAS(X509_check_host); |
1087 | 1087 | ||
1088 | int | 1088 | int |
1089 | X509_check_email(X509 *x, const char *chk, size_t chklen, unsigned int flags) | 1089 | X509_check_email(X509 *x, const char *chk, size_t chklen, unsigned int flags) |
@@ -1096,7 +1096,7 @@ X509_check_email(X509 *x, const char *chk, size_t chklen, unsigned int flags) | |||
1096 | return -2; | 1096 | return -2; |
1097 | return do_x509_check(x, chk, chklen, flags, GEN_EMAIL, NULL); | 1097 | return do_x509_check(x, chk, chklen, flags, GEN_EMAIL, NULL); |
1098 | } | 1098 | } |
1099 | LCRYPTO_ALIAS(X509_check_email) | 1099 | LCRYPTO_ALIAS(X509_check_email); |
1100 | 1100 | ||
1101 | int | 1101 | int |
1102 | X509_check_ip(X509 *x, const unsigned char *chk, size_t chklen, | 1102 | X509_check_ip(X509 *x, const unsigned char *chk, size_t chklen, |
@@ -1106,7 +1106,7 @@ X509_check_ip(X509 *x, const unsigned char *chk, size_t chklen, | |||
1106 | return -2; | 1106 | return -2; |
1107 | return do_x509_check(x, (char *)chk, chklen, flags, GEN_IPADD, NULL); | 1107 | return do_x509_check(x, (char *)chk, chklen, flags, GEN_IPADD, NULL); |
1108 | } | 1108 | } |
1109 | LCRYPTO_ALIAS(X509_check_ip) | 1109 | LCRYPTO_ALIAS(X509_check_ip); |
1110 | 1110 | ||
1111 | int | 1111 | int |
1112 | X509_check_ip_asc(X509 *x, const char *ipasc, unsigned int flags) | 1112 | X509_check_ip_asc(X509 *x, const char *ipasc, unsigned int flags) |
@@ -1121,7 +1121,7 @@ X509_check_ip_asc(X509 *x, const char *ipasc, unsigned int flags) | |||
1121 | return -2; | 1121 | return -2; |
1122 | return do_x509_check(x, (char *)ipout, iplen, flags, GEN_IPADD, NULL); | 1122 | return do_x509_check(x, (char *)ipout, iplen, flags, GEN_IPADD, NULL); |
1123 | } | 1123 | } |
1124 | LCRYPTO_ALIAS(X509_check_ip_asc) | 1124 | LCRYPTO_ALIAS(X509_check_ip_asc); |
1125 | 1125 | ||
1126 | /* Convert IP addresses both IPv4 and IPv6 into an | 1126 | /* Convert IP addresses both IPv4 and IPv6 into an |
1127 | * OCTET STRING compatible with RFC3280. | 1127 | * OCTET STRING compatible with RFC3280. |
@@ -1150,7 +1150,7 @@ a2i_IPADDRESS(const char *ipasc) | |||
1150 | } | 1150 | } |
1151 | return ret; | 1151 | return ret; |
1152 | } | 1152 | } |
1153 | LCRYPTO_ALIAS(a2i_IPADDRESS) | 1153 | LCRYPTO_ALIAS(a2i_IPADDRESS); |
1154 | 1154 | ||
1155 | ASN1_OCTET_STRING * | 1155 | ASN1_OCTET_STRING * |
1156 | a2i_IPADDRESS_NC(const char *ipasc) | 1156 | a2i_IPADDRESS_NC(const char *ipasc) |
@@ -1196,7 +1196,7 @@ a2i_IPADDRESS_NC(const char *ipasc) | |||
1196 | ASN1_OCTET_STRING_free(ret); | 1196 | ASN1_OCTET_STRING_free(ret); |
1197 | return NULL; | 1197 | return NULL; |
1198 | } | 1198 | } |
1199 | LCRYPTO_ALIAS(a2i_IPADDRESS_NC) | 1199 | LCRYPTO_ALIAS(a2i_IPADDRESS_NC); |
1200 | 1200 | ||
1201 | 1201 | ||
1202 | int | 1202 | int |
@@ -1214,7 +1214,7 @@ a2i_ipadd(unsigned char *ipout, const char *ipasc) | |||
1214 | return 4; | 1214 | return 4; |
1215 | } | 1215 | } |
1216 | } | 1216 | } |
1217 | LCRYPTO_ALIAS(a2i_ipadd) | 1217 | LCRYPTO_ALIAS(a2i_ipadd); |
1218 | 1218 | ||
1219 | static int | 1219 | static int |
1220 | ipv4_from_asc(unsigned char *v4, const char *in) | 1220 | ipv4_from_asc(unsigned char *v4, const char *in) |
@@ -1411,4 +1411,4 @@ X509V3_NAME_from_section(X509_NAME *nm, STACK_OF(CONF_VALUE)*dn_sk, | |||
1411 | } | 1411 | } |
1412 | return 1; | 1412 | return 1; |
1413 | } | 1413 | } |
1414 | LCRYPTO_ALIAS(X509V3_NAME_from_section) | 1414 | LCRYPTO_ALIAS(X509V3_NAME_from_section); |
diff --git a/src/lib/libcrypto/x509/x509_v3.c b/src/lib/libcrypto/x509/x509_v3.c index 27f670c450..8dddb463ce 100644 --- a/src/lib/libcrypto/x509/x509_v3.c +++ b/src/lib/libcrypto/x509/x509_v3.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_v3.c,v 1.20 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509_v3.c,v 1.21 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -75,7 +75,7 @@ X509v3_get_ext_count(const STACK_OF(X509_EXTENSION) *x) | |||
75 | return (0); | 75 | return (0); |
76 | return (sk_X509_EXTENSION_num(x)); | 76 | return (sk_X509_EXTENSION_num(x)); |
77 | } | 77 | } |
78 | LCRYPTO_ALIAS(X509v3_get_ext_count) | 78 | LCRYPTO_ALIAS(X509v3_get_ext_count); |
79 | 79 | ||
80 | int | 80 | int |
81 | X509v3_get_ext_by_NID(const STACK_OF(X509_EXTENSION) *x, int nid, int lastpos) | 81 | X509v3_get_ext_by_NID(const STACK_OF(X509_EXTENSION) *x, int nid, int lastpos) |
@@ -87,7 +87,7 @@ X509v3_get_ext_by_NID(const STACK_OF(X509_EXTENSION) *x, int nid, int lastpos) | |||
87 | return (-2); | 87 | return (-2); |
88 | return (X509v3_get_ext_by_OBJ(x, obj, lastpos)); | 88 | return (X509v3_get_ext_by_OBJ(x, obj, lastpos)); |
89 | } | 89 | } |
90 | LCRYPTO_ALIAS(X509v3_get_ext_by_NID) | 90 | LCRYPTO_ALIAS(X509v3_get_ext_by_NID); |
91 | 91 | ||
92 | int | 92 | int |
93 | X509v3_get_ext_by_OBJ(const STACK_OF(X509_EXTENSION) *sk, | 93 | X509v3_get_ext_by_OBJ(const STACK_OF(X509_EXTENSION) *sk, |
@@ -109,7 +109,7 @@ X509v3_get_ext_by_OBJ(const STACK_OF(X509_EXTENSION) *sk, | |||
109 | } | 109 | } |
110 | return (-1); | 110 | return (-1); |
111 | } | 111 | } |
112 | LCRYPTO_ALIAS(X509v3_get_ext_by_OBJ) | 112 | LCRYPTO_ALIAS(X509v3_get_ext_by_OBJ); |
113 | 113 | ||
114 | int | 114 | int |
115 | X509v3_get_ext_by_critical(const STACK_OF(X509_EXTENSION) *sk, int crit, | 115 | X509v3_get_ext_by_critical(const STACK_OF(X509_EXTENSION) *sk, int crit, |
@@ -132,7 +132,7 @@ X509v3_get_ext_by_critical(const STACK_OF(X509_EXTENSION) *sk, int crit, | |||
132 | } | 132 | } |
133 | return (-1); | 133 | return (-1); |
134 | } | 134 | } |
135 | LCRYPTO_ALIAS(X509v3_get_ext_by_critical) | 135 | LCRYPTO_ALIAS(X509v3_get_ext_by_critical); |
136 | 136 | ||
137 | X509_EXTENSION * | 137 | X509_EXTENSION * |
138 | X509v3_get_ext(const STACK_OF(X509_EXTENSION) *x, int loc) | 138 | X509v3_get_ext(const STACK_OF(X509_EXTENSION) *x, int loc) |
@@ -142,7 +142,7 @@ X509v3_get_ext(const STACK_OF(X509_EXTENSION) *x, int loc) | |||
142 | else | 142 | else |
143 | return sk_X509_EXTENSION_value(x, loc); | 143 | return sk_X509_EXTENSION_value(x, loc); |
144 | } | 144 | } |
145 | LCRYPTO_ALIAS(X509v3_get_ext) | 145 | LCRYPTO_ALIAS(X509v3_get_ext); |
146 | 146 | ||
147 | X509_EXTENSION * | 147 | X509_EXTENSION * |
148 | X509v3_delete_ext(STACK_OF(X509_EXTENSION) *x, int loc) | 148 | X509v3_delete_ext(STACK_OF(X509_EXTENSION) *x, int loc) |
@@ -154,7 +154,7 @@ X509v3_delete_ext(STACK_OF(X509_EXTENSION) *x, int loc) | |||
154 | ret = sk_X509_EXTENSION_delete(x, loc); | 154 | ret = sk_X509_EXTENSION_delete(x, loc); |
155 | return (ret); | 155 | return (ret); |
156 | } | 156 | } |
157 | LCRYPTO_ALIAS(X509v3_delete_ext) | 157 | LCRYPTO_ALIAS(X509v3_delete_ext); |
158 | 158 | ||
159 | STACK_OF(X509_EXTENSION) * | 159 | STACK_OF(X509_EXTENSION) * |
160 | X509v3_add_ext(STACK_OF(X509_EXTENSION) **x, X509_EXTENSION *ex, int loc) | 160 | X509v3_add_ext(STACK_OF(X509_EXTENSION) **x, X509_EXTENSION *ex, int loc) |
@@ -197,7 +197,7 @@ err2: | |||
197 | sk_X509_EXTENSION_free(sk); | 197 | sk_X509_EXTENSION_free(sk); |
198 | return (NULL); | 198 | return (NULL); |
199 | } | 199 | } |
200 | LCRYPTO_ALIAS(X509v3_add_ext) | 200 | LCRYPTO_ALIAS(X509v3_add_ext); |
201 | 201 | ||
202 | X509_EXTENSION * | 202 | X509_EXTENSION * |
203 | X509_EXTENSION_create_by_NID(X509_EXTENSION **ex, int nid, int crit, | 203 | X509_EXTENSION_create_by_NID(X509_EXTENSION **ex, int nid, int crit, |
@@ -216,7 +216,7 @@ X509_EXTENSION_create_by_NID(X509_EXTENSION **ex, int nid, int crit, | |||
216 | ASN1_OBJECT_free(obj); | 216 | ASN1_OBJECT_free(obj); |
217 | return (ret); | 217 | return (ret); |
218 | } | 218 | } |
219 | LCRYPTO_ALIAS(X509_EXTENSION_create_by_NID) | 219 | LCRYPTO_ALIAS(X509_EXTENSION_create_by_NID); |
220 | 220 | ||
221 | X509_EXTENSION * | 221 | X509_EXTENSION * |
222 | X509_EXTENSION_create_by_OBJ(X509_EXTENSION **ex, const ASN1_OBJECT *obj, | 222 | X509_EXTENSION_create_by_OBJ(X509_EXTENSION **ex, const ASN1_OBJECT *obj, |
@@ -248,7 +248,7 @@ err: | |||
248 | X509_EXTENSION_free(ret); | 248 | X509_EXTENSION_free(ret); |
249 | return (NULL); | 249 | return (NULL); |
250 | } | 250 | } |
251 | LCRYPTO_ALIAS(X509_EXTENSION_create_by_OBJ) | 251 | LCRYPTO_ALIAS(X509_EXTENSION_create_by_OBJ); |
252 | 252 | ||
253 | int | 253 | int |
254 | X509_EXTENSION_set_object(X509_EXTENSION *ex, const ASN1_OBJECT *obj) | 254 | X509_EXTENSION_set_object(X509_EXTENSION *ex, const ASN1_OBJECT *obj) |
@@ -259,7 +259,7 @@ X509_EXTENSION_set_object(X509_EXTENSION *ex, const ASN1_OBJECT *obj) | |||
259 | ex->object = OBJ_dup(obj); | 259 | ex->object = OBJ_dup(obj); |
260 | return ex->object != NULL; | 260 | return ex->object != NULL; |
261 | } | 261 | } |
262 | LCRYPTO_ALIAS(X509_EXTENSION_set_object) | 262 | LCRYPTO_ALIAS(X509_EXTENSION_set_object); |
263 | 263 | ||
264 | int | 264 | int |
265 | X509_EXTENSION_set_critical(X509_EXTENSION *ex, int crit) | 265 | X509_EXTENSION_set_critical(X509_EXTENSION *ex, int crit) |
@@ -269,7 +269,7 @@ X509_EXTENSION_set_critical(X509_EXTENSION *ex, int crit) | |||
269 | ex->critical = (crit) ? 0xFF : -1; | 269 | ex->critical = (crit) ? 0xFF : -1; |
270 | return (1); | 270 | return (1); |
271 | } | 271 | } |
272 | LCRYPTO_ALIAS(X509_EXTENSION_set_critical) | 272 | LCRYPTO_ALIAS(X509_EXTENSION_set_critical); |
273 | 273 | ||
274 | int | 274 | int |
275 | X509_EXTENSION_set_data(X509_EXTENSION *ex, ASN1_OCTET_STRING *data) | 275 | X509_EXTENSION_set_data(X509_EXTENSION *ex, ASN1_OCTET_STRING *data) |
@@ -283,7 +283,7 @@ X509_EXTENSION_set_data(X509_EXTENSION *ex, ASN1_OCTET_STRING *data) | |||
283 | return (0); | 283 | return (0); |
284 | return (1); | 284 | return (1); |
285 | } | 285 | } |
286 | LCRYPTO_ALIAS(X509_EXTENSION_set_data) | 286 | LCRYPTO_ALIAS(X509_EXTENSION_set_data); |
287 | 287 | ||
288 | ASN1_OBJECT * | 288 | ASN1_OBJECT * |
289 | X509_EXTENSION_get_object(X509_EXTENSION *ex) | 289 | X509_EXTENSION_get_object(X509_EXTENSION *ex) |
@@ -292,7 +292,7 @@ X509_EXTENSION_get_object(X509_EXTENSION *ex) | |||
292 | return (NULL); | 292 | return (NULL); |
293 | return (ex->object); | 293 | return (ex->object); |
294 | } | 294 | } |
295 | LCRYPTO_ALIAS(X509_EXTENSION_get_object) | 295 | LCRYPTO_ALIAS(X509_EXTENSION_get_object); |
296 | 296 | ||
297 | ASN1_OCTET_STRING * | 297 | ASN1_OCTET_STRING * |
298 | X509_EXTENSION_get_data(X509_EXTENSION *ex) | 298 | X509_EXTENSION_get_data(X509_EXTENSION *ex) |
@@ -301,7 +301,7 @@ X509_EXTENSION_get_data(X509_EXTENSION *ex) | |||
301 | return (NULL); | 301 | return (NULL); |
302 | return (ex->value); | 302 | return (ex->value); |
303 | } | 303 | } |
304 | LCRYPTO_ALIAS(X509_EXTENSION_get_data) | 304 | LCRYPTO_ALIAS(X509_EXTENSION_get_data); |
305 | 305 | ||
306 | int | 306 | int |
307 | X509_EXTENSION_get_critical(const X509_EXTENSION *ex) | 307 | X509_EXTENSION_get_critical(const X509_EXTENSION *ex) |
@@ -312,4 +312,4 @@ X509_EXTENSION_get_critical(const X509_EXTENSION *ex) | |||
312 | return 1; | 312 | return 1; |
313 | return 0; | 313 | return 0; |
314 | } | 314 | } |
315 | LCRYPTO_ALIAS(X509_EXTENSION_get_critical) | 315 | LCRYPTO_ALIAS(X509_EXTENSION_get_critical); |
diff --git a/src/lib/libcrypto/x509/x509_vfy.c b/src/lib/libcrypto/x509/x509_vfy.c index f6c7c21f5f..8bba796198 100644 --- a/src/lib/libcrypto/x509/x509_vfy.c +++ b/src/lib/libcrypto/x509/x509_vfy.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_vfy.c,v 1.110 2022/12/26 07:18:53 jmc Exp $ */ | 1 | /* $OpenBSD: x509_vfy.c,v 1.111 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -668,7 +668,7 @@ X509_verify_cert(X509_STORE_CTX *ctx) | |||
668 | /* if we succeed we have a chain in ctx->chain */ | 668 | /* if we succeed we have a chain in ctx->chain */ |
669 | return (chain_count > 0 && ctx->chain != NULL); | 669 | return (chain_count > 0 && ctx->chain != NULL); |
670 | } | 670 | } |
671 | LCRYPTO_ALIAS(X509_verify_cert) | 671 | LCRYPTO_ALIAS(X509_verify_cert); |
672 | 672 | ||
673 | /* Given a STACK_OF(X509) find the issuer of cert (if any) | 673 | /* Given a STACK_OF(X509) find the issuer of cert (if any) |
674 | */ | 674 | */ |
@@ -2012,7 +2012,7 @@ X509_cmp_current_time(const ASN1_TIME *ctm) | |||
2012 | { | 2012 | { |
2013 | return X509_cmp_time(ctm, NULL); | 2013 | return X509_cmp_time(ctm, NULL); |
2014 | } | 2014 | } |
2015 | LCRYPTO_ALIAS(X509_cmp_current_time) | 2015 | LCRYPTO_ALIAS(X509_cmp_current_time); |
2016 | 2016 | ||
2017 | /* | 2017 | /* |
2018 | * Compare a possibly unvalidated ASN1_TIME string against a time_t | 2018 | * Compare a possibly unvalidated ASN1_TIME string against a time_t |
@@ -2052,7 +2052,7 @@ X509_cmp_time(const ASN1_TIME *ctm, time_t *cmp_time) | |||
2052 | { | 2052 | { |
2053 | return X509_cmp_time_internal(ctm, cmp_time, 0); | 2053 | return X509_cmp_time_internal(ctm, cmp_time, 0); |
2054 | } | 2054 | } |
2055 | LCRYPTO_ALIAS(X509_cmp_time) | 2055 | LCRYPTO_ALIAS(X509_cmp_time); |
2056 | 2056 | ||
2057 | 2057 | ||
2058 | ASN1_TIME * | 2058 | ASN1_TIME * |
@@ -2060,14 +2060,14 @@ X509_gmtime_adj(ASN1_TIME *s, long adj) | |||
