diff options
author | beck <> | 2022-11-14 17:48:50 +0000 |
---|---|---|
committer | beck <> | 2022-11-14 17:48:50 +0000 |
commit | 109899f1b36632f5f1c469c4f562df69585eb21e (patch) | |
tree | c42f727f8848b4a56e738422f26e8b44150174e4 /src | |
parent | fd2db7678bc81cd8abe106c7bd1c724c8b01888d (diff) | |
download | openbsd-109899f1b36632f5f1c469c4f562df69585eb21e.tar.gz openbsd-109899f1b36632f5f1c469c4f562df69585eb21e.tar.bz2 openbsd-109899f1b36632f5f1c469c4f562df69585eb21e.zip |
Hide public symbols in libcrypto/x509 .c files
ok tb@
Diffstat (limited to 'src')
55 files changed, 2073 insertions, 52 deletions
diff --git a/src/lib/libcrypto/Symbols.namespace b/src/lib/libcrypto/Symbols.namespace index 270be2262a..b4be562f6a 100644 --- a/src/lib/libcrypto/Symbols.namespace +++ b/src/lib/libcrypto/Symbols.namespace | |||
@@ -257,3 +257,652 @@ _libre_UI_set_result | |||
257 | _libre_UI_UTIL_read_pw_string | 257 | _libre_UI_UTIL_read_pw_string |
258 | _libre_UI_UTIL_read_pw | 258 | _libre_UI_UTIL_read_pw |
259 | _libre_ERR_load_UI_strings | 259 | _libre_ERR_load_UI_strings |
260 | _libre_X509_CRL_up_ref | ||
261 | _libre_i2d_re_X509_CRL_tbs | ||
262 | _libre_X509_get_X509_PUBKEY | ||
263 | _libre_X509_verify_cert_error_string | ||
264 | _libre_X509_verify | ||
265 | _libre_X509_REQ_verify | ||
266 | _libre_NETSCAPE_SPKI_verify | ||
267 | _libre_NETSCAPE_SPKI_b64_decode | ||
268 | _libre_NETSCAPE_SPKI_b64_encode | ||
269 | _libre_NETSCAPE_SPKI_get_pubkey | ||
270 | _libre_NETSCAPE_SPKI_set_pubkey | ||
271 | _libre_X509_sign | ||
272 | _libre_X509_sign_ctx | ||
273 | _libre_X509_REQ_sign | ||
274 | _libre_X509_REQ_sign_ctx | ||
275 | _libre_X509_CRL_sign | ||
276 | _libre_X509_CRL_sign_ctx | ||
277 | _libre_NETSCAPE_SPKI_sign | ||
278 | _libre_X509_pubkey_digest | ||
279 | _libre_X509_digest | ||
280 | _libre_X509_CRL_digest | ||
281 | _libre_X509_REQ_digest | ||
282 | _libre_X509_NAME_digest | ||
283 | _libre_d2i_X509_fp | ||
284 | _libre_i2d_X509_fp | ||
285 | _libre_d2i_X509_CRL_fp | ||
286 | _libre_i2d_X509_CRL_fp | ||
287 | _libre_d2i_X509_REQ_fp | ||
288 | _libre_i2d_X509_REQ_fp | ||
289 | _libre_d2i_RSAPrivateKey_fp | ||
290 | _libre_i2d_RSAPrivateKey_fp | ||
291 | _libre_d2i_RSAPublicKey_fp | ||
292 | _libre_i2d_RSAPublicKey_fp | ||
293 | _libre_d2i_DSAPrivateKey_fp | ||
294 | _libre_i2d_DSAPrivateKey_fp | ||
295 | _libre_d2i_ECPrivateKey_fp | ||
296 | _libre_i2d_ECPrivateKey_fp | ||
297 | _libre_d2i_PKCS8_fp | ||
298 | _libre_i2d_PKCS8_fp | ||
299 | _libre_d2i_PKCS8_PRIV_KEY_INFO_fp | ||
300 | _libre_i2d_PKCS8_PRIV_KEY_INFO_fp | ||
301 | _libre_i2d_PKCS8PrivateKeyInfo_fp | ||
302 | _libre_i2d_PrivateKey_fp | ||
303 | _libre_d2i_PrivateKey_fp | ||
304 | _libre_d2i_X509_bio | ||
305 | _libre_i2d_X509_bio | ||
306 | _libre_d2i_X509_CRL_bio | ||
307 | _libre_i2d_X509_CRL_bio | ||
308 | _libre_d2i_X509_REQ_bio | ||
309 | _libre_i2d_X509_REQ_bio | ||
310 | _libre_d2i_RSAPrivateKey_bio | ||
311 | _libre_i2d_RSAPrivateKey_bio | ||
312 | _libre_d2i_RSAPublicKey_bio | ||
313 | _libre_i2d_RSAPublicKey_bio | ||
314 | _libre_d2i_DSAPrivateKey_bio | ||
315 | _libre_i2d_DSAPrivateKey_bio | ||
316 | _libre_d2i_ECPrivateKey_bio | ||
317 | _libre_i2d_ECPrivateKey_bio | ||
318 | _libre_d2i_PKCS8_bio | ||
319 | _libre_i2d_PKCS8_bio | ||
320 | _libre_d2i_PKCS8_PRIV_KEY_INFO_bio | ||
321 | _libre_i2d_PKCS8_PRIV_KEY_INFO_bio | ||
322 | _libre_i2d_PKCS8PrivateKeyInfo_bio | ||
323 | _libre_i2d_PrivateKey_bio | ||
324 | _libre_d2i_PrivateKey_bio | ||
325 | _libre_X509_cmp_time | ||
326 | _libre_X509_cmp_current_time | ||
327 | _libre_X509_time_adj | ||
328 | _libre_X509_time_adj_ex | ||
329 | _libre_X509_gmtime_adj | ||
330 | _libre_X509_get_default_cert_area | ||
331 | _libre_X509_get_default_cert_dir | ||
332 | _libre_X509_get_default_cert_file | ||
333 | _libre_X509_get_default_cert_dir_env | ||
334 | _libre_X509_get_default_cert_file_env | ||
335 | _libre_X509_get_default_private_dir | ||
336 | _libre_X509_to_X509_REQ | ||
337 | _libre_X509_REQ_to_X509 | ||
338 | _libre_X509_get_pubkey_parameters | ||
339 | _libre_X509_TRUST_set_default | ||
340 | _libre_X509_TRUST_set | ||
341 | _libre_X509_NAME_oneline | ||
342 | _libre_X509_get0_extensions | ||
343 | _libre_X509_get0_tbs_sigalg | ||
344 | _libre_X509_set_version | ||
345 | _libre_X509_get_version | ||
346 | _libre_X509_set_serialNumber | ||
347 | _libre_X509_get_serialNumber | ||
348 | _libre_X509_get0_serialNumber | ||
349 | _libre_X509_set_issuer_name | ||
350 | _libre_X509_get_issuer_name | ||
351 | _libre_X509_set_subject_name | ||
352 | _libre_X509_get_subject_name | ||
353 | _libre_X509_set_notBefore | ||
354 | _libre_X509_set1_notBefore | ||
355 | _libre_X509_set_notAfter | ||
356 | _libre_X509_set1_notAfter | ||
357 | _libre_X509_get0_notBefore | ||
358 | _libre_X509_getm_notBefore | ||
359 | _libre_X509_get0_notAfter | ||
360 | _libre_X509_getm_notAfter | ||
361 | _libre_X509_set_pubkey | ||
362 | _libre_X509_get_pubkey | ||
363 | _libre_X509_get0_pubkey | ||
364 | _libre_X509_get0_pubkey_bitstr | ||
365 | _libre_X509_certificate_type | ||
366 | _libre_X509_get_signature_type | ||
367 | _libre_X509_REQ_set_version | ||
368 | _libre_X509_REQ_get_version | ||
369 | _libre_X509_REQ_set_subject_name | ||
370 | _libre_X509_REQ_get_subject_name | ||
371 | _libre_X509_REQ_set_pubkey | ||
372 | _libre_X509_REQ_get_pubkey | ||
373 | _libre_i2d_re_X509_REQ_tbs | ||
374 | _libre_X509_REQ_get0_pubkey | ||
375 | _libre_X509_REQ_extension_nid | ||
376 | _libre_X509_REQ_get_extension_nids | ||
377 | _libre_X509_REQ_set_extension_nids | ||
378 | _libre_X509_REQ_get_extensions | ||
379 | _libre_X509_REQ_add_extensions_nid | ||
380 | _libre_X509_REQ_add_extensions | ||
381 | _libre_X509_REQ_get_attr_count | ||
382 | _libre_X509_REQ_get_attr_by_NID | ||
383 | _libre_X509_REQ_get_attr_by_OBJ | ||
384 | _libre_X509_REQ_get_attr | ||
385 | _libre_X509_REQ_delete_attr | ||
386 | _libre_X509_REQ_add1_attr | ||
387 | _libre_X509_REQ_add1_attr_by_OBJ | ||
388 | _libre_X509_REQ_add1_attr_by_NID | ||
389 | _libre_X509_REQ_add1_attr_by_txt | ||
390 | _libre_X509_CRL_set_version | ||
391 | _libre_X509_CRL_set_issuer_name | ||
392 | _libre_X509_CRL_set_lastUpdate | ||
393 | _libre_X509_CRL_set1_lastUpdate | ||
394 | _libre_X509_CRL_set_nextUpdate | ||
395 | _libre_X509_CRL_set1_nextUpdate | ||
396 | _libre_X509_CRL_sort | ||
397 | _libre_X509_REVOKED_get0_extensions | ||
398 | _libre_X509_REVOKED_get0_revocationDate | ||
399 | _libre_X509_REVOKED_get0_serialNumber | ||
400 | _libre_X509_REVOKED_set_revocationDate | ||
401 | _libre_X509_REVOKED_set_serialNumber | ||
402 | _libre_X509_REQ_check_private_key | ||
403 | _libre_X509_check_private_key | ||
404 | _libre_X509_issuer_and_serial_cmp | ||
405 | _libre_X509_issuer_and_serial_hash | ||
406 | _libre_X509_issuer_name_cmp | ||
407 | _libre_X509_issuer_name_hash | ||
408 | _libre_X509_subject_name_cmp | ||
409 | _libre_X509_subject_name_hash | ||
410 | _libre_X509_issuer_name_hash_old | ||
411 | _libre_X509_subject_name_hash_old | ||
412 | _libre_X509_cmp | ||
413 | _libre_X509_NAME_cmp | ||
414 | _libre_X509_NAME_hash | ||
415 | _libre_X509_NAME_hash_old | ||
416 | _libre_X509_CRL_cmp | ||
417 | _libre_X509_CRL_match | ||
418 | _libre_X509_NAME_entry_count | ||
419 | _libre_X509_NAME_get_text_by_NID | ||
420 | _libre_X509_NAME_get_text_by_OBJ | ||
421 | _libre_X509_NAME_get_index_by_NID | ||
422 | _libre_X509_NAME_get_index_by_OBJ | ||
423 | _libre_X509_NAME_get_entry | ||
424 | _libre_X509_NAME_delete_entry | ||
425 | _libre_X509_NAME_add_entry | ||
426 | _libre_X509_NAME_add_entry_by_OBJ | ||
427 | _libre_X509_NAME_add_entry_by_NID | ||
428 | _libre_X509_NAME_ENTRY_create_by_txt | ||
429 | _libre_X509_NAME_ENTRY_create_by_NID | ||
430 | _libre_X509_NAME_add_entry_by_txt | ||
431 | _libre_X509_NAME_ENTRY_create_by_OBJ | ||
432 | _libre_X509_NAME_ENTRY_set_object | ||
433 | _libre_X509_NAME_ENTRY_set_data | ||
434 | _libre_X509_NAME_ENTRY_get_object | ||
435 | _libre_X509_NAME_ENTRY_get_data | ||
436 | _libre_X509_NAME_ENTRY_set | ||
437 | _libre_X509v3_get_ext_count | ||
438 | _libre_X509v3_get_ext_by_NID | ||
439 | _libre_X509v3_get_ext_by_OBJ | ||
440 | _libre_X509v3_get_ext_by_critical | ||
441 | _libre_X509v3_get_ext | ||
442 | _libre_X509v3_delete_ext | ||
443 | _libre_X509v3_add_ext | ||
444 | _libre_X509_get_ext_count | ||
445 | _libre_X509_get_ext_by_NID | ||
446 | _libre_X509_get_ext_by_OBJ | ||
447 | _libre_X509_get_ext_by_critical | ||
448 | _libre_X509_get_ext | ||
449 | _libre_X509_delete_ext | ||
450 | _libre_X509_add_ext | ||
451 | _libre_X509_get_ext_d2i | ||
452 | _libre_X509_add1_ext_i2d | ||
453 | _libre_X509_CRL_get_ext_count | ||
454 | _libre_X509_CRL_get_ext_by_NID | ||
455 | _libre_X509_CRL_get_ext_by_OBJ | ||
456 | _libre_X509_CRL_get_ext_by_critical | ||
457 | _libre_X509_CRL_get_ext | ||
458 | _libre_X509_CRL_delete_ext | ||
459 | _libre_X509_CRL_add_ext | ||
460 | _libre_X509_CRL_get_ext_d2i | ||
461 | _libre_X509_CRL_add1_ext_i2d | ||
462 | _libre_X509_REVOKED_get_ext_count | ||
463 | _libre_X509_REVOKED_get_ext_by_NID | ||
464 | _libre_X509_REVOKED_get_ext_by_OBJ | ||
465 | _libre_X509_REVOKED_get_ext_by_critical | ||
466 | _libre_X509_REVOKED_get_ext | ||
467 | _libre_X509_REVOKED_delete_ext | ||
468 | _libre_X509_REVOKED_add_ext | ||
469 | _libre_X509_REVOKED_get_ext_d2i | ||
470 | _libre_X509_REVOKED_add1_ext_i2d | ||
471 | _libre_X509_EXTENSION_create_by_NID | ||
472 | _libre_X509_EXTENSION_create_by_OBJ | ||
473 | _libre_X509_EXTENSION_set_object | ||
474 | _libre_X509_EXTENSION_set_critical | ||
475 | _libre_X509_EXTENSION_set_data | ||
476 | _libre_X509_EXTENSION_get_object | ||
477 | _libre_X509_EXTENSION_get_data | ||
478 | _libre_X509_EXTENSION_get_critical | ||
