diff options
author | beck <> | 2022-11-14 17:48:50 +0000 |
---|---|---|
committer | beck <> | 2022-11-14 17:48:50 +0000 |
commit | 109899f1b36632f5f1c469c4f562df69585eb21e (patch) | |
tree | c42f727f8848b4a56e738422f26e8b44150174e4 /src/lib/libcrypto/x509/x509_vfy.c | |
parent | fd2db7678bc81cd8abe106c7bd1c724c8b01888d (diff) | |
download | openbsd-109899f1b36632f5f1c469c4f562df69585eb21e.tar.gz openbsd-109899f1b36632f5f1c469c4f562df69585eb21e.tar.bz2 openbsd-109899f1b36632f5f1c469c4f562df69585eb21e.zip |
Hide public symbols in libcrypto/x509 .c files
ok tb@
Diffstat (limited to 'src/lib/libcrypto/x509/x509_vfy.c')
-rw-r--r-- | src/lib/libcrypto/x509/x509_vfy.c | 54 |
1 files changed, 53 insertions, 1 deletions
diff --git a/src/lib/libcrypto/x509/x509_vfy.c b/src/lib/libcrypto/x509/x509_vfy.c index 11bf3d9292..09c0b8105e 100644 --- a/src/lib/libcrypto/x509/x509_vfy.c +++ b/src/lib/libcrypto/x509/x509_vfy.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_vfy.c,v 1.104 2022/11/13 18:37:32 beck Exp $ */ | 1 | /* $OpenBSD: x509_vfy.c,v 1.105 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -668,6 +668,7 @@ X509_verify_cert(X509_STORE_CTX *ctx) | |||
668 | /* if we succeed we have a chain in ctx->chain */ | 668 | /* if we succeed we have a chain in ctx->chain */ |
669 | return (chain_count > 0 && ctx->chain != NULL); | 669 | return (chain_count > 0 && ctx->chain != NULL); |
670 | } | 670 | } |
671 | LCRYPTO_ALIAS(X509_verify_cert) | ||
671 | 672 | ||
672 | /* Given a STACK_OF(X509) find the issuer of cert (if any) | 673 | /* Given a STACK_OF(X509) find the issuer of cert (if any) |
673 | */ | 674 | */ |
@@ -2062,6 +2063,7 @@ X509_cmp_current_time(const ASN1_TIME *ctm) | |||
2062 | { | 2063 | { |
2063 | return X509_cmp_time(ctm, NULL); | 2064 | return X509_cmp_time(ctm, NULL); |
2064 | } | 2065 | } |
2066 | LCRYPTO_ALIAS(X509_cmp_current_time) | ||
2065 | 2067 | ||
2066 | /* | 2068 | /* |
2067 | * Compare a possibly unvalidated ASN1_TIME string against a time_t | 2069 | * Compare a possibly unvalidated ASN1_TIME string against a time_t |
@@ -2101,6 +2103,7 @@ X509_cmp_time(const ASN1_TIME *ctm, time_t *cmp_time) | |||
2101 | { | 2103 | { |
2102 | return X509_cmp_time_internal(ctm, cmp_time, 0); | 2104 | return X509_cmp_time_internal(ctm, cmp_time, 0); |
2103 | } | 2105 | } |
2106 | LCRYPTO_ALIAS(X509_cmp_time) | ||
2104 | 2107 | ||
2105 | 2108 | ||
2106 | ASN1_TIME * | 2109 | ASN1_TIME * |
@@ -2108,12 +2111,14 @@ X509_gmtime_adj(ASN1_TIME *s, long adj) | |||
2108 | { | 2111 | { |
2109 | return X509_time_adj(s, adj, NULL); | 2112 | return X509_time_adj(s, adj, NULL); |
2110 | } | 2113 | } |
2114 | LCRYPTO_ALIAS(X509_gmtime_adj) | ||
2111 | 2115 | ||
2112 | ASN1_TIME * | 2116 | ASN1_TIME * |
2113 | X509_time_adj(ASN1_TIME *s, long offset_sec, time_t *in_time) | 2117 | X509_time_adj(ASN1_TIME *s, long offset_sec, time_t *in_time) |
2114 | { | 2118 | { |
2115 | return X509_time_adj_ex(s, 0, offset_sec, in_time); | 2119 | return X509_time_adj_ex(s, 0, offset_sec, in_time); |
2116 | } | 2120 | } |
2121 | LCRYPTO_ALIAS(X509_time_adj) | ||
2117 | 2122 | ||
2118 | ASN1_TIME * | 2123 | ASN1_TIME * |