2060 | { | 2060 | { |
2061 | return X509_time_adj(s, adj, NULL); | 2061 | return X509_time_adj(s, adj, NULL); |
2062 | } | 2062 | } |
2063 | LCRYPTO_ALIAS(X509_gmtime_adj) | 2063 | LCRYPTO_ALIAS(X509_gmtime_adj); |
2064 | 2064 | ||
2065 | ASN1_TIME * | 2065 | ASN1_TIME * |
2066 | X509_time_adj(ASN1_TIME *s, long offset_sec, time_t *in_time) | 2066 | X509_time_adj(ASN1_TIME *s, long offset_sec, time_t *in_time) |
2067 | { | 2067 | { |
2068 | return X509_time_adj_ex(s, 0, offset_sec, in_time); | 2068 | return X509_time_adj_ex(s, 0, offset_sec, in_time); |
2069 | } | 2069 | } |
2070 | LCRYPTO_ALIAS(X509_time_adj) | 2070 | LCRYPTO_ALIAS(X509_time_adj); |
2071 | 2071 | ||
2072 | ASN1_TIME * | 2072 | ASN1_TIME * |
2073 | X509_time_adj_ex(ASN1_TIME *s, int offset_day, long offset_sec, time_t *in_time) | 2073 | X509_time_adj_ex(ASN1_TIME *s, int offset_day, long offset_sec, time_t *in_time) |
@@ -2080,7 +2080,7 @@ X509_time_adj_ex(ASN1_TIME *s, int offset_day, long offset_sec, time_t *in_time) | |||
2080 | 2080 | ||
2081 | return ASN1_TIME_adj(s, t, offset_day, offset_sec); | 2081 | return ASN1_TIME_adj(s, t, offset_day, offset_sec); |
2082 | } | 2082 | } |
2083 | LCRYPTO_ALIAS(X509_time_adj_ex) | 2083 | LCRYPTO_ALIAS(X509_time_adj_ex); |
2084 | 2084 | ||
2085 | int | 2085 | int |
2086 | X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) | 2086 | X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) |
@@ -2120,7 +2120,7 @@ X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) | |||
2120 | return 0; | 2120 | return 0; |
2121 | return 1; | 2121 | return 1; |
2122 | } | 2122 | } |
2123 | LCRYPTO_ALIAS(X509_get_pubkey_parameters) | 2123 | LCRYPTO_ALIAS(X509_get_pubkey_parameters); |
2124 | 2124 | ||
2125 | int | 2125 | int |
2126 | X509_STORE_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | 2126 | X509_STORE_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, |
@@ -2131,77 +2131,77 @@ X509_STORE_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | |||
2131 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_X509_STORE_CTX, | 2131 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_X509_STORE_CTX, |
2132 | argl, argp, new_func, dup_func, free_func); | 2132 | argl, argp, new_func, dup_func, free_func); |
2133 | } | 2133 | } |
2134 | LCRYPTO_ALIAS(X509_STORE_CTX_get_ex_new_index) | 2134 | LCRYPTO_ALIAS(X509_STORE_CTX_get_ex_new_index); |
2135 | 2135 | ||
2136 | int | 2136 | int |
2137 | X509_STORE_CTX_set_ex_data(X509_STORE_CTX *ctx, int idx, void *data) | 2137 | X509_STORE_CTX_set_ex_data(X509_STORE_CTX *ctx, int idx, void *data) |
2138 | { | 2138 | { |
2139 | return CRYPTO_set_ex_data(&ctx->ex_data, idx, data); | 2139 | return CRYPTO_set_ex_data(&ctx->ex_data, idx, data); |
2140 | } | 2140 | } |
2141 | LCRYPTO_ALIAS(X509_STORE_CTX_set_ex_data) | 2141 | LCRYPTO_ALIAS(X509_STORE_CTX_set_ex_data); |
2142 | 2142 | ||
2143 | void * | 2143 | void * |
2144 | X509_STORE_CTX_get_ex_data(X509_STORE_CTX *ctx, int idx) | 2144 | X509_STORE_CTX_get_ex_data(X509_STORE_CTX *ctx, int idx) |
2145 | { | 2145 | { |
2146 | return CRYPTO_get_ex_data(&ctx->ex_data, idx); | 2146 | return CRYPTO_get_ex_data(&ctx->ex_data, idx); |
2147 | } | 2147 | } |
2148 | LCRYPTO_ALIAS(X509_STORE_CTX_get_ex_data) | 2148 | LCRYPTO_ALIAS(X509_STORE_CTX_get_ex_data); |
2149 | 2149 | ||
2150 | int | 2150 | int |
2151 | X509_STORE_CTX_get_error(X509_STORE_CTX *ctx) | 2151 | X509_STORE_CTX_get_error(X509_STORE_CTX *ctx) |
2152 | { | 2152 | { |
2153 | return ctx->error; | 2153 | return ctx->error; |
2154 | } | 2154 | } |
2155 | LCRYPTO_ALIAS(X509_STORE_CTX_get_error) | 2155 | LCRYPTO_ALIAS(X509_STORE_CTX_get_error); |
2156 | 2156 | ||
2157 | void | 2157 | void |
2158 | X509_STORE_CTX_set_error(X509_STORE_CTX *ctx, int err) | 2158 | X509_STORE_CTX_set_error(X509_STORE_CTX *ctx, int err) |
2159 | { | 2159 | { |
2160 | ctx->error = err; | 2160 | ctx->error = err; |
2161 | } | 2161 | } |
2162 | LCRYPTO_ALIAS(X509_STORE_CTX_set_error) | 2162 | LCRYPTO_ALIAS(X509_STORE_CTX_set_error); |
2163 | 2163 | ||
2164 | int | 2164 | int |
2165 | X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx) | 2165 | X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx) |
2166 | { | 2166 | { |
2167 | return ctx->error_depth; | 2167 | return ctx->error_depth; |
2168 | } | 2168 | } |
2169 | LCRYPTO_ALIAS(X509_STORE_CTX_get_error_depth) | 2169 | LCRYPTO_ALIAS(X509_STORE_CTX_get_error_depth); |
2170 | 2170 | ||
2171 | void | 2171 | void |
2172 | X509_STORE_CTX_set_error_depth(X509_STORE_CTX *ctx, int depth) | 2172 | X509_STORE_CTX_set_error_depth(X509_STORE_CTX *ctx, int depth) |
2173 | { | 2173 | { |
2174 | ctx->error_depth = depth; | 2174 | ctx->error_depth = depth; |
2175 | } | 2175 | } |
2176 | LCRYPTO_ALIAS(X509_STORE_CTX_set_error_depth) | 2176 | LCRYPTO_ALIAS(X509_STORE_CTX_set_error_depth); |
2177 | 2177 | ||
2178 | X509 * | 2178 | X509 * |
2179 | X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx) | 2179 | X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx) |
2180 | { | 2180 | { |
2181 | return ctx->current_cert; | 2181 | return ctx->current_cert; |
2182 | } | 2182 | } |
2183 | LCRYPTO_ALIAS(X509_STORE_CTX_get_current_cert) | 2183 | LCRYPTO_ALIAS(X509_STORE_CTX_get_current_cert); |
2184 | 2184 | ||
2185 | void | 2185 | void |
2186 | X509_STORE_CTX_set_current_cert(X509_STORE_CTX *ctx, X509 *x) | 2186 | X509_STORE_CTX_set_current_cert(X509_STORE_CTX *ctx, X509 *x) |
2187 | { | 2187 | { |
2188 | ctx->current_cert = x; | 2188 | ctx->current_cert = x; |
2189 | } | 2189 | } |
2190 | LCRYPTO_ALIAS(X509_STORE_CTX_set_current_cert) | 2190 | LCRYPTO_ALIAS(X509_STORE_CTX_set_current_cert); |
2191 | 2191 | ||
2192 | STACK_OF(X509) * | 2192 | STACK_OF(X509) * |
2193 | X509_STORE_CTX_get_chain(X509_STORE_CTX *ctx) | 2193 | X509_STORE_CTX_get_chain(X509_STORE_CTX *ctx) |
2194 | { | 2194 | { |
2195 | return ctx->chain; | 2195 | return ctx->chain; |
2196 | } | 2196 | } |
2197 | LCRYPTO_ALIAS(X509_STORE_CTX_get_chain) | 2197 | LCRYPTO_ALIAS(X509_STORE_CTX_get_chain); |
2198 | 2198 | ||
2199 | STACK_OF(X509) * | 2199 | STACK_OF(X509) * |
2200 | X509_STORE_CTX_get0_chain(X509_STORE_CTX *xs) | 2200 | X509_STORE_CTX_get0_chain(X509_STORE_CTX *xs) |
2201 | { | 2201 | { |
2202 | return xs->chain; | 2202 | return xs->chain; |
2203 | } | 2203 | } |
2204 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_chain) | 2204 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_chain); |
2205 | 2205 | ||
2206 | STACK_OF(X509) * | 2206 | STACK_OF(X509) * |
2207 | X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx) | 2207 | X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx) |
@@ -2218,70 +2218,70 @@ X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx) | |||
2218 | } | 2218 | } |
2219 | return chain; | 2219 | return chain; |
2220 | } | 2220 | } |
2221 | LCRYPTO_ALIAS(X509_STORE_CTX_get1_chain) | 2221 | LCRYPTO_ALIAS(X509_STORE_CTX_get1_chain); |
2222 | 2222 | ||
2223 | X509 * | 2223 | X509 * |
2224 | X509_STORE_CTX_get0_current_issuer(X509_STORE_CTX *ctx) | 2224 | X509_STORE_CTX_get0_current_issuer(X509_STORE_CTX *ctx) |
2225 | { | 2225 | { |
2226 | return ctx->current_issuer; | 2226 | return ctx->current_issuer; |
2227 | } | 2227 | } |
2228 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_current_issuer) | 2228 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_current_issuer); |
2229 | 2229 | ||
2230 | X509_CRL * | 2230 | X509_CRL * |
2231 | X509_STORE_CTX_get0_current_crl(X509_STORE_CTX *ctx) | 2231 | X509_STORE_CTX_get0_current_crl(X509_STORE_CTX *ctx) |
2232 | { | 2232 | { |
2233 | return ctx->current_crl; | 2233 | return ctx->current_crl; |
2234 | } | 2234 | } |
2235 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_current_crl) | 2235 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_current_crl); |
2236 | 2236 | ||
2237 | X509_STORE_CTX * | 2237 | X509_STORE_CTX * |
2238 | X509_STORE_CTX_get0_parent_ctx(X509_STORE_CTX *ctx) | 2238 | X509_STORE_CTX_get0_parent_ctx(X509_STORE_CTX *ctx) |
2239 | { | 2239 | { |
2240 | return ctx->parent; | 2240 | return ctx->parent; |
2241 | } | 2241 | } |
2242 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_parent_ctx) | 2242 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_parent_ctx); |
2243 | 2243 | ||
2244 | X509_STORE * | 2244 | X509_STORE * |
2245 | X509_STORE_CTX_get0_store(X509_STORE_CTX *xs) | 2245 | X509_STORE_CTX_get0_store(X509_STORE_CTX *xs) |
2246 | { | 2246 | { |
2247 | return xs->store; | 2247 | return xs->store; |
2248 | } | 2248 | } |
2249 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_store) | 2249 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_store); |
2250 | 2250 | ||
2251 | void | 2251 | void |
2252 | X509_STORE_CTX_set_cert(X509_STORE_CTX *ctx, X509 *x) | 2252 | X509_STORE_CTX_set_cert(X509_STORE_CTX *ctx, X509 *x) |
2253 | { | 2253 | { |
2254 | ctx->cert = x; | 2254 | ctx->cert = x; |
2255 | } | 2255 | } |
2256 | LCRYPTO_ALIAS(X509_STORE_CTX_set_cert) | 2256 | LCRYPTO_ALIAS(X509_STORE_CTX_set_cert); |
2257 | 2257 | ||
2258 | void | 2258 | void |
2259 | X509_STORE_CTX_set_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | 2259 | X509_STORE_CTX_set_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) |
2260 | { | 2260 | { |
2261 | ctx->untrusted = sk; | 2261 | ctx->untrusted = sk; |
2262 | } | 2262 | } |
2263 | LCRYPTO_ALIAS(X509_STORE_CTX_set_chain) | 2263 | LCRYPTO_ALIAS(X509_STORE_CTX_set_chain); |
2264 | 2264 | ||
2265 | void | 2265 | void |
2266 | X509_STORE_CTX_set0_crls(X509_STORE_CTX *ctx, STACK_OF(X509_CRL) *sk) | 2266 | X509_STORE_CTX_set0_crls(X509_STORE_CTX *ctx, STACK_OF(X509_CRL) *sk) |
2267 | { | 2267 | { |
2268 | ctx->crls = sk; | 2268 | ctx->crls = sk; |
2269 | } | 2269 | } |
2270 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_crls) | 2270 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_crls); |
2271 | 2271 | ||
2272 | int | 2272 | int |
2273 | X509_STORE_CTX_set_purpose(X509_STORE_CTX *ctx, int purpose) | 2273 | X509_STORE_CTX_set_purpose(X509_STORE_CTX *ctx, int purpose) |
2274 | { | 2274 | { |
2275 | return X509_STORE_CTX_purpose_inherit(ctx, 0, purpose, 0); | 2275 | return X509_STORE_CTX_purpose_inherit(ctx, 0, purpose, 0); |
2276 | } | 2276 | } |
2277 | LCRYPTO_ALIAS(X509_STORE_CTX_set_purpose) | 2277 | LCRYPTO_ALIAS(X509_STORE_CTX_set_purpose); |
2278 | 2278 | ||
2279 | int | 2279 | int |
2280 | X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) | 2280 | X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) |
2281 | { | 2281 | { |
2282 | return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); | 2282 | return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); |
2283 | } | 2283 | } |
2284 | LCRYPTO_ALIAS(X509_STORE_CTX_set_trust) | 2284 | LCRYPTO_ALIAS(X509_STORE_CTX_set_trust); |
2285 | 2285 | ||
2286 | /* This function is used to set the X509_STORE_CTX purpose and trust | 2286 | /* This function is used to set the X509_STORE_CTX purpose and trust |
2287 | * values. This is intended to be used when another structure has its | 2287 | * values. This is intended to be used when another structure has its |
@@ -2337,7 +2337,7 @@ X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, | |||
2337 | ctx->param->trust = trust; | 2337 | ctx->param->trust = trust; |
2338 | return 1; | 2338 | return 1; |
2339 | } | 2339 | } |
2340 | LCRYPTO_ALIAS(X509_STORE_CTX_purpose_inherit) | 2340 | LCRYPTO_ALIAS(X509_STORE_CTX_purpose_inherit); |
2341 | 2341 | ||
2342 | X509_STORE_CTX * | 2342 | X509_STORE_CTX * |
2343 | X509_STORE_CTX_new(void) | 2343 | X509_STORE_CTX_new(void) |
@@ -2351,7 +2351,7 @@ X509_STORE_CTX_new(void) | |||
2351 | } | 2351 | } |
2352 | return ctx; | 2352 | return ctx; |
2353 | } | 2353 | } |
2354 | LCRYPTO_ALIAS(X509_STORE_CTX_new) | 2354 | LCRYPTO_ALIAS(X509_STORE_CTX_new); |
2355 | 2355 | ||
2356 | void | 2356 | void |
2357 | X509_STORE_CTX_free(X509_STORE_CTX *ctx) | 2357 | X509_STORE_CTX_free(X509_STORE_CTX *ctx) |
@@ -2362,7 +2362,7 @@ X509_STORE_CTX_free(X509_STORE_CTX *ctx) | |||
2362 | X509_STORE_CTX_cleanup(ctx); | 2362 | X509_STORE_CTX_cleanup(ctx); |
2363 | free(ctx); | 2363 | free(ctx); |
2364 | } | 2364 | } |
2365 | LCRYPTO_ALIAS(X509_STORE_CTX_free) | 2365 | LCRYPTO_ALIAS(X509_STORE_CTX_free); |
2366 | 2366 | ||
2367 | int | 2367 | int |
2368 | X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, | 2368 | X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, |
@@ -2484,7 +2484,7 @@ X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, | |||
2484 | } | 2484 | } |
2485 | return 1; | 2485 | return 1; |
2486 | } | 2486 | } |
2487 | LCRYPTO_ALIAS(X509_STORE_CTX_init) | 2487 | LCRYPTO_ALIAS(X509_STORE_CTX_init); |
2488 | 2488 | ||
2489 | /* Set alternative lookup method: just a STACK of trusted certificates. | 2489 | /* Set alternative lookup method: just a STACK of trusted certificates. |
2490 | * This avoids X509_STORE nastiness where it isn't needed. | 2490 | * This avoids X509_STORE nastiness where it isn't needed. |