479 | _libre_X509at_get_attr_count | ||
480 | _libre_X509at_get_attr_by_NID | ||
481 | _libre_X509at_get_attr_by_OBJ | ||
482 | _libre_X509at_get_attr | ||
483 | _libre_X509at_delete_attr | ||
484 | _libre_X509at_add1_attr | ||
485 | _libre_X509at_add1_attr_by_OBJ | ||
486 | _libre_X509at_add1_attr_by_NID | ||
487 | _libre_X509at_add1_attr_by_txt | ||
488 | _libre_X509at_get0_data_by_OBJ | ||
489 | _libre_X509_ATTRIBUTE_create_by_NID | ||
490 | _libre_X509_ATTRIBUTE_create_by_OBJ | ||
491 | _libre_X509_ATTRIBUTE_create_by_txt | ||
492 | _libre_X509_ATTRIBUTE_set1_object | ||
493 | _libre_X509_ATTRIBUTE_set1_data | ||
494 | _libre_X509_ATTRIBUTE_get0_data | ||
495 | _libre_X509_ATTRIBUTE_count | ||
496 | _libre_X509_ATTRIBUTE_get0_object | ||
497 | _libre_X509_ATTRIBUTE_get0_type | ||
498 | _libre_X509_verify_cert | ||
499 | _libre_X509_find_by_issuer_and_serial | ||
500 | _libre_X509_find_by_subject | ||
501 | _libre_X509_check_trust | ||
502 | _libre_X509_TRUST_get_count | ||
503 | _libre_X509_TRUST_get0 | ||
504 | _libre_X509_TRUST_get_by_id | ||
505 | _libre_X509_TRUST_add | ||
506 | _libre_X509_TRUST_cleanup | ||
507 | _libre_X509_TRUST_get_flags | ||
508 | _libre_X509_TRUST_get0_name | ||
509 | _libre_X509_TRUST_get_trust | ||
510 | _libre_X509_up_ref | ||
511 | _libre_X509_chain_up_ref | ||
512 | _libre_ERR_load_X509_strings | ||
513 | _libre_X509_STORE_set_depth | ||
514 | _libre_X509_STORE_CTX_set_depth | ||
515 | _libre_X509_OBJECT_new | ||
516 | _libre_X509_OBJECT_free | ||
517 | _libre_X509_OBJECT_idx_by_subject | ||
518 | _libre_X509_OBJECT_retrieve_by_subject | ||
519 | _libre_X509_OBJECT_retrieve_match | ||
520 | _libre_X509_OBJECT_up_ref_count | ||
521 | _libre_X509_OBJECT_get_type | ||
522 | _libre_X509_OBJECT_get0_X509 | ||
523 | _libre_X509_OBJECT_get0_X509_CRL | ||
524 | _libre_X509_STORE_new | ||
525 | _libre_X509_STORE_free | ||
526 | _libre_X509_STORE_up_ref | ||
527 | _libre_X509_STORE_get1_certs | ||
528 | _libre_X509_STORE_get1_crls | ||
529 | _libre_X509_STORE_get0_objects | ||
530 | _libre_X509_STORE_get_ex_data | ||
531 | _libre_X509_STORE_set_ex_data | ||
532 | _libre_X509_STORE_set_flags | ||
533 | _libre_X509_STORE_set_purpose | ||
534 | _libre_X509_STORE_set_trust | ||
535 | _libre_X509_STORE_set1_param | ||
536 | _libre_X509_STORE_get0_param | ||
537 | _libre_X509_STORE_get_verify_cb | ||
538 | _libre_X509_STORE_set_verify_cb | ||
539 | _libre_X509_STORE_CTX_new | ||
540 | _libre_X509_STORE_CTX_get1_issuer | ||
541 | _libre_X509_STORE_CTX_free | ||
542 | _libre_X509_STORE_CTX_init | ||
543 | _libre_X509_STORE_CTX_get0_cert | ||
544 | _libre_X509_STORE_CTX_get0_chain | ||
545 | _libre_X509_STORE_CTX_get0_store | ||
546 | _libre_X509_STORE_CTX_get0_untrusted | ||
547 | _libre_X509_STORE_CTX_set0_untrusted | ||
548 | _libre_X509_STORE_CTX_trusted_stack | ||
549 | _libre_X509_STORE_CTX_set0_trusted_stack | ||
550 | _libre_X509_STORE_CTX_cleanup | ||
551 | _libre_X509_STORE_add_lookup | ||
552 | _libre_X509_LOOKUP_hash_dir | ||
553 | _libre_X509_LOOKUP_file | ||
554 | _libre_X509_LOOKUP_mem | ||
555 | _libre_X509_STORE_add_cert | ||
556 | _libre_X509_STORE_add_crl | ||
557 | _libre_X509_STORE_CTX_get_by_subject | ||
558 | _libre_X509_STORE_CTX_get_obj_by_subject | ||
559 | _libre_X509_LOOKUP_ctrl | ||
560 | _libre_X509_load_cert_file | ||
561 | _libre_X509_load_crl_file | ||
562 | _libre_X509_load_cert_crl_file | ||
563 | _libre_X509_LOOKUP_new | ||
564 | _libre_X509_LOOKUP_free | ||
565 | _libre_X509_LOOKUP_init | ||
566 | _libre_X509_LOOKUP_by_subject | ||
567 | _libre_X509_LOOKUP_by_issuer_serial | ||
568 | _libre_X509_LOOKUP_by_fingerprint | ||
569 | _libre_X509_LOOKUP_by_alias | ||
570 | _libre_X509_LOOKUP_shutdown | ||
571 | _libre_X509_STORE_load_locations | ||
572 | _libre_X509_STORE_load_mem | ||
573 | _libre_X509_STORE_set_default_paths | ||
574 | _libre_X509_STORE_CTX_get_ex_new_index | ||
575 | _libre_X509_STORE_CTX_set_ex_data | ||
576 | _libre_X509_STORE_CTX_get_ex_data | ||
577 | _libre_X509_STORE_CTX_get_error | ||
578 | _libre_X509_STORE_CTX_set_error | ||
579 | _libre_X509_STORE_CTX_get_error_depth | ||
580 | _libre_X509_STORE_CTX_set_error_depth | ||
581 | _libre_X509_STORE_CTX_get_current_cert | ||
582 | _libre_X509_STORE_CTX_set_current_cert | ||
583 | _libre_X509_STORE_CTX_get0_current_issuer | ||
584 | _libre_X509_STORE_CTX_get0_current_crl | ||
585 | _libre_X509_STORE_CTX_get0_parent_ctx | ||
586 | _libre_X509_STORE_CTX_get_chain | ||
587 | _libre_X509_STORE_CTX_get1_chain | ||
588 | _libre_X509_STORE_CTX_set_cert | ||
589 | _libre_X509_STORE_CTX_set_chain | ||
590 | _libre_X509_STORE_CTX_set0_crls | ||
591 | _libre_X509_STORE_CTX_set_purpose | ||
592 | _libre_X509_STORE_CTX_set_trust | ||
593 | _libre_X509_STORE_CTX_purpose_inherit | ||
594 | _libre_X509_STORE_CTX_set_flags | ||
595 | _libre_X509_STORE_CTX_set_time | ||
596 | _libre_X509_STORE_CTX_set0_verified_chain | ||
597 | _libre_X509_STORE_CTX_get_verify | ||
598 | _libre_X509_STORE_CTX_set_verify | ||
599 | _libre_X509_STORE_CTX_get_verify_cb | ||
600 | _libre_X509_STORE_CTX_set_verify_cb | ||
601 | _libre_X509_STORE_set_verify | ||
602 | _libre_X509_STORE_get_verify | ||
603 | _libre_X509_STORE_CTX_get0_policy_tree | ||
604 | _libre_X509_STORE_CTX_get_explicit_policy | ||
605 | _libre_X509_STORE_CTX_get_num_untrusted | ||
606 | _libre_X509_STORE_CTX_get0_param | ||
607 | _libre_X509_STORE_CTX_set0_param | ||
608 | _libre_X509_STORE_CTX_set_default | ||
609 | _libre_X509_VERIFY_PARAM_new | ||
610 | _libre_X509_VERIFY_PARAM_free | ||
611 | _libre_X509_VERIFY_PARAM_inherit | ||
612 | _libre_X509_VERIFY_PARAM_set1 | ||
613 | _libre_X509_VERIFY_PARAM_set1_name | ||
614 | _libre_X509_VERIFY_PARAM_set_flags | ||
615 | _libre_X509_VERIFY_PARAM_clear_flags | ||
616 | _libre_X509_VERIFY_PARAM_get_flags | ||
617 | _libre_X509_VERIFY_PARAM_set_purpose | ||
618 | _libre_X509_VERIFY_PARAM_set_trust | ||
619 | _libre_X509_VERIFY_PARAM_set_depth | ||
620 | _libre_X509_VERIFY_PARAM_set_auth_level | ||
621 | _libre_X509_VERIFY_PARAM_get_time | ||
622 | _libre_X509_VERIFY_PARAM_set_time | ||
623 | _libre_X509_VERIFY_PARAM_add0_policy | ||
624 | _libre_X509_VERIFY_PARAM_set1_policies | ||
625 | _libre_X509_VERIFY_PARAM_get_depth | ||
626 | _libre_X509_VERIFY_PARAM_set1_host | ||
627 | _libre_X509_VERIFY_PARAM_add1_host | ||
628 | _libre_X509_VERIFY_PARAM_set_hostflags | ||
629 | _libre_X509_VERIFY_PARAM_get0_peername | ||
630 | _libre_X509_VERIFY_PARAM_set1_email | ||
631 | _libre_X509_VERIFY_PARAM_set1_ip | ||
632 | _libre_X509_VERIFY_PARAM_set1_ip_asc | ||
633 | _libre_X509_VERIFY_PARAM_get0_name | ||
634 | _libre_X509_VERIFY_PARAM_get0 | ||
635 | _libre_X509_VERIFY_PARAM_get_count | ||
636 | _libre_X509_VERIFY_PARAM_add0_table | ||
637 | _libre_X509_VERIFY_PARAM_lookup | ||
638 | _libre_X509_VERIFY_PARAM_table_cleanup | ||
639 | _libre_X509_policy_check | ||
640 | _libre_X509_policy_tree_free | ||
641 | _libre_X509_policy_tree_level_count | ||
642 | _libre_X509_policy_tree_get0_level | ||
643 | _libre_X509_policy_tree_get0_policies | ||
644 | _libre_X509_policy_tree_get0_user_policies | ||
645 | _libre_X509_policy_level_node_count | ||
646 | _libre_X509_policy_level_get0_node | ||
647 | _libre_X509_policy_node_get0_policy | ||
648 | _libre_X509_policy_node_get0_qualifiers | ||
649 | _libre_X509_policy_node_get0_parent | ||
650 | _libre_PROXY_POLICY_new | ||
651 | _libre_PROXY_POLICY_free | ||
652 | _libre_d2i_PROXY_POLICY | ||
653 | _libre_i2d_PROXY_POLICY | ||
654 | _libre_PROXY_CERT_INFO_EXTENSION_new | ||
655 | _libre_PROXY_CERT_INFO_EXTENSION_free | ||
656 | _libre_d2i_PROXY_CERT_INFO_EXTENSION | ||
657 | _libre_i2d_PROXY_CERT_INFO_EXTENSION | ||
658 | _libre_BASIC_CONSTRAINTS_new | ||
659 | _libre_BASIC_CONSTRAINTS_free | ||
660 | _libre_d2i_BASIC_CONSTRAINTS | ||
661 | _libre_i2d_BASIC_CONSTRAINTS | ||
662 | _libre_SXNET_new | ||
663 | _libre_SXNET_free | ||
664 | _libre_d2i_SXNET | ||
665 | _libre_i2d_SXNET | ||
666 | _libre_SXNETID_new | ||
667 | _libre_SXNETID_free | ||
668 | _libre_d2i_SXNETID | ||
669 | _libre_i2d_SXNETID | ||
670 | _libre_SXNET_add_id_asc | ||
671 | _libre_SXNET_add_id_ulong | ||
672 | _libre_SXNET_add_id_INTEGER | ||
673 | _libre_SXNET_get_id_asc | ||
674 | _libre_SXNET_get_id_ulong | ||
675 | _libre_SXNET_get_id_INTEGER | ||
676 | _libre_AUTHORITY_KEYID_new | ||
677 | _libre_AUTHORITY_KEYID_free | ||
678 | _libre_d2i_AUTHORITY_KEYID | ||
679 | _libre_i2d_AUTHORITY_KEYID | ||
680 | _libre_PKEY_USAGE_PERIOD_new | ||
681 | _libre_PKEY_USAGE_PERIOD_free | ||
682 | _libre_d2i_PKEY_USAGE_PERIOD | ||
683 | _libre_i2d_PKEY_USAGE_PERIOD | ||
684 | _libre_GENERAL_NAME_new | ||
685 | _libre_GENERAL_NAME_free | ||
686 | _libre_d2i_GENERAL_NAME | ||
687 | _libre_i2d_GENERAL_NAME | ||
688 | _libre_GENERAL_NAME_dup | ||
689 | _libre_GENERAL_NAME_cmp | ||
690 | _libre_v2i_ASN1_BIT_STRING | ||
691 | _libre_i2v_ASN1_BIT_STRING | ||
692 | _libre_i2v_GENERAL_NAME | ||
693 | _libre_GENERAL_NAME_print | ||
694 | _libre_GENERAL_NAMES_new | ||
695 | _libre_GENERAL_NAMES_free | ||
696 | _libre_d2i_GENERAL_NAMES | ||
697 | _libre_i2d_GENERAL_NAMES | ||
698 | _libre_i2v_GENERAL_NAMES | ||
699 | _libre_v2i_GENERAL_NAMES | ||
700 | _libre_OTHERNAME_new | ||
701 | _libre_OTHERNAME_free | ||
702 | _libre_d2i_OTHERNAME | ||
703 | _libre_i2d_OTHERNAME | ||
704 | _libre_EDIPARTYNAME_new | ||
705 | _libre_EDIPARTYNAME_free | ||
706 | _libre_d2i_EDIPARTYNAME | ||
707 | _libre_i2d_EDIPARTYNAME | ||
708 | _libre_OTHERNAME_cmp | ||
709 | _libre_GENERAL_NAME_set0_value | ||
710 | _libre_GENERAL_NAME_get0_value | ||
711 | _libre_GENERAL_NAME_set0_othername | ||
712 | _libre_GENERAL_NAME_get0_otherName | ||
713 | _libre_i2s_ASN1_OCTET_STRING | ||
