diff options
| author | beck <> | 2022-11-14 17:48:50 +0000 |
|---|---|---|
| committer | beck <> | 2022-11-14 17:48:50 +0000 |
| commit | 86ef9af254717a5620d93d1ebe06ab2ad9597496 (patch) | |
| tree | c42f727f8848b4a56e738422f26e8b44150174e4 /src/lib/libcrypto/x509/x509_vpm.c | |
| parent | ee06865d71aaa04ea842bc01f03382ca41128858 (diff) | |
| download | openbsd-86ef9af254717a5620d93d1ebe06ab2ad9597496.tar.gz openbsd-86ef9af254717a5620d93d1ebe06ab2ad9597496.tar.bz2 openbsd-86ef9af254717a5620d93d1ebe06ab2ad9597496.zip | |
Hide public symbols in libcrypto/x509 .c files
ok tb@
Diffstat (limited to 'src/lib/libcrypto/x509/x509_vpm.c')
| -rw-r--r-- | src/lib/libcrypto/x509/x509_vpm.c | 32 |
1 files changed, 31 insertions, 1 deletions
diff --git a/src/lib/libcrypto/x509/x509_vpm.c b/src/lib/libcrypto/x509/x509_vpm.c index e14d7a36fd..56e2c34127 100644 --- a/src/lib/libcrypto/x509/x509_vpm.c +++ b/src/lib/libcrypto/x509/x509_vpm.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: x509_vpm.c,v 1.30 2022/07/04 12:17:32 tb Exp $ */ | 1 | /* $OpenBSD: x509_vpm.c,v 1.31 2022/11/14 17:48:50 beck Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 2004. | 3 | * project 2004. |
| 4 | */ | 4 | */ |
| @@ -218,6 +218,7 @@ X509_VERIFY_PARAM_new(void) | |||
| 218 | x509_verify_param_zero(param); | 218 | x509_verify_param_zero(param); |
| 219 | return param; | 219 | return param; |
| 220 | } | 220 | } |
| 221 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_new) | ||
| 221 | 222 | ||
| 222 | void | 223 | void |
| 223 | X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param) | 224 | X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param) |
| @@ -228,6 +229,7 @@ X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param) | |||
| 228 | free(param->id); | 229 | free(param->id); |
| 229 | free(param); | 230 | free(param); |
| 230 | } | 231 | } |
| 232 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_free) | ||
| 231 | 233 | ||
| 232 | /* | 234 | /* |
| 233 | * This function determines how parameters are "inherited" from one structure | 235 | * This function determines how parameters are "inherited" from one structure |
| @@ -356,6 +358,7 @@ X509_VERIFY_PARAM_inherit(X509_VERIFY_PARAM *dest, const X509_VERIFY_PARAM *src) | |||
| 356 | 358 | ||
| 357 | return 1; | 359 | return 1; |
| 358 | } | 360 | } |
| 361 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_inherit) | ||
| 359 | 362 | ||
| 360 | int | 363 | int |
| 361 | X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, const X509_VERIFY_PARAM *from) | 364 | X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, const X509_VERIFY_PARAM *from) |
| @@ -368,6 +371,7 @@ X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, const X509_VERIFY_PARAM *from) | |||
| 368 | to->inh_flags = save_flags; | 371 | to->inh_flags = save_flags; |
| 369 | return ret; | 372 | return ret; |
| 370 | } | 373 | } |
| 374 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1) | ||
| 371 | 375 | ||
| 372 | static int | 376 | static int |
| 373 | x509_param_set1_internal(char **pdest, size_t *pdestlen, const char *src, | 377 | x509_param_set1_internal(char **pdest, size_t *pdestlen, const char *src, |
| @@ -412,6 +416,7 @@ X509_VERIFY_PARAM_set1_name(X509_VERIFY_PARAM *param, const char *name) | |||
| 412 | return 1; | 416 | return 1; |
| 413 | return 0; | 417 | return 0; |
| 414 | } | 418 | } |
| 419 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_name) | ||
| 415 | 420 | ||
| 416 | int | 421 | int |
| 417 | X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags) | 422 | X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags) |