@@ -2496,14 +2496,14 @@ X509_STORE_CTX_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | |||
2496 | ctx->other_ctx = sk; | 2496 | ctx->other_ctx = sk; |
2497 | ctx->get_issuer = get_issuer_sk; | 2497 | ctx->get_issuer = get_issuer_sk; |
2498 | } | 2498 | } |
2499 | LCRYPTO_ALIAS(X509_STORE_CTX_trusted_stack) | 2499 | LCRYPTO_ALIAS(X509_STORE_CTX_trusted_stack); |
2500 | 2500 | ||
2501 | void | 2501 | void |
2502 | X509_STORE_CTX_set0_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | 2502 | X509_STORE_CTX_set0_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) |
2503 | { | 2503 | { |
2504 | X509_STORE_CTX_trusted_stack(ctx, sk); | 2504 | X509_STORE_CTX_trusted_stack(ctx, sk); |
2505 | } | 2505 | } |
2506 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_trusted_stack) | 2506 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_trusted_stack); |
2507 | 2507 | ||
2508 | void | 2508 | void |
2509 | X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) | 2509 | X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) |
@@ -2527,35 +2527,35 @@ X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) | |||
2527 | ctx, &(ctx->ex_data)); | 2527 | ctx, &(ctx->ex_data)); |
2528 | memset(&ctx->ex_data, 0, sizeof(CRYPTO_EX_DATA)); | 2528 | memset(&ctx->ex_data, 0, sizeof(CRYPTO_EX_DATA)); |
2529 | } | 2529 | } |
2530 | LCRYPTO_ALIAS(X509_STORE_CTX_cleanup) | 2530 | LCRYPTO_ALIAS(X509_STORE_CTX_cleanup); |
2531 | 2531 | ||
2532 | void | 2532 | void |
2533 | X509_STORE_CTX_set_depth(X509_STORE_CTX *ctx, int depth) | 2533 | X509_STORE_CTX_set_depth(X509_STORE_CTX *ctx, int depth) |
2534 | { | 2534 | { |
2535 | X509_VERIFY_PARAM_set_depth(ctx->param, depth); | 2535 | X509_VERIFY_PARAM_set_depth(ctx->param, depth); |
2536 | } | 2536 | } |
2537 | LCRYPTO_ALIAS(X509_STORE_CTX_set_depth) | 2537 | LCRYPTO_ALIAS(X509_STORE_CTX_set_depth); |
2538 | 2538 | ||
2539 | void | 2539 | void |
2540 | X509_STORE_CTX_set_flags(X509_STORE_CTX *ctx, unsigned long flags) | 2540 | X509_STORE_CTX_set_flags(X509_STORE_CTX *ctx, unsigned long flags) |
2541 | { | 2541 | { |
2542 | X509_VERIFY_PARAM_set_flags(ctx->param, flags); | 2542 | X509_VERIFY_PARAM_set_flags(ctx->param, flags); |
2543 | } | 2543 | } |
2544 | LCRYPTO_ALIAS(X509_STORE_CTX_set_flags) | 2544 | LCRYPTO_ALIAS(X509_STORE_CTX_set_flags); |
2545 | 2545 | ||
2546 | void | 2546 | void |
2547 | X509_STORE_CTX_set_time(X509_STORE_CTX *ctx, unsigned long flags, time_t t) | 2547 | X509_STORE_CTX_set_time(X509_STORE_CTX *ctx, unsigned long flags, time_t t) |
2548 | { | 2548 | { |
2549 | X509_VERIFY_PARAM_set_time(ctx->param, t); | 2549 | X509_VERIFY_PARAM_set_time(ctx->param, t); |
2550 | } | 2550 | } |
2551 | LCRYPTO_ALIAS(X509_STORE_CTX_set_time) | 2551 | LCRYPTO_ALIAS(X509_STORE_CTX_set_time); |
2552 | 2552 | ||
2553 | int | 2553 | int |
2554 | (*X509_STORE_CTX_get_verify_cb(X509_STORE_CTX *ctx))(int, X509_STORE_CTX *) | 2554 | (*X509_STORE_CTX_get_verify_cb(X509_STORE_CTX *ctx))(int, X509_STORE_CTX *) |
2555 | { | 2555 | { |
2556 | return ctx->verify_cb; | 2556 | return ctx->verify_cb; |
2557 | } | 2557 | } |
2558 | LCRYPTO_ALIAS(X509_STORE_CTX_get_verify_cb) | 2558 | LCRYPTO_ALIAS(X509_STORE_CTX_get_verify_cb); |
2559 | 2559 | ||
2560 | void | 2560 | void |
2561 | X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx, | 2561 | X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx, |
@@ -2563,28 +2563,28 @@ X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx, | |||
2563 | { | 2563 | { |
2564 | ctx->verify_cb = verify_cb; | 2564 | ctx->verify_cb = verify_cb; |
2565 | } | 2565 | } |
2566 | LCRYPTO_ALIAS(X509_STORE_CTX_set_verify_cb) | 2566 | LCRYPTO_ALIAS(X509_STORE_CTX_set_verify_cb); |
2567 | 2567 | ||
2568 | int | 2568 | int |
2569 | (*X509_STORE_CTX_get_verify(X509_STORE_CTX *ctx))(X509_STORE_CTX *) | 2569 | (*X509_STORE_CTX_get_verify(X509_STORE_CTX *ctx))(X509_STORE_CTX *) |
2570 | { | 2570 | { |
2571 | return ctx->verify; | 2571 | return ctx->verify; |
2572 | } | 2572 | } |
2573 | LCRYPTO_ALIAS(X509_STORE_CTX_get_verify) | 2573 | LCRYPTO_ALIAS(X509_STORE_CTX_get_verify); |
2574 | 2574 | ||
2575 | void | 2575 | void |
2576 | X509_STORE_CTX_set_verify(X509_STORE_CTX *ctx, int (*verify)(X509_STORE_CTX *)) | 2576 | X509_STORE_CTX_set_verify(X509_STORE_CTX *ctx, int (*verify)(X509_STORE_CTX *)) |
2577 | { | 2577 | { |
2578 | ctx->verify = verify; | 2578 | ctx->verify = verify; |
2579 | } | 2579 | } |
2580 | LCRYPTO_ALIAS(X509_STORE_CTX_set_verify) | 2580 | LCRYPTO_ALIAS(X509_STORE_CTX_set_verify); |
2581 | 2581 | ||
2582 | X509_STORE_CTX_check_issued_fn | 2582 | X509_STORE_CTX_check_issued_fn |
2583 | X509_STORE_get_check_issued(X509_STORE *store) | 2583 | X509_STORE_get_check_issued(X509_STORE *store) |
2584 | { | 2584 | { |
2585 | return store->check_issued; | 2585 | return store->check_issued; |
2586 | } | 2586 | } |
2587 | LCRYPTO_ALIAS(X509_STORE_get_check_issued) | 2587 | LCRYPTO_ALIAS(X509_STORE_get_check_issued); |
2588 | 2588 | ||
2589 | void | 2589 | void |
2590 | X509_STORE_set_check_issued(X509_STORE *store, | 2590 | X509_STORE_set_check_issued(X509_STORE *store, |
@@ -2592,35 +2592,35 @@ X509_STORE_set_check_issued(X509_STORE *store, | |||
2592 | { | 2592 | { |
2593 | store->check_issued = check_issued; | 2593 | store->check_issued = check_issued; |
2594 | } | 2594 | } |
2595 | LCRYPTO_ALIAS(X509_STORE_set_check_issued) | 2595 | LCRYPTO_ALIAS(X509_STORE_set_check_issued); |
2596 | 2596 | ||
2597 | X509_STORE_CTX_check_issued_fn | 2597 | X509_STORE_CTX_check_issued_fn |
2598 | X509_STORE_CTX_get_check_issued(X509_STORE_CTX *ctx) | 2598 | X509_STORE_CTX_get_check_issued(X509_STORE_CTX *ctx) |
2599 | { | 2599 | { |
2600 | return ctx->check_issued; | 2600 | return ctx->check_issued; |
2601 | } | 2601 | } |
2602 | LCRYPTO_ALIAS(X509_STORE_CTX_get_check_issued) | 2602 | LCRYPTO_ALIAS(X509_STORE_CTX_get_check_issued); |
2603 | 2603 | ||
2604 | X509 * | 2604 | X509 * |
2605 | X509_STORE_CTX_get0_cert(X509_STORE_CTX *ctx) | 2605 | X509_STORE_CTX_get0_cert(X509_STORE_CTX *ctx) |
2606 | { | 2606 | { |
2607 | return ctx->cert; | 2607 | return ctx->cert; |
2608 | } | 2608 | } |
2609 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_cert) | 2609 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_cert); |
2610 | 2610 | ||
2611 | STACK_OF(X509) * | 2611 | STACK_OF(X509) * |
2612 | X509_STORE_CTX_get0_untrusted(X509_STORE_CTX *ctx) | 2612 | X509_STORE_CTX_get0_untrusted(X509_STORE_CTX *ctx) |
2613 | { | 2613 | { |
2614 | return ctx->untrusted; | 2614 | return ctx->untrusted; |
2615 | } | 2615 | } |
2616 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_untrusted) | 2616 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_untrusted); |
2617 | 2617 | ||
2618 | void | 2618 | void |
2619 | X509_STORE_CTX_set0_untrusted(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | 2619 | X509_STORE_CTX_set0_untrusted(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) |
2620 | { | 2620 | { |
2621 | ctx->untrusted = sk; | 2621 | ctx->untrusted = sk; |
2622 | } | 2622 | } |
2623 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_untrusted) | 2623 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_untrusted); |
2624 | 2624 | ||
2625 | void | 2625 | void |
2626 | X509_STORE_CTX_set0_verified_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | 2626 | X509_STORE_CTX_set0_verified_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) |
@@ -2628,28 +2628,28 @@ X509_STORE_CTX_set0_verified_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | |||
2628 | sk_X509_pop_free(ctx->chain, X509_free); | 2628 | sk_X509_pop_free(ctx->chain, X509_free); |
2629 | ctx->chain = sk; | 2629 | ctx->chain = sk; |
2630 | } | 2630 | } |
2631 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_verified_chain) | 2631 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_verified_chain); |
2632 | 2632 | ||
2633 | X509_POLICY_TREE * | 2633 | X509_POLICY_TREE * |
2634 | X509_STORE_CTX_get0_policy_tree(X509_STORE_CTX *ctx) | 2634 | X509_STORE_CTX_get0_policy_tree(X509_STORE_CTX *ctx) |
2635 | { | 2635 | { |
2636 | return ctx->tree; | 2636 | return ctx->tree; |
2637 | } | 2637 | } |
2638 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_policy_tree) | 2638 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_policy_tree); |
2639 | 2639 | ||
2640 | int | 2640 | int |
2641 | X509_STORE_CTX_get_explicit_policy(X509_STORE_CTX *ctx) | 2641 | X509_STORE_CTX_get_explicit_policy(X509_STORE_CTX *ctx) |
2642 | { | 2642 | { |
2643 | return ctx->explicit_policy; | 2643 | return ctx->explicit_policy; |
2644 | } | 2644 | } |
2645 | LCRYPTO_ALIAS(X509_STORE_CTX_get_explicit_policy) | 2645 | LCRYPTO_ALIAS(X509_STORE_CTX_get_explicit_policy); |
2646 | 2646 | ||
2647 | int | 2647 | int |
2648 | X509_STORE_CTX_get_num_untrusted(X509_STORE_CTX *ctx) | 2648 | X509_STORE_CTX_get_num_untrusted(X509_STORE_CTX *ctx) |
2649 | { | 2649 | { |
2650 | return ctx->num_untrusted; | 2650 | return ctx->num_untrusted; |
2651 | } | 2651 | } |
2652 | LCRYPTO_ALIAS(X509_STORE_CTX_get_num_untrusted) | 2652 | LCRYPTO_ALIAS(X509_STORE_CTX_get_num_untrusted); |
2653 | 2653 | ||
2654 | int | 2654 | int |
2655 | X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name) | 2655 | X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name) |
@@ -2660,14 +2660,14 @@ X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name) | |||
2660 | return 0; | 2660 | return 0; |
2661 | return X509_VERIFY_PARAM_inherit(ctx->param, param); | 2661 | return X509_VERIFY_PARAM_inherit(ctx->param, param); |
2662 | } | 2662 | } |
2663 | LCRYPTO_ALIAS(X509_STORE_CTX_set_default) | 2663 | LCRYPTO_ALIAS(X509_STORE_CTX_set_default); |
2664 | 2664 | ||
2665 | X509_VERIFY_PARAM * | 2665 | X509_VERIFY_PARAM * |
2666 | X509_STORE_CTX_get0_param(X509_STORE_CTX *ctx) | 2666 | X509_STORE_CTX_get0_param(X509_STORE_CTX *ctx) |
2667 | { | 2667 | { |
2668 | return ctx->param; | 2668 | return ctx->param; |
2669 | } | 2669 | } |
2670 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_param) | 2670 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_param); |
2671 | 2671 | ||
2672 | void | 2672 | void |
2673 | X509_STORE_CTX_set0_param(X509_STORE_CTX *ctx, X509_VERIFY_PARAM *param) | 2673 | X509_STORE_CTX_set0_param(X509_STORE_CTX *ctx, X509_VERIFY_PARAM *param) |
@@ -2676,7 +2676,7 @@ X509_STORE_CTX_set0_param(X509_STORE_CTX *ctx, X509_VERIFY_PARAM *param) | |||
2676 | X509_VERIFY_PARAM_free(ctx->param); | 2676 | X509_VERIFY_PARAM_free(ctx->param); |
2677 | ctx->param = param; | 2677 | ctx->param = param; |
2678 | } | 2678 | } |
2679 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_param) | 2679 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_param); |
2680 | 2680 | ||
2681 | /* | 2681 | /* |
2682 | * Check if |bits| are adequate for |security level|. | 2682 | * Check if |bits| are adequate for |security level|. |
diff --git a/src/lib/libcrypto/x509/x509_vpm.c b/src/lib/libcrypto/x509/x509_vpm.c index 724a28fc1b..cb13267b75 100644 --- a/src/lib/libcrypto/x509/x509_vpm.c +++ b/src/lib/libcrypto/x509/x509_vpm.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_vpm.c,v 1.32 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509_vpm.c,v 1.33 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2004. | 3 | * project 2004. |
4 | */ | 4 | */ |
@@ -218,7 +218,7 @@ X509_VERIFY_PARAM_new(void) | |||
218 | x509_verify_param_zero(param); | 218 | x509_verify_param_zero(param); |
219 | return param; | 219 | return param; |
220 | } | 220 | } |
221 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_new) | 221 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_new); |
222 | 222 | ||
223 | void | 223 | void |
224 | X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param) | 224 | X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param) |
@@ -229,7 +229,7 @@ X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param) | |||
229 | free(param->id); | 229 | free(param->id); |
230 | free(param); | 230 | free(param); |
231 | } | 231 | } |
232 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_free) | 232 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_free); |
233 | 233 | ||
234 | /* | 234 | /* |
235 | * This function determines how parameters are "inherited" from one structure | 235 | * This function determines how parameters are "inherited" from one structure |
@@ -358,7 +358,7 @@ X509_VERIFY_PARAM_inherit(X509_VERIFY_PARAM *dest, const X509_VERIFY_PARAM *src) | |||
358 | 358 | ||
359 | return 1; | 359 | return 1; |
360 | } | 360 | } |
361 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_inherit) | 361 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_inherit); |
362 | 362 | ||
363 | int | 363 | int |
364 | X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, const X509_VERIFY_PARAM *from) | 364 | X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, const X509_VERIFY_PARAM *from) |
@@ -371,7 +371,7 @@ X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, const X509_VERIFY_PARAM *from) | |||