714 | _libre_s2i_ASN1_OCTET_STRING | ||
715 | _libre_EXTENDED_KEY_USAGE_new | ||
716 | _libre_EXTENDED_KEY_USAGE_free | ||
717 | _libre_d2i_EXTENDED_KEY_USAGE | ||
718 | _libre_i2d_EXTENDED_KEY_USAGE | ||
719 | _libre_i2a_ACCESS_DESCRIPTION | ||
720 | _libre_CERTIFICATEPOLICIES_new | ||
721 | _libre_CERTIFICATEPOLICIES_free | ||
722 | _libre_d2i_CERTIFICATEPOLICIES | ||
723 | _libre_i2d_CERTIFICATEPOLICIES | ||
724 | _libre_POLICYINFO_new | ||
725 | _libre_POLICYINFO_free | ||
726 | _libre_d2i_POLICYINFO | ||
727 | _libre_i2d_POLICYINFO | ||
728 | _libre_POLICYQUALINFO_new | ||
729 | _libre_POLICYQUALINFO_free | ||
730 | _libre_d2i_POLICYQUALINFO | ||
731 | _libre_i2d_POLICYQUALINFO | ||
732 | _libre_USERNOTICE_new | ||
733 | _libre_USERNOTICE_free | ||
734 | _libre_d2i_USERNOTICE | ||
735 | _libre_i2d_USERNOTICE | ||
736 | _libre_NOTICEREF_new | ||
737 | _libre_NOTICEREF_free | ||
738 | _libre_d2i_NOTICEREF | ||
739 | _libre_i2d_NOTICEREF | ||
740 | _libre_CRL_DIST_POINTS_new | ||
741 | _libre_CRL_DIST_POINTS_free | ||
742 | _libre_d2i_CRL_DIST_POINTS | ||
743 | _libre_i2d_CRL_DIST_POINTS | ||
744 | _libre_DIST_POINT_new | ||
745 | _libre_DIST_POINT_free | ||
746 | _libre_d2i_DIST_POINT | ||
747 | _libre_i2d_DIST_POINT | ||
748 | _libre_DIST_POINT_NAME_new | ||
749 | _libre_DIST_POINT_NAME_free | ||
750 | _libre_d2i_DIST_POINT_NAME | ||
751 | _libre_i2d_DIST_POINT_NAME | ||
752 | _libre_ISSUING_DIST_POINT_new | ||
753 | _libre_ISSUING_DIST_POINT_free | ||
754 | _libre_d2i_ISSUING_DIST_POINT | ||
755 | _libre_i2d_ISSUING_DIST_POINT | ||
756 | _libre_DIST_POINT_set_dpname | ||
757 | _libre_NAME_CONSTRAINTS_check | ||
758 | _libre_ACCESS_DESCRIPTION_new | ||
759 | _libre_ACCESS_DESCRIPTION_free | ||
760 | _libre_d2i_ACCESS_DESCRIPTION | ||
761 | _libre_i2d_ACCESS_DESCRIPTION | ||
762 | _libre_AUTHORITY_INFO_ACCESS_new | ||
763 | _libre_AUTHORITY_INFO_ACCESS_free | ||
764 | _libre_d2i_AUTHORITY_INFO_ACCESS | ||
765 | _libre_i2d_AUTHORITY_INFO_ACCESS | ||
766 | _libre_POLICY_MAPPING_new | ||
767 | _libre_POLICY_MAPPING_free | ||
768 | _libre_GENERAL_SUBTREE_new | ||
769 | _libre_GENERAL_SUBTREE_free | ||
770 | _libre_NAME_CONSTRAINTS_new | ||
771 | _libre_NAME_CONSTRAINTS_free | ||
772 | _libre_POLICY_CONSTRAINTS_new | ||
773 | _libre_POLICY_CONSTRAINTS_free | ||
774 | _libre_a2i_GENERAL_NAME | ||
775 | _libre_v2i_GENERAL_NAME | ||
776 | _libre_v2i_GENERAL_NAME_ex | ||
777 | _libre_X509V3_conf_free | ||
778 | _libre_X509V3_EXT_nconf_nid | ||
779 | _libre_X509V3_EXT_nconf | ||
780 | _libre_X509V3_EXT_add_nconf_sk | ||
781 | _libre_X509V3_EXT_add_nconf | ||
782 | _libre_X509V3_EXT_REQ_add_nconf | ||
783 | _libre_X509V3_EXT_CRL_add_nconf | ||
784 | _libre_X509V3_EXT_conf_nid | ||
785 | _libre_X509V3_EXT_conf | ||
786 | _libre_X509V3_EXT_add_conf | ||
787 | _libre_X509V3_EXT_REQ_add_conf | ||
788 | _libre_X509V3_EXT_CRL_add_conf | ||
789 | _libre_X509V3_add_value_bool_nf | ||
790 | _libre_X509V3_get_value_bool | ||
791 | _libre_X509V3_get_value_int | ||
792 | _libre_X509V3_set_nconf | ||
793 | _libre_X509V3_set_conf_lhash | ||
794 | _libre_X509V3_get_string | ||
795 | _libre_X509V3_get_section | ||
796 | _libre_X509V3_string_free | ||
797 | _libre_X509V3_section_free | ||
798 | _libre_X509V3_set_ctx | ||
799 | _libre_X509V3_add_value | ||
800 | _libre_X509V3_add_value_uchar | ||
801 | _libre_X509V3_add_value_bool | ||
802 | _libre_X509V3_add_value_int | ||
803 | _libre_i2s_ASN1_INTEGER | ||
804 | _libre_s2i_ASN1_INTEGER | ||
805 | _libre_i2s_ASN1_ENUMERATED | ||
806 | _libre_i2s_ASN1_ENUMERATED_TABLE | ||
807 | _libre_X509V3_EXT_add | ||
808 | _libre_X509V3_EXT_add_list | ||
809 | _libre_X509V3_EXT_add_alias | ||
810 | _libre_X509V3_EXT_cleanup | ||
811 | _libre_X509V3_EXT_get | ||
812 | _libre_X509V3_EXT_get_nid | ||
813 | _libre_X509V3_add_standard_extensions | ||
814 | _libre_X509V3_parse_list | ||
815 | _libre_X509V3_EXT_d2i | ||
816 | _libre_X509V3_get_d2i | ||
817 | _libre_X509V3_EXT_i2d | ||
818 | _libre_X509V3_add1_i2d | ||
819 | _libre_hex_to_string | ||
820 | _libre_string_to_hex | ||
821 | _libre_X509V3_EXT_val_prn | ||
822 | _libre_X509V3_EXT_print | ||
823 | _libre_X509V3_EXT_print_fp | ||
824 | _libre_X509V3_extensions_print | ||
825 | _libre_X509_check_ca | ||
826 | _libre_X509_check_purpose | ||
827 | _libre_X509_supported_extension | ||
828 | _libre_X509_PURPOSE_set | ||
829 | _libre_X509_check_issued | ||
830 | _libre_X509_check_akid | ||
831 | _libre_X509_PURPOSE_get_count | ||
832 | _libre_X509_PURPOSE_get0 | ||
833 | _libre_X509_PURPOSE_get_by_sname | ||
834 | _libre_X509_PURPOSE_get_by_id | ||
835 | _libre_X509_PURPOSE_add | ||
836 | _libre_X509_PURPOSE_get0_name | ||
837 | _libre_X509_PURPOSE_get0_sname | ||
838 | _libre_X509_PURPOSE_get_trust | ||
839 | _libre_X509_PURPOSE_cleanup | ||
840 | _libre_X509_PURPOSE_get_id | ||
841 | _libre_X509_get_extension_flags | ||
842 | _libre_X509_get_key_usage | ||
843 | _libre_X509_get_extended_key_usage | ||
844 | _libre_X509_get1_email | ||
845 | _libre_X509_REQ_get1_email | ||
846 | _libre_X509_email_free | ||
847 | _libre_X509_get1_ocsp | ||
848 | _libre_X509_check_host | ||
849 | _libre_X509_check_email | ||
850 | _libre_X509_check_ip | ||
851 | _libre_X509_check_ip_asc | ||
852 | _libre_a2i_IPADDRESS | ||
853 | _libre_a2i_IPADDRESS_NC | ||
854 | _libre_a2i_ipadd | ||
855 | _libre_X509V3_NAME_from_section | ||
856 | _libre_X509_POLICY_NODE_print | ||
857 | _libre_ASRange_new | ||
858 | _libre_ASRange_free | ||
859 | _libre_d2i_ASRange | ||
860 | _libre_i2d_ASRange | ||
861 | _libre_ASIdOrRange_new | ||
862 | _libre_ASIdOrRange_free | ||
863 | _libre_d2i_ASIdOrRange | ||
864 | _libre_i2d_ASIdOrRange | ||
865 | _libre_ASIdentifierChoice_new | ||
866 | _libre_ASIdentifierChoice_free | ||
867 | _libre_d2i_ASIdentifierChoice | ||
868 | _libre_i2d_ASIdentifierChoice | ||
869 | _libre_ASIdentifiers_new | ||
870 | _libre_ASIdentifiers_free | ||
871 | _libre_d2i_ASIdentifiers | ||
872 | _libre_i2d_ASIdentifiers | ||
873 | _libre_IPAddressRange_new | ||
874 | _libre_IPAddressRange_free | ||
875 | _libre_d2i_IPAddressRange | ||
876 | _libre_i2d_IPAddressRange | ||
877 | _libre_IPAddressOrRange_new | ||
878 | _libre_IPAddressOrRange_free | ||
879 | _libre_d2i_IPAddressOrRange | ||
880 | _libre_i2d_IPAddressOrRange | ||
881 | _libre_IPAddressChoice_new | ||
882 | _libre_IPAddressChoice_free | ||
883 | _libre_d2i_IPAddressChoice | ||
884 | _libre_i2d_IPAddressChoice | ||
885 | _libre_IPAddressFamily_new | ||
886 | _libre_IPAddressFamily_free | ||
887 | _libre_d2i_IPAddressFamily | ||
888 | _libre_i2d_IPAddressFamily | ||
889 | _libre_X509v3_asid_add_inherit | ||
890 | _libre_X509v3_asid_add_id_or_range | ||
891 | _libre_X509v3_addr_add_inherit | ||
892 | _libre_X509v3_addr_add_prefix | ||
893 | _libre_X509v3_addr_add_range | ||
894 | _libre_X509v3_addr_get_afi | ||
895 | _libre_X509v3_addr_get_range | ||
896 | _libre_X509v3_asid_is_canonical | ||
897 | _libre_X509v3_addr_is_canonical | ||
898 | _libre_X509v3_asid_canonize | ||
899 | _libre_X509v3_addr_canonize | ||
900 | _libre_X509v3_asid_inherits | ||
901 | _libre_X509v3_addr_inherits | ||
902 | _libre_X509v3_asid_subset | ||
903 | _libre_X509v3_addr_subset | ||
904 | _libre_X509v3_asid_validate_path | ||
905 | _libre_X509v3_addr_validate_path | ||
906 | _libre_X509v3_asid_validate_resource_set | ||
907 | _libre_X509v3_addr_validate_resource_set | ||
908 | _libre_ERR_load_X509V3_strings | ||
diff --git a/src/lib/libcrypto/hidden/openssl/x509.h b/src/lib/libcrypto/hidden/openssl/x509.h new file mode 100644 index 0000000000..59af41f917 --- /dev/null +++ b/src/lib/libcrypto/hidden/openssl/x509.h | |||
@@ -0,0 +1,278 @@ | |||
1 | /* $OpenBSD: x509.h,v 1.1 2022/11/14 17:48:49 beck Exp $ */ | ||
2 | /* | ||
3 | * Copyright (c) 2022 Bob Beck <beck@openbsd.org> | ||
4 | * | ||
5 | * Permission to use, copy, modify, and distribute this software for any | ||
6 | * purpose with or without fee is hereby granted, provided that the above | ||
7 | * copyright notice and this permission notice appear in all copies. | ||
8 | * | ||
9 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
10 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
11 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
12 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
13 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
14 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
15 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
16 | */ | ||
17 | |||
18 | #ifndef _LIBCRYPTO_X509_H | ||
19 | #define _LIBCRYPTO_X509_H | ||
20 | |||
21 | #include_next <openssl/x509.h> | ||
22 | #include "crypto_namespace.h" | ||
23 | |||
24 | LCRYPTO_USED(X509_CRL_up_ref); | ||
25 | LCRYPTO_USED(i2d_re_X509_CRL_tbs); | ||
26 | LCRYPTO_USED(X509_get_X509_PUBKEY); | ||
27 | LCRYPTO_USED(X509_verify_cert_error_string); | ||
28 | LCRYPTO_USED(X509_verify); | ||
29 | LCRYPTO_USED(X509_REQ_verify); | ||
30 | LCRYPTO_USED(NETSCAPE_SPKI_verify); | ||
31 | LCRYPTO_USED(NETSCAPE_SPKI_b64_decode); | ||
32 | LCRYPTO_USED(NETSCAPE_SPKI_b64_encode); | ||
33 | LCRYPTO_USED(NETSCAPE_SPKI_get_pubkey); | ||
34 | LCRYPTO_USED(NETSCAPE_SPKI_set_pubkey); | ||
35 | LCRYPTO_USED(X509_sign); | ||
36 | LCRYPTO_USED(X509_sign_ctx); | ||
37 | LCRYPTO_USED(X509_REQ_sign); | ||
38 | LCRYPTO_USED(X509_REQ_sign_ctx); | ||
39 | LCRYPTO_USED(X509_CRL_sign); | ||
40 | LCRYPTO_USED(X509_CRL_sign_ctx); | ||
41 | LCRYPTO_USED(NETSCAPE_SPKI_sign); | ||
42 | LCRYPTO_USED(X509_pubkey_digest); | ||
43 | LCRYPTO_USED(X509_digest); | ||
44 | LCRYPTO_USED(X509_CRL_digest); | ||
45 | LCRYPTO_USED(X509_REQ_digest); | ||
46 | LCRYPTO_USED(X509_NAME_digest); | ||
47 | LCRYPTO_USED(d2i_X509_fp); | ||
48 | LCRYPTO_USED(i2d_X509_fp); | ||