2119 | X509_time_adj_ex(ASN1_TIME *s, int offset_day, long offset_sec, time_t *in_time) | 2124 | X509_time_adj_ex(ASN1_TIME *s, int offset_day, long offset_sec, time_t *in_time) |
@@ -2126,6 +2131,7 @@ X509_time_adj_ex(ASN1_TIME *s, int offset_day, long offset_sec, time_t *in_time) | |||
2126 | 2131 | ||
2127 | return ASN1_TIME_adj(s, t, offset_day, offset_sec); | 2132 | return ASN1_TIME_adj(s, t, offset_day, offset_sec); |
2128 | } | 2133 | } |
2134 | LCRYPTO_ALIAS(X509_time_adj_ex) | ||
2129 | 2135 | ||
2130 | int | 2136 | int |
2131 | X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) | 2137 | X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) |
@@ -2165,6 +2171,7 @@ X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) | |||
2165 | return 0; | 2171 | return 0; |
2166 | return 1; | 2172 | return 1; |
2167 | } | 2173 | } |
2174 | LCRYPTO_ALIAS(X509_get_pubkey_parameters) | ||
2168 | 2175 | ||
2169 | int | 2176 | int |
2170 | X509_STORE_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | 2177 | X509_STORE_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, |
@@ -2175,66 +2182,77 @@ X509_STORE_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | |||
2175 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_X509_STORE_CTX, | 2182 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_X509_STORE_CTX, |
2176 | argl, argp, new_func, dup_func, free_func); | 2183 | argl, argp, new_func, dup_func, free_func); |
2177 | } | 2184 | } |
2185 | LCRYPTO_ALIAS(X509_STORE_CTX_get_ex_new_index) | ||
2178 | 2186 | ||
2179 | int | 2187 | int |
2180 | X509_STORE_CTX_set_ex_data(X509_STORE_CTX *ctx, int idx, void *data) | 2188 | X509_STORE_CTX_set_ex_data(X509_STORE_CTX *ctx, int idx, void *data) |
2181 | { | 2189 | { |
2182 | return CRYPTO_set_ex_data(&ctx->ex_data, idx, data); | 2190 | return CRYPTO_set_ex_data(&ctx->ex_data, idx, data); |
2183 | } | 2191 | } |
2192 | LCRYPTO_ALIAS(X509_STORE_CTX_set_ex_data) | ||
2184 | 2193 | ||
2185 | void * | 2194 | void * |
2186 | X509_STORE_CTX_get_ex_data(X509_STORE_CTX *ctx, int idx) | 2195 | X509_STORE_CTX_get_ex_data(X509_STORE_CTX *ctx, int idx) |
2187 | { | 2196 | { |
2188 | return CRYPTO_get_ex_data(&ctx->ex_data, idx); | 2197 | return CRYPTO_get_ex_data(&ctx->ex_data, idx); |
2189 | } | 2198 | } |
2199 | LCRYPTO_ALIAS(X509_STORE_CTX_get_ex_data) | ||
2190 | 2200 | ||
2191 | int | 2201 | int |
2192 | X509_STORE_CTX_get_error(X509_STORE_CTX *ctx) | 2202 | X509_STORE_CTX_get_error(X509_STORE_CTX *ctx) |
2193 | { | 2203 | { |
2194 | return ctx->error; | 2204 | return ctx->error; |
2195 | } | 2205 | } |
2206 | LCRYPTO_ALIAS(X509_STORE_CTX_get_error) | ||
2196 | 2207 | ||
2197 | void | 2208 | void |
2198 | X509_STORE_CTX_set_error(X509_STORE_CTX *ctx, int err) | 2209 | X509_STORE_CTX_set_error(X509_STORE_CTX *ctx, int err) |
2199 | { | 2210 | { |
2200 | ctx->error = err; | 2211 | ctx->error = err; |
2201 | } | 2212 | } |
2213 | LCRYPTO_ALIAS(X509_STORE_CTX_set_error) | ||
2202 | 2214 | ||
2203 | int | 2215 | int |
2204 | X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx) | 2216 | X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx) |
2205 | { | 2217 | { |
2206 | return ctx->error_depth; | 2218 | return ctx->error_depth; |