371 | to->inh_flags = save_flags; | 371 | to->inh_flags = save_flags; |
372 | return ret; | 372 | return ret; |
373 | } | 373 | } |
374 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1) | 374 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1); |
375 | 375 | ||
376 | static int | 376 | static int |
377 | x509_param_set1_internal(char **pdest, size_t *pdestlen, const char *src, | 377 | x509_param_set1_internal(char **pdest, size_t *pdestlen, const char *src, |
@@ -416,7 +416,7 @@ X509_VERIFY_PARAM_set1_name(X509_VERIFY_PARAM *param, const char *name) | |||
416 | return 1; | 416 | return 1; |
417 | return 0; | 417 | return 0; |
418 | } | 418 | } |
419 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_name) | 419 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_name); |
420 | 420 | ||
421 | int | 421 | int |
422 | X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags) | 422 | X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags) |
@@ -426,7 +426,7 @@ X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags) | |||
426 | param->flags |= X509_V_FLAG_POLICY_CHECK; | 426 | param->flags |= X509_V_FLAG_POLICY_CHECK; |
427 | return 1; | 427 | return 1; |
428 | } | 428 | } |
429 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_flags) | 429 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_flags); |
430 | 430 | ||
431 | int | 431 | int |
432 | X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, unsigned long flags) | 432 | X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, unsigned long flags) |
@@ -434,49 +434,49 @@ X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, unsigned long flags) | |||
434 | param->flags &= ~flags; | 434 | param->flags &= ~flags; |
435 | return 1; | 435 | return 1; |
436 | } | 436 | } |
437 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_clear_flags) | 437 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_clear_flags); |
438 | 438 | ||
439 | unsigned long | 439 | unsigned long |
440 | X509_VERIFY_PARAM_get_flags(X509_VERIFY_PARAM *param) | 440 | X509_VERIFY_PARAM_get_flags(X509_VERIFY_PARAM *param) |
441 | { | 441 | { |
442 | return param->flags; | 442 | return param->flags; |
443 | } | 443 | } |
444 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_flags) | 444 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_flags); |
445 | 445 | ||
446 | int | 446 | int |
447 | X509_VERIFY_PARAM_set_purpose(X509_VERIFY_PARAM *param, int purpose) | 447 | X509_VERIFY_PARAM_set_purpose(X509_VERIFY_PARAM *param, int purpose) |
448 | { | 448 | { |
449 | return X509_PURPOSE_set(¶m->purpose, purpose); | 449 | return X509_PURPOSE_set(¶m->purpose, purpose); |
450 | } | 450 | } |
451 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_purpose) | 451 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_purpose); |
452 | 452 | ||
453 | int | 453 | int |
454 | X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) | 454 | X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) |
455 | { | 455 | { |
456 | return X509_TRUST_set(¶m->trust, trust); | 456 | return X509_TRUST_set(¶m->trust, trust); |
457 | } | 457 | } |
458 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_trust) | 458 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_trust); |
459 | 459 | ||
460 | void | 460 | void |
461 | X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth) | 461 | X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth) |
462 | { | 462 | { |
463 | param->depth = depth; | 463 | param->depth = depth; |
464 | } | 464 | } |
465 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_depth) | 465 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_depth); |
466 | 466 | ||
467 | void | 467 | void |
468 | X509_VERIFY_PARAM_set_auth_level(X509_VERIFY_PARAM *param, int auth_level) | 468 | X509_VERIFY_PARAM_set_auth_level(X509_VERIFY_PARAM *param, int auth_level) |
469 | { | 469 | { |
470 | param->security_level = auth_level; | 470 | param->security_level = auth_level; |
471 | } | 471 | } |
472 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_auth_level) | 472 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_auth_level); |
473 | 473 | ||
474 | time_t | 474 | time_t |
475 | X509_VERIFY_PARAM_get_time(const X509_VERIFY_PARAM *param) | 475 | X509_VERIFY_PARAM_get_time(const X509_VERIFY_PARAM *param) |
476 | { | 476 | { |
477 | return param->check_time; | 477 | return param->check_time; |
478 | } | 478 | } |
479 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_time) | 479 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_time); |
480 | 480 | ||
481 | void | 481 | void |
482 | X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t) | 482 | X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t) |
@@ -484,7 +484,7 @@ X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t) | |||
484 | param->check_time = t; | 484 | param->check_time = t; |
485 | param->flags |= X509_V_FLAG_USE_CHECK_TIME; | 485 | param->flags |= X509_V_FLAG_USE_CHECK_TIME; |
486 | } | 486 | } |
487 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_time) | 487 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_time); |
488 | 488 | ||
489 | int | 489 | int |
490 | X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) | 490 | X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) |
@@ -498,7 +498,7 @@ X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) | |||
498 | return 0; | 498 | return 0; |
499 | return 1; | 499 | return 1; |
500 | } | 500 | } |
501 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add0_policy) | 501 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add0_policy); |
502 | 502 | ||
503 | int | 503 | int |
504 | X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, | 504 | X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, |
@@ -534,7 +534,7 @@ X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, | |||
534 | param->flags |= X509_V_FLAG_POLICY_CHECK; | 534 | param->flags |= X509_V_FLAG_POLICY_CHECK; |
535 | return 1; | 535 | return 1; |
536 | } | 536 | } |
537 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_policies) | 537 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_policies); |
538 | 538 | ||
539 | int | 539 | int |
540 | X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, | 540 | X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, |
@@ -545,7 +545,7 @@ X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, | |||
545 | param->id->poisoned = 1; | 545 | param->id->poisoned = 1; |
546 | return 0; | 546 | return 0; |
547 | } | 547 | } |
548 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_host) | 548 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_host); |
549 | 549 | ||
550 | int | 550 | int |
551 | X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, | 551 | X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, |
@@ -556,21 +556,21 @@ X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, | |||
556 | param->id->poisoned = 1; | 556 | param->id->poisoned = 1; |
557 | return 0; | 557 | return 0; |
558 | } | 558 | } |
559 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add1_host) | 559 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add1_host); |
560 | 560 | ||
561 | void | 561 | void |
562 | X509_VERIFY_PARAM_set_hostflags(X509_VERIFY_PARAM *param, unsigned int flags) | 562 | X509_VERIFY_PARAM_set_hostflags(X509_VERIFY_PARAM *param, unsigned int flags) |
563 | { | 563 | { |
564 | param->id->hostflags = flags; | 564 | param->id->hostflags = flags; |
565 | } | 565 | } |
566 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_hostflags) | 566 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_hostflags); |
567 | 567 | ||
568 | char * | 568 | char * |
569 | X509_VERIFY_PARAM_get0_peername(X509_VERIFY_PARAM *param) | 569 | X509_VERIFY_PARAM_get0_peername(X509_VERIFY_PARAM *param) |
570 | { | 570 | { |
571 | return param->id->peername; | 571 | return param->id->peername; |
572 | } | 572 | } |
573 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0_peername) | 573 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0_peername); |
574 | 574 | ||
575 | int | 575 | int |
576 | X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param, const char *email, | 576 | X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param, const char *email, |
@@ -582,7 +582,7 @@ X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param, const char *email, | |||
582 | param->id->poisoned = 1; | 582 | param->id->poisoned = 1; |
583 | return 0; | 583 | return 0; |
584 | } | 584 | } |
585 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_email) | 585 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_email); |
586 | 586 | ||
587 | int | 587 | int |
588 | X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param, const unsigned char *ip, | 588 | X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param, const unsigned char *ip, |
@@ -597,7 +597,7 @@ X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param, const unsigned char *ip, | |||
597 | param->id->poisoned = 1; | 597 | param->id->poisoned = 1; |
598 | return 0; | 598 | return 0; |
599 | } | 599 | } |
600 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_ip) | 600 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_ip); |
601 | 601 | ||
602 | int | 602 | int |
603 | X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, const char *ipasc) | 603 | X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, const char *ipasc) |
@@ -608,21 +608,21 @@ X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, const char *ipasc) | |||
608 | iplen = (size_t)a2i_ipadd(ipout, ipasc); | 608 | iplen = (size_t)a2i_ipadd(ipout, ipasc); |
609 | return X509_VERIFY_PARAM_set1_ip(param, ipout, iplen); | 609 | return X509_VERIFY_PARAM_set1_ip(param, ipout, iplen); |
610 | } | 610 | } |
611 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_ip_asc) | 611 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_ip_asc); |
612 | 612 | ||
613 | int | 613 | int |
614 | X509_VERIFY_PARAM_get_depth(const X509_VERIFY_PARAM *param) | 614 | X509_VERIFY_PARAM_get_depth(const X509_VERIFY_PARAM *param) |
615 | { | 615 | { |
616 | return param->depth; | 616 | return param->depth; |
617 | } | 617 | } |
618 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_depth) | 618 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_depth); |
619 | 619 | ||
620 | const char * | 620 | const char * |
621 | X509_VERIFY_PARAM_get0_name(const X509_VERIFY_PARAM *param) | 621 | X509_VERIFY_PARAM_get0_name(const X509_VERIFY_PARAM *param) |
622 | { | 622 | { |
623 | return param->name; | 623 | return param->name; |
624 | } | 624 | } |
625 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0_name) | 625 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0_name); |
626 | 626 | ||
627 | static const X509_VERIFY_PARAM_ID _empty_id = { NULL }; | 627 | static const X509_VERIFY_PARAM_ID _empty_id = { NULL }; |
628 | 628 | ||
@@ -704,7 +704,7 @@ X509_VERIFY_PARAM_add0_table(X509_VERIFY_PARAM *param) | |||
704 | return 0; | 704 | return 0; |
705 | return 1; | 705 | return 1; |
706 | } | 706 | } |
707 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add0_table) | 707 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add0_table); |
708 | 708 | ||
709 | int | 709 | int |
710 | X509_VERIFY_PARAM_get_count(void) | 710 | X509_VERIFY_PARAM_get_count(void) |
@@ -714,7 +714,7 @@ X509_VERIFY_PARAM_get_count(void) | |||
714 | num += sk_X509_VERIFY_PARAM_num(param_table); | 714 | num += sk_X509_VERIFY_PARAM_num(param_table); |
715 | return num; | 715 | return num; |
716 | } | 716 | } |
717 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_count) | 717 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_count); |
718 | 718 | ||
719 | const X509_VERIFY_PARAM * | 719 | const X509_VERIFY_PARAM * |
720 | X509_VERIFY_PARAM_get0(int id) | 720 | X509_VERIFY_PARAM_get0(int id) |
@@ -724,7 +724,7 @@ X509_VERIFY_PARAM_get0(int id) | |||
724 | return default_table + id; | 724 | return default_table + id; |
725 | return sk_X509_VERIFY_PARAM_value(param_table, id - num); | 725 | return sk_X509_VERIFY_PARAM_value(param_table, id - num); |
726 | } | 726 | } |
727 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0) | 727 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0); |
728 | 728 | ||
729 | const X509_VERIFY_PARAM * | 729 | const X509_VERIFY_PARAM * |
730 | X509_VERIFY_PARAM_lookup(const char *name) | 730 | X509_VERIFY_PARAM_lookup(const char *name) |
@@ -747,7 +747,7 @@ X509_VERIFY_PARAM_lookup(const char *name) | |||
747 | } | 747 | } |
748 | return NULL; | 748 | return NULL; |
749 | } | 749 | } |
750 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_lookup) | 750 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_lookup); |
751 | 751 | ||
752 | void | 752 | void |
753 | X509_VERIFY_PARAM_table_cleanup(void) | 753 | X509_VERIFY_PARAM_table_cleanup(void) |