49 | LCRYPTO_USED(d2i_X509_CRL_fp); | ||
50 | LCRYPTO_USED(i2d_X509_CRL_fp); | ||
51 | LCRYPTO_USED(d2i_X509_REQ_fp); | ||
52 | LCRYPTO_USED(i2d_X509_REQ_fp); | ||
53 | LCRYPTO_USED(d2i_RSAPrivateKey_fp); | ||
54 | LCRYPTO_USED(i2d_RSAPrivateKey_fp); | ||
55 | LCRYPTO_USED(d2i_RSAPublicKey_fp); | ||
56 | LCRYPTO_USED(i2d_RSAPublicKey_fp); | ||
57 | LCRYPTO_USED(d2i_DSAPrivateKey_fp); | ||
58 | LCRYPTO_USED(i2d_DSAPrivateKey_fp); | ||
59 | LCRYPTO_USED(d2i_ECPrivateKey_fp); | ||
60 | LCRYPTO_USED(i2d_ECPrivateKey_fp); | ||
61 | LCRYPTO_USED(d2i_PKCS8_fp); | ||
62 | LCRYPTO_USED(i2d_PKCS8_fp); | ||
63 | LCRYPTO_USED(d2i_PKCS8_PRIV_KEY_INFO_fp); | ||
64 | LCRYPTO_USED(i2d_PKCS8_PRIV_KEY_INFO_fp); | ||
65 | LCRYPTO_USED(i2d_PKCS8PrivateKeyInfo_fp); | ||
66 | LCRYPTO_USED(i2d_PrivateKey_fp); | ||
67 | LCRYPTO_USED(d2i_PrivateKey_fp); | ||
68 | LCRYPTO_USED(d2i_X509_bio); | ||
69 | LCRYPTO_USED(i2d_X509_bio); | ||
70 | LCRYPTO_USED(d2i_X509_CRL_bio); | ||
71 | LCRYPTO_USED(i2d_X509_CRL_bio); | ||
72 | LCRYPTO_USED(d2i_X509_REQ_bio); | ||
73 | LCRYPTO_USED(i2d_X509_REQ_bio); | ||
74 | LCRYPTO_USED(d2i_RSAPrivateKey_bio); | ||
75 | LCRYPTO_USED(i2d_RSAPrivateKey_bio); | ||
76 | LCRYPTO_USED(d2i_RSAPublicKey_bio); | ||
77 | LCRYPTO_USED(i2d_RSAPublicKey_bio); | ||
78 | LCRYPTO_USED(d2i_DSAPrivateKey_bio); | ||
79 | LCRYPTO_USED(i2d_DSAPrivateKey_bio); | ||
80 | LCRYPTO_USED(d2i_ECPrivateKey_bio); | ||
81 | LCRYPTO_USED(i2d_ECPrivateKey_bio); | ||
82 | LCRYPTO_USED(d2i_PKCS8_bio); | ||
83 | LCRYPTO_USED(i2d_PKCS8_bio); | ||
84 | LCRYPTO_USED(d2i_PKCS8_PRIV_KEY_INFO_bio); | ||
85 | LCRYPTO_USED(i2d_PKCS8_PRIV_KEY_INFO_bio); | ||
86 | LCRYPTO_USED(i2d_PKCS8PrivateKeyInfo_bio); | ||
87 | LCRYPTO_USED(i2d_PrivateKey_bio); | ||
88 | LCRYPTO_USED(d2i_PrivateKey_bio); | ||
89 | LCRYPTO_USED(X509_cmp_time); | ||
90 | LCRYPTO_USED(X509_cmp_current_time); | ||
91 | LCRYPTO_USED(X509_time_adj); | ||
92 | LCRYPTO_USED(X509_time_adj_ex); | ||
93 | LCRYPTO_USED(X509_gmtime_adj); | ||
94 | LCRYPTO_USED(X509_get_default_cert_area); | ||
95 | LCRYPTO_USED(X509_get_default_cert_dir); | ||
96 | LCRYPTO_USED(X509_get_default_cert_file); | ||
97 | LCRYPTO_USED(X509_get_default_cert_dir_env); | ||
98 | LCRYPTO_USED(X509_get_default_cert_file_env); | ||
99 | LCRYPTO_USED(X509_get_default_private_dir); | ||
100 | LCRYPTO_USED(X509_to_X509_REQ); | ||
101 | LCRYPTO_USED(X509_REQ_to_X509); | ||
102 | LCRYPTO_USED(X509_get_pubkey_parameters); | ||
103 | LCRYPTO_USED(X509_TRUST_set_default); | ||
104 | LCRYPTO_USED(X509_TRUST_set); | ||
105 | LCRYPTO_USED(X509_NAME_oneline); | ||
106 | LCRYPTO_USED(X509_get0_extensions); | ||
107 | LCRYPTO_USED(X509_get0_tbs_sigalg); | ||
108 | LCRYPTO_USED(X509_set_version); | ||
109 | LCRYPTO_USED(X509_get_version); | ||
110 | LCRYPTO_USED(X509_set_serialNumber); | ||
111 | LCRYPTO_USED(X509_get_serialNumber); | ||
112 | LCRYPTO_USED(X509_get0_serialNumber); | ||
113 | LCRYPTO_USED(X509_set_issuer_name); | ||
114 | LCRYPTO_USED(X509_get_issuer_name); | ||
115 | LCRYPTO_USED(X509_set_subject_name); | ||
116 | LCRYPTO_USED(X509_get_subject_name); | ||
117 | LCRYPTO_USED(X509_set_notBefore); | ||
118 | LCRYPTO_USED(X509_set1_notBefore); | ||
119 | LCRYPTO_USED(X509_set_notAfter); | ||
120 | LCRYPTO_USED(X509_set1_notAfter); | ||
121 | LCRYPTO_USED(X509_get0_notBefore); | ||
122 | LCRYPTO_USED(X509_getm_notBefore); | ||
123 | LCRYPTO_USED(X509_get0_notAfter); | ||
124 | LCRYPTO_USED(X509_getm_notAfter); | ||
125 | LCRYPTO_USED(X509_set_pubkey); | ||
126 | LCRYPTO_USED(X509_get_pubkey); | ||
127 | LCRYPTO_USED(X509_get0_pubkey); | ||
128 | LCRYPTO_USED(X509_get0_pubkey_bitstr); | ||
129 | LCRYPTO_USED(X509_certificate_type); | ||
130 | LCRYPTO_USED(X509_get_signature_type); | ||
131 | LCRYPTO_USED(X509_REQ_set_version); | ||
132 | LCRYPTO_USED(X509_REQ_get_version); | ||
133 | LCRYPTO_USED(X509_REQ_set_subject_name); | ||
134 | LCRYPTO_USED(X509_REQ_get_subject_name); | ||
135 | LCRYPTO_USED(X509_REQ_set_pubkey); | ||
136 | LCRYPTO_USED(X509_REQ_get_pubkey); | ||
137 | LCRYPTO_USED(i2d_re_X509_REQ_tbs); | ||
138 | LCRYPTO_USED(X509_REQ_get0_pubkey); | ||
139 | LCRYPTO_USED(X509_REQ_extension_nid); | ||
140 | LCRYPTO_USED(X509_REQ_get_extension_nids); | ||
141 | LCRYPTO_USED(X509_REQ_set_extension_nids); | ||
142 | LCRYPTO_USED(X509_REQ_get_extensions); | ||
143 | LCRYPTO_USED(X509_REQ_add_extensions_nid); | ||
144 | LCRYPTO_USED(X509_REQ_add_extensions); | ||
145 | LCRYPTO_USED(X509_REQ_get_attr_count); | ||
146 | LCRYPTO_USED(X509_REQ_get_attr_by_NID); | ||
147 | LCRYPTO_USED(X509_REQ_get_attr_by_OBJ); | ||
148 | LCRYPTO_USED(X509_REQ_get_attr); | ||
149 | LCRYPTO_USED(X509_REQ_delete_attr); | ||
150 | LCRYPTO_USED(X509_REQ_add1_attr); | ||
151 | LCRYPTO_USED(X509_REQ_add1_attr_by_OBJ); | ||
152 | LCRYPTO_USED(X509_REQ_add1_attr_by_NID); | ||
153 | LCRYPTO_USED(X509_REQ_add1_attr_by_txt); | ||
154 | LCRYPTO_USED(X509_CRL_set_version); | ||
155 | LCRYPTO_USED(X509_CRL_set_issuer_name); | ||
156 | LCRYPTO_USED(X509_CRL_set_lastUpdate); | ||
157 | LCRYPTO_USED(X509_CRL_set1_lastUpdate); | ||
158 | LCRYPTO_USED(X509_CRL_set_nextUpdate); | ||
159 | LCRYPTO_USED(X509_CRL_set1_nextUpdate); | ||
160 | LCRYPTO_USED(X509_CRL_sort); | ||
161 | LCRYPTO_USED(X509_REVOKED_get0_extensions); | ||
162 | LCRYPTO_USED(X509_REVOKED_get0_revocationDate); | ||
163 | LCRYPTO_USED(X509_REVOKED_get0_serialNumber); | ||
164 | LCRYPTO_USED(X509_REVOKED_set_revocationDate); | ||
165 | LCRYPTO_USED(X509_REVOKED_set_serialNumber); | ||
166 | LCRYPTO_USED(X509_REQ_check_private_key); | ||
167 | LCRYPTO_USED(X509_check_private_key); | ||
168 | LCRYPTO_USED(X509_issuer_and_serial_cmp); | ||
169 | LCRYPTO_USED(X509_issuer_and_serial_hash); | ||
170 | LCRYPTO_USED(X509_issuer_name_cmp); | ||
171 | LCRYPTO_USED(X509_issuer_name_hash); | ||
172 | LCRYPTO_USED(X509_subject_name_cmp); | ||
173 | LCRYPTO_USED(X509_subject_name_hash); | ||
174 | LCRYPTO_USED(X509_issuer_name_hash_old); | ||
175 | LCRYPTO_USED(X509_subject_name_hash_old); | ||
176 | LCRYPTO_USED(X509_cmp); | ||
177 | LCRYPTO_USED(X509_NAME_cmp); | ||
178 | LCRYPTO_USED(X509_NAME_hash); | ||
179 | LCRYPTO_USED(X509_NAME_hash_old); | ||
180 | LCRYPTO_USED(X509_CRL_cmp); | ||
181 | LCRYPTO_USED(X509_CRL_match); | ||
182 | LCRYPTO_USED(X509_NAME_entry_count); | ||
183 | LCRYPTO_USED(X509_NAME_get_text_by_NID); | ||
184 | LCRYPTO_USED(X509_NAME_get_text_by_OBJ); | ||
185 | LCRYPTO_USED(X509_NAME_get_index_by_NID); | ||
186 | LCRYPTO_USED(X509_NAME_get_index_by_OBJ); | ||
187 | LCRYPTO_USED(X509_NAME_get_entry); | ||
188 | LCRYPTO_USED(X509_NAME_delete_entry); | ||
189 | LCRYPTO_USED(X509_NAME_add_entry); | ||
190 | LCRYPTO_USED(X509_NAME_add_entry_by_OBJ); | ||
191 | LCRYPTO_USED(X509_NAME_add_entry_by_NID); | ||
192 | LCRYPTO_USED(X509_NAME_ENTRY_create_by_txt); | ||
193 | LCRYPTO_USED(X509_NAME_ENTRY_create_by_NID); | ||
194 | LCRYPTO_USED(X509_NAME_add_entry_by_txt); | ||
195 | LCRYPTO_USED(X509_NAME_ENTRY_create_by_OBJ); | ||
196 | LCRYPTO_USED(X509_NAME_ENTRY_set_object); | ||
197 | LCRYPTO_USED(X509_NAME_ENTRY_set_data); | ||
198 | LCRYPTO_USED(X509_NAME_ENTRY_get_object); | ||
199 | LCRYPTO_USED(X509_NAME_ENTRY_get_data); | ||
200 | LCRYPTO_USED(X509_NAME_ENTRY_set); | ||
201 | LCRYPTO_USED(X509v3_get_ext_count); | ||
202 | LCRYPTO_USED(X509v3_get_ext_by_NID); | ||
203 | LCRYPTO_USED(X509v3_get_ext_by_OBJ); | ||
204 | LCRYPTO_USED(X509v3_get_ext_by_critical); | ||
205 | LCRYPTO_USED(X509v3_get_ext); | ||
206 | LCRYPTO_USED(X509v3_delete_ext); | ||
207 | LCRYPTO_USED(X509v3_add_ext); | ||
208 | LCRYPTO_USED(X509_get_ext_count); | ||
209 | LCRYPTO_USED(X509_get_ext_by_NID); | ||
210 | LCRYPTO_USED(X509_get_ext_by_OBJ); | ||
211 | LCRYPTO_USED(X509_get_ext_by_critical); | ||
212 | LCRYPTO_USED(X509_get_ext); | ||
213 | LCRYPTO_USED(X509_delete_ext); | ||
214 | LCRYPTO_USED(X509_add_ext); | ||
215 | LCRYPTO_USED(X509_get_ext_d2i); | ||
216 | LCRYPTO_USED(X509_add1_ext_i2d); | ||
217 | LCRYPTO_USED(X509_CRL_get_ext_count); | ||
218 | LCRYPTO_USED(X509_CRL_get_ext_by_NID); | ||
219 | LCRYPTO_USED(X509_CRL_get_ext_by_OBJ); | ||
220 | LCRYPTO_USED(X509_CRL_get_ext_by_critical); | ||
221 | LCRYPTO_USED(X509_CRL_get_ext); | ||
222 | LCRYPTO_USED(X509_CRL_delete_ext); | ||
223 | LCRYPTO_USED(X509_CRL_add_ext); | ||
224 | LCRYPTO_USED(X509_CRL_get_ext_d2i); | ||
225 | LCRYPTO_USED(X509_CRL_add1_ext_i2d); | ||
226 | LCRYPTO_USED(X509_REVOKED_get_ext_count); | ||
227 | LCRYPTO_USED(X509_REVOKED_get_ext_by_NID); | ||
228 | LCRYPTO_USED(X509_REVOKED_get_ext_by_OBJ); | ||
229 | LCRYPTO_USED(X509_REVOKED_get_ext_by_critical); | ||
230 | LCRYPTO_USED(X509_REVOKED_get_ext); | ||
231 | LCRYPTO_USED(X509_REVOKED_delete_ext); | ||
232 | LCRYPTO_USED(X509_REVOKED_add_ext); | ||
233 | LCRYPTO_USED(X509_REVOKED_get_ext_d2i); | ||
234 | LCRYPTO_USED(X509_REVOKED_add1_ext_i2d); | ||
235 | LCRYPTO_USED(X509_EXTENSION_create_by_NID); | ||
236 | LCRYPTO_USED(X509_EXTENSION_create_by_OBJ); | ||
237 | LCRYPTO_USED(X509_EXTENSION_set_object); | ||
238 | LCRYPTO_USED(X509_EXTENSION_set_critical); | ||
239 | LCRYPTO_USED(X509_EXTENSION_set_data); | ||
240 | LCRYPTO_USED(X509_EXTENSION_get_object); | ||
241 | LCRYPTO_USED(X509_EXTENSION_get_data); | ||
242 | LCRYPTO_USED(X509_EXTENSION_get_critical); | ||
243 | LCRYPTO_USED(X509at_get_attr_count); | ||
244 | LCRYPTO_USED(X509at_get_attr_by_NID); | ||
245 | LCRYPTO_USED(X509at_get_attr_by_OBJ); | ||
246 | LCRYPTO_USED(X509at_get_attr); | ||
247 | LCRYPTO_USED(X509at_delete_attr); | ||
248 | LCRYPTO_USED(X509at_add1_attr); | ||
249 | LCRYPTO_USED(X509at_add1_attr_by_OBJ); | ||
250 | LCRYPTO_USED(X509at_add1_attr_by_NID); | ||
251 | LCRYPTO_USED(X509at_add1_attr_by_txt); | ||
252 | LCRYPTO_USED(X509at_get0_data_by_OBJ); | ||