| @@ -421,6 +426,7 @@ X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags) | |||
| 421 | param->flags |= X509_V_FLAG_POLICY_CHECK; | 426 | param->flags |= X509_V_FLAG_POLICY_CHECK; |
| 422 | return 1; | 427 | return 1; |
| 423 | } | 428 | } |
| 429 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_flags) | ||
| 424 | 430 | ||
| 425 | int | 431 | int |
| 426 | X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, unsigned long flags) | 432 | X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, unsigned long flags) |
| @@ -428,42 +434,49 @@ X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, unsigned long flags) | |||
| 428 | param->flags &= ~flags; | 434 | param->flags &= ~flags; |
| 429 | return 1; | 435 | return 1; |
| 430 | } | 436 | } |
| 437 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_clear_flags) | ||
| 431 | 438 | ||
| 432 | unsigned long | 439 | unsigned long |
| 433 | X509_VERIFY_PARAM_get_flags(X509_VERIFY_PARAM *param) | 440 | X509_VERIFY_PARAM_get_flags(X509_VERIFY_PARAM *param) |
| 434 | { | 441 | { |
| 435 | return param->flags; | 442 | return param->flags; |
| 436 | } | 443 | } |
| 444 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_flags) | ||
| 437 | 445 | ||
| 438 | int | 446 | int |
| 439 | X509_VERIFY_PARAM_set_purpose(X509_VERIFY_PARAM *param, int purpose) | 447 | X509_VERIFY_PARAM_set_purpose(X509_VERIFY_PARAM *param, int purpose) |
| 440 | { | 448 | { |
| 441 | return X509_PURPOSE_set(¶m->purpose, purpose); | 449 | return X509_PURPOSE_set(¶m->purpose, purpose); |
| 442 | } | 450 | } |
| 451 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_purpose) | ||
| 443 | 452 | ||
| 444 | int | 453 | int |
| 445 | X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) | 454 | X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) |
| 446 | { | 455 | { |
| 447 | return X509_TRUST_set(¶m->trust, trust); | 456 | return X509_TRUST_set(¶m->trust, trust); |
| 448 | } | 457 | } |
| 458 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_trust) | ||
| 449 | 459 | ||
| 450 | void | 460 | void |
| 451 | X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth) | 461 | X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth) |
| 452 | { | 462 | { |
| 453 | param->depth = depth; | 463 | param->depth = depth; |
| 454 | } | 464 | } |
| 465 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_depth) | ||
| 455 | 466 | ||
| 456 | void | 467 | void |
| 457 | X509_VERIFY_PARAM_set_auth_level(X509_VERIFY_PARAM *param, int auth_level) | 468 | X509_VERIFY_PARAM_set_auth_level(X509_VERIFY_PARAM *param, int auth_level) |
| 458 | { | 469 | { |
| 459 | param->security_level = auth_level; | 470 | param->security_level = auth_level; |
| 460 | } | 471 | } |
| 472 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_auth_level) | ||
| 461 | 473 | ||
| 462 | time_t | 474 | time_t |
| 463 | X509_VERIFY_PARAM_get_time(const X509_VERIFY_PARAM *param) | 475 | X509_VERIFY_PARAM_get_time(const X509_VERIFY_PARAM *param) |
| 464 | { | 476 | { |
| 465 | return param->check_time; | 477 | return param->check_time; |
| 466 | } | 478 | } |
| 479 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_time) | ||
| 467 | 480 | ||
| 468 | void | 481 | void |
| 469 | X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t) | 482 | X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t) |
| @@ -471,6 +484,7 @@ X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t) | |||
| 471 | param->check_time = t; | 484 | param->check_time = t; |
| 472 | param->flags |= X509_V_FLAG_USE_CHECK_TIME; | 485 | param->flags |= X509_V_FLAG_USE_CHECK_TIME; |
| 473 | } | 486 | } |
| 487 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_time) | ||