2207 | } | 2219 | } |
2220 | LCRYPTO_ALIAS(X509_STORE_CTX_get_error_depth) | ||
2208 | 2221 | ||
2209 | void | 2222 | void |
2210 | X509_STORE_CTX_set_error_depth(X509_STORE_CTX *ctx, int depth) | 2223 | X509_STORE_CTX_set_error_depth(X509_STORE_CTX *ctx, int depth) |
2211 | { | 2224 | { |
2212 | ctx->error_depth = depth; | 2225 | ctx->error_depth = depth; |
2213 | } | 2226 | } |
2227 | LCRYPTO_ALIAS(X509_STORE_CTX_set_error_depth) | ||
2214 | 2228 | ||
2215 | X509 * | 2229 | X509 * |
2216 | X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx) | 2230 | X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx) |
2217 | { | 2231 | { |
2218 | return ctx->current_cert; | 2232 | return ctx->current_cert; |
2219 | } | 2233 | } |
2234 | LCRYPTO_ALIAS(X509_STORE_CTX_get_current_cert) | ||
2220 | 2235 | ||
2221 | void | 2236 | void |
2222 | X509_STORE_CTX_set_current_cert(X509_STORE_CTX *ctx, X509 *x) | 2237 | X509_STORE_CTX_set_current_cert(X509_STORE_CTX *ctx, X509 *x) |
2223 | { | 2238 | { |
2224 | ctx->current_cert = x; | 2239 | ctx->current_cert = x; |
2225 | } | 2240 | } |
2241 | LCRYPTO_ALIAS(X509_STORE_CTX_set_current_cert) | ||
2226 | 2242 | ||
2227 | STACK_OF(X509) * | 2243 | STACK_OF(X509) * |
2228 | X509_STORE_CTX_get_chain(X509_STORE_CTX *ctx) | 2244 | X509_STORE_CTX_get_chain(X509_STORE_CTX *ctx) |
2229 | { | 2245 | { |
2230 | return ctx->chain; | 2246 | return ctx->chain; |
2231 | } | 2247 | } |
2248 | LCRYPTO_ALIAS(X509_STORE_CTX_get_chain) | ||
2232 | 2249 | ||
2233 | STACK_OF(X509) * | 2250 | STACK_OF(X509) * |
2234 | X509_STORE_CTX_get0_chain(X509_STORE_CTX *xs) | 2251 | X509_STORE_CTX_get0_chain(X509_STORE_CTX *xs) |
2235 | { | 2252 | { |
2236 | return xs->chain; | 2253 | return xs->chain; |
2237 | } | 2254 | } |
2255 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_chain) | ||
2238 | 2256 | ||
2239 | STACK_OF(X509) * | 2257 | STACK_OF(X509) * |
2240 | X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx) | 2258 | X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx) |
@@ -2251,60 +2269,70 @@ X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx) | |||
2251 | } | 2269 | } |
2252 | return chain; | 2270 | return chain; |
2253 | } | 2271 | } |
2272 | LCRYPTO_ALIAS(X509_STORE_CTX_get1_chain) | ||
2254 | 2273 | ||
2255 | X509 * | 2274 | X509 * |
2256 | X509_STORE_CTX_get0_current_issuer(X509_STORE_CTX *ctx) | 2275 | X509_STORE_CTX_get0_current_issuer(X509_STORE_CTX *ctx) |
2257 | { | 2276 | { |
2258 | return ctx->current_issuer; | 2277 | return ctx->current_issuer; |
2259 | } | 2278 | } |
2279 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_current_issuer) | ||
2260 | 2280 | ||
2261 | X509_CRL * | 2281 | X509_CRL * |
2262 | X509_STORE_CTX_get0_current_crl(X509_STORE_CTX *ctx) | 2282 | X509_STORE_CTX_get0_current_crl(X509_STORE_CTX *ctx) |
2263 | { | 2283 | { |
2264 | return ctx->current_crl; | 2284 | return ctx->current_crl; |
2265 | } | 2285 | } |
2286 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_current_crl) | ||
2266 | 2287 | ||
2267 | X509_STORE_CTX * | 2288 | X509_STORE_CTX * |
2268 | X509_STORE_CTX_get0_parent_ctx(X509_STORE_CTX *ctx) | 2289 | X509_STORE_CTX_get0_parent_ctx(X509_STORE_CTX *ctx) |