253 | LCRYPTO_USED(X509_ATTRIBUTE_create_by_NID); | ||
254 | LCRYPTO_USED(X509_ATTRIBUTE_create_by_OBJ); | ||
255 | LCRYPTO_USED(X509_ATTRIBUTE_create_by_txt); | ||
256 | LCRYPTO_USED(X509_ATTRIBUTE_set1_object); | ||
257 | LCRYPTO_USED(X509_ATTRIBUTE_set1_data); | ||
258 | LCRYPTO_USED(X509_ATTRIBUTE_get0_data); | ||
259 | LCRYPTO_USED(X509_ATTRIBUTE_count); | ||
260 | LCRYPTO_USED(X509_ATTRIBUTE_get0_object); | ||
261 | LCRYPTO_USED(X509_ATTRIBUTE_get0_type); | ||
262 | LCRYPTO_USED(X509_verify_cert); | ||
263 | LCRYPTO_USED(X509_find_by_issuer_and_serial); | ||
264 | LCRYPTO_USED(X509_find_by_subject); | ||
265 | LCRYPTO_USED(X509_check_trust); | ||
266 | LCRYPTO_USED(X509_TRUST_get_count); | ||
267 | LCRYPTO_USED(X509_TRUST_get0); | ||
268 | LCRYPTO_USED(X509_TRUST_get_by_id); | ||
269 | LCRYPTO_USED(X509_TRUST_add); | ||
270 | LCRYPTO_USED(X509_TRUST_cleanup); | ||
271 | LCRYPTO_USED(X509_TRUST_get_flags); | ||
272 | LCRYPTO_USED(X509_TRUST_get0_name); | ||
273 | LCRYPTO_USED(X509_TRUST_get_trust); | ||
274 | LCRYPTO_USED(X509_up_ref); | ||
275 | LCRYPTO_USED(X509_chain_up_ref); | ||
276 | LCRYPTO_USED(ERR_load_X509_strings); | ||
277 | |||
278 | #endif /* _LIBCRYPTO_X509_H */ | ||
diff --git a/src/lib/libcrypto/hidden/openssl/x509_vfy.h b/src/lib/libcrypto/hidden/openssl/x509_vfy.h new file mode 100644 index 0000000000..3a52206b45 --- /dev/null +++ b/src/lib/libcrypto/hidden/openssl/x509_vfy.h | |||
@@ -0,0 +1,162 @@ | |||
1 | /* $OpenBSD: x509_vfy.h,v 1.1 2022/11/14 17:48:49 beck Exp $ */ | ||
2 | /* | ||
3 | * Copyright (c) 2022 Bob Beck <beck@openbsd.org> | ||
4 | * | ||
5 | * Permission to use, copy, modify, and distribute this software for any | ||
6 | * purpose with or without fee is hereby granted, provided that the above | ||
7 | * copyright notice and this permission notice appear in all copies. | ||
8 | * | ||
9 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
10 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
11 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
12 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
13 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
14 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
15 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
16 | */ | ||
17 | |||
18 | #ifndef _LIBCRYPTO_X509_VFY_H | ||
19 | #define _LIBCRYPTO_X509_VFY_H | ||
20 | |||
21 | #include_next <openssl/x509_vfy.h> | ||
22 | #include "crypto_namespace.h" | ||
23 | |||
24 | LCRYPTO_USED(X509_STORE_set_depth); | ||
25 | LCRYPTO_USED(X509_STORE_CTX_set_depth); | ||
26 | LCRYPTO_USED(X509_OBJECT_new); | ||
27 | LCRYPTO_USED(X509_OBJECT_free); | ||
28 | LCRYPTO_USED(X509_OBJECT_idx_by_subject); | ||
29 | LCRYPTO_USED(X509_OBJECT_retrieve_by_subject); | ||
30 | LCRYPTO_USED(X509_OBJECT_retrieve_match); | ||
31 | LCRYPTO_USED(X509_OBJECT_up_ref_count); | ||
32 | LCRYPTO_USED(X509_OBJECT_get_type); | ||
33 | LCRYPTO_USED(X509_OBJECT_get0_X509); | ||
34 | LCRYPTO_USED(X509_OBJECT_get0_X509_CRL); | ||
35 | LCRYPTO_USED(X509_STORE_new); | ||
36 | LCRYPTO_USED(X509_STORE_free); | ||
37 | LCRYPTO_USED(X509_STORE_up_ref); | ||
38 | LCRYPTO_USED(X509_STORE_get1_certs); | ||
39 | LCRYPTO_USED(X509_STORE_get1_crls); | ||
40 | LCRYPTO_USED(X509_STORE_get0_objects); | ||
41 | LCRYPTO_USED(X509_STORE_get_ex_data); | ||
42 | LCRYPTO_USED(X509_STORE_set_ex_data); | ||
43 | LCRYPTO_USED(X509_STORE_set_flags); | ||
44 | LCRYPTO_USED(X509_STORE_set_purpose); | ||
45 | LCRYPTO_USED(X509_STORE_set_trust); | ||
46 | LCRYPTO_USED(X509_STORE_set1_param); | ||
47 | LCRYPTO_USED(X509_STORE_get0_param); | ||
48 | LCRYPTO_USED(X509_STORE_get_verify_cb); | ||
49 | LCRYPTO_USED(X509_STORE_set_verify_cb); | ||
50 | LCRYPTO_USED(X509_STORE_CTX_new); | ||
51 | LCRYPTO_USED(X509_STORE_CTX_get1_issuer); | ||
52 | LCRYPTO_USED(X509_STORE_CTX_free); | ||
53 | LCRYPTO_USED(X509_STORE_CTX_init); | ||
54 | LCRYPTO_USED(X509_STORE_CTX_get0_cert); | ||
55 | LCRYPTO_USED(X509_STORE_CTX_get0_chain); | ||
56 | LCRYPTO_USED(X509_STORE_CTX_get0_store); | ||
57 | LCRYPTO_USED(X509_STORE_CTX_get0_untrusted); | ||
58 | LCRYPTO_USED(X509_STORE_CTX_set0_untrusted); | ||
59 | LCRYPTO_USED(X509_STORE_CTX_trusted_stack); | ||
60 | LCRYPTO_USED(X509_STORE_CTX_set0_trusted_stack); | ||
61 | LCRYPTO_USED(X509_STORE_CTX_cleanup); | ||
62 | LCRYPTO_USED(X509_STORE_add_lookup); | ||
63 | LCRYPTO_USED(X509_LOOKUP_hash_dir); | ||
64 | LCRYPTO_USED(X509_LOOKUP_file); | ||
65 | LCRYPTO_USED(X509_LOOKUP_mem); | ||
66 | LCRYPTO_USED(X509_STORE_add_cert); | ||
67 | LCRYPTO_USED(X509_STORE_add_crl); | ||
68 | LCRYPTO_USED(X509_STORE_CTX_get_by_subject); | ||
69 | LCRYPTO_USED(X509_STORE_CTX_get_obj_by_subject); | ||
70 | LCRYPTO_USED(X509_LOOKUP_ctrl); | ||
71 | LCRYPTO_USED(X509_load_cert_file); | ||
72 | LCRYPTO_USED(X509_load_crl_file); | ||
73 | LCRYPTO_USED(X509_load_cert_crl_file); | ||
74 | LCRYPTO_USED(X509_LOOKUP_new); | ||
75 | LCRYPTO_USED(X509_LOOKUP_free); | ||
76 | LCRYPTO_USED(X509_LOOKUP_init); | ||
77 | LCRYPTO_USED(X509_LOOKUP_by_subject); | ||
78 | LCRYPTO_USED(X509_LOOKUP_by_issuer_serial); | ||
79 | LCRYPTO_USED(X509_LOOKUP_by_fingerprint); | ||
80 | LCRYPTO_USED(X509_LOOKUP_by_alias); | ||
81 | LCRYPTO_USED(X509_LOOKUP_shutdown); | ||
82 | LCRYPTO_USED(X509_STORE_load_locations); | ||
83 | LCRYPTO_USED(X509_STORE_load_mem); | ||
84 | LCRYPTO_USED(X509_STORE_set_default_paths); | ||
85 | LCRYPTO_USED(X509_STORE_CTX_get_ex_new_index); | ||
86 | LCRYPTO_USED(X509_STORE_CTX_set_ex_data); | ||
87 | LCRYPTO_USED(X509_STORE_CTX_get_ex_data); | ||
88 | LCRYPTO_USED(X509_STORE_CTX_get_error); | ||
89 | LCRYPTO_USED(X509_STORE_CTX_set_error); | ||
90 | LCRYPTO_USED(X509_STORE_CTX_get_error_depth); | ||
91 | LCRYPTO_USED(X509_STORE_CTX_set_error_depth); | ||
92 | LCRYPTO_USED(X509_STORE_CTX_get_current_cert); | ||
93 | LCRYPTO_USED(X509_STORE_CTX_set_current_cert); | ||
94 | LCRYPTO_USED(X509_STORE_CTX_get0_current_issuer); | ||
95 | LCRYPTO_USED(X509_STORE_CTX_get0_current_crl); | ||
96 | LCRYPTO_USED(X509_STORE_CTX_get0_parent_ctx); | ||
97 | LCRYPTO_USED(X509_STORE_CTX_get_chain); | ||
98 | LCRYPTO_USED(X509_STORE_CTX_get1_chain); | ||
99 | LCRYPTO_USED(X509_STORE_CTX_set_cert); | ||
100 | LCRYPTO_USED(X509_STORE_CTX_set_chain); | ||
101 | LCRYPTO_USED(X509_STORE_CTX_set0_crls); | ||
102 | LCRYPTO_USED(X509_STORE_CTX_set_purpose); | ||
103 | LCRYPTO_USED(X509_STORE_CTX_set_trust); | ||
104 | LCRYPTO_USED(X509_STORE_CTX_purpose_inherit); | ||
105 | LCRYPTO_USED(X509_STORE_CTX_set_flags); | ||
106 | LCRYPTO_USED(X509_STORE_CTX_set_time); | ||
107 | LCRYPTO_USED(X509_STORE_CTX_set0_verified_chain); | ||
108 | LCRYPTO_USED(X509_STORE_CTX_get_verify); | ||
109 | LCRYPTO_USED(X509_STORE_CTX_set_verify); | ||
110 | LCRYPTO_USED(X509_STORE_CTX_get_verify_cb); | ||
111 | LCRYPTO_USED(X509_STORE_CTX_set_verify_cb); | ||
112 | LCRYPTO_USED(X509_STORE_set_verify); | ||
113 | LCRYPTO_USED(X509_STORE_get_verify); | ||
114 | LCRYPTO_USED(X509_STORE_CTX_get0_policy_tree); | ||
115 | LCRYPTO_USED(X509_STORE_CTX_get_explicit_policy); | ||
116 | LCRYPTO_USED(X509_STORE_CTX_get_num_untrusted); | ||
117 | LCRYPTO_USED(X509_STORE_CTX_get0_param); | ||
118 | LCRYPTO_USED(X509_STORE_CTX_set0_param); | ||
119 | LCRYPTO_USED(X509_STORE_CTX_set_default); | ||
120 | LCRYPTO_USED(X509_VERIFY_PARAM_new); | ||
121 | LCRYPTO_USED(X509_VERIFY_PARAM_free); | ||
122 | LCRYPTO_USED(X509_VERIFY_PARAM_inherit); | ||
123 | LCRYPTO_USED(X509_VERIFY_PARAM_set1); | ||
124 | LCRYPTO_USED(X509_VERIFY_PARAM_set1_name); | ||
125 | LCRYPTO_USED(X509_VERIFY_PARAM_set_flags); | ||
126 | LCRYPTO_USED(X509_VERIFY_PARAM_clear_flags); | ||
127 | LCRYPTO_USED(X509_VERIFY_PARAM_get_flags); | ||
128 | LCRYPTO_USED(X509_VERIFY_PARAM_set_purpose); | ||
129 | LCRYPTO_USED(X509_VERIFY_PARAM_set_trust); | ||
130 | LCRYPTO_USED(X509_VERIFY_PARAM_set_depth); | ||
131 | LCRYPTO_USED(X509_VERIFY_PARAM_set_auth_level); | ||
132 | LCRYPTO_USED(X509_VERIFY_PARAM_get_time); | ||
133 | LCRYPTO_USED(X509_VERIFY_PARAM_set_time); | ||
134 | LCRYPTO_USED(X509_VERIFY_PARAM_add0_policy); | ||
135 | LCRYPTO_USED(X509_VERIFY_PARAM_set1_policies); | ||
136 | LCRYPTO_USED(X509_VERIFY_PARAM_get_depth); | ||
137 | LCRYPTO_USED(X509_VERIFY_PARAM_set1_host); | ||
138 | LCRYPTO_USED(X509_VERIFY_PARAM_add1_host); | ||
139 | LCRYPTO_USED(X509_VERIFY_PARAM_set_hostflags); | ||
140 | LCRYPTO_USED(X509_VERIFY_PARAM_get0_peername); | ||
141 | LCRYPTO_USED(X509_VERIFY_PARAM_set1_email); | ||
142 | LCRYPTO_USED(X509_VERIFY_PARAM_set1_ip); | ||
143 | LCRYPTO_USED(X509_VERIFY_PARAM_set1_ip_asc); | ||
144 | LCRYPTO_USED(X509_VERIFY_PARAM_get0_name); | ||
145 | LCRYPTO_USED(X509_VERIFY_PARAM_get0); | ||
146 | LCRYPTO_USED(X509_VERIFY_PARAM_get_count); | ||
147 | LCRYPTO_USED(X509_VERIFY_PARAM_add0_table); | ||
148 | LCRYPTO_USED(X509_VERIFY_PARAM_lookup); | ||
149 | LCRYPTO_USED(X509_VERIFY_PARAM_table_cleanup); | ||
150 | LCRYPTO_USED(X509_policy_check); | ||
151 | LCRYPTO_USED(X509_policy_tree_free); | ||
152 | LCRYPTO_USED(X509_policy_tree_level_count); | ||
153 | LCRYPTO_USED(X509_policy_tree_get0_level); | ||
154 | LCRYPTO_USED(X509_policy_tree_get0_policies); | ||
155 | LCRYPTO_USED(X509_policy_tree_get0_user_policies); | ||
156 | LCRYPTO_USED(X509_policy_level_node_count); | ||
157 | LCRYPTO_USED(X509_policy_level_get0_node); | ||
158 | LCRYPTO_USED(X509_policy_node_get0_policy); | ||
159 | LCRYPTO_USED(X509_policy_node_get0_qualifiers); | ||
160 | LCRYPTO_USED(X509_policy_node_get0_parent); | ||
161 | |||
162 | #endif /* _LIBCRYPTO_X509_VFY_H */ | ||
diff --git a/src/lib/libcrypto/hidden/openssl/x509v3.h b/src/lib/libcrypto/hidden/openssl/x509v3.h new file mode 100644 index 0000000000..eed75e0749 --- /dev/null +++ b/src/lib/libcrypto/hidden/openssl/x509v3.h | |||