@@ -757,4 +757,4 @@ X509_VERIFY_PARAM_table_cleanup(void) | |||
757 | X509_VERIFY_PARAM_free); | 757 | X509_VERIFY_PARAM_free); |
758 | param_table = NULL; | 758 | param_table = NULL; |
759 | } | 759 | } |
760 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_table_cleanup) | 760 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_table_cleanup); |
diff --git a/src/lib/libcrypto/x509/x509cset.c b/src/lib/libcrypto/x509/x509cset.c index a75a63b03b..7904a7d670 100644 --- a/src/lib/libcrypto/x509/x509cset.c +++ b/src/lib/libcrypto/x509/x509cset.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509cset.c,v 1.18 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509cset.c,v 1.19 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2001. | 3 | * project 2001. |
4 | */ | 4 | */ |
@@ -71,7 +71,7 @@ X509_CRL_up_ref(X509_CRL *x) | |||
71 | int refs = CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509_CRL); | 71 | int refs = CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509_CRL); |
72 | return (refs > 1) ? 1 : 0; | 72 | return (refs > 1) ? 1 : 0; |
73 | } | 73 | } |
74 | LCRYPTO_ALIAS(X509_CRL_up_ref) | 74 | LCRYPTO_ALIAS(X509_CRL_up_ref); |
75 | 75 | ||
76 | int | 76 | int |
77 | X509_CRL_set_version(X509_CRL *x, long version) | 77 | X509_CRL_set_version(X509_CRL *x, long version) |
@@ -84,7 +84,7 @@ X509_CRL_set_version(X509_CRL *x, long version) | |||
84 | } | 84 | } |
85 | return (ASN1_INTEGER_set(x->crl->version, version)); | 85 | return (ASN1_INTEGER_set(x->crl->version, version)); |
86 | } | 86 | } |
87 | LCRYPTO_ALIAS(X509_CRL_set_version) | 87 | LCRYPTO_ALIAS(X509_CRL_set_version); |
88 | 88 | ||
89 | int | 89 | int |
90 | X509_CRL_set_issuer_name(X509_CRL *x, X509_NAME *name) | 90 | X509_CRL_set_issuer_name(X509_CRL *x, X509_NAME *name) |
@@ -93,7 +93,7 @@ X509_CRL_set_issuer_name(X509_CRL *x, X509_NAME *name) | |||
93 | return (0); | 93 | return (0); |
94 | return (X509_NAME_set(&x->crl->issuer, name)); | 94 | return (X509_NAME_set(&x->crl->issuer, name)); |
95 | } | 95 | } |
96 | LCRYPTO_ALIAS(X509_CRL_set_issuer_name) | 96 | LCRYPTO_ALIAS(X509_CRL_set_issuer_name); |
97 | 97 | ||
98 | int | 98 | int |
99 | X509_CRL_set_lastUpdate(X509_CRL *x, const ASN1_TIME *tm) | 99 | X509_CRL_set_lastUpdate(X509_CRL *x, const ASN1_TIME *tm) |
@@ -112,14 +112,14 @@ X509_CRL_set_lastUpdate(X509_CRL *x, const ASN1_TIME *tm) | |||
112 | } | 112 | } |
113 | return (in != NULL); | 113 | return (in != NULL); |
114 | } | 114 | } |
115 | LCRYPTO_ALIAS(X509_CRL_set_lastUpdate) | 115 | LCRYPTO_ALIAS(X509_CRL_set_lastUpdate); |
116 | 116 | ||
117 | int | 117 | int |
118 | X509_CRL_set1_lastUpdate(X509_CRL *x, const ASN1_TIME *tm) | 118 | X509_CRL_set1_lastUpdate(X509_CRL *x, const ASN1_TIME *tm) |
119 | { | 119 | { |
120 | return X509_CRL_set_lastUpdate(x, tm); | 120 | return X509_CRL_set_lastUpdate(x, tm); |
121 | } | 121 | } |
122 | LCRYPTO_ALIAS(X509_CRL_set1_lastUpdate) | 122 | LCRYPTO_ALIAS(X509_CRL_set1_lastUpdate); |
123 | 123 | ||
124 | int | 124 | int |
125 | X509_CRL_set_nextUpdate(X509_CRL *x, const ASN1_TIME *tm) | 125 | X509_CRL_set_nextUpdate(X509_CRL *x, const ASN1_TIME *tm) |
@@ -138,14 +138,14 @@ X509_CRL_set_nextUpdate(X509_CRL *x, const ASN1_TIME *tm) | |||
138 | } | 138 | } |
139 | return (in != NULL); | 139 | return (in != NULL); |
140 | } | 140 | } |
141 | LCRYPTO_ALIAS(X509_CRL_set_nextUpdate) | 141 | LCRYPTO_ALIAS(X509_CRL_set_nextUpdate); |
142 | 142 | ||
143 | int | 143 | int |
144 | X509_CRL_set1_nextUpdate(X509_CRL *x, const ASN1_TIME *tm) | 144 | X509_CRL_set1_nextUpdate(X509_CRL *x, const ASN1_TIME *tm) |
145 | { | 145 | { |
146 | return X509_CRL_set_nextUpdate(x, tm); | 146 | return X509_CRL_set_nextUpdate(x, tm); |
147 | } | 147 | } |
148 | LCRYPTO_ALIAS(X509_CRL_set1_nextUpdate) | 148 | LCRYPTO_ALIAS(X509_CRL_set1_nextUpdate); |
149 | 149 | ||
150 | int | 150 | int |
151 | X509_CRL_sort(X509_CRL *c) | 151 | X509_CRL_sort(X509_CRL *c) |
@@ -163,28 +163,28 @@ X509_CRL_sort(X509_CRL *c) | |||
163 | c->crl->enc.modified = 1; | 163 | c->crl->enc.modified = 1; |
164 | return 1; | 164 | return 1; |
165 | } | 165 | } |
166 | LCRYPTO_ALIAS(X509_CRL_sort) | 166 | LCRYPTO_ALIAS(X509_CRL_sort); |
167 | 167 | ||
168 | const STACK_OF(X509_EXTENSION) * | 168 | const STACK_OF(X509_EXTENSION) * |
169 | X509_REVOKED_get0_extensions(const X509_REVOKED *x) | 169 | X509_REVOKED_get0_extensions(const X509_REVOKED *x) |
170 | { | 170 | { |
171 | return x->extensions; | 171 | return x->extensions; |
172 | } | 172 | } |
173 | LCRYPTO_ALIAS(X509_REVOKED_get0_extensions) | 173 | LCRYPTO_ALIAS(X509_REVOKED_get0_extensions); |
174 | 174 | ||
175 | const ASN1_TIME * | 175 | const ASN1_TIME * |
176 | X509_REVOKED_get0_revocationDate(const X509_REVOKED *x) | 176 | X509_REVOKED_get0_revocationDate(const X509_REVOKED *x) |
177 | { | 177 | { |
178 | return x->revocationDate; | 178 | return x->revocationDate; |
179 | } | 179 | } |
180 | LCRYPTO_ALIAS(X509_REVOKED_get0_revocationDate) | 180 | LCRYPTO_ALIAS(X509_REVOKED_get0_revocationDate); |
181 | 181 | ||
182 | const ASN1_INTEGER * | 182 | const ASN1_INTEGER * |
183 | X509_REVOKED_get0_serialNumber(const X509_REVOKED *x) | 183 | X509_REVOKED_get0_serialNumber(const X509_REVOKED *x) |
184 | { | 184 | { |
185 | return x->serialNumber; | 185 | return x->serialNumber; |
186 | } | 186 | } |
187 | LCRYPTO_ALIAS(X509_REVOKED_get0_serialNumber) | 187 | LCRYPTO_ALIAS(X509_REVOKED_get0_serialNumber); |
188 | 188 | ||
189 | int | 189 | int |
190 | X509_REVOKED_set_revocationDate(X509_REVOKED *x, ASN1_TIME *tm) | 190 | X509_REVOKED_set_revocationDate(X509_REVOKED *x, ASN1_TIME *tm) |
@@ -203,7 +203,7 @@ X509_REVOKED_set_revocationDate(X509_REVOKED *x, ASN1_TIME *tm) | |||
203 | } | 203 | } |
204 | return (in != NULL); | 204 | return (in != NULL); |
205 | } | 205 | } |
206 | LCRYPTO_ALIAS(X509_REVOKED_set_revocationDate) | 206 | LCRYPTO_ALIAS(X509_REVOKED_set_revocationDate); |
207 | 207 | ||
208 | int | 208 | int |
209 | X509_REVOKED_set_serialNumber(X509_REVOKED *x, ASN1_INTEGER *serial) | 209 | X509_REVOKED_set_serialNumber(X509_REVOKED *x, ASN1_INTEGER *serial) |
@@ -222,7 +222,7 @@ X509_REVOKED_set_serialNumber(X509_REVOKED *x, ASN1_INTEGER *serial) | |||
222 | } | 222 | } |
223 | return (in != NULL); | 223 | return (in != NULL); |
224 | } | 224 | } |
225 | LCRYPTO_ALIAS(X509_REVOKED_set_serialNumber) | 225 | LCRYPTO_ALIAS(X509_REVOKED_set_serialNumber); |
226 | 226 | ||
227 | int | 227 | int |
228 | i2d_re_X509_CRL_tbs(X509_CRL *crl, unsigned char **pp) | 228 | i2d_re_X509_CRL_tbs(X509_CRL *crl, unsigned char **pp) |
@@ -230,4 +230,4 @@ i2d_re_X509_CRL_tbs(X509_CRL *crl, unsigned char **pp) | |||
230 | crl->crl->enc.modified = 1; | 230 | crl->crl->enc.modified = 1; |
231 | return i2d_X509_CRL_INFO(crl->crl, pp); | 231 | return i2d_X509_CRL_INFO(crl->crl, pp); |
232 | } | 232 | } |
233 | LCRYPTO_ALIAS(i2d_re_X509_CRL_tbs) | 233 | LCRYPTO_ALIAS(i2d_re_X509_CRL_tbs); |
diff --git a/src/lib/libcrypto/x509/x509name.c b/src/lib/libcrypto/x509/x509name.c index 19a253da4d..a6e4dbef89 100644 --- a/src/lib/libcrypto/x509/x509name.c +++ b/src/lib/libcrypto/x509/x509name.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509name.c,v 1.30 2022/12/26 07:18:53 jmc Exp $ */ | 1 | /* $OpenBSD: x509name.c,v 1.31 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -78,7 +78,7 @@ X509_NAME_get_text_by_NID(X509_NAME *name, int nid, char *buf, int len) | |||
78 | return (-1); | 78 | return (-1); |
79 | return (X509_NAME_get_text_by_OBJ(name, obj, buf, len)); | 79 | return (X509_NAME_get_text_by_OBJ(name, obj, buf, len)); |
80 | } | 80 | } |
81 | LCRYPTO_ALIAS(X509_NAME_get_text_by_NID) | 81 | LCRYPTO_ALIAS(X509_NAME_get_text_by_NID); |
82 | 82 | ||
83 | int | 83 | int |
84 | X509_NAME_get_text_by_OBJ(X509_NAME *name, const ASN1_OBJECT *obj, char *buf, | 84 | X509_NAME_get_text_by_OBJ(X509_NAME *name, const ASN1_OBJECT *obj, char *buf, |
@@ -100,7 +100,7 @@ X509_NAME_get_text_by_OBJ(X509_NAME *name, const ASN1_OBJECT *obj, char *buf, | |||
100 | } | 100 | } |
101 | return (i); | 101 | return (i); |
102 | } | 102 | } |
103 | LCRYPTO_ALIAS(X509_NAME_get_text_by_OBJ) | 103 | LCRYPTO_ALIAS(X509_NAME_get_text_by_OBJ); |
104 | 104 | ||
105 | int | 105 | int |
106 | X509_NAME_entry_count(const X509_NAME *name) | 106 | X509_NAME_entry_count(const X509_NAME *name) |
@@ -109,7 +109,7 @@ X509_NAME_entry_count(const X509_NAME *name) | |||
109 | return (0); | 109 | return (0); |
110 | return (sk_X509_NAME_ENTRY_num(name->entries)); | 110 | return (sk_X509_NAME_ENTRY_num(name->entries)); |
111 | } | 111 | } |
112 | LCRYPTO_ALIAS(X509_NAME_entry_count) | 112 | LCRYPTO_ALIAS(X509_NAME_entry_count); |
113 | 113 | ||
114 | int | 114 | int |
115 | X509_NAME_get_index_by_NID(const X509_NAME *name, int nid, int lastpos) | 115 | X509_NAME_get_index_by_NID(const X509_NAME *name, int nid, int lastpos) |
@@ -121,7 +121,7 @@ X509_NAME_get_index_by_NID(const X509_NAME *name, int nid, int lastpos) | |||
121 | return (-2); | 121 | return (-2); |
122 | return (X509_NAME_get_index_by_OBJ(name, obj, lastpos)); | 122 | return (X509_NAME_get_index_by_OBJ(name, obj, lastpos)); |
123 | } | 123 | } |
124 | LCRYPTO_ALIAS(X509_NAME_get_index_by_NID) | 124 | LCRYPTO_ALIAS(X509_NAME_get_index_by_NID); |
125 | 125 | ||
126 | /* NOTE: you should be passing -1, not 0 as lastpos */ | 126 | /* NOTE: you should be passing -1, not 0 as lastpos */ |
127 | int | 127 | int |
@@ -145,7 +145,7 @@ X509_NAME_get_index_by_OBJ(const X509_NAME *name, const ASN1_OBJECT *obj, | |||
145 | } | 145 | } |
146 | return (-1); | 146 | return (-1); |
147 | } | 147 | } |
148 | LCRYPTO_ALIAS(X509_NAME_get_index_by_OBJ) | 148 | LCRYPTO_ALIAS(X509_NAME_get_index_by_OBJ); |
149 | 149 | ||
150 | X509_NAME_ENTRY * | 150 | X509_NAME_ENTRY * |
151 | X509_NAME_get_entry(const X509_NAME *name, int loc) | 151 | X509_NAME_get_entry(const X509_NAME *name, int loc) |
@@ -156,7 +156,7 @@ X509_NAME_get_entry(const X509_NAME *name, int loc) | |||
156 | else | 156 | else |
157 | return (sk_X509_NAME_ENTRY_value(name->entries, loc)); | 157 | return (sk_X509_NAME_ENTRY_value(name->entries, loc)); |
158 | } | 158 | } |
159 | LCRYPTO_ALIAS(X509_NAME_get_entry) | 159 | LCRYPTO_ALIAS(X509_NAME_get_entry); |
160 | 160 | ||
161 | X509_NAME_ENTRY * | 161 | X509_NAME_ENTRY * |
162 | X509_NAME_delete_entry(X509_NAME *name, int loc) | 162 | X509_NAME_delete_entry(X509_NAME *name, int loc) |
@@ -195,7 +195,7 @@ X509_NAME_delete_entry(X509_NAME *name, int loc) | |||
195 | sk_X509_NAME_ENTRY_value(sk, i)->set--; | 195 | sk_X509_NAME_ENTRY_value(sk, i)->set--; |
196 | return (ret); | 196 | return (ret); |
197 | } | 197 | } |
198 | LCRYPTO_ALIAS(X509_NAME_delete_entry) | 198 | LCRYPTO_ALIAS(X509_NAME_delete_entry); |
199 | 199 | ||
200 | int | 200 | int |
201 | X509_NAME_add_entry_by_OBJ(X509_NAME *name, const ASN1_OBJECT *obj, int type, | 201 | X509_NAME_add_entry_by_OBJ(X509_NAME *name, const ASN1_OBJECT *obj, int type, |
@@ -211,7 +211,7 @@ X509_NAME_add_entry_by_OBJ(X509_NAME *name, const ASN1_OBJECT *obj, int type, | |||
211 | X509_NAME_ENTRY_free(ne); | 211 | X509_NAME_ENTRY_free(ne); |
212 | return ret; | 212 | return ret; |
213 | } | 213 | } |
214 | LCRYPTO_ALIAS(X509_NAME_add_entry_by_OBJ) | 214 | LCRYPTO_ALIAS(X509_NAME_add_entry_by_OBJ); |
215 | 215 | ||
216 | int | 216 | int |
217 | X509_NAME_add_entry_by_NID(X509_NAME *name, int nid, int type, | 217 | X509_NAME_add_entry_by_NID(X509_NAME *name, int nid, int type, |
@@ -227,7 +227,7 @@ X509_NAME_add_entry_by_NID(X509_NAME *name, int nid, int type, | |||
227 | X509_NAME_ENTRY_free(ne); | 227 | X509_NAME_ENTRY_free(ne); |
228 | return ret; | 228 | return ret; |
229 | } | 229 | } |
230 | LCRYPTO_ALIAS(X509_NAME_add_entry_by_NID) | 230 | LCRYPTO_ALIAS(X509_NAME_add_entry_by_NID); |
231 | 231 | ||
232 | int | 232 | int |
233 | X509_NAME_add_entry_by_txt(X509_NAME *name, const char *field, int type, | 233 | X509_NAME_add_entry_by_txt(X509_NAME *name, const char *field, int type, |
@@ -243,7 +243,7 @@ X509_NAME_add_entry_by_txt(X509_NAME *name, const char *field, int type, | |||
243 | X509_NAME_ENTRY_free(ne); | 243 | X509_NAME_ENTRY_free(ne); |
244 | return ret; | 244 | return ret; |
245 | } | 245 | } |
246 | LCRYPTO_ALIAS(X509_NAME_add_entry_by_txt) | 246 | LCRYPTO_ALIAS(X509_NAME_add_entry_by_txt); |
247 | 247 | ||
248 | /* if set is -1, append to previous set, 0 'a new one', and 1, | 248 | /* if set is -1, append to previous set, 0 'a new one', and 1, |
249 | * prepend to the guy we are about to stomp on. */ | 249 | * prepend to the guy we are about to stomp on. */ |
@@ -302,7 +302,7 @@ err: | |||
302 | X509_NAME_ENTRY_free(new_name); | 302 | X509_NAME_ENTRY_free(new_name); |
303 | return (0); | 303 | return (0); |
304 | } | 304 | } |
305 | LCRYPTO_ALIAS(X509_NAME_add_entry) | 305 | LCRYPTO_ALIAS(X509_NAME_add_entry); |
306 | 306 | ||
307 | X509_NAME_ENTRY * | 307 | X509_NAME_ENTRY * |
308 | X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY **ne, | 308 | X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY **ne, |