2269 | { | 2290 | { |
2270 | return ctx->parent; | 2291 | return ctx->parent; |
2271 | } | 2292 | } |
2293 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_parent_ctx) | ||
2272 | 2294 | ||
2273 | X509_STORE * | 2295 | X509_STORE * |
2274 | X509_STORE_CTX_get0_store(X509_STORE_CTX *xs) | 2296 | X509_STORE_CTX_get0_store(X509_STORE_CTX *xs) |
2275 | { | 2297 | { |
2276 | return xs->store; | 2298 | return xs->store; |
2277 | } | 2299 | } |
2300 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_store) | ||
2278 | 2301 | ||
2279 | void | 2302 | void |
2280 | X509_STORE_CTX_set_cert(X509_STORE_CTX *ctx, X509 *x) | 2303 | X509_STORE_CTX_set_cert(X509_STORE_CTX *ctx, X509 *x) |
2281 | { | 2304 | { |
2282 | ctx->cert = x; | 2305 | ctx->cert = x; |
2283 | } | 2306 | } |
2307 | LCRYPTO_ALIAS(X509_STORE_CTX_set_cert) | ||
2284 | 2308 | ||
2285 | void | 2309 | void |
2286 | X509_STORE_CTX_set_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | 2310 | X509_STORE_CTX_set_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) |
2287 | { | 2311 | { |
2288 | ctx->untrusted = sk; | 2312 | ctx->untrusted = sk; |
2289 | } | 2313 | } |
2314 | LCRYPTO_ALIAS(X509_STORE_CTX_set_chain) | ||
2290 | 2315 | ||
2291 | void | 2316 | void |
2292 | X509_STORE_CTX_set0_crls(X509_STORE_CTX *ctx, STACK_OF(X509_CRL) *sk) | 2317 | X509_STORE_CTX_set0_crls(X509_STORE_CTX *ctx, STACK_OF(X509_CRL) *sk) |
2293 | { | 2318 | { |
2294 | ctx->crls = sk; | 2319 | ctx->crls = sk; |
2295 | } | 2320 | } |
2321 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_crls) | ||
2296 | 2322 | ||
2297 | int | 2323 | int |
2298 | X509_STORE_CTX_set_purpose(X509_STORE_CTX *ctx, int purpose) | 2324 | X509_STORE_CTX_set_purpose(X509_STORE_CTX *ctx, int purpose) |
2299 | { | 2325 | { |
2300 | return X509_STORE_CTX_purpose_inherit(ctx, 0, purpose, 0); | 2326 | return X509_STORE_CTX_purpose_inherit(ctx, 0, purpose, 0); |
2301 | } | 2327 | } |
2328 | LCRYPTO_ALIAS(X509_STORE_CTX_set_purpose) | ||
2302 | 2329 | ||
2303 | int | 2330 | int |
2304 | X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) | 2331 | X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) |
2305 | { | 2332 | { |
2306 | return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); | 2333 | return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); |
2307 | } | 2334 | } |
2335 | LCRYPTO_ALIAS(X509_STORE_CTX_set_trust) | ||
2308 | 2336 | ||
2309 | /* This function is used to set the X509_STORE_CTX purpose and trust | 2337 | /* This function is used to set the X509_STORE_CTX purpose and trust |
2310 | * values. This is intended to be used when another structure has its | 2338 | * values. This is intended to be used when another structure has its |
@@ -2360,6 +2388,7 @@ X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, | |||
2360 | ctx->param->trust = trust; | 2388 | ctx->param->trust = trust; |
2361 | return 1; | 2389 | return 1; |
2362 | } | 2390 | } |
2391 | LCRYPTO_ALIAS(X509_STORE_CTX_purpose_inherit) | ||
2363 | 2392 | ||
2364 | X509_STORE_CTX * | 2393 | X509_STORE_CTX * |
2365 | X509_STORE_CTX_new(void) | 2394 | X509_STORE_CTX_new(void) |
@@ -2373,6 +2402,7 @@ X509_STORE_CTX_new(void) | |||
2373 | } | 2402 | } |
