diff options
author | beck <> | 2022-11-14 17:48:50 +0000 |
---|---|---|
committer | beck <> | 2022-11-14 17:48:50 +0000 |
commit | 109899f1b36632f5f1c469c4f562df69585eb21e (patch) | |
tree | c42f727f8848b4a56e738422f26e8b44150174e4 /src/lib/libcrypto/x509/x509_vpm.c | |
parent | fd2db7678bc81cd8abe106c7bd1c724c8b01888d (diff) | |
download | openbsd-109899f1b36632f5f1c469c4f562df69585eb21e.tar.gz openbsd-109899f1b36632f5f1c469c4f562df69585eb21e.tar.bz2 openbsd-109899f1b36632f5f1c469c4f562df69585eb21e.zip |
Hide public symbols in libcrypto/x509 .c files
ok tb@
Diffstat (limited to 'src/lib/libcrypto/x509/x509_vpm.c')
-rw-r--r-- | src/lib/libcrypto/x509/x509_vpm.c | 32 |
1 files changed, 31 insertions, 1 deletions
diff --git a/src/lib/libcrypto/x509/x509_vpm.c b/src/lib/libcrypto/x509/x509_vpm.c index e14d7a36fd..56e2c34127 100644 --- a/src/lib/libcrypto/x509/x509_vpm.c +++ b/src/lib/libcrypto/x509/x509_vpm.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_vpm.c,v 1.30 2022/07/04 12:17:32 tb Exp $ */ | 1 | /* $OpenBSD: x509_vpm.c,v 1.31 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2004. | 3 | * project 2004. |
4 | */ | 4 | */ |
@@ -218,6 +218,7 @@ X509_VERIFY_PARAM_new(void) | |||
218 | x509_verify_param_zero(param); | 218 | x509_verify_param_zero(param); |
219 | return param; | 219 | return param; |
220 | } | 220 | } |
221 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_new) | ||
221 | 222 | ||
222 | void | 223 | void |
223 | X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param) | 224 | X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param) |
@@ -228,6 +229,7 @@ X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param) | |||
228 | free(param->id); | 229 | free(param->id); |
229 | free(param); | 230 | free(param); |
230 | } | 231 | } |
232 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_free) | ||
231 | 233 | ||
232 | /* | 234 | /* |
233 | * This function determines how parameters are "inherited" from one structure | 235 | * This function determines how parameters are "inherited" from one structure |
@@ -356,6 +358,7 @@ X509_VERIFY_PARAM_inherit(X509_VERIFY_PARAM *dest, const X509_VERIFY_PARAM *src) | |||
356 | 358 | ||
357 | return 1; | 359 | return 1; |
358 | } | 360 | } |
361 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_inherit) | ||
359 | 362 | ||
360 | int | 363 | int |
361 | X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, const X509_VERIFY_PARAM *from) | 364 | X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, const X509_VERIFY_PARAM *from) |
@@ -368,6 +371,7 @@ X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, const X509_VERIFY_PARAM *from) | |||
368 | to->inh_flags = save_flags; | 371 | to->inh_flags = save_flags; |
369 | return ret; | 372 | return ret; |
370 | } | 373 | } |
374 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1) | ||
371 | 375 | ||
372 | static int | 376 | static int |
373 | x509_param_set1_internal(char **pdest, size_t *pdestlen, const char *src, | 377 | x509_param_set1_internal(char **pdest, size_t *pdestlen, const char *src, |
@@ -412,6 +416,7 @@ X509_VERIFY_PARAM_set1_name(X509_VERIFY_PARAM *param, const char *name) | |||
412 | return 1; | 416 | return 1; |
413 | return 0; | 417 | return 0; |
414 | } | 418 | } |
419 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_name) | ||
415 | 420 | ||
416 | int | 421 | int |
417 | X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags) | 422 | X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags) |
@@ -421,6 +426,7 @@ X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags) | |||
421 | param->flags |= X509_V_FLAG_POLICY_CHECK; | 426 | param->flags |= X509_V_FLAG_POLICY_CHECK; |
422 | return 1; | 427 | return 1; |
423 | } | 428 | } |
429 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_flags) | ||
424 | 430 | ||
425 | int | 431 | int |
426 | X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, unsigned long flags) | 432 | X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, unsigned long flags) |
@@ -428,42 +434,49 @@ X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, unsigned long flags) | |||
428 | param->flags &= ~flags; | 434 | param->flags &= ~flags; |
429 | return 1; | 435 | return 1; |
430 | } | 436 | } |
437 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_clear_flags) | ||
431 | 438 | ||
432 | unsigned long | 439 | unsigned long |
433 | X509_VERIFY_PARAM_get_flags(X509_VERIFY_PARAM *param) | 440 | X509_VERIFY_PARAM_get_flags(X509_VERIFY_PARAM *param) |
434 | { | 441 | { |
435 | return param->flags; | 442 | return param->flags; |
436 | } | 443 | } |
444 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_flags) | ||
437 | 445 | ||
438 | int | 446 | int |