@@ -321,7 +321,7 @@ X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY **ne, | |||
321 | ASN1_OBJECT_free(obj); | 321 | ASN1_OBJECT_free(obj); |
322 | return nentry; | 322 | return nentry; |
323 | } | 323 | } |
324 | LCRYPTO_ALIAS(X509_NAME_ENTRY_create_by_txt) | 324 | LCRYPTO_ALIAS(X509_NAME_ENTRY_create_by_txt); |
325 | 325 | ||
326 | X509_NAME_ENTRY * | 326 | X509_NAME_ENTRY * |
327 | X509_NAME_ENTRY_create_by_NID(X509_NAME_ENTRY **ne, int nid, int type, | 327 | X509_NAME_ENTRY_create_by_NID(X509_NAME_ENTRY **ne, int nid, int type, |
@@ -339,7 +339,7 @@ X509_NAME_ENTRY_create_by_NID(X509_NAME_ENTRY **ne, int nid, int type, | |||
339 | ASN1_OBJECT_free(obj); | 339 | ASN1_OBJECT_free(obj); |
340 | return nentry; | 340 | return nentry; |
341 | } | 341 | } |
342 | LCRYPTO_ALIAS(X509_NAME_ENTRY_create_by_NID) | 342 | LCRYPTO_ALIAS(X509_NAME_ENTRY_create_by_NID); |
343 | 343 | ||
344 | X509_NAME_ENTRY * | 344 | X509_NAME_ENTRY * |
345 | X509_NAME_ENTRY_create_by_OBJ(X509_NAME_ENTRY **ne, const ASN1_OBJECT *obj, | 345 | X509_NAME_ENTRY_create_by_OBJ(X509_NAME_ENTRY **ne, const ASN1_OBJECT *obj, |
@@ -367,7 +367,7 @@ err: | |||
367 | X509_NAME_ENTRY_free(ret); | 367 | X509_NAME_ENTRY_free(ret); |
368 | return (NULL); | 368 | return (NULL); |
369 | } | 369 | } |
370 | LCRYPTO_ALIAS(X509_NAME_ENTRY_create_by_OBJ) | 370 | LCRYPTO_ALIAS(X509_NAME_ENTRY_create_by_OBJ); |
371 | 371 | ||
372 | int | 372 | int |
373 | X509_NAME_ENTRY_set_object(X509_NAME_ENTRY *ne, const ASN1_OBJECT *obj) | 373 | X509_NAME_ENTRY_set_object(X509_NAME_ENTRY *ne, const ASN1_OBJECT *obj) |
@@ -380,7 +380,7 @@ X509_NAME_ENTRY_set_object(X509_NAME_ENTRY *ne, const ASN1_OBJECT *obj) | |||
380 | ne->object = OBJ_dup(obj); | 380 | ne->object = OBJ_dup(obj); |
381 | return ((ne->object == NULL) ? 0 : 1); | 381 | return ((ne->object == NULL) ? 0 : 1); |
382 | } | 382 | } |
383 | LCRYPTO_ALIAS(X509_NAME_ENTRY_set_object) | 383 | LCRYPTO_ALIAS(X509_NAME_ENTRY_set_object); |
384 | 384 | ||
385 | int | 385 | int |
386 | X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *ne, int type, | 386 | X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *ne, int type, |
@@ -406,7 +406,7 @@ X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *ne, int type, | |||
406 | } | 406 | } |
407 | return (1); | 407 | return (1); |
408 | } | 408 | } |
409 | LCRYPTO_ALIAS(X509_NAME_ENTRY_set_data) | 409 | LCRYPTO_ALIAS(X509_NAME_ENTRY_set_data); |
410 | 410 | ||
411 | ASN1_OBJECT * | 411 | ASN1_OBJECT * |
412 | X509_NAME_ENTRY_get_object(const X509_NAME_ENTRY *ne) | 412 | X509_NAME_ENTRY_get_object(const X509_NAME_ENTRY *ne) |
@@ -415,7 +415,7 @@ X509_NAME_ENTRY_get_object(const X509_NAME_ENTRY *ne) | |||
415 | return (NULL); | 415 | return (NULL); |
416 | return (ne->object); | 416 | return (ne->object); |
417 | } | 417 | } |
418 | LCRYPTO_ALIAS(X509_NAME_ENTRY_get_object) | 418 | LCRYPTO_ALIAS(X509_NAME_ENTRY_get_object); |
419 | 419 | ||
420 | ASN1_STRING * | 420 | ASN1_STRING * |
421 | X509_NAME_ENTRY_get_data(const X509_NAME_ENTRY *ne) | 421 | X509_NAME_ENTRY_get_data(const X509_NAME_ENTRY *ne) |
@@ -424,11 +424,11 @@ X509_NAME_ENTRY_get_data(const X509_NAME_ENTRY *ne) | |||
424 | return (NULL); | 424 | return (NULL); |
425 | return (ne->value); | 425 | return (ne->value); |
426 | } | 426 | } |
427 | LCRYPTO_ALIAS(X509_NAME_ENTRY_get_data) | 427 | LCRYPTO_ALIAS(X509_NAME_ENTRY_get_data); |
428 | 428 | ||
429 | int | 429 | int |
430 | X509_NAME_ENTRY_set(const X509_NAME_ENTRY *ne) | 430 | X509_NAME_ENTRY_set(const X509_NAME_ENTRY *ne) |
431 | { | 431 | { |
432 | return (ne->set); | 432 | return (ne->set); |
433 | } | 433 | } |
434 | LCRYPTO_ALIAS(X509_NAME_ENTRY_set) | 434 | LCRYPTO_ALIAS(X509_NAME_ENTRY_set); |
diff --git a/src/lib/libcrypto/x509/x509rset.c b/src/lib/libcrypto/x509/x509rset.c index 640a850800..f097a379fb 100644 --- a/src/lib/libcrypto/x509/x509rset.c +++ b/src/lib/libcrypto/x509/x509rset.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509rset.c,v 1.11 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509rset.c,v 1.12 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -73,14 +73,14 @@ X509_REQ_set_version(X509_REQ *x, long version) | |||
73 | x->req_info->enc.modified = 1; | 73 | x->req_info->enc.modified = 1; |
74 | return (ASN1_INTEGER_set(x->req_info->version, version)); | 74 | return (ASN1_INTEGER_set(x->req_info->version, version)); |
75 | } | 75 | } |
76 | LCRYPTO_ALIAS(X509_REQ_set_version) | 76 | LCRYPTO_ALIAS(X509_REQ_set_version); |
77 | 77 | ||
78 | long | 78 | long |
79 | X509_REQ_get_version(const X509_REQ *x) | 79 | X509_REQ_get_version(const X509_REQ *x) |
80 | { | 80 | { |
81 | return ASN1_INTEGER_get(x->req_info->version); | 81 | return ASN1_INTEGER_get(x->req_info->version); |
82 | } | 82 | } |
83 | LCRYPTO_ALIAS(X509_REQ_get_version) | 83 | LCRYPTO_ALIAS(X509_REQ_get_version); |
84 | 84 | ||
85 | int | 85 | int |
86 | X509_REQ_set_subject_name(X509_REQ *x, X509_NAME *name) | 86 | X509_REQ_set_subject_name(X509_REQ *x, X509_NAME *name) |
@@ -90,14 +90,14 @@ X509_REQ_set_subject_name(X509_REQ *x, X509_NAME *name) | |||
90 | x->req_info->enc.modified = 1; | 90 | x->req_info->enc.modified = 1; |
91 | return (X509_NAME_set(&x->req_info->subject, name)); | 91 | return (X509_NAME_set(&x->req_info->subject, name)); |
92 | } | 92 | } |
93 | LCRYPTO_ALIAS(X509_REQ_set_subject_name) | 93 | LCRYPTO_ALIAS(X509_REQ_set_subject_name); |
94 | 94 | ||
95 | X509_NAME * | 95 | X509_NAME * |
96 | X509_REQ_get_subject_name(const X509_REQ *x) | 96 | X509_REQ_get_subject_name(const X509_REQ *x) |
97 | { | 97 | { |
98 | return x->req_info->subject; | 98 | return x->req_info->subject; |
99 | } | 99 | } |
100 | LCRYPTO_ALIAS(X509_REQ_get_subject_name) | 100 | LCRYPTO_ALIAS(X509_REQ_get_subject_name); |
101 | 101 | ||
102 | int | 102 | int |
103 | X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey) | 103 | X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey) |
@@ -107,4 +107,4 @@ X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey) | |||
107 | x->req_info->enc.modified = 1; | 107 | x->req_info->enc.modified = 1; |
108 | return (X509_PUBKEY_set(&x->req_info->pubkey, pkey)); | 108 | return (X509_PUBKEY_set(&x->req_info->pubkey, pkey)); |
109 | } | 109 | } |
110 | LCRYPTO_ALIAS(X509_REQ_set_pubkey) | 110 | LCRYPTO_ALIAS(X509_REQ_set_pubkey); |
diff --git a/src/lib/libcrypto/x509/x509spki.c b/src/lib/libcrypto/x509/x509spki.c index 2c1b506dcd..04c9a6f01b 100644 --- a/src/lib/libcrypto/x509/x509spki.c +++ b/src/lib/libcrypto/x509/x509spki.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509spki.c,v 1.15 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509spki.c,v 1.16 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -70,7 +70,7 @@ NETSCAPE_SPKI_set_pubkey(NETSCAPE_SPKI *x, EVP_PKEY *pkey) | |||
70 | return (0); | 70 | return (0); |
71 | return (X509_PUBKEY_set(&(x->spkac->pubkey), pkey)); | 71 | return (X509_PUBKEY_set(&(x->spkac->pubkey), pkey)); |
72 | } | 72 | } |
73 | LCRYPTO_ALIAS(NETSCAPE_SPKI_set_pubkey) | 73 | LCRYPTO_ALIAS(NETSCAPE_SPKI_set_pubkey); |
74 | 74 | ||
75 | EVP_PKEY * | 75 | EVP_PKEY * |
76 | NETSCAPE_SPKI_get_pubkey(NETSCAPE_SPKI *x) | 76 | NETSCAPE_SPKI_get_pubkey(NETSCAPE_SPKI *x) |
@@ -79,7 +79,7 @@ NETSCAPE_SPKI_get_pubkey(NETSCAPE_SPKI *x) | |||
79 | return (NULL); | 79 | return (NULL); |
80 | return (X509_PUBKEY_get(x->spkac->pubkey)); | 80 | return (X509_PUBKEY_get(x->spkac->pubkey)); |
81 | } | 81 | } |
82 | LCRYPTO_ALIAS(NETSCAPE_SPKI_get_pubkey) | 82 | LCRYPTO_ALIAS(NETSCAPE_SPKI_get_pubkey); |
83 | 83 | ||
84 | /* Load a Netscape SPKI from a base64 encoded string */ | 84 | /* Load a Netscape SPKI from a base64 encoded string */ |
85 | 85 | ||
@@ -108,7 +108,7 @@ NETSCAPE_SPKI_b64_decode(const char *str, int len) | |||
108 | free(spki_der); | 108 | free(spki_der); |
109 | return spki; | 109 | return spki; |
110 | } | 110 | } |
111 | LCRYPTO_ALIAS(NETSCAPE_SPKI_b64_decode) | 111 | LCRYPTO_ALIAS(NETSCAPE_SPKI_b64_decode); |
112 | 112 | ||
113 | /* Generate a base64 encoded string from an SPKI */ | 113 | /* Generate a base64 encoded string from an SPKI */ |
114 | 114 | ||
@@ -133,4 +133,4 @@ NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *spki) | |||
133 | free(der_spki); | 133 | free(der_spki); |
134 | return b64_str; | 134 | return b64_str; |
135 | } | 135 | } |
136 | LCRYPTO_ALIAS(NETSCAPE_SPKI_b64_encode) | 136 | LCRYPTO_ALIAS(NETSCAPE_SPKI_b64_encode); |
diff --git a/src/lib/libcrypto/x509/x509type.c b/src/lib/libcrypto/x509/x509type.c index 7e10fb540d..ebc02c5929 100644 --- a/src/lib/libcrypto/x509/x509type.c +++ b/src/lib/libcrypto/x509/x509type.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509type.c,v 1.17 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509type.c,v 1.18 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -124,4 +124,4 @@ X509_certificate_type(const X509 *x, const EVP_PKEY *pkey) | |||
124 | ret |= EVP_PKT_EXP; | 124 | ret |= EVP_PKT_EXP; |
125 | return (ret); | 125 | return (ret); |
126 | } | 126 | } |
127 | LCRYPTO_ALIAS(X509_certificate_type) | 127 | LCRYPTO_ALIAS(X509_certificate_type); |
diff --git a/src/lib/libcrypto/x509/x_all.c b/src/lib/libcrypto/x509/x_all.c index 819162dc31..cd6da9f409 100644 --- a/src/lib/libcrypto/x509/x_all.c +++ b/src/lib/libcrypto/x509/x_all.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x_all.c,v 1.29 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x_all.c,v 1.30 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -80,84 +80,84 @@ d2i_X509_bio(BIO *bp, X509 **x509) | |||
80 | { | 80 | { |
81 | return ASN1_item_d2i_bio(&X509_it, bp, x509); | 81 | return ASN1_item_d2i_bio(&X509_it, bp, x509); |
82 | } | 82 | } |
83 | LCRYPTO_ALIAS(d2i_X509_bio) | 83 | LCRYPTO_ALIAS(d2i_X509_bio); |
84 | 84 | ||
85 | int | 85 | int |
86 | i2d_X509_bio(BIO *bp, X509 *x509) | 86 | i2d_X509_bio(BIO *bp, X509 *x509) |
87 | { | 87 | { |
88 | return ASN1_item_i2d_bio(&X509_it, bp, x509); | 88 | return ASN1_item_i2d_bio(&X509_it, bp, x509); |
89 | } | 89 | } |
90 | LCRYPTO_ALIAS(i2d_X509_bio) | 90 | LCRYPTO_ALIAS(i2d_X509_bio); |
91 | 91 | ||
92 | X509 * | 92 | X509 * |
93 | d2i_X509_fp(FILE *fp, X509 **x509) | 93 | d2i_X509_fp(FILE *fp, X509 **x509) |
94 | { | 94 | { |
95 | return ASN1_item_d2i_fp(&X509_it, fp, x509); | 95 | return ASN1_item_d2i_fp(&X509_it, fp, x509); |
96 | } | 96 | } |
97 | LCRYPTO_ALIAS(d2i_X509_fp) | 97 | LCRYPTO_ALIAS(d2i_X509_fp); |
98 | 98 | ||
99 | int | 99 | int |
100 | i2d_X509_fp(FILE *fp, X509 *x509) | 100 | i2d_X509_fp(FILE *fp, X509 *x509) |
101 | { | 101 | { |
102 | return ASN1_item_i2d_fp(&X509_it, fp, x509); | 102 | return ASN1_item_i2d_fp(&X509_it, fp, x509); |
103 | } | 103 | } |
104 | LCRYPTO_ALIAS(i2d_X509_fp) | 104 | LCRYPTO_ALIAS(i2d_X509_fp); |
105 | 105 | ||
106 | X509_CRL * | 106 | X509_CRL * |
107 | d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) | 107 | d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) |
108 | { | 108 | { |
109 | return ASN1_item_d2i_bio(&X509_CRL_it, bp, crl); | 109 | return ASN1_item_d2i_bio(&X509_CRL_it, bp, crl); |
110 | } | 110 | } |
111 | LCRYPTO_ALIAS(d2i_X509_CRL_bio) | 111 | LCRYPTO_ALIAS(d2i_X509_CRL_bio); |
112 | 112 | ||
113 | int | 113 | int |
114 | i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) | 114 | i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) |
115 | { | 115 | { |
116 | return ASN1_item_i2d_bio(&X509_CRL_it, bp, crl); | 116 | return ASN1_item_i2d_bio(&X509_CRL_it, bp, crl); |
117 | } | 117 | } |
118 | LCRYPTO_ALIAS(i2d_X509_CRL_bio) | 118 | LCRYPTO_ALIAS(i2d_X509_CRL_bio); |
119 | 119 | ||
120 | X509_CRL * | 120 | X509_CRL * |
121 | d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) | 121 | d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) |
122 | { | 122 | { |
123 | return ASN1_item_d2i_fp(&X509_CRL_it, fp, crl); | 123 | return ASN1_item_d2i_fp(&X509_CRL_it, fp, crl); |
124 | } | 124 | } |
125 | LCRYPTO_ALIAS(d2i_X509_CRL_fp) | 125 | LCRYPTO_ALIAS(d2i_X509_CRL_fp); |
126 | 126 | ||
127 | int | 127 | int |
128 | i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) | 128 | i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) |
129 | { | 129 | { |
130 | return ASN1_item_i2d_fp(&X509_CRL_it, fp, crl); | 130 | return ASN1_item_i2d_fp(&X509_CRL_it, fp, crl); |
131 | } | 131 | } |
132 | LCRYPTO_ALIAS(i2d_X509_CRL_fp) | 132 | LCRYPTO_ALIAS(i2d_X509_CRL_fp); |
133 | 133 | ||
134 | X509_REQ * | 134 | X509_REQ * |
135 | d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) | 135 | d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) |
136 | { | 136 | { |
137 | return ASN1_item_d2i_bio(&X509_REQ_it, bp, req); | 137 | return ASN1_item_d2i_bio(&X509_REQ_it, bp, req); |
138 | } | 138 | } |
139 | LCRYPTO_ALIAS(d2i_X509_REQ_bio) | 139 | LCRYPTO_ALIAS(d2i_X509_REQ_bio); |
140 | 140 | ||
141 | int | 141 | int |
142 | i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) | 142 | i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) |