@@ -0,0 +1,284 @@ | |||
1 | /* $OpenBSD: x509v3.h,v 1.1 2022/11/14 17:48:49 beck Exp $ */ | ||
2 | /* | ||
3 | * Copyright (c) 2022 Bob Beck <beck@openbsd.org> | ||
4 | * | ||
5 | * Permission to use, copy, modify, and distribute this software for any | ||
6 | * purpose with or without fee is hereby granted, provided that the above | ||
7 | * copyright notice and this permission notice appear in all copies. | ||
8 | * | ||
9 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
10 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
11 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
12 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
13 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
14 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
15 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
16 | */ | ||
17 | |||
18 | #ifndef _LIBCRYPTO_X509V3_H | ||
19 | #define _LIBCRYPTO_X509V3_H | ||
20 | |||
21 | #include_next <openssl/x509v3.h> | ||
22 | #include "crypto_namespace.h" | ||
23 | |||
24 | LCRYPTO_USED(PROXY_POLICY_new); | ||
25 | LCRYPTO_USED(PROXY_POLICY_free); | ||
26 | LCRYPTO_USED(d2i_PROXY_POLICY); | ||
27 | LCRYPTO_USED(i2d_PROXY_POLICY); | ||
28 | LCRYPTO_USED(PROXY_CERT_INFO_EXTENSION_new); | ||
29 | LCRYPTO_USED(PROXY_CERT_INFO_EXTENSION_free); | ||
30 | LCRYPTO_USED(d2i_PROXY_CERT_INFO_EXTENSION); | ||
31 | LCRYPTO_USED(i2d_PROXY_CERT_INFO_EXTENSION); | ||
32 | LCRYPTO_USED(BASIC_CONSTRAINTS_new); | ||
33 | LCRYPTO_USED(BASIC_CONSTRAINTS_free); | ||
34 | LCRYPTO_USED(d2i_BASIC_CONSTRAINTS); | ||
35 | LCRYPTO_USED(i2d_BASIC_CONSTRAINTS); | ||
36 | LCRYPTO_USED(SXNET_new); | ||
37 | LCRYPTO_USED(SXNET_free); | ||
38 | LCRYPTO_USED(d2i_SXNET); | ||
39 | LCRYPTO_USED(i2d_SXNET); | ||
40 | LCRYPTO_USED(SXNETID_new); | ||
41 | LCRYPTO_USED(SXNETID_free); | ||
42 | LCRYPTO_USED(d2i_SXNETID); | ||
43 | LCRYPTO_USED(i2d_SXNETID); | ||
44 | LCRYPTO_USED(SXNET_add_id_asc); | ||
45 | LCRYPTO_USED(SXNET_add_id_ulong); | ||
46 | LCRYPTO_USED(SXNET_add_id_INTEGER); | ||
47 | LCRYPTO_USED(SXNET_get_id_asc); | ||
48 | LCRYPTO_USED(SXNET_get_id_ulong); | ||
49 | LCRYPTO_USED(SXNET_get_id_INTEGER); | ||
50 | LCRYPTO_USED(AUTHORITY_KEYID_new); | ||
51 | LCRYPTO_USED(AUTHORITY_KEYID_free); | ||
52 | LCRYPTO_USED(d2i_AUTHORITY_KEYID); | ||
53 | LCRYPTO_USED(i2d_AUTHORITY_KEYID); | ||
54 | LCRYPTO_USED(PKEY_USAGE_PERIOD_new); | ||
55 | LCRYPTO_USED(PKEY_USAGE_PERIOD_free); | ||
56 | LCRYPTO_USED(d2i_PKEY_USAGE_PERIOD); | ||
57 | LCRYPTO_USED(i2d_PKEY_USAGE_PERIOD); | ||
58 | LCRYPTO_USED(GENERAL_NAME_new); | ||
59 | LCRYPTO_USED(GENERAL_NAME_free); | ||
60 | LCRYPTO_USED(d2i_GENERAL_NAME); | ||
61 | LCRYPTO_USED(i2d_GENERAL_NAME); | ||
62 | LCRYPTO_USED(GENERAL_NAME_dup); | ||
63 | LCRYPTO_USED(GENERAL_NAME_cmp); | ||
64 | LCRYPTO_USED(v2i_ASN1_BIT_STRING); | ||
65 | LCRYPTO_USED(i2v_ASN1_BIT_STRING); | ||
66 | LCRYPTO_USED(i2v_GENERAL_NAME); | ||
67 | LCRYPTO_USED(GENERAL_NAME_print); | ||
68 | LCRYPTO_USED(GENERAL_NAMES_new); | ||
69 | LCRYPTO_USED(GENERAL_NAMES_free); | ||
70 | LCRYPTO_USED(d2i_GENERAL_NAMES); | ||
71 | LCRYPTO_USED(i2d_GENERAL_NAMES); | ||
72 | LCRYPTO_USED(i2v_GENERAL_NAMES); | ||
73 | LCRYPTO_USED(v2i_GENERAL_NAMES); | ||
74 | LCRYPTO_USED(OTHERNAME_new); | ||
75 | LCRYPTO_USED(OTHERNAME_free); | ||
76 | LCRYPTO_USED(d2i_OTHERNAME); | ||
77 | LCRYPTO_USED(i2d_OTHERNAME); | ||
78 | LCRYPTO_USED(EDIPARTYNAME_new); | ||
79 | LCRYPTO_USED(EDIPARTYNAME_free); | ||
80 | LCRYPTO_USED(d2i_EDIPARTYNAME); | ||
81 | LCRYPTO_USED(i2d_EDIPARTYNAME); | ||
82 | LCRYPTO_USED(OTHERNAME_cmp); | ||
83 | LCRYPTO_USED(GENERAL_NAME_set0_value); | ||
84 | LCRYPTO_USED(GENERAL_NAME_get0_value); | ||
85 | LCRYPTO_USED(GENERAL_NAME_set0_othername); | ||
86 | LCRYPTO_USED(GENERAL_NAME_get0_otherName); | ||
87 | LCRYPTO_USED(i2s_ASN1_OCTET_STRING); | ||
88 | LCRYPTO_USED(s2i_ASN1_OCTET_STRING); | ||
89 | LCRYPTO_USED(EXTENDED_KEY_USAGE_new); | ||
90 | LCRYPTO_USED(EXTENDED_KEY_USAGE_free); | ||
91 | LCRYPTO_USED(d2i_EXTENDED_KEY_USAGE); | ||
92 | LCRYPTO_USED(i2d_EXTENDED_KEY_USAGE); | ||
93 | LCRYPTO_USED(i2a_ACCESS_DESCRIPTION); | ||
94 | LCRYPTO_USED(CERTIFICATEPOLICIES_new); | ||
95 | LCRYPTO_USED(CERTIFICATEPOLICIES_free); | ||
96 | LCRYPTO_USED(d2i_CERTIFICATEPOLICIES); | ||
97 | LCRYPTO_USED(i2d_CERTIFICATEPOLICIES); | ||
98 | LCRYPTO_USED(POLICYINFO_new); | ||
99 | LCRYPTO_USED(POLICYINFO_free); | ||
100 | LCRYPTO_USED(d2i_POLICYINFO); | ||
101 | LCRYPTO_USED(i2d_POLICYINFO); | ||
102 | LCRYPTO_USED(POLICYQUALINFO_new); | ||
103 | LCRYPTO_USED(POLICYQUALINFO_free); | ||
104 | LCRYPTO_USED(d2i_POLICYQUALINFO); | ||
105 | LCRYPTO_USED(i2d_POLICYQUALINFO); | ||
106 | LCRYPTO_USED(USERNOTICE_new); | ||
107 | LCRYPTO_USED(USERNOTICE_free); | ||
108 | LCRYPTO_USED(d2i_USERNOTICE); | ||
109 | LCRYPTO_USED(i2d_USERNOTICE); | ||
110 | LCRYPTO_USED(NOTICEREF_new); | ||
111 | LCRYPTO_USED(NOTICEREF_free); | ||
112 | LCRYPTO_USED(d2i_NOTICEREF); | ||
113 | LCRYPTO_USED(i2d_NOTICEREF); | ||
114 | LCRYPTO_USED(CRL_DIST_POINTS_new); | ||
115 | LCRYPTO_USED(CRL_DIST_POINTS_free); | ||
116 | LCRYPTO_USED(d2i_CRL_DIST_POINTS); | ||
117 | LCRYPTO_USED(i2d_CRL_DIST_POINTS); | ||
118 | LCRYPTO_USED(DIST_POINT_new); | ||
119 | LCRYPTO_USED(DIST_POINT_free); | ||
120 | LCRYPTO_USED(d2i_DIST_POINT); | ||
121 | LCRYPTO_USED(i2d_DIST_POINT); | ||
122 | LCRYPTO_USED(DIST_POINT_NAME_new); | ||
123 | LCRYPTO_USED(DIST_POINT_NAME_free); | ||
124 | LCRYPTO_USED(d2i_DIST_POINT_NAME); | ||
125 | LCRYPTO_USED(i2d_DIST_POINT_NAME); | ||
126 | LCRYPTO_USED(ISSUING_DIST_POINT_new); | ||
127 | LCRYPTO_USED(ISSUING_DIST_POINT_free); | ||
128 | LCRYPTO_USED(d2i_ISSUING_DIST_POINT); | ||
129 | LCRYPTO_USED(i2d_ISSUING_DIST_POINT); | ||
130 | LCRYPTO_USED(DIST_POINT_set_dpname); | ||
131 | LCRYPTO_USED(NAME_CONSTRAINTS_check); | ||
132 | LCRYPTO_USED(ACCESS_DESCRIPTION_new); | ||
133 | LCRYPTO_USED(ACCESS_DESCRIPTION_free); | ||
134 | LCRYPTO_USED(d2i_ACCESS_DESCRIPTION); | ||
135 | LCRYPTO_USED(i2d_ACCESS_DESCRIPTION); | ||
136 | LCRYPTO_USED(AUTHORITY_INFO_ACCESS_new); | ||
137 | LCRYPTO_USED(AUTHORITY_INFO_ACCESS_free); | ||
138 | LCRYPTO_USED(d2i_AUTHORITY_INFO_ACCESS); | ||
139 | LCRYPTO_USED(i2d_AUTHORITY_INFO_ACCESS); | ||
140 | LCRYPTO_USED(POLICY_MAPPING_new); | ||
141 | LCRYPTO_USED(POLICY_MAPPING_free); | ||
142 | LCRYPTO_USED(GENERAL_SUBTREE_new); | ||
143 | LCRYPTO_USED(GENERAL_SUBTREE_free); | ||
144 | LCRYPTO_USED(NAME_CONSTRAINTS_new); | ||
145 | LCRYPTO_USED(NAME_CONSTRAINTS_free); | ||
146 | LCRYPTO_USED(POLICY_CONSTRAINTS_new); | ||
147 | LCRYPTO_USED(POLICY_CONSTRAINTS_free); | ||
148 | LCRYPTO_USED(a2i_GENERAL_NAME); | ||
149 | LCRYPTO_USED(v2i_GENERAL_NAME); | ||
150 | LCRYPTO_USED(v2i_GENERAL_NAME_ex); | ||
151 | LCRYPTO_USED(X509V3_conf_free); | ||
152 | LCRYPTO_USED(X509V3_EXT_nconf_nid); | ||
153 | LCRYPTO_USED(X509V3_EXT_nconf); | ||
154 | LCRYPTO_USED(X509V3_EXT_add_nconf_sk); | ||
155 | LCRYPTO_USED(X509V3_EXT_add_nconf); | ||
156 | LCRYPTO_USED(X509V3_EXT_REQ_add_nconf); | ||
157 | LCRYPTO_USED(X509V3_EXT_CRL_add_nconf); | ||
158 | LCRYPTO_USED(X509V3_EXT_conf_nid); | ||
159 | LCRYPTO_USED(X509V3_EXT_conf); | ||
160 | LCRYPTO_USED(X509V3_EXT_add_conf); | ||
161 | LCRYPTO_USED(X509V3_EXT_REQ_add_conf); | ||
162 | LCRYPTO_USED(X509V3_EXT_CRL_add_conf); | ||
163 | LCRYPTO_USED(X509V3_add_value_bool_nf); | ||
164 | LCRYPTO_USED(X509V3_get_value_bool); | ||
165 | LCRYPTO_USED(X509V3_get_value_int); | ||
166 | LCRYPTO_USED(X509V3_set_nconf); | ||
167 | LCRYPTO_USED(X509V3_set_conf_lhash); | ||
168 | LCRYPTO_USED(X509V3_get_string); | ||
169 | LCRYPTO_USED(X509V3_get_section); | ||
170 | LCRYPTO_USED(X509V3_string_free); | ||
171 | LCRYPTO_USED(X509V3_section_free); | ||
172 | LCRYPTO_USED(X509V3_set_ctx); | ||
173 | LCRYPTO_USED(X509V3_add_value); | ||
174 | LCRYPTO_USED(X509V3_add_value_uchar); | ||
175 | LCRYPTO_USED(X509V3_add_value_bool); | ||
176 | LCRYPTO_USED(X509V3_add_value_int); | ||
177 | LCRYPTO_USED(i2s_ASN1_INTEGER); | ||
178 | LCRYPTO_USED(s2i_ASN1_INTEGER); | ||
179 | LCRYPTO_USED(i2s_ASN1_ENUMERATED); | ||
180 | LCRYPTO_USED(i2s_ASN1_ENUMERATED_TABLE); | ||
181 | LCRYPTO_USED(X509V3_EXT_add); | ||
182 | LCRYPTO_USED(X509V3_EXT_add_list); | ||
183 | LCRYPTO_USED(X509V3_EXT_add_alias); | ||
184 | LCRYPTO_USED(X509V3_EXT_cleanup); | ||
185 | LCRYPTO_USED(X509V3_EXT_get); | ||
186 | LCRYPTO_USED(X509V3_EXT_get_nid); | ||
187 | LCRYPTO_USED(X509V3_add_standard_extensions); | ||
188 | LCRYPTO_USED(X509V3_parse_list); | ||
189 | LCRYPTO_USED(X509V3_EXT_d2i); | ||
190 | LCRYPTO_USED(X509V3_get_d2i); | ||
191 | LCRYPTO_USED(X509V3_EXT_i2d); | ||
192 | LCRYPTO_USED(X509V3_add1_i2d); | ||
193 | LCRYPTO_USED(hex_to_string); | ||
194 | LCRYPTO_USED(string_to_hex); | ||
195 | LCRYPTO_USED(X509V3_EXT_val_prn); | ||
196 | LCRYPTO_USED(X509V3_EXT_print); | ||
197 | LCRYPTO_USED(X509V3_EXT_print_fp); | ||
198 | LCRYPTO_USED(X509V3_extensions_print); | ||
199 | LCRYPTO_USED(X509_check_ca); | ||
200 | LCRYPTO_USED(X509_check_purpose); | ||
201 | LCRYPTO_USED(X509_supported_extension); | ||
202 | LCRYPTO_USED(X509_PURPOSE_set); | ||
203 | LCRYPTO_USED(X509_check_issued); | ||
204 | LCRYPTO_USED(X509_check_akid); | ||
205 | LCRYPTO_USED(X509_PURPOSE_get_count); | ||
206 | LCRYPTO_USED(X509_PURPOSE_get0); | ||
207 | LCRYPTO_USED(X509_PURPOSE_get_by_sname); | ||
208 | LCRYPTO_USED(X509_PURPOSE_get_by_id); | ||
209 | LCRYPTO_USED(X509_PURPOSE_add); | ||
210 | LCRYPTO_USED(X509_PURPOSE_get0_name); | ||
211 | LCRYPTO_USED(X509_PURPOSE_get0_sname); | ||
212 | LCRYPTO_USED(X509_PURPOSE_get_trust); | ||
213 | LCRYPTO_USED(X509_PURPOSE_cleanup); | ||
214 | LCRYPTO_USED(X509_PURPOSE_get_id); | ||
215 | LCRYPTO_USED(X509_get_extension_flags); | ||