439 | X509_VERIFY_PARAM_set_purpose(X509_VERIFY_PARAM *param, int purpose) | 447 | X509_VERIFY_PARAM_set_purpose(X509_VERIFY_PARAM *param, int purpose) |
440 | { | 448 | { |
441 | return X509_PURPOSE_set(¶m->purpose, purpose); | 449 | return X509_PURPOSE_set(¶m->purpose, purpose); |
442 | } | 450 | } |
451 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_purpose) | ||
443 | 452 | ||
444 | int | 453 | int |
445 | X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) | 454 | X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) |
446 | { | 455 | { |
447 | return X509_TRUST_set(¶m->trust, trust); | 456 | return X509_TRUST_set(¶m->trust, trust); |
448 | } | 457 | } |
458 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_trust) | ||
449 | 459 | ||
450 | void | 460 | void |
451 | X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth) | 461 | X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth) |
452 | { | 462 | { |
453 | param->depth = depth; | 463 | param->depth = depth; |
454 | } | 464 | } |
465 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_depth) | ||
455 | 466 | ||
456 | void | 467 | void |
457 | X509_VERIFY_PARAM_set_auth_level(X509_VERIFY_PARAM *param, int auth_level) | 468 | X509_VERIFY_PARAM_set_auth_level(X509_VERIFY_PARAM *param, int auth_level) |
458 | { | 469 | { |
459 | param->security_level = auth_level; | 470 | param->security_level = auth_level; |
460 | } | 471 | } |
472 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_auth_level) | ||
461 | 473 | ||
462 | time_t | 474 | time_t |
463 | X509_VERIFY_PARAM_get_time(const X509_VERIFY_PARAM *param) | 475 | X509_VERIFY_PARAM_get_time(const X509_VERIFY_PARAM *param) |
464 | { | 476 | { |
465 | return param->check_time; | 477 | return param->check_time; |
466 | } | 478 | } |
479 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_time) | ||
467 | 480 | ||
468 | void | 481 | void |
469 | X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t) | 482 | X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t) |
@@ -471,6 +484,7 @@ X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t) | |||
471 | param->check_time = t; | 484 | param->check_time = t; |
472 | param->flags |= X509_V_FLAG_USE_CHECK_TIME; | 485 | param->flags |= X509_V_FLAG_USE_CHECK_TIME; |
473 | } | 486 | } |
487 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_time) | ||
474 | 488 | ||
475 | int | 489 | int |
476 | X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) | 490 | X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) |
@@ -484,6 +498,7 @@ X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) | |||
484 | return 0; | 498 | return 0; |
485 | return 1; | 499 | return 1; |
486 | } | 500 | } |
501 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add0_policy) | ||
487 | 502 | ||
488 | int | 503 | int |
489 | X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, | 504 | X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, |
@@ -519,6 +534,7 @@ X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, | |||
519 | param->flags |= X509_V_FLAG_POLICY_CHECK; | 534 | param->flags |= X509_V_FLAG_POLICY_CHECK; |
520 | return 1; | 535 | return 1; |
521 | } | 536 | } |
537 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_policies) | ||
522 | 538 | ||
523 | int | 539 | int |
524 | X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, | 540 | X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, |
@@ -529,6 +545,7 @@ X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, | |||
529 | param->id->poisoned = 1; | 545 | param->id->poisoned = 1; |
530 | return 0; | 546 | return 0; |
531 | } | 547 | } |
548 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_host) | ||
532 | 549 | ||
533 | int | 550 | int |
534 | X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, | 551 | X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, |
@@ -539,18 +556,21 @@ X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, | |||
539 | param->id->poisoned = 1; | 556 | param->id->poisoned = 1; |
540 | return 0; | 557 | return 0; |
541 | } | 558 | } |
559 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add1_host) | ||
542 | 560 | ||
543 | void | 561 | void |
544 | X509_VERIFY_PARAM_set_hostflags(X509_VERIFY_PARAM *param, unsigned int flags) | 562 | X509_VERIFY_PARAM_set_hostflags(X509_VERIFY_PARAM *param, unsigned int flags) |
545 | { | 563 | { |
546 | param->id->hostflags = flags; | 564 | param->id->hostflags = flags; |
547 | } | 565 | } |
566 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_hostflags) | ||
548 | 567 | ||
549 | char * | 568 | char * |
550 | X509_VERIFY_PARAM_get0_peername(X509_VERIFY_PARAM *param) | 569 | X509_VERIFY_PARAM_get0_peername(X509_VERIFY_PARAM *param) |
551 | { | 570 | { |
552 | return param->id->peername; | 571 | return param->id->peername; |
553 | } | 572 | } |
573 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0_peername) | ||
554 | 574 | ||
555 | int | 575 | int |
556 | X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param, const char *email, | 576 | X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param, const char *email, |
@@ -562,6 +582,7 @@ X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param, const char *email, | |||
562 | param->id->poisoned = 1; | 582 | param->id->poisoned = 1; |
563 | return 0; | 583 | return 0; |
564 | } | 584 | } |
585 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_email) | ||
565 | 586 | ||
566 | int | 587 | int |
567 | X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param, const unsigned char *ip, | 588 | X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param, const unsigned char *ip, |
@@ -576,6 +597,7 @@ X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param, const unsigned char *ip, | |||
576 | param->id->poisoned = 1; | 597 | param->id->poisoned = 1; |
577 | return 0; | 598 | return 0; |
578 | } | 599 | } |
600 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_ip) | ||
579 | 601 | ||
580 | int | 602 | int |
581 | X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, const char *ipasc) | 603 | X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, const char *ipasc) |
@@ -586,18 +608,21 @@ X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, const char *ipasc) | |||
586 | iplen = (size_t)a2i_ipadd(ipout, ipasc); | 608 | iplen = (size_t)a2i_ipadd(ipout, ipasc); |
587 | return X509_VERIFY_PARAM_set1_ip(param, ipout, iplen); | 609 | return X509_VERIFY_PARAM_set1_ip(param, ipout, iplen); |
588 | } | 610 | } |
611 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_ip_asc) | ||
589 | 612 | ||
590 | int | 613 | int |
591 | X509_VERIFY_PARAM_get_depth(const X509_VERIFY_PARAM *param) | 614 | X509_VERIFY_PARAM_get_depth(const X509_VERIFY_PARAM *param) |
592 | { | 615 | { |
593 | return param->depth; | 616 | return param->depth; |
594 | } | 617 | } |
618 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_depth) | ||
595 | 619 | ||
596 | const char * | 620 | const char * |
597 | X509_VERIFY_PARAM_get0_name(const X509_VERIFY_PARAM *param) | 621 | X509_VERIFY_PARAM_get0_name(const X509_VERIFY_PARAM *param) |
598 | { | 622 | { |
599 | return param->name; | 623 | return param->name; |
600 | } | 624 | } |
625 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0_name) | ||
601 | 626 | ||
602 | static const X509_VERIFY_PARAM_ID _empty_id = { NULL }; | 627 | static const X509_VERIFY_PARAM_ID _empty_id = { NULL }; |
603 | 628 | ||
@@ -679,6 +704,7 @@ X509_VERIFY_PARAM_add0_table(X509_VERIFY_PARAM *param) | |||
679 | return 0; | 704 | return 0; |
680 | return 1; | 705 | return 1; |
681 | } | 706 | } |
707 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add0_table) | ||
682 | 708 | ||
683 | int | 709 | int |
684 | X509_VERIFY_PARAM_get_count(void) | 710 | X509_VERIFY_PARAM_get_count(void) |
@@ -688,6 +714,7 @@ X509_VERIFY_PARAM_get_count(void) | |||
688 | num += sk_X509_VERIFY_PARAM_num(param_table); | 714 | num += sk_X509_VERIFY_PARAM_num(param_table); |
689 | return num; | 715 | return num; |
690 | } | 716 | } |
717 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_count) | ||
691 | 718 | ||
692 | const X509_VERIFY_PARAM * | 719 | const X509_VERIFY_PARAM * |
693 | X509_VERIFY_PARAM_get0(int id) | 720 | X509_VERIFY_PARAM_get0(int id) |
@@ -697,6 +724,7 @@ X509_VERIFY_PARAM_get0(int id) | |||
697 | return default_table + id; | 724 | return default_table + id; |
698 | return sk_X509_VERIFY_PARAM_value(param_table, id - num); | 725 | return sk_X509_VERIFY_PARAM_value(param_table, id - num); |
699 | } | 726 | } |
727 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0) | ||
700 | 728 | ||
701 | const X509_VERIFY_PARAM * | 729 | const X509_VERIFY_PARAM * |
702 | X509_VERIFY_PARAM_lookup(const char *name) | 730 | X509_VERIFY_PARAM_lookup(const char *name) |
@@ -719,6 +747,7 @@ X509_VERIFY_PARAM_lookup(const char *name) | |||
719 | } | 747 | } |
720 | return NULL; | 748 | return NULL; |
721 | } | 749 | } |
750 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_lookup) | ||
722 | 751 | ||
723 | void | 752 | void |
724 | X509_VERIFY_PARAM_table_cleanup(void) | 753 | X509_VERIFY_PARAM_table_cleanup(void) |
@@ -728,3 +757,4 @@ X509_VERIFY_PARAM_table_cleanup(void) | |||
728 | X509_VERIFY_PARAM_free); | 757 | X509_VERIFY_PARAM_free); |
729 | param_table = NULL; | 758 | param_table = NULL; |
730 | } | 759 | } |
760 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_table_cleanup) | ||