| 474 | 488 | ||
| 475 | int | 489 | int |
| 476 | X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) | 490 | X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) |
| @@ -484,6 +498,7 @@ X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) | |||
| 484 | return 0; | 498 | return 0; |
| 485 | return 1; | 499 | return 1; |
| 486 | } | 500 | } |
| 501 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add0_policy) | ||
| 487 | 502 | ||
| 488 | int | 503 | int |
| 489 | X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, | 504 | X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, |
| @@ -519,6 +534,7 @@ X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, | |||
| 519 | param->flags |= X509_V_FLAG_POLICY_CHECK; | 534 | param->flags |= X509_V_FLAG_POLICY_CHECK; |
| 520 | return 1; | 535 | return 1; |
| 521 | } | 536 | } |
| 537 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_policies) | ||
| 522 | 538 | ||
| 523 | int | 539 | int |
| 524 | X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, | 540 | X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, |
| @@ -529,6 +545,7 @@ X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, | |||
| 529 | param->id->poisoned = 1; | 545 | param->id->poisoned = 1; |
| 530 | return 0; | 546 | return 0; |
| 531 | } | 547 | } |
| 548 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_host) | ||
| 532 | 549 | ||
| 533 | int | 550 | int |
| 534 | X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, | 551 | X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, |
| @@ -539,18 +556,21 @@ X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, | |||
| 539 | param->id->poisoned = 1; | 556 | param->id->poisoned = 1; |
| 540 | return 0; | 557 | return 0; |
| 541 | } | 558 | } |
| 559 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add1_host) | ||
| 542 | 560 | ||
| 543 | void | 561 | void |
| 544 | X509_VERIFY_PARAM_set_hostflags(X509_VERIFY_PARAM *param, unsigned int flags) | 562 | X509_VERIFY_PARAM_set_hostflags(X509_VERIFY_PARAM *param, unsigned int flags) |
| 545 | { | 563 | { |
| 546 | param->id->hostflags = flags; | 564 | param->id->hostflags = flags; |
| 547 | } | 565 | } |
| 566 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_hostflags) | ||
| 548 | 567 | ||
| 549 | char * | 568 | char * |
| 550 | X509_VERIFY_PARAM_get0_peername(X509_VERIFY_PARAM *param) | 569 | X509_VERIFY_PARAM_get0_peername(X509_VERIFY_PARAM *param) |
| 551 | { | 570 | { |
| 552 | return param->id->peername; | 571 | return param->id->peername; |
| 553 | } | 572 | } |
| 573 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0_peername) | ||
| 554 | 574 | ||
| 555 | int | 575 | int |
| 556 | X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param, const char *email, | 576 | X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param, const char *email, |
| @@ -562,6 +582,7 @@ X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param, const char *email, | |||
| 562 | param->id->poisoned = 1; | 582 | param->id->poisoned = 1; |
| 563 | return 0; | 583 | return 0; |
| 564 | } | 584 | } |
| 585 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_email) | ||
| 565 | 586 | ||
| 566 | int | 587 | int |
| 567 | X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param, const unsigned char *ip, | 588 | X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param, const unsigned char *ip, |
| @@ -576,6 +597,7 @@ X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param, const unsigned char *ip, | |||
| 576 | param->id->poisoned = 1; | 597 | param->id->poisoned = 1; |
| 577 | return 0; | 598 | return 0; |
| 578 | } | 599 | } |