143 | { | 143 | { |
144 | return ASN1_item_i2d_bio(&X509_REQ_it, bp, req); | 144 | return ASN1_item_i2d_bio(&X509_REQ_it, bp, req); |
145 | } | 145 | } |
146 | LCRYPTO_ALIAS(i2d_X509_REQ_bio) | 146 | LCRYPTO_ALIAS(i2d_X509_REQ_bio); |
147 | 147 | ||
148 | X509_REQ * | 148 | X509_REQ * |
149 | d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) | 149 | d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) |
150 | { | 150 | { |
151 | return ASN1_item_d2i_fp(&X509_REQ_it, fp, req); | 151 | return ASN1_item_d2i_fp(&X509_REQ_it, fp, req); |
152 | } | 152 | } |
153 | LCRYPTO_ALIAS(d2i_X509_REQ_fp) | 153 | LCRYPTO_ALIAS(d2i_X509_REQ_fp); |
154 | 154 | ||
155 | int | 155 | int |
156 | i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) | 156 | i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) |
157 | { | 157 | { |
158 | return ASN1_item_i2d_fp(&X509_REQ_it, fp, req); | 158 | return ASN1_item_i2d_fp(&X509_REQ_it, fp, req); |
159 | } | 159 | } |
160 | LCRYPTO_ALIAS(i2d_X509_REQ_fp) | 160 | LCRYPTO_ALIAS(i2d_X509_REQ_fp); |
161 | 161 | ||
162 | #ifndef OPENSSL_NO_RSA | 162 | #ifndef OPENSSL_NO_RSA |
163 | RSA * | 163 | RSA * |
@@ -165,56 +165,56 @@ d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) | |||
165 | { | 165 | { |
166 | return ASN1_item_d2i_bio(&RSAPrivateKey_it, bp, rsa); | 166 | return ASN1_item_d2i_bio(&RSAPrivateKey_it, bp, rsa); |
167 | } | 167 | } |
168 | LCRYPTO_ALIAS(d2i_RSAPrivateKey_bio) | 168 | LCRYPTO_ALIAS(d2i_RSAPrivateKey_bio); |
169 | 169 | ||
170 | int | 170 | int |
171 | i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) | 171 | i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) |
172 | { | 172 | { |
173 | return ASN1_item_i2d_bio(&RSAPrivateKey_it, bp, rsa); | 173 | return ASN1_item_i2d_bio(&RSAPrivateKey_it, bp, rsa); |
174 | } | 174 | } |
175 | LCRYPTO_ALIAS(i2d_RSAPrivateKey_bio) | 175 | LCRYPTO_ALIAS(i2d_RSAPrivateKey_bio); |
176 | 176 | ||
177 | RSA * | 177 | RSA * |
178 | d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) | 178 | d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) |
179 | { | 179 | { |
180 | return ASN1_item_d2i_fp(&RSAPrivateKey_it, fp, rsa); | 180 | return ASN1_item_d2i_fp(&RSAPrivateKey_it, fp, rsa); |
181 | } | 181 | } |
182 | LCRYPTO_ALIAS(d2i_RSAPrivateKey_fp) | 182 | LCRYPTO_ALIAS(d2i_RSAPrivateKey_fp); |
183 | 183 | ||
184 | int | 184 | int |
185 | i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) | 185 | i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) |
186 | { | 186 | { |
187 | return ASN1_item_i2d_fp(&RSAPrivateKey_it, fp, rsa); | 187 | return ASN1_item_i2d_fp(&RSAPrivateKey_it, fp, rsa); |
188 | } | 188 | } |
189 | LCRYPTO_ALIAS(i2d_RSAPrivateKey_fp) | 189 | LCRYPTO_ALIAS(i2d_RSAPrivateKey_fp); |
190 | 190 | ||
191 | RSA * | 191 | RSA * |
192 | d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) | 192 | d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) |
193 | { | 193 | { |
194 | return ASN1_item_d2i_bio(&RSAPublicKey_it, bp, rsa); | 194 | return ASN1_item_d2i_bio(&RSAPublicKey_it, bp, rsa); |
195 | } | 195 | } |
196 | LCRYPTO_ALIAS(d2i_RSAPublicKey_bio) | 196 | LCRYPTO_ALIAS(d2i_RSAPublicKey_bio); |
197 | 197 | ||
198 | int | 198 | int |
199 | i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa) | 199 | i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa) |
200 | { | 200 | { |
201 | return ASN1_item_i2d_bio(&RSAPublicKey_it, bp, rsa); | 201 | return ASN1_item_i2d_bio(&RSAPublicKey_it, bp, rsa); |
202 | } | 202 | } |
203 | LCRYPTO_ALIAS(i2d_RSAPublicKey_bio) | 203 | LCRYPTO_ALIAS(i2d_RSAPublicKey_bio); |
204 | 204 | ||
205 | RSA * | 205 | RSA * |
206 | d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) | 206 | d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) |
207 | { | 207 | { |
208 | return ASN1_item_d2i_fp(&RSAPublicKey_it, fp, rsa); | 208 | return ASN1_item_d2i_fp(&RSAPublicKey_it, fp, rsa); |
209 | } | 209 | } |
210 | LCRYPTO_ALIAS(d2i_RSAPublicKey_fp) | 210 | LCRYPTO_ALIAS(d2i_RSAPublicKey_fp); |
211 | 211 | ||
212 | int | 212 | int |
213 | i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) | 213 | i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) |
214 | { | 214 | { |
215 | return ASN1_item_i2d_fp(&RSAPublicKey_it, fp, rsa); | 215 | return ASN1_item_i2d_fp(&RSAPublicKey_it, fp, rsa); |
216 | } | 216 | } |
217 | LCRYPTO_ALIAS(i2d_RSAPublicKey_fp) | 217 | LCRYPTO_ALIAS(i2d_RSAPublicKey_fp); |
218 | #endif | 218 | #endif |
219 | 219 | ||
220 | #ifndef OPENSSL_NO_DSA | 220 | #ifndef OPENSSL_NO_DSA |
@@ -223,28 +223,28 @@ d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa) | |||
223 | { | 223 | { |
224 | return ASN1_item_d2i_bio(&DSAPrivateKey_it, bp, dsa); | 224 | return ASN1_item_d2i_bio(&DSAPrivateKey_it, bp, dsa); |
225 | } | 225 | } |
226 | LCRYPTO_ALIAS(d2i_DSAPrivateKey_bio) | 226 | LCRYPTO_ALIAS(d2i_DSAPrivateKey_bio); |
227 | 227 | ||
228 | int | 228 | int |
229 | i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa) | 229 | i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa) |
230 | { | 230 | { |
231 | return ASN1_item_i2d_bio(&DSAPrivateKey_it, bp, dsa); | 231 | return ASN1_item_i2d_bio(&DSAPrivateKey_it, bp, dsa); |
232 | } | 232 | } |
233 | LCRYPTO_ALIAS(i2d_DSAPrivateKey_bio) | 233 | LCRYPTO_ALIAS(i2d_DSAPrivateKey_bio); |
234 | 234 | ||
235 | DSA * | 235 | DSA * |
236 | d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) | 236 | d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) |
237 | { | 237 | { |
238 | return ASN1_item_d2i_fp(&DSAPrivateKey_it, fp, dsa); | 238 | return ASN1_item_d2i_fp(&DSAPrivateKey_it, fp, dsa); |
239 | } | 239 | } |
240 | LCRYPTO_ALIAS(d2i_DSAPrivateKey_fp) | 240 | LCRYPTO_ALIAS(d2i_DSAPrivateKey_fp); |
241 | 241 | ||
242 | int | 242 | int |
243 | i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) | 243 | i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) |
244 | { | 244 | { |
245 | return ASN1_item_i2d_fp(&DSAPrivateKey_it, fp, dsa); | 245 | return ASN1_item_i2d_fp(&DSAPrivateKey_it, fp, dsa); |
246 | } | 246 | } |
247 | LCRYPTO_ALIAS(i2d_DSAPrivateKey_fp) | 247 | LCRYPTO_ALIAS(i2d_DSAPrivateKey_fp); |
248 | #endif | 248 | #endif |
249 | 249 | ||
250 | #ifndef OPENSSL_NO_EC | 250 | #ifndef OPENSSL_NO_EC |
@@ -253,28 +253,28 @@ d2i_ECPrivateKey_bio(BIO *bp, EC_KEY **eckey) | |||
253 | { | 253 | { |
254 | return ASN1_d2i_bio_of(EC_KEY, EC_KEY_new, d2i_ECPrivateKey, bp, eckey); | 254 | return ASN1_d2i_bio_of(EC_KEY, EC_KEY_new, d2i_ECPrivateKey, bp, eckey); |
255 | } | 255 | } |
256 | LCRYPTO_ALIAS(d2i_ECPrivateKey_bio) | 256 | LCRYPTO_ALIAS(d2i_ECPrivateKey_bio); |
257 | 257 | ||
258 | int | 258 | int |
259 | i2d_ECPrivateKey_bio(BIO *bp, EC_KEY *eckey) | 259 | i2d_ECPrivateKey_bio(BIO *bp, EC_KEY *eckey) |
260 | { | 260 | { |
261 | return ASN1_i2d_bio_of(EC_KEY, i2d_ECPrivateKey, bp, eckey); | 261 | return ASN1_i2d_bio_of(EC_KEY, i2d_ECPrivateKey, bp, eckey); |
262 | } | 262 | } |
263 | LCRYPTO_ALIAS(i2d_ECPrivateKey_bio) | 263 | LCRYPTO_ALIAS(i2d_ECPrivateKey_bio); |
264 | 264 | ||
265 | EC_KEY * | 265 | EC_KEY * |
266 | d2i_ECPrivateKey_fp(FILE *fp, EC_KEY **eckey) | 266 | d2i_ECPrivateKey_fp(FILE *fp, EC_KEY **eckey) |
267 | { | 267 | { |
268 | return ASN1_d2i_fp_of(EC_KEY, EC_KEY_new, d2i_ECPrivateKey, fp, eckey); | 268 | return ASN1_d2i_fp_of(EC_KEY, EC_KEY_new, d2i_ECPrivateKey, fp, eckey); |
269 | } | 269 | } |
270 | LCRYPTO_ALIAS(d2i_ECPrivateKey_fp) | 270 | LCRYPTO_ALIAS(d2i_ECPrivateKey_fp); |
271 | 271 | ||
272 | int | 272 | int |
273 | i2d_ECPrivateKey_fp(FILE *fp, EC_KEY *eckey) | 273 | i2d_ECPrivateKey_fp(FILE *fp, EC_KEY *eckey) |
274 | { | 274 | { |
275 | return ASN1_i2d_fp_of(EC_KEY, i2d_ECPrivateKey, fp, eckey); | 275 | return ASN1_i2d_fp_of(EC_KEY, i2d_ECPrivateKey, fp, eckey); |
276 | } | 276 | } |
277 | LCRYPTO_ALIAS(i2d_ECPrivateKey_fp) | 277 | LCRYPTO_ALIAS(i2d_ECPrivateKey_fp); |
278 | #endif | 278 | #endif |
279 | 279 | ||
280 | X509_SIG * | 280 | X509_SIG * |
@@ -282,28 +282,28 @@ d2i_PKCS8_bio(BIO *bp, X509_SIG **p8) | |||
282 | { | 282 | { |
283 | return ASN1_item_d2i_bio(&X509_SIG_it, bp, p8); | 283 | return ASN1_item_d2i_bio(&X509_SIG_it, bp, p8); |
284 | } | 284 | } |
285 | LCRYPTO_ALIAS(d2i_PKCS8_bio) | 285 | LCRYPTO_ALIAS(d2i_PKCS8_bio); |
286 | 286 | ||
287 | int | 287 | int |
288 | i2d_PKCS8_bio(BIO *bp, X509_SIG *p8) | 288 | i2d_PKCS8_bio(BIO *bp, X509_SIG *p8) |
289 | { | 289 | { |
290 | return ASN1_item_i2d_bio(&X509_SIG_it, bp, p8); | 290 | return ASN1_item_i2d_bio(&X509_SIG_it, bp, p8); |
291 | } | 291 | } |
292 | LCRYPTO_ALIAS(i2d_PKCS8_bio) | 292 | LCRYPTO_ALIAS(i2d_PKCS8_bio); |
293 | 293 | ||
294 | X509_SIG * | 294 | X509_SIG * |
295 | d2i_PKCS8_fp(FILE *fp, X509_SIG **p8) | 295 | d2i_PKCS8_fp(FILE *fp, X509_SIG **p8) |
296 | { | 296 | { |
297 | return ASN1_item_d2i_fp(&X509_SIG_it, fp, p8); | 297 | return ASN1_item_d2i_fp(&X509_SIG_it, fp, p8); |
298 | } | 298 | } |
299 | LCRYPTO_ALIAS(d2i_PKCS8_fp) | 299 | LCRYPTO_ALIAS(d2i_PKCS8_fp); |
300 | 300 | ||
301 | int | 301 | int |
302 | i2d_PKCS8_fp(FILE *fp, X509_SIG *p8) | 302 | i2d_PKCS8_fp(FILE *fp, X509_SIG *p8) |
303 | { | 303 | { |
304 | return ASN1_item_i2d_fp(&X509_SIG_it, fp, p8); | 304 | return ASN1_item_i2d_fp(&X509_SIG_it, fp, p8); |
305 | } | 305 | } |
306 | LCRYPTO_ALIAS(i2d_PKCS8_fp) | 306 | LCRYPTO_ALIAS(i2d_PKCS8_fp); |
307 | 307 | ||
308 | PKCS8_PRIV_KEY_INFO * | 308 | PKCS8_PRIV_KEY_INFO * |
309 | d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO **p8inf) | 309 | d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO **p8inf) |
@@ -311,7 +311,7 @@ d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO **p8inf) | |||
311 | return ASN1_item_d2i_bio(&PKCS8_PRIV_KEY_INFO_it, bp, | 311 | return ASN1_item_d2i_bio(&PKCS8_PRIV_KEY_INFO_it, bp, |
312 | p8inf); | 312 | p8inf); |
313 | } | 313 | } |
314 | LCRYPTO_ALIAS(d2i_PKCS8_PRIV_KEY_INFO_bio) | 314 | LCRYPTO_ALIAS(d2i_PKCS8_PRIV_KEY_INFO_bio); |
315 | 315 | ||
316 | int | 316 | int |
317 | i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf) | 317 | i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf) |
@@ -319,7 +319,7 @@ i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf) | |||
319 | return ASN1_item_i2d_bio(&PKCS8_PRIV_KEY_INFO_it, bp, | 319 | return ASN1_item_i2d_bio(&PKCS8_PRIV_KEY_INFO_it, bp, |
320 | p8inf); | 320 | p8inf); |
321 | } | 321 | } |
322 | LCRYPTO_ALIAS(i2d_PKCS8_PRIV_KEY_INFO_bio) | 322 | LCRYPTO_ALIAS(i2d_PKCS8_PRIV_KEY_INFO_bio); |
323 | 323 | ||
324 | PKCS8_PRIV_KEY_INFO * | 324 | PKCS8_PRIV_KEY_INFO * |
325 | d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO **p8inf) | 325 | d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO **p8inf) |
@@ -327,7 +327,7 @@ d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO **p8inf) | |||
327 | return ASN1_item_d2i_fp(&PKCS8_PRIV_KEY_INFO_it, fp, | 327 | return ASN1_item_d2i_fp(&PKCS8_PRIV_KEY_INFO_it, fp, |
328 | p8inf); | 328 | p8inf); |
329 | } | 329 | } |
330 | LCRYPTO_ALIAS(d2i_PKCS8_PRIV_KEY_INFO_fp) | 330 | LCRYPTO_ALIAS(d2i_PKCS8_PRIV_KEY_INFO_fp); |
331 | 331 | ||
332 | int | 332 | int |
333 | i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf) | 333 | i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf) |
@@ -335,7 +335,7 @@ i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf) | |||
335 | return ASN1_item_i2d_fp(&PKCS8_PRIV_KEY_INFO_it, fp, | 335 | return ASN1_item_i2d_fp(&PKCS8_PRIV_KEY_INFO_it, fp, |
336 | p8inf); | 336 | p8inf); |
337 | } | 337 | } |
338 | LCRYPTO_ALIAS(i2d_PKCS8_PRIV_KEY_INFO_fp) | 338 | LCRYPTO_ALIAS(i2d_PKCS8_PRIV_KEY_INFO_fp); |
339 | 339 | ||
340 | EVP_PKEY * | 340 | EVP_PKEY * |
341 | d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a) | 341 | d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a) |
@@ -343,14 +343,14 @@ d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a) | |||
343 | return ASN1_d2i_bio_of(EVP_PKEY, EVP_PKEY_new, d2i_AutoPrivateKey, | 343 | return ASN1_d2i_bio_of(EVP_PKEY, EVP_PKEY_new, d2i_AutoPrivateKey, |
344 | bp, a); | 344 | bp, a); |
345 | } | 345 | } |
346 | LCRYPTO_ALIAS(d2i_PrivateKey_bio) | 346 | LCRYPTO_ALIAS(d2i_PrivateKey_bio); |
347 | 347 | ||
348 | int | 348 | int |
349 | i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey) | 349 | i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey) |
350 | { | 350 | { |
351 | return ASN1_i2d_bio_of(EVP_PKEY, i2d_PrivateKey, bp, pkey); | 351 | return ASN1_i2d_bio_of(EVP_PKEY, i2d_PrivateKey, bp, pkey); |
352 | } | 352 | } |
353 | LCRYPTO_ALIAS(i2d_PrivateKey_bio) | 353 | LCRYPTO_ALIAS(i2d_PrivateKey_bio); |
354 | 354 | ||
355 | EVP_PKEY * | 355 | EVP_PKEY * |
356 | d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a) | 356 | d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a) |
@@ -358,14 +358,14 @@ d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a) | |||
358 | return ASN1_d2i_fp_of(EVP_PKEY, EVP_PKEY_new, d2i_AutoPrivateKey, | 358 | return ASN1_d2i_fp_of(EVP_PKEY, EVP_PKEY_new, d2i_AutoPrivateKey, |