2374 | return ctx; | 2403 | return ctx; |
2375 | } | 2404 | } |
2405 | LCRYPTO_ALIAS(X509_STORE_CTX_new) | ||
2376 | 2406 | ||
2377 | void | 2407 | void |
2378 | X509_STORE_CTX_free(X509_STORE_CTX *ctx) | 2408 | X509_STORE_CTX_free(X509_STORE_CTX *ctx) |
@@ -2383,6 +2413,7 @@ X509_STORE_CTX_free(X509_STORE_CTX *ctx) | |||
2383 | X509_STORE_CTX_cleanup(ctx); | 2413 | X509_STORE_CTX_cleanup(ctx); |
2384 | free(ctx); | 2414 | free(ctx); |
2385 | } | 2415 | } |
2416 | LCRYPTO_ALIAS(X509_STORE_CTX_free) | ||
2386 | 2417 | ||
2387 | int | 2418 | int |
2388 | X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, | 2419 | X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, |
@@ -2504,6 +2535,7 @@ X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, | |||
2504 | } | 2535 | } |
2505 | return 1; | 2536 | return 1; |
2506 | } | 2537 | } |
2538 | LCRYPTO_ALIAS(X509_STORE_CTX_init) | ||
2507 | 2539 | ||
2508 | /* Set alternative lookup method: just a STACK of trusted certificates. | 2540 | /* Set alternative lookup method: just a STACK of trusted certificates. |
2509 | * This avoids X509_STORE nastiness where it isn't needed. | 2541 | * This avoids X509_STORE nastiness where it isn't needed. |
@@ -2515,12 +2547,14 @@ X509_STORE_CTX_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | |||
2515 | ctx->other_ctx = sk; | 2547 | ctx->other_ctx = sk; |
2516 | ctx->get_issuer = get_issuer_sk; | 2548 | ctx->get_issuer = get_issuer_sk; |
2517 | } | 2549 | } |
2550 | LCRYPTO_ALIAS(X509_STORE_CTX_trusted_stack) | ||
2518 | 2551 | ||
2519 | void | 2552 | void |
2520 | X509_STORE_CTX_set0_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | 2553 | X509_STORE_CTX_set0_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) |
2521 | { | 2554 | { |
2522 | X509_STORE_CTX_trusted_stack(ctx, sk); | 2555 | X509_STORE_CTX_trusted_stack(ctx, sk); |
2523 | } | 2556 | } |
2557 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_trusted_stack) | ||
2524 | 2558 | ||
2525 | void | 2559 | void |
2526 | X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) | 2560 | X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) |
@@ -2544,30 +2578,35 @@ X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) | |||
2544 | ctx, &(ctx->ex_data)); | 2578 | ctx, &(ctx->ex_data)); |
2545 | memset(&ctx->ex_data, 0, sizeof(CRYPTO_EX_DATA)); | 2579 | memset(&ctx->ex_data, 0, sizeof(CRYPTO_EX_DATA)); |
2546 | } | 2580 | } |
2581 | LCRYPTO_ALIAS(X509_STORE_CTX_cleanup) | ||
2547 | 2582 | ||
2548 | void | 2583 | void |
2549 | X509_STORE_CTX_set_depth(X509_STORE_CTX *ctx, int depth) | 2584 | X509_STORE_CTX_set_depth(X509_STORE_CTX *ctx, int depth) |
2550 | { | 2585 | { |
2551 | X509_VERIFY_PARAM_set_depth(ctx->param, depth); | 2586 | X509_VERIFY_PARAM_set_depth(ctx->param, depth); |
2552 | } | 2587 | } |
2588 | LCRYPTO_ALIAS(X509_STORE_CTX_set_depth) | ||
2553 | 2589 | ||
2554 | void | 2590 | void |
2555 | X509_STORE_CTX_set_flags(X509_STORE_CTX *ctx, unsigned long flags) | 2591 | X509_STORE_CTX_set_flags(X509_STORE_CTX *ctx, unsigned long flags) |
2556 | { | 2592 | { |
2557 | X509_VERIFY_PARAM_set_flags(ctx->param, flags); | 2593 | X509_VERIFY_PARAM_set_flags(ctx->param, flags); |
2558 | } | 2594 | } |
2595 | LCRYPTO_ALIAS(X509_STORE_CTX_set_flags) | ||
2559 | 2596 | ||
2560 | void | 2597 | void |
2561 | X509_STORE_CTX_set_time(X509_STORE_CTX *ctx, unsigned long flags, time_t t) | 2598 | X509_STORE_CTX_set_time(X509_STORE_CTX *ctx, unsigned long flags, time_t t) |
2562 | { | 2599 | { |
2563 | X509_VERIFY_PARAM_set_time(ctx->param, t); | 2600 | X509_VERIFY_PARAM_set_time(ctx->param, t); |
2564 | } | 2601 | } |
2602 | LCRYPTO_ALIAS(X509_STORE_CTX_set_time) | ||
2565 | 2603 | ||
2566 | int | 2604 | int |
2567 | (*X509_STORE_CTX_get_verify_cb(X509_STORE_CTX *ctx))(int, X509_STORE_CTX *) | 2605 | (*X509_STORE_CTX_get_verify_cb(X509_STORE_CTX *ctx))(int, X509_STORE_CTX *) |
2568 | { | 2606 | { |
2569 | return ctx->verify_cb; | 2607 | return ctx->verify_cb; |
2570 | } | 2608 | } |
2609 | LCRYPTO_ALIAS(X509_STORE_CTX_get_verify_cb) | ||
2571 | 2610 | ||
2572 | void | 2611 | void |
2573 | X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx, | 2612 | X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx, |
@@ -2575,36 +2614,42 @@ X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx, | |||
2575 | { | 2614 | { |
2576 | ctx->verify_cb = verify_cb; | 2615 | ctx->verify_cb = verify_cb; |
2577 | } | 2616 | } |
2617 | LCRYPTO_ALIAS(X509_STORE_CTX_set_verify_cb) | ||
2578 | 2618 | ||
2579 | int | 2619 | int |
2580 | (*X509_STORE_CTX_get_verify(X509_STORE_CTX *ctx))(X509_STORE_CTX *) | 2620 | (*X509_STORE_CTX_get_verify(X509_STORE_CTX *ctx))(X509_STORE_CTX *) |
2581 | { | 2621 | { |
2582 | return ctx->verify; | 2622 | return ctx->verify; |
2583 | } | 2623 | } |
2624 | LCRYPTO_ALIAS(X509_STORE_CTX_get_verify) | ||
2584 | 2625 | ||
2585 | void | 2626 | void |
2586 | X509_STORE_CTX_set_verify(X509_STORE_CTX *ctx, int (*verify)(X509_STORE_CTX *)) | 2627 | X509_STORE_CTX_set_verify(X509_STORE_CTX *ctx, int (*verify)(X509_STORE_CTX *)) |
2587 | { | 2628 | { |
2588 | ctx->verify = verify; | 2629 | ctx->verify = verify; |
2589 | } | 2630 | } |
2631 | LCRYPTO_ALIAS(X509_STORE_CTX_set_verify) | ||
2590 | 2632 | ||
2591 | X509 * | 2633 | X509 * |
2592 | X509_STORE_CTX_get0_cert(X509_STORE_CTX *ctx) | 2634 | X509_STORE_CTX_get0_cert(X509_STORE_CTX *ctx) |
2593 | { | 2635 | { |
2594 | return ctx->cert; | 2636 | return ctx->cert; |
2595 | } | 2637 | } |
2638 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_cert) | ||
2596 | 2639 | ||
2597 | STACK_OF(X509) * | 2640 | STACK_OF(X509) * |
2598 | X509_STORE_CTX_get0_untrusted(X509_STORE_CTX *ctx) | 2641 | X509_STORE_CTX_get0_untrusted(X509_STORE_CTX *ctx) |
2599 | { | 2642 | { |
2600 | return ctx->untrusted; | 2643 | return ctx->untrusted; |
2601 | } | 2644 | } |
2645 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_untrusted) | ||
2602 | 2646 | ||
2603 | void | 2647 | void |
2604 | X509_STORE_CTX_set0_untrusted(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | 2648 | X509_STORE_CTX_set0_untrusted(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) |
2605 | { | 2649 | { |
2606 | ctx->untrusted = sk; | 2650 | ctx->untrusted = sk; |
2607 | } | 2651 | } |
2652 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_untrusted) | ||
2608 | 2653 | ||
2609 | void | 2654 | void |