216 | LCRYPTO_USED(X509_get_key_usage); | ||
217 | LCRYPTO_USED(X509_get_extended_key_usage); | ||
218 | LCRYPTO_USED(X509_get1_email); | ||
219 | LCRYPTO_USED(X509_REQ_get1_email); | ||
220 | LCRYPTO_USED(X509_email_free); | ||
221 | LCRYPTO_USED(X509_get1_ocsp); | ||
222 | LCRYPTO_USED(X509_check_host); | ||
223 | LCRYPTO_USED(X509_check_email); | ||
224 | LCRYPTO_USED(X509_check_ip); | ||
225 | LCRYPTO_USED(X509_check_ip_asc); | ||
226 | LCRYPTO_USED(a2i_IPADDRESS); | ||
227 | LCRYPTO_USED(a2i_IPADDRESS_NC); | ||
228 | LCRYPTO_USED(a2i_ipadd); | ||
229 | LCRYPTO_USED(X509V3_NAME_from_section); | ||
230 | LCRYPTO_USED(X509_POLICY_NODE_print); | ||
231 | LCRYPTO_USED(ASRange_new); | ||
232 | LCRYPTO_USED(ASRange_free); | ||
233 | LCRYPTO_USED(d2i_ASRange); | ||
234 | LCRYPTO_USED(i2d_ASRange); | ||
235 | LCRYPTO_USED(ASIdOrRange_new); | ||
236 | LCRYPTO_USED(ASIdOrRange_free); | ||
237 | LCRYPTO_USED(d2i_ASIdOrRange); | ||
238 | LCRYPTO_USED(i2d_ASIdOrRange); | ||
239 | LCRYPTO_USED(ASIdentifierChoice_new); | ||
240 | LCRYPTO_USED(ASIdentifierChoice_free); | ||
241 | LCRYPTO_USED(d2i_ASIdentifierChoice); | ||
242 | LCRYPTO_USED(i2d_ASIdentifierChoice); | ||
243 | LCRYPTO_USED(ASIdentifiers_new); | ||
244 | LCRYPTO_USED(ASIdentifiers_free); | ||
245 | LCRYPTO_USED(d2i_ASIdentifiers); | ||
246 | LCRYPTO_USED(i2d_ASIdentifiers); | ||
247 | LCRYPTO_USED(IPAddressRange_new); | ||
248 | LCRYPTO_USED(IPAddressRange_free); | ||
249 | LCRYPTO_USED(d2i_IPAddressRange); | ||
250 | LCRYPTO_USED(i2d_IPAddressRange); | ||
251 | LCRYPTO_USED(IPAddressOrRange_new); | ||
252 | LCRYPTO_USED(IPAddressOrRange_free); | ||
253 | LCRYPTO_USED(d2i_IPAddressOrRange); | ||
254 | LCRYPTO_USED(i2d_IPAddressOrRange); | ||
255 | LCRYPTO_USED(IPAddressChoice_new); | ||
256 | LCRYPTO_USED(IPAddressChoice_free); | ||
257 | LCRYPTO_USED(d2i_IPAddressChoice); | ||
258 | LCRYPTO_USED(i2d_IPAddressChoice); | ||
259 | LCRYPTO_USED(IPAddressFamily_new); | ||
260 | LCRYPTO_USED(IPAddressFamily_free); | ||
261 | LCRYPTO_USED(d2i_IPAddressFamily); | ||
262 | LCRYPTO_USED(i2d_IPAddressFamily); | ||
263 | LCRYPTO_USED(X509v3_asid_add_inherit); | ||
264 | LCRYPTO_USED(X509v3_asid_add_id_or_range); | ||
265 | LCRYPTO_USED(X509v3_addr_add_inherit); | ||
266 | LCRYPTO_USED(X509v3_addr_add_prefix); | ||
267 | LCRYPTO_USED(X509v3_addr_add_range); | ||
268 | LCRYPTO_USED(X509v3_addr_get_afi); | ||
269 | LCRYPTO_USED(X509v3_addr_get_range); | ||
270 | LCRYPTO_USED(X509v3_asid_is_canonical); | ||
271 | LCRYPTO_USED(X509v3_addr_is_canonical); | ||
272 | LCRYPTO_USED(X509v3_asid_canonize); | ||
273 | LCRYPTO_USED(X509v3_addr_canonize); | ||
274 | LCRYPTO_USED(X509v3_asid_inherits); | ||
275 | LCRYPTO_USED(X509v3_addr_inherits); | ||
276 | LCRYPTO_USED(X509v3_asid_subset); | ||
277 | LCRYPTO_USED(X509v3_addr_subset); | ||
278 | LCRYPTO_USED(X509v3_asid_validate_path); | ||
279 | LCRYPTO_USED(X509v3_addr_validate_path); | ||
280 | LCRYPTO_USED(X509v3_asid_validate_resource_set); | ||
281 | LCRYPTO_USED(X509v3_addr_validate_resource_set); | ||
282 | LCRYPTO_USED(ERR_load_X509V3_strings); | ||
283 | |||
284 | #endif /* _LIBCRYPTO_X509V3_H */ | ||
diff --git a/src/lib/libcrypto/x509/by_dir.c b/src/lib/libcrypto/x509/by_dir.c index fa05f552f9..2875a12c92 100644 --- a/src/lib/libcrypto/x509/by_dir.c +++ b/src/lib/libcrypto/x509/by_dir.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: by_dir.c,v 1.41 2021/11/10 14:34:21 schwarze Exp $ */ | 1 | /* $OpenBSD: by_dir.c,v 1.42 2022/11/14 17:48:49 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -117,6 +117,7 @@ X509_LOOKUP_hash_dir(void) | |||
117 | { | 117 | { |
118 | return &x509_dir_lookup; | 118 | return &x509_dir_lookup; |
119 | } | 119 | } |
120 | LCRYPTO_ALIAS(X509_LOOKUP_hash_dir) | ||
120 | 121 | ||
121 | static int | 122 | static int |
122 | dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl, | 123 | dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl, |
diff --git a/src/lib/libcrypto/x509/by_file.c b/src/lib/libcrypto/x509/by_file.c index 3116b7cf1e..747252d25b 100644 --- a/src/lib/libcrypto/x509/by_file.c +++ b/src/lib/libcrypto/x509/by_file.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: by_file.c,v 1.25 2021/11/10 13:57:42 schwarze Exp $ */ | 1 | /* $OpenBSD: by_file.c,v 1.26 2022/11/14 17:48:49 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -89,6 +89,7 @@ X509_LOOKUP_file(void) | |||
89 | { | 89 | { |
90 | return &x509_file_lookup; | 90 | return &x509_file_lookup; |
91 | } | 91 | } |
92 | LCRYPTO_ALIAS(X509_LOOKUP_file) | ||
92 | 93 | ||
93 | static int | 94 | static int |
94 | by_file_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl, | 95 | by_file_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl, |
@@ -173,6 +174,7 @@ err: | |||
173 | BIO_free(in); | 174 | BIO_free(in); |
174 | return ret; | 175 | return ret; |
175 | } | 176 | } |
177 | LCRYPTO_ALIAS(X509_load_cert_file) | ||
176 | 178 | ||
177 | int | 179 | int |
178 | X509_load_crl_file(X509_LOOKUP *ctx, const char *file, int type) | 180 | X509_load_crl_file(X509_LOOKUP *ctx, const char *file, int type) |
@@ -229,6 +231,7 @@ err: | |||
229 | BIO_free(in); | 231 | BIO_free(in); |
230 | return ret; | 232 | return ret; |
231 | } | 233 | } |
234 | LCRYPTO_ALIAS(X509_load_crl_file) | ||
232 | 235 | ||
233 | int | 236 | int |
234 | X509_load_cert_crl_file(X509_LOOKUP *ctx, const char *file, int type) | 237 | X509_load_cert_crl_file(X509_LOOKUP *ctx, const char *file, int type) |
@@ -267,4 +270,4 @@ X509_load_cert_crl_file(X509_LOOKUP *ctx, const char *file, int type) | |||
267 | sk_X509_INFO_pop_free(inf, X509_INFO_free); | 270 | sk_X509_INFO_pop_free(inf, X509_INFO_free); |
268 | return count; | 271 | return count; |
269 | } | 272 | } |
270 | 273 | LCRYPTO_ALIAS(X509_load_cert_crl_file) | |
diff --git a/src/lib/libcrypto/x509/by_mem.c b/src/lib/libcrypto/x509/by_mem.c index 272877f843..fe1ac24525 100644 --- a/src/lib/libcrypto/x509/by_mem.c +++ b/src/lib/libcrypto/x509/by_mem.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: by_mem.c,v 1.5 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: by_mem.c,v 1.6 2022/11/14 17:48:49 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -90,6 +90,7 @@ X509_LOOKUP_mem(void) | |||
90 | { | 90 | { |
91 | return (&x509_mem_lookup); | 91 | return (&x509_mem_lookup); |
92 | } | 92 | } |
93 | LCRYPTO_ALIAS(X509_LOOKUP_mem) | ||
93 | 94 | ||
94 | static int | 95 | static int |
95 | by_mem_ctrl(X509_LOOKUP *lu, int cmd, const char *buf, | 96 | by_mem_ctrl(X509_LOOKUP *lu, int cmd, const char *buf, |
diff --git a/src/lib/libcrypto/x509/pcy_lib.c b/src/lib/libcrypto/x509/pcy_lib.c index 3d5c58d710..e4b06e988b 100644 --- a/src/lib/libcrypto/x509/pcy_lib.c +++ b/src/lib/libcrypto/x509/pcy_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pcy_lib.c,v 1.1 2020/06/04 15:19:31 jsing Exp $ */ | 1 | /* $OpenBSD: pcy_lib.c,v 1.2 2022/11/14 17:48:49 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2004. | 3 | * project 2004. |
4 | */ | 4 | */ |
@@ -72,6 +72,7 @@ X509_policy_tree_level_count(const X509_POLICY_TREE *tree) | |||
72 | return 0; | 72 | return 0; |
73 | return tree->nlevel; | 73 | return tree->nlevel; |
74 | } | 74 | } |
75 | LCRYPTO_ALIAS(X509_policy_tree_level_count) | ||
75 | 76 | ||
76 | X509_POLICY_LEVEL * | 77 | X509_POLICY_LEVEL * |
77 | X509_policy_tree_get0_level(const X509_POLICY_TREE *tree, int i) | 78 | X509_policy_tree_get0_level(const X509_POLICY_TREE *tree, int i) |
@@ -80,6 +81,7 @@ X509_policy_tree_get0_level(const X509_POLICY_TREE *tree, int i) | |||
80 | return NULL; | 81 | return NULL; |
81 | return tree->levels + i; | 82 | return tree->levels + i; |
82 | } | 83 | } |
84 | LCRYPTO_ALIAS(X509_policy_tree_get0_level) | ||
83 | 85 | ||
84 | STACK_OF(X509_POLICY_NODE) * | 86 | STACK_OF(X509_POLICY_NODE) * |
85 | X509_policy_tree_get0_policies(const X509_POLICY_TREE *tree) | 87 | X509_policy_tree_get0_policies(const X509_POLICY_TREE *tree) |
@@ -88,6 +90,7 @@ X509_policy_tree_get0_policies(const X509_POLICY_TREE *tree) | |||
88 | return NULL; | 90 | return NULL; |
89 | return tree->auth_policies; | 91 | return tree->auth_policies; |
90 | } | 92 | } |
93 | LCRYPTO_ALIAS(X509_policy_tree_get0_policies) | ||
91 | 94 | ||
92 | STACK_OF(X509_POLICY_NODE) * | 95 | STACK_OF(X509_POLICY_NODE) * |
93 | X509_policy_tree_get0_user_policies(const X509_POLICY_TREE *tree) | 96 | X509_policy_tree_get0_user_policies(const X509_POLICY_TREE *tree) |
@@ -99,6 +102,7 @@ X509_policy_tree_get0_user_policies(const X509_POLICY_TREE *tree) | |||
99 | else | 102 | else |
100 | return tree->user_policies; | 103 | return tree->user_policies; |
101 | } | 104 | } |
105 | LCRYPTO_ALIAS(X509_policy_tree_get0_user_policies) | ||
102 | 106 | ||
103 | /* X509_POLICY_LEVEL stuff */ | 107 | /* X509_POLICY_LEVEL stuff */ |
104 | 108 | ||
@@ -116,6 +120,7 @@ X509_policy_level_node_count(X509_POLICY_LEVEL *level) | |||
116 | n += sk_X509_POLICY_NODE_num(level->nodes); | 120 | n += sk_X509_POLICY_NODE_num(level->nodes); |
117 | return n; | 121 | return n; |
118 | } | 122 | } |
123 | LCRYPTO_ALIAS(X509_policy_level_node_count) | ||
119 | 124 | ||
120 | X509_POLICY_NODE * | 125 | X509_POLICY_NODE * |
121 | X509_policy_level_get0_node(X509_POLICY_LEVEL *level, int i) | 126 | X509_policy_level_get0_node(X509_POLICY_LEVEL *level, int i) |
@@ -129,6 +134,7 @@ X509_policy_level_get0_node(X509_POLICY_LEVEL *level, int i) | |||
129 | } | 134 | } |
130 | return sk_X509_POLICY_NODE_value(level->nodes, i); | 135 | return sk_X509_POLICY_NODE_value(level->nodes, i); |
131 | } | 136 | } |
137 | LCRYPTO_ALIAS(X509_policy_level_get0_node) | ||
132 | 138 | ||
133 | /* X509_POLICY_NODE stuff */ | 139 | /* X509_POLICY_NODE stuff */ |
134 | 140 | ||