| 600 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_ip) | ||
| 579 | 601 | ||
| 580 | int | 602 | int |
| 581 | X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, const char *ipasc) | 603 | X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, const char *ipasc) |
| @@ -586,18 +608,21 @@ X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, const char *ipasc) | |||
| 586 | iplen = (size_t)a2i_ipadd(ipout, ipasc); | 608 | iplen = (size_t)a2i_ipadd(ipout, ipasc); |
| 587 | return X509_VERIFY_PARAM_set1_ip(param, ipout, iplen); | 609 | return X509_VERIFY_PARAM_set1_ip(param, ipout, iplen); |
| 588 | } | 610 | } |
| 611 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_ip_asc) | ||
| 589 | 612 | ||
| 590 | int | 613 | int |
| 591 | X509_VERIFY_PARAM_get_depth(const X509_VERIFY_PARAM *param) | 614 | X509_VERIFY_PARAM_get_depth(const X509_VERIFY_PARAM *param) |
| 592 | { | 615 | { |
| 593 | return param->depth; | 616 | return param->depth; |
| 594 | } | 617 | } |
| 618 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_depth) | ||
| 595 | 619 | ||
| 596 | const char * | 620 | const char * |
| 597 | X509_VERIFY_PARAM_get0_name(const X509_VERIFY_PARAM *param) | 621 | X509_VERIFY_PARAM_get0_name(const X509_VERIFY_PARAM *param) |
| 598 | { | 622 | { |
| 599 | return param->name; | 623 | return param->name; |
| 600 | } | 624 | } |
| 625 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0_name) | ||
| 601 | 626 | ||
| 602 | static const X509_VERIFY_PARAM_ID _empty_id = { NULL }; | 627 | static const X509_VERIFY_PARAM_ID _empty_id = { NULL }; |
| 603 | 628 | ||
| @@ -679,6 +704,7 @@ X509_VERIFY_PARAM_add0_table(X509_VERIFY_PARAM *param) | |||
| 679 | return 0; | 704 | return 0; |
| 680 | return 1; | 705 | return 1; |
| 681 | } | 706 | } |
| 707 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add0_table) | ||
| 682 | 708 | ||
| 683 | int | 709 | int |
| 684 | X509_VERIFY_PARAM_get_count(void) | 710 | X509_VERIFY_PARAM_get_count(void) |
| @@ -688,6 +714,7 @@ X509_VERIFY_PARAM_get_count(void) | |||
| 688 | num += sk_X509_VERIFY_PARAM_num(param_table); | 714 | num += sk_X509_VERIFY_PARAM_num(param_table); |
| 689 | return num; | 715 | return num; |
| 690 | } | 716 | } |
| 717 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_count) | ||
| 691 | 718 | ||
| 692 | const X509_VERIFY_PARAM * | 719 | const X509_VERIFY_PARAM * |
| 693 | X509_VERIFY_PARAM_get0(int id) | 720 | X509_VERIFY_PARAM_get0(int id) |
| @@ -697,6 +724,7 @@ X509_VERIFY_PARAM_get0(int id) | |||
| 697 | return default_table + id; | 724 | return default_table + id; |
| 698 | return sk_X509_VERIFY_PARAM_value(param_table, id - num); | 725 | return sk_X509_VERIFY_PARAM_value(param_table, id - num); |
| 699 | } | 726 | } |
| 727 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0) | ||
| 700 | 728 | ||
| 701 | const X509_VERIFY_PARAM * | 729 | const X509_VERIFY_PARAM * |
| 702 | X509_VERIFY_PARAM_lookup(const char *name) | 730 | X509_VERIFY_PARAM_lookup(const char *name) |
| @@ -719,6 +747,7 @@ X509_VERIFY_PARAM_lookup(const char *name) | |||
| 719 | } | 747 | } |
| 720 | return NULL; | 748 | return NULL; |
| 721 | } | 749 | } |
| 750 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_lookup) | ||
| 722 | 751 | ||
| 723 | void | 752 | void |
| 724 | X509_VERIFY_PARAM_table_cleanup(void) | 753 | X509_VERIFY_PARAM_table_cleanup(void) |
| @@ -728,3 +757,4 @@ X509_VERIFY_PARAM_table_cleanup(void) | |||
| 728 | X509_VERIFY_PARAM_free); | 757 | X509_VERIFY_PARAM_free); |
| 729 | param_table = NULL; | 758 | param_table = NULL; |
| 730 | } | 759 | } |
| 760 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_table_cleanup) | ||