2610 | X509_STORE_CTX_set0_verified_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | 2655 | X509_STORE_CTX_set0_verified_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) |
@@ -2612,24 +2657,28 @@ X509_STORE_CTX_set0_verified_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | |||
2612 | sk_X509_pop_free(ctx->chain, X509_free); | 2657 | sk_X509_pop_free(ctx->chain, X509_free); |
2613 | ctx->chain = sk; | 2658 | ctx->chain = sk; |
2614 | } | 2659 | } |
2660 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_verified_chain) | ||
2615 | 2661 | ||
2616 | X509_POLICY_TREE * | 2662 | X509_POLICY_TREE * |
2617 | X509_STORE_CTX_get0_policy_tree(X509_STORE_CTX *ctx) | 2663 | X509_STORE_CTX_get0_policy_tree(X509_STORE_CTX *ctx) |
2618 | { | 2664 | { |
2619 | return ctx->tree; | 2665 | return ctx->tree; |
2620 | } | 2666 | } |
2667 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_policy_tree) | ||
2621 | 2668 | ||
2622 | int | 2669 | int |
2623 | X509_STORE_CTX_get_explicit_policy(X509_STORE_CTX *ctx) | 2670 | X509_STORE_CTX_get_explicit_policy(X509_STORE_CTX *ctx) |
2624 | { | 2671 | { |
2625 | return ctx->explicit_policy; | 2672 | return ctx->explicit_policy; |
2626 | } | 2673 | } |
2674 | LCRYPTO_ALIAS(X509_STORE_CTX_get_explicit_policy) | ||
2627 | 2675 | ||
2628 | int | 2676 | int |
2629 | X509_STORE_CTX_get_num_untrusted(X509_STORE_CTX *ctx) | 2677 | X509_STORE_CTX_get_num_untrusted(X509_STORE_CTX *ctx) |
2630 | { | 2678 | { |
2631 | return ctx->num_untrusted; | 2679 | return ctx->num_untrusted; |
2632 | } | 2680 | } |
2681 | LCRYPTO_ALIAS(X509_STORE_CTX_get_num_untrusted) | ||
2633 | 2682 | ||
2634 | int | 2683 | int |
2635 | X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name) | 2684 | X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name) |
@@ -2640,12 +2689,14 @@ X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name) | |||
2640 | return 0; | 2689 | return 0; |
2641 | return X509_VERIFY_PARAM_inherit(ctx->param, param); | 2690 | return X509_VERIFY_PARAM_inherit(ctx->param, param); |
2642 | } | 2691 | } |
2692 | LCRYPTO_ALIAS(X509_STORE_CTX_set_default) | ||
2643 | 2693 | ||
2644 | X509_VERIFY_PARAM * | 2694 | X509_VERIFY_PARAM * |
2645 | X509_STORE_CTX_get0_param(X509_STORE_CTX *ctx) | 2695 | X509_STORE_CTX_get0_param(X509_STORE_CTX *ctx) |
2646 | { | 2696 | { |
2647 | return ctx->param; | 2697 | return ctx->param; |
2648 | } | 2698 | } |
2699 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_param) | ||
2649 | 2700 | ||
2650 | void | 2701 | void |
2651 | X509_STORE_CTX_set0_param(X509_STORE_CTX *ctx, X509_VERIFY_PARAM *param) | 2702 | X509_STORE_CTX_set0_param(X509_STORE_CTX *ctx, X509_VERIFY_PARAM *param) |
@@ -2654,6 +2705,7 @@ X509_STORE_CTX_set0_param(X509_STORE_CTX *ctx, X509_VERIFY_PARAM *param) | |||
2654 | X509_VERIFY_PARAM_free(ctx->param); | 2705 | X509_VERIFY_PARAM_free(ctx->param); |
2655 | ctx->param = param; | 2706 | ctx->param = param; |
2656 | } | 2707 | } |
2708 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_param) | ||
2657 | 2709 | ||
2658 | /* | 2710 | /* |
2659 | * Check if |bits| are adequate for |security level|. | 2711 | * Check if |bits| are adequate for |security level|. |