@@ -139,6 +145,7 @@ X509_policy_node_get0_policy(const X509_POLICY_NODE *node) | |||
139 | return NULL; | 145 | return NULL; |
140 | return node->data->valid_policy; | 146 | return node->data->valid_policy; |
141 | } | 147 | } |
148 | LCRYPTO_ALIAS(X509_policy_node_get0_policy) | ||
142 | 149 | ||
143 | STACK_OF(POLICYQUALINFO) * | 150 | STACK_OF(POLICYQUALINFO) * |
144 | X509_policy_node_get0_qualifiers(const X509_POLICY_NODE *node) | 151 | X509_policy_node_get0_qualifiers(const X509_POLICY_NODE *node) |
@@ -147,6 +154,7 @@ X509_policy_node_get0_qualifiers(const X509_POLICY_NODE *node) | |||
147 | return NULL; | 154 | return NULL; |
148 | return node->data->qualifier_set; | 155 | return node->data->qualifier_set; |
149 | } | 156 | } |
157 | LCRYPTO_ALIAS(X509_policy_node_get0_qualifiers) | ||
150 | 158 | ||
151 | const X509_POLICY_NODE * | 159 | const X509_POLICY_NODE * |
152 | X509_policy_node_get0_parent(const X509_POLICY_NODE *node) | 160 | X509_policy_node_get0_parent(const X509_POLICY_NODE *node) |
@@ -155,3 +163,4 @@ X509_policy_node_get0_parent(const X509_POLICY_NODE *node) | |||
155 | return NULL; | 163 | return NULL; |
156 | return node->parent; | 164 | return node->parent; |
157 | } | 165 | } |
166 | LCRYPTO_ALIAS(X509_policy_node_get0_parent) | ||
diff --git a/src/lib/libcrypto/x509/pcy_tree.c b/src/lib/libcrypto/x509/pcy_tree.c index 284c08e66a..1df37c8776 100644 --- a/src/lib/libcrypto/x509/pcy_tree.c +++ b/src/lib/libcrypto/x509/pcy_tree.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pcy_tree.c,v 1.2 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: pcy_tree.c,v 1.3 2022/11/14 17:48:49 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2004. | 3 | * project 2004. |
4 | */ | 4 | */ |
@@ -657,6 +657,7 @@ X509_policy_tree_free(X509_POLICY_TREE *tree) | |||
657 | free(tree->levels); | 657 | free(tree->levels); |
658 | free(tree); | 658 | free(tree); |
659 | } | 659 | } |
660 | LCRYPTO_ALIAS(X509_policy_tree_free) | ||
660 | 661 | ||
661 | /* Application policy checking function. | 662 | /* Application policy checking function. |
662 | * Return codes: | 663 | * Return codes: |
@@ -769,3 +770,4 @@ error: | |||
769 | 770 | ||
770 | return 0; | 771 | return 0; |
771 | } | 772 | } |
773 | LCRYPTO_ALIAS(X509_policy_check) | ||
diff --git a/src/lib/libcrypto/x509/x509_addr.c b/src/lib/libcrypto/x509/x509_addr.c index e15bf821da..ee4e285a77 100644 --- a/src/lib/libcrypto/x509/x509_addr.c +++ b/src/lib/libcrypto/x509/x509_addr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_addr.c,v 1.83 2022/05/25 17:10:30 tb Exp $ */ | 1 | /* $OpenBSD: x509_addr.c,v 1.84 2022/11/14 17:48:49 beck Exp $ */ |
2 | /* | 2 | /* |
3 | * Contributed to the OpenSSL Project by the American Registry for | 3 | * Contributed to the OpenSSL Project by the American Registry for |
4 | * Internet Numbers ("ARIN"). | 4 | * Internet Numbers ("ARIN"). |
@@ -215,24 +215,28 @@ d2i_IPAddressRange(IPAddressRange **a, const unsigned char **in, long len) | |||
215 | return (IPAddressRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 215 | return (IPAddressRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
216 | &IPAddressRange_it); | 216 | &IPAddressRange_it); |
217 | } | 217 | } |
218 | LCRYPTO_ALIAS(d2i_IPAddressRange) | ||
218 | 219 | ||
219 | int | 220 | int |
220 | i2d_IPAddressRange(IPAddressRange *a, unsigned char **out) | 221 | i2d_IPAddressRange(IPAddressRange *a, unsigned char **out) |
221 | { | 222 | { |
222 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressRange_it); | 223 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressRange_it); |
223 | } | 224 | } |
225 | LCRYPTO_ALIAS(i2d_IPAddressRange) | ||
224 | 226 | ||
225 | IPAddressRange * | 227 | IPAddressRange * |
226 | IPAddressRange_new(void) | 228 | IPAddressRange_new(void) |
227 | { | 229 | { |
228 | return (IPAddressRange *)ASN1_item_new(&IPAddressRange_it); | 230 | return (IPAddressRange *)ASN1_item_new(&IPAddressRange_it); |
229 | } | 231 | } |
232 | LCRYPTO_ALIAS(IPAddressRange_new) | ||
230 | 233 | ||
231 | void | 234 | void |
232 | IPAddressRange_free(IPAddressRange *a) | 235 | IPAddressRange_free(IPAddressRange *a) |
233 | { | 236 | { |
234 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressRange_it); | 237 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressRange_it); |
235 | } | 238 | } |
239 | LCRYPTO_ALIAS(IPAddressRange_free) | ||
236 | 240 | ||
237 | IPAddressOrRange * | 241 | IPAddressOrRange * |
238 | d2i_IPAddressOrRange(IPAddressOrRange **a, const unsigned char **in, long len) | 242 | d2i_IPAddressOrRange(IPAddressOrRange **a, const unsigned char **in, long len) |
@@ -240,24 +244,28 @@ d2i_IPAddressOrRange(IPAddressOrRange **a, const unsigned char **in, long len) | |||
240 | return (IPAddressOrRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 244 | return (IPAddressOrRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
241 | &IPAddressOrRange_it); | 245 | &IPAddressOrRange_it); |
242 | } | 246 | } |
247 | LCRYPTO_ALIAS(d2i_IPAddressOrRange) | ||
243 | 248 | ||
244 | int | 249 | int |
245 | i2d_IPAddressOrRange(IPAddressOrRange *a, unsigned char **out) | 250 | i2d_IPAddressOrRange(IPAddressOrRange *a, unsigned char **out) |
246 | { | 251 | { |
247 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressOrRange_it); | 252 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressOrRange_it); |
248 | } | 253 | } |
254 | LCRYPTO_ALIAS(i2d_IPAddressOrRange) | ||
249 | 255 | ||
250 | IPAddressOrRange * | 256 | IPAddressOrRange * |
251 | IPAddressOrRange_new(void) | 257 | IPAddressOrRange_new(void) |
252 | { | 258 | { |
253 | return (IPAddressOrRange *)ASN1_item_new(&IPAddressOrRange_it); | 259 | return (IPAddressOrRange *)ASN1_item_new(&IPAddressOrRange_it); |
254 | } | 260 | } |
261 | LCRYPTO_ALIAS(IPAddressOrRange_new) | ||
255 | 262 | ||
256 | void | 263 | void |
257 | IPAddressOrRange_free(IPAddressOrRange *a) | 264 | IPAddressOrRange_free(IPAddressOrRange *a) |
258 | { | 265 | { |
259 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressOrRange_it); | 266 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressOrRange_it); |
260 | } | 267 | } |
268 | LCRYPTO_ALIAS(IPAddressOrRange_free) | ||
261 | 269 | ||
262 | IPAddressChoice * | 270 | IPAddressChoice * |
263 | d2i_IPAddressChoice(IPAddressChoice **a, const unsigned char **in, long len) | 271 | d2i_IPAddressChoice(IPAddressChoice **a, const unsigned char **in, long len) |
@@ -265,24 +273,28 @@ d2i_IPAddressChoice(IPAddressChoice **a, const unsigned char **in, long len) | |||
265 | return (IPAddressChoice *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 273 | return (IPAddressChoice *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
266 | &IPAddressChoice_it); | 274 | &IPAddressChoice_it); |
267 | } | 275 | } |
276 | LCRYPTO_ALIAS(d2i_IPAddressChoice) | ||
268 | 277 | ||
269 | int | 278 | int |
270 | i2d_IPAddressChoice(IPAddressChoice *a, unsigned char **out) | 279 | i2d_IPAddressChoice(IPAddressChoice *a, unsigned char **out) |
271 | { | 280 | { |
272 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressChoice_it); | 281 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressChoice_it); |
273 | } | 282 | } |
283 | LCRYPTO_ALIAS(i2d_IPAddressChoice) | ||
274 | 284 | ||
275 | IPAddressChoice * | 285 | IPAddressChoice * |
276 | IPAddressChoice_new(void) | 286 | IPAddressChoice_new(void) |
277 | { | 287 | { |
278 | return (IPAddressChoice *)ASN1_item_new(&IPAddressChoice_it); | 288 | return (IPAddressChoice *)ASN1_item_new(&IPAddressChoice_it); |
279 | } | 289 | } |
290 | LCRYPTO_ALIAS(IPAddressChoice_new) | ||
280 | 291 | ||
281 | void | 292 | void |
282 | IPAddressChoice_free(IPAddressChoice *a) | 293 | IPAddressChoice_free(IPAddressChoice *a) |
283 | { | 294 | { |
284 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressChoice_it); | 295 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressChoice_it); |
285 | } | 296 | } |
297 | LCRYPTO_ALIAS(IPAddressChoice_free) | ||
286 | 298 | ||
287 | IPAddressFamily * | 299 | IPAddressFamily * |
288 | d2i_IPAddressFamily(IPAddressFamily **a, const unsigned char **in, long len) | 300 | d2i_IPAddressFamily(IPAddressFamily **a, const unsigned char **in, long len) |
@@ -290,24 +302,28 @@ d2i_IPAddressFamily(IPAddressFamily **a, const unsigned char **in, long len) | |||
290 | return (IPAddressFamily *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 302 | return (IPAddressFamily *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
291 | &IPAddressFamily_it); | 303 | &IPAddressFamily_it); |
292 | } | 304 | } |
305 | LCRYPTO_ALIAS(d2i_IPAddressFamily) | ||
293 | 306 | ||
294 | int | 307 | int |
295 | i2d_IPAddressFamily(IPAddressFamily *a, unsigned char **out) | 308 | i2d_IPAddressFamily(IPAddressFamily *a, unsigned char **out) |
296 | { | 309 | { |
297 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressFamily_it); | 310 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &IPAddressFamily_it); |
298 | } | 311 | } |
312 | LCRYPTO_ALIAS(i2d_IPAddressFamily) | ||
299 | 313 | ||
300 | IPAddressFamily * | 314 | IPAddressFamily * |
301 | IPAddressFamily_new(void) | 315 | IPAddressFamily_new(void) |
302 | { | 316 | { |
303 | return (IPAddressFamily *)ASN1_item_new(&IPAddressFamily_it); | 317 | return (IPAddressFamily *)ASN1_item_new(&IPAddressFamily_it); |
304 | } | 318 | } |
319 | LCRYPTO_ALIAS(IPAddressFamily_new) | ||
305 | 320 | ||
306 | void | 321 | void |
307 | IPAddressFamily_free(IPAddressFamily *a) | 322 | IPAddressFamily_free(IPAddressFamily *a) |
308 | { | 323 | { |
309 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressFamily_it); | 324 | ASN1_item_free((ASN1_VALUE *)a, &IPAddressFamily_it); |
310 | } | 325 | } |
326 | LCRYPTO_ALIAS(IPAddