diff options
| author | beck <> | 2023-07-08 07:22:58 +0000 |
|---|---|---|
| committer | beck <> | 2023-07-08 07:22:58 +0000 |
| commit | 76f3e45e5e334b3d6431f9c0e76ac816fc551075 (patch) | |
| tree | 0dd34e85f663bac5c9beff861c8387172d9ea94f /src/lib/libcrypto/ct/ct_sct.c | |
| parent | 690a2d7bb2ae49af3eba452cabf6daa1c05c5468 (diff) | |
| download | openbsd-76f3e45e5e334b3d6431f9c0e76ac816fc551075.tar.gz openbsd-76f3e45e5e334b3d6431f9c0e76ac816fc551075.tar.bz2 openbsd-76f3e45e5e334b3d6431f9c0e76ac816fc551075.zip | |
Hide symbols in dso and ct
ok jsing@
Diffstat (limited to 'src/lib/libcrypto/ct/ct_sct.c')
| -rw-r--r-- | src/lib/libcrypto/ct/ct_sct.c | 27 |
1 files changed, 26 insertions, 1 deletions
diff --git a/src/lib/libcrypto/ct/ct_sct.c b/src/lib/libcrypto/ct/ct_sct.c index a05b0f92a2..16ee8d5576 100644 --- a/src/lib/libcrypto/ct/ct_sct.c +++ b/src/lib/libcrypto/ct/ct_sct.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ct_sct.c,v 1.8 2022/01/22 00:29:59 inoguchi Exp $ */ | 1 | /* $OpenBSD: ct_sct.c,v 1.9 2023/07/08 07:22:58 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Written by Rob Stradling (rob@comodo.com), Stephen Henson (steve@openssl.org) | 3 | * Written by Rob Stradling (rob@comodo.com), Stephen Henson (steve@openssl.org) |
| 4 | * and Adam Eijdenberg (adam.eijdenberg@gmail.com) for the OpenSSL project 2016. | 4 | * and Adam Eijdenberg (adam.eijdenberg@gmail.com) for the OpenSSL project 2016. |
| @@ -85,6 +85,7 @@ SCT_new(void) | |||
| 85 | sct->version = SCT_VERSION_NOT_SET; | 85 | sct->version = SCT_VERSION_NOT_SET; |
| 86 | return sct; | 86 | return sct; |
| 87 | } | 87 | } |
| 88 | LCRYPTO_ALIAS(SCT_new); | ||
| 88 | 89 | ||
| 89 | void | 90 | void |
| 90 | SCT_free(SCT *sct) | 91 | SCT_free(SCT *sct) |
| @@ -98,12 +99,14 @@ SCT_free(SCT *sct) | |||
| 98 | free(sct->sct); | 99 | free(sct->sct); |
| 99 | free(sct); | 100 | free(sct); |
| 100 | } | 101 | } |
| 102 | LCRYPTO_ALIAS(SCT_free); | ||
| 101 | 103 | ||
| 102 | void | 104 | void |
| 103 | SCT_LIST_free(STACK_OF(SCT) *scts) | 105 | SCT_LIST_free(STACK_OF(SCT) *scts) |
| 104 | { | 106 | { |
| 105 | sk_SCT_pop_free(scts, SCT_free); | 107 | sk_SCT_pop_free(scts, SCT_free); |
| 106 | } | 108 | } |
| 109 | LCRYPTO_ALIAS(SCT_LIST_free); | ||
| 107 | 110 | ||
| 108 | int | 111 | int |
| 109 | SCT_set_version(SCT *sct, sct_version_t version) | 112 | SCT_set_version(SCT *sct, sct_version_t version) |
| @@ -116,6 +119,7 @@ SCT_set_version(SCT *sct, sct_version_t version) | |||
| 116 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 119 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
| 117 | return 1; | 120 | return 1; |
| 118 | } | 121 | } |
| 122 | LCRYPTO_ALIAS(SCT_set_version); | ||
| 119 | 123 | ||
| 120 | int | 124 | int |
| 121 | SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type) | 125 | SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type) |
| @@ -133,6 +137,7 @@ SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type) | |||
| 133 | CTerror(CT_R_UNSUPPORTED_ENTRY_TYPE); | 137 | CTerror(CT_R_UNSUPPORTED_ENTRY_TYPE); |
| 134 | return 0; | 138 | return 0; |
| 135 | } | 139 | } |
| 140 | LCRYPTO_ALIAS(SCT_set_log_entry_type); | ||
| 136 | 141 | ||
| 137 | int | 142 | int |
| 138 | SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len) | 143 | SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len) |
| @@ -148,6 +153,7 @@ SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len) | |||
| 148 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 153 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
| 149 | return 1; | 154 | return 1; |
| 150 | } | 155 | } |
| 156 | LCRYPTO_ALIAS(SCT_set0_log_id); | ||
| 151 | 157 | ||
| 152 | int | 158 | int |
| 153 | SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len) | 159 | SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len) |
| @@ -173,6 +179,7 @@ SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len) | |||
| 173 | } | 179 | } |
| 174 | return 1; | 180 | return 1; |
| 175 | } | 181 | } |
| 182 | LCRYPTO_ALIAS(SCT_set1_log_id); | ||
| 176 | 183 | ||
| 177 | 184 | ||
| 178 | void | 185 | void |
| @@ -181,6 +188,7 @@ SCT_set_timestamp(SCT *sct, uint64_t timestamp) | |||
| 181 | sct->timestamp = timestamp; | 188 | sct->timestamp = timestamp; |
| 182 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 189 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
| 183 | } | 190 | } |
| 191 | LCRYPTO_ALIAS(SCT_set_timestamp); | ||
| 184 | 192 | ||
| 185 | int | 193 | int |
| 186 | SCT_set_signature_nid(SCT *sct, int nid) | 194 | SCT_set_signature_nid(SCT *sct, int nid) |
| @@ -201,6 +209,7 @@ SCT_set_signature_nid(SCT *sct, int nid) | |||
| 201 | return 0; | 209 | return 0; |
| 202 | } | 210 | } |
| 203 | } | 211 | } |
| 212 | LCRYPTO_ALIAS(SCT_set_signature_nid); | ||
| 204 | 213 | ||
| 205 | void | 214 | void |
| 206 | SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len) | 215 | SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len) |
| @@ -210,6 +219,7 @@ SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len) | |||
| 210 | sct->ext_len = ext_len; | 219 | sct->ext_len = ext_len; |
| 211 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 220 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
| 212 | } | 221 | } |
| 222 | LCRYPTO_ALIAS(SCT_set0_extensions); | ||
| 213 | 223 | ||
| 214 | int | 224 | int |
| 215 | SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len) | 225 | SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len) |
| @@ -230,6 +240,7 @@ SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len) | |||
| 230 | } | 240 | } |
| 231 | return 1; | 241 | return 1; |
| 232 | } | 242 | } |
| 243 | LCRYPTO_ALIAS(SCT_set1_extensions); | ||
| 233 | 244 | ||
| 234 | void | 245 | void |
| 235 | SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) | 246 | SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) |
| @@ -239,6 +250,7 @@ SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) | |||
| 239 | sct->sig_len = sig_len; | 250 | sct->sig_len = sig_len; |
| 240 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 251 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
| 241 | } | 252 | } |
| 253 | LCRYPTO_ALIAS(SCT_set0_signature); | ||
| 242 | 254 | ||
| 243 | int | 255 | int |
| 244 | SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) | 256 | SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) |
| @@ -259,18 +271,21 @@ SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) | |||
| 259 | } | 271 | } |
| 260 | return 1; | 272 | return 1; |
| 261 | } | 273 | } |
| 274 | LCRYPTO_ALIAS(SCT_set1_signature); | ||
| 262 | 275 | ||
| 263 | sct_version_t | 276 | sct_version_t |
| 264 | SCT_get_version(const SCT *sct) | 277 | SCT_get_version(const SCT *sct) |
| 265 | { | 278 | { |
| 266 | return sct->version; | 279 | return sct->version; |
| 267 | } | 280 | } |
| 281 | LCRYPTO_ALIAS(SCT_get_version); | ||
| 268 | 282 | ||
| 269 | ct_log_entry_type_t | 283 | ct_log_entry_type_t |
| 270 | SCT_get_log_entry_type(const SCT *sct) | 284 | SCT_get_log_entry_type(const SCT *sct) |
| 271 | { | 285 | { |
| 272 | return sct->entry_type; | 286 | return sct->entry_type; |
| 273 | } | 287 | } |
| 288 | LCRYPTO_ALIAS(SCT_get_log_entry_type); | ||
| 274 | 289 | ||
| 275 | size_t | 290 | size_t |
| 276 | SCT_get0_log_id(const SCT *sct, unsigned char **log_id) | 291 | SCT_get0_log_id(const SCT *sct, unsigned char **log_id) |
| @@ -278,12 +293,14 @@ SCT_get0_log_id(const SCT *sct, unsigned char **log_id) | |||
| 278 | *log_id = sct->log_id; | 293 | *log_id = sct->log_id; |
| 279 | return sct->log_id_len; | 294 | return sct->log_id_len; |
| 280 | } | 295 | } |
| 296 | LCRYPTO_ALIAS(SCT_get0_log_id); | ||
| 281 | 297 | ||
| 282 | uint64_t | 298 | uint64_t |
| 283 | SCT_get_timestamp(const SCT *sct) | 299 | SCT_get_timestamp(const SCT *sct) |
| 284 | { | 300 | { |
| 285 | return sct->timestamp; | 301 | return sct->timestamp; |
| 286 | } | 302 | } |
| 303 | LCRYPTO_ALIAS(SCT_get_timestamp); | ||
| 287 | 304 | ||
| 288 | int | 305 | int |
| 289 | SCT_get_signature_nid(const SCT *sct) | 306 | SCT_get_signature_nid(const SCT *sct) |
| @@ -303,6 +320,7 @@ SCT_get_signature_nid(const SCT *sct) | |||
| 303 | } | 320 | } |
| 304 | return NID_undef; | 321 | return NID_undef; |
| 305 | } | 322 | } |
| 323 | LCRYPTO_ALIAS(SCT_get_signature_nid); | ||
| 306 | 324 | ||
| 307 | size_t | 325 | size_t |
| 308 | SCT_get0_extensions(const SCT *sct, unsigned char **ext) | 326 | SCT_get0_extensions(const SCT *sct, unsigned char **ext) |
| @@ -310,6 +328,7 @@ SCT_get0_extensions(const SCT *sct, unsigned char **ext) | |||
| 310 | *ext = sct->ext; | 328 | *ext = sct->ext; |
| 311 | return sct->ext_len; | 329 | return sct->ext_len; |
| 312 | } | 330 | } |
| 331 | LCRYPTO_ALIAS(SCT_get0_extensions); | ||
| 313 | 332 | ||
| 314 | size_t | 333 | size_t |
| 315 | SCT_get0_signature(const SCT *sct, unsigned char **sig) | 334 | SCT_get0_signature(const SCT *sct, unsigned char **sig) |
| @@ -317,6 +336,7 @@ SCT_get0_signature(const SCT *sct, unsigned char **sig) | |||
| 317 | *sig = sct->sig; | 336 | *sig = sct->sig; |
| 318 | return sct->sig_len; | 337 | return sct->sig_len; |
| 319 | } | 338 | } |
| 339 | LCRYPTO_ALIAS(SCT_get0_signature); | ||
| 320 | 340 | ||
| 321 | int | 341 | int |
| 322 | SCT_is_complete(const SCT *sct) | 342 | SCT_is_complete(const SCT *sct) |
| @@ -343,6 +363,7 @@ SCT_get_source(const SCT *sct) | |||
| 343 | { | 363 | { |
| 344 | return sct->source; | 364 | return sct->source; |
| 345 | } | 365 | } |
| 366 | LCRYPTO_ALIAS(SCT_get_source); | ||
| 346 | 367 | ||
| 347 | int | 368 | int |
| 348 | SCT_set_source(SCT *sct, sct_source_t source) | 369 | SCT_set_source(SCT *sct, sct_source_t source) |
| @@ -361,12 +382,14 @@ SCT_set_source(SCT *sct, sct_source_t source) | |||
| 361 | /* if we aren't sure, leave the log entry type alone */ | 382 | /* if we aren't sure, leave the log entry type alone */ |
| 362 | return 1; | 383 | return 1; |
| 363 | } | 384 | } |
| 385 | LCRYPTO_ALIAS(SCT_set_source); | ||
| 364 | 386 | ||
| 365 | sct_validation_status_t | 387 | sct_validation_status_t |
| 366 | SCT_get_validation_status(const SCT *sct) | 388 | SCT_get_validation_status(const SCT *sct) |
| 367 | { | 389 | { |
| 368 | return sct->validation_status; | 390 | return sct->validation_status; |
| 369 | } | 391 | } |
| 392 | LCRYPTO_ALIAS(SCT_get_validation_status); | ||
| 370 | 393 | ||
| 371 | int | 394 | int |
| 372 | SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx) | 395 | SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx) |
| @@ -455,6 +478,7 @@ SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx) | |||
| 455 | 478 | ||
| 456 | return is_sct_valid; | 479 | return is_sct_valid; |
| 457 | } | 480 | } |
| 481 | LCRYPTO_ALIAS(SCT_validate); | ||
| 458 | 482 | ||
| 459 | int | 483 | int |
| 460 | SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) | 484 | SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) |
| @@ -478,3 +502,4 @@ SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) | |||
| 478 | 502 | ||
| 479 | return are_scts_valid; | 503 | return are_scts_valid; |
| 480 | } | 504 | } |
| 505 | LCRYPTO_ALIAS(SCT_LIST_validate); | ||