359 | fp, a); | 359 | fp, a); |
360 | } | 360 | } |
361 | LCRYPTO_ALIAS(d2i_PrivateKey_fp) | 361 | LCRYPTO_ALIAS(d2i_PrivateKey_fp); |
362 | 362 | ||
363 | int | 363 | int |
364 | i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey) | 364 | i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey) |
365 | { | 365 | { |
366 | return ASN1_i2d_fp_of(EVP_PKEY, i2d_PrivateKey, fp, pkey); | 366 | return ASN1_i2d_fp_of(EVP_PKEY, i2d_PrivateKey, fp, pkey); |
367 | } | 367 | } |
368 | LCRYPTO_ALIAS(i2d_PrivateKey_fp) | 368 | LCRYPTO_ALIAS(i2d_PrivateKey_fp); |
369 | 369 | ||
370 | int | 370 | int |
371 | i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key) | 371 | i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key) |
@@ -380,7 +380,7 @@ i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key) | |||
380 | PKCS8_PRIV_KEY_INFO_free(p8inf); | 380 | PKCS8_PRIV_KEY_INFO_free(p8inf); |
381 | return ret; | 381 | return ret; |
382 | } | 382 | } |
383 | LCRYPTO_ALIAS(i2d_PKCS8PrivateKeyInfo_bio) | 383 | LCRYPTO_ALIAS(i2d_PKCS8PrivateKeyInfo_bio); |
384 | 384 | ||
385 | int | 385 | int |
386 | i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key) | 386 | i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key) |
@@ -394,7 +394,7 @@ i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key) | |||
394 | PKCS8_PRIV_KEY_INFO_free(p8inf); | 394 | PKCS8_PRIV_KEY_INFO_free(p8inf); |
395 | return ret; | 395 | return ret; |
396 | } | 396 | } |
397 | LCRYPTO_ALIAS(i2d_PKCS8PrivateKeyInfo_fp) | 397 | LCRYPTO_ALIAS(i2d_PKCS8PrivateKeyInfo_fp); |
398 | 398 | ||
399 | int | 399 | int |
400 | X509_verify(X509 *a, EVP_PKEY *r) | 400 | X509_verify(X509 *a, EVP_PKEY *r) |
@@ -404,7 +404,7 @@ X509_verify(X509 *a, EVP_PKEY *r) | |||
404 | return (ASN1_item_verify(&X509_CINF_it, a->sig_alg, | 404 | return (ASN1_item_verify(&X509_CINF_it, a->sig_alg, |
405 | a->signature, a->cert_info, r)); | 405 | a->signature, a->cert_info, r)); |
406 | } | 406 | } |
407 | LCRYPTO_ALIAS(X509_verify) | 407 | LCRYPTO_ALIAS(X509_verify); |
408 | 408 | ||
409 | int | 409 | int |
410 | X509_REQ_verify(X509_REQ *a, EVP_PKEY *r) | 410 | X509_REQ_verify(X509_REQ *a, EVP_PKEY *r) |
@@ -412,7 +412,7 @@ X509_REQ_verify(X509_REQ *a, EVP_PKEY *r) | |||
412 | return (ASN1_item_verify(&X509_REQ_INFO_it, | 412 | return (ASN1_item_verify(&X509_REQ_INFO_it, |
413 | a->sig_alg, a->signature, a->req_info, r)); | 413 | a->sig_alg, a->signature, a->req_info, r)); |
414 | } | 414 | } |
415 | LCRYPTO_ALIAS(X509_REQ_verify) | 415 | LCRYPTO_ALIAS(X509_REQ_verify); |
416 | 416 | ||
417 | int | 417 | int |
418 | NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r) | 418 | NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r) |
@@ -420,7 +420,7 @@ NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r) | |||
420 | return (ASN1_item_verify(&NETSCAPE_SPKAC_it, | 420 | return (ASN1_item_verify(&NETSCAPE_SPKAC_it, |
421 | a->sig_algor, a->signature, a->spkac, r)); | 421 | a->sig_algor, a->signature, a->spkac, r)); |
422 | } | 422 | } |
423 | LCRYPTO_ALIAS(NETSCAPE_SPKI_verify) | 423 | LCRYPTO_ALIAS(NETSCAPE_SPKI_verify); |
424 | 424 | ||
425 | int | 425 | int |
426 | X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) | 426 | X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) |
@@ -430,7 +430,7 @@ X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) | |||
430 | x->cert_info->signature, x->sig_alg, x->signature, | 430 | x->cert_info->signature, x->sig_alg, x->signature, |
431 | x->cert_info, pkey, md)); | 431 | x->cert_info, pkey, md)); |
432 | } | 432 | } |
433 | LCRYPTO_ALIAS(X509_sign) | 433 | LCRYPTO_ALIAS(X509_sign); |
434 | 434 | ||
435 | int | 435 | int |
436 | X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx) | 436 | X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx) |
@@ -440,7 +440,7 @@ X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx) | |||
440 | x->cert_info->signature, x->sig_alg, x->signature, | 440 | x->cert_info->signature, x->sig_alg, x->signature, |
441 | x->cert_info, ctx); | 441 | x->cert_info, ctx); |
442 | } | 442 | } |
443 | LCRYPTO_ALIAS(X509_sign_ctx) | 443 | LCRYPTO_ALIAS(X509_sign_ctx); |
444 | 444 | ||
445 | int | 445 | int |
446 | X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) | 446 | X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) |
@@ -448,7 +448,7 @@ X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) | |||
448 | return (ASN1_item_sign(&X509_REQ_INFO_it, | 448 | return (ASN1_item_sign(&X509_REQ_INFO_it, |
449 | x->sig_alg, NULL, x->signature, x->req_info, pkey, md)); | 449 | x->sig_alg, NULL, x->signature, x->req_info, pkey, md)); |
450 | } | 450 | } |
451 | LCRYPTO_ALIAS(X509_REQ_sign) | 451 | LCRYPTO_ALIAS(X509_REQ_sign); |
452 | 452 | ||
453 | int | 453 | int |
454 | X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx) | 454 | X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx) |
@@ -456,7 +456,7 @@ X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx) | |||
456 | return ASN1_item_sign_ctx(&X509_REQ_INFO_it, | 456 | return ASN1_item_sign_ctx(&X509_REQ_INFO_it, |
457 | x->sig_alg, NULL, x->signature, x->req_info, ctx); | 457 | x->sig_alg, NULL, x->signature, x->req_info, ctx); |
458 | } | 458 | } |
459 | LCRYPTO_ALIAS(X509_REQ_sign_ctx) | 459 | LCRYPTO_ALIAS(X509_REQ_sign_ctx); |
460 | 460 | ||
461 | int | 461 | int |
462 | X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) | 462 | X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) |
@@ -465,7 +465,7 @@ X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) | |||
465 | return(ASN1_item_sign(&X509_CRL_INFO_it, x->crl->sig_alg, | 465 | return(ASN1_item_sign(&X509_CRL_INFO_it, x->crl->sig_alg, |
466 | x->sig_alg, x->signature, x->crl, pkey, md)); | 466 | x->sig_alg, x->signature, x->crl, pkey, md)); |
467 | } | 467 | } |
468 | LCRYPTO_ALIAS(X509_CRL_sign) | 468 | LCRYPTO_ALIAS(X509_CRL_sign); |
469 | 469 | ||
470 | int | 470 | int |
471 | X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx) | 471 | X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx) |
@@ -474,7 +474,7 @@ X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx) | |||
474 | return ASN1_item_sign_ctx(&X509_CRL_INFO_it, | 474 | return ASN1_item_sign_ctx(&X509_CRL_INFO_it, |
475 | x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx); | 475 | x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx); |
476 | } | 476 | } |
477 | LCRYPTO_ALIAS(X509_CRL_sign_ctx) | 477 | LCRYPTO_ALIAS(X509_CRL_sign_ctx); |
478 | 478 | ||
479 | int | 479 | int |
480 | NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) | 480 | NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) |
@@ -482,7 +482,7 @@ NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) | |||
482 | return (ASN1_item_sign(&NETSCAPE_SPKAC_it, | 482 | return (ASN1_item_sign(&NETSCAPE_SPKAC_it, |
483 | x->sig_algor, NULL, x->signature, x->spkac, pkey, md)); | 483 | x->sig_algor, NULL, x->signature, x->spkac, pkey, md)); |
484 | } | 484 | } |
485 | LCRYPTO_ALIAS(NETSCAPE_SPKI_sign) | 485 | LCRYPTO_ALIAS(NETSCAPE_SPKI_sign); |
486 | 486 | ||
487 | int | 487 | int |
488 | X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md, | 488 | X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md, |
@@ -494,7 +494,7 @@ X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md, | |||
494 | return 0; | 494 | return 0; |
495 | return EVP_Digest(key->data, key->length, md, len, type, NULL); | 495 | return EVP_Digest(key->data, key->length, md, len, type, NULL); |
496 | } | 496 | } |
497 | LCRYPTO_ALIAS(X509_pubkey_digest) | 497 | LCRYPTO_ALIAS(X509_pubkey_digest); |
498 | 498 | ||
499 | int | 499 | int |
500 | X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, | 500 | X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, |
@@ -503,7 +503,7 @@ X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, | |||
503 | return (ASN1_item_digest(&X509_it, type, (char *)data, | 503 | return (ASN1_item_digest(&X509_it, type, (char *)data, |
504 | md, len)); | 504 | md, len)); |
505 | } | 505 | } |
506 | LCRYPTO_ALIAS(X509_digest) | 506 | LCRYPTO_ALIAS(X509_digest); |
507 | 507 | ||
508 | int | 508 | int |
509 | X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, | 509 | X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, |
@@ -512,7 +512,7 @@ X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, | |||
512 | return (ASN1_item_digest(&X509_CRL_it, type, (char *)data, | 512 | return (ASN1_item_digest(&X509_CRL_it, type, (char *)data, |
513 | md, len)); | 513 | md, len)); |
514 | } | 514 | } |
515 | LCRYPTO_ALIAS(X509_CRL_digest) | 515 | LCRYPTO_ALIAS(X509_CRL_digest); |
516 | 516 | ||
517 | int | 517 | int |
518 | X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, | 518 | X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, |
@@ -521,7 +521,7 @@ X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, | |||
521 | return (ASN1_item_digest(&X509_REQ_it, type, (char *)data, | 521 | return (ASN1_item_digest(&X509_REQ_it, type, (char *)data, |
522 | md, len)); | 522 | md, len)); |
523 | } | 523 | } |
524 | LCRYPTO_ALIAS(X509_REQ_digest) | 524 | LCRYPTO_ALIAS(X509_REQ_digest); |
525 | 525 | ||
526 | int | 526 | int |
527 | X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, | 527 | X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, |
@@ -530,7 +530,7 @@ X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, | |||
530 | return (ASN1_item_digest(&X509_NAME_it, type, (char *)data, | 530 | return (ASN1_item_digest(&X509_NAME_it, type, (char *)data, |
531 | md, len)); | 531 | md, len)); |
532 | } | 532 | } |
533 | LCRYPTO_ALIAS(X509_NAME_digest) | 533 | LCRYPTO_ALIAS(X509_NAME_digest); |
534 | 534 | ||
535 | int | 535 | int |
536 | X509_up_ref(X509 *x) | 536 | X509_up_ref(X509 *x) |
@@ -538,4 +538,4 @@ X509_up_ref(X509 *x) | |||
538 | int i = CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509); | 538 | int i = CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509); |
539 | return i > 1 ? 1 : 0; | 539 | return i > 1 ? 1 : 0; |
540 | } | 540 | } |
541 | LCRYPTO_ALIAS(X509_up_ref) | 541 | LCRYPTO_ALIAS(X509_up_ref); |
diff --git a/src/lib/libssl/bio_ssl.c b/src/lib/libssl/bio_ssl.c index 98a730d110..1a8cda84d6 100644 --- a/src/lib/libssl/bio_ssl.c +++ b/src/lib/libssl/bio_ssl.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: bio_ssl.c,v 1.37 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: bio_ssl.c,v 1.38 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -103,7 +103,7 @@ BIO_f_ssl(void) | |||
103 | { | 103 | { |
104 | return (&methods_sslp); | 104 | return (&methods_sslp); |
105 | } | 105 | } |
106 | LSSL_ALIAS(BIO_f_ssl) | 106 | LSSL_ALIAS(BIO_f_ssl); |
107 | 107 | ||
108 | static int | 108 | static int |
109 | ssl_new(BIO *bi) | 109 | ssl_new(BIO *bi) |
@@ -533,7 +533,7 @@ BIO_new_ssl_connect(SSL_CTX *ctx) | |||
533 | BIO_free(ssl); | 533 | BIO_free(ssl); |
534 | return (NULL); | 534 | return (NULL); |
535 | } | 535 | } |
536 | LSSL_ALIAS(BIO_new_ssl_connect) | 536 | LSSL_ALIAS(BIO_new_ssl_connect); |
537 | 537 | ||
538 | BIO * | 538 | BIO * |
539 | BIO_new_ssl(SSL_CTX *ctx, int client) | 539 | BIO_new_ssl(SSL_CTX *ctx, int client) |
@@ -558,7 +558,7 @@ BIO_new_ssl(SSL_CTX *ctx, int client) | |||
558 | BIO_free(ret); | 558 | BIO_free(ret); |
559 | return (NULL); | 559 | return (NULL); |
560 | } | 560 | } |
561 | LSSL_ALIAS(BIO_new_ssl) | 561 | LSSL_ALIAS(BIO_new_ssl); |
562 | 562 | ||
563 | int | 563 | int |
564 | BIO_ssl_copy_session_id(BIO *t, BIO *f) | 564 | BIO_ssl_copy_session_id(BIO *t, BIO *f) |
diff --git a/src/lib/libssl/hidden/ssl_namespace.h b/src/lib/libssl/hidden/ssl_namespace.h index 803f3e66be..7a941a0e10 100644 --- a/src/lib/libssl/hidden/ssl_namespace.h +++ b/src/lib/libssl/hidden/ssl_namespace.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_namespace.h,v 1.1 2022/11/11 11:25:18 beck Exp $ */ | 1 | /* $OpenBSD: ssl_namespace.h,v 1.2 2023/02/16 08:38:17 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2016 Philip Guenther <guenther@openbsd.org> | 3 | * Copyright (c) 2016 Philip Guenther <guenther@openbsd.org> |
4 | * | 4 | * |
@@ -27,11 +27,11 @@ | |||
27 | #define LSSL_UNUSED(x) typeof(x) x __attribute__((deprecated)) | 27 | #define LSSL_UNUSED(x) typeof(x) x __attribute__((deprecated)) |
28 | #define LSSL_USED(x) __attribute__((visibility("hidden"))) \ | 28 | #define LSSL_USED(x) __attribute__((visibility("hidden"))) \ |
29 | typeof(x) x asm("_lssl_"#x) | 29 | typeof(x) x asm("_lssl_"#x) |
30 | #define LSSL_ALIAS(x) asm(".global "#x"; "#x" = _lssl_"#x); | 30 | #define LSSL_ALIAS(x) asm(".global "#x"; "#x" = _lssl_"#x) |
31 | #else | 31 | #else |
32 | #define LSSL_UNUSED(x) | 32 | #define LSSL_UNUSED(x) |
33 | #define LSSL_USED(x) | 33 | #define LSSL_USED(x) |
34 | #define LSSL_ALIAS(x) | 34 | #define LSSL_ALIAS(x) asm("") |
35 | #endif | 35 | #endif |
36 | 36 | ||
37 | #endif /* _LIBSSL_SSL_NAMESPACE_H_ */ | 37 | #endif /* _LIBSSL_SSL_NAMESPACE_H_ */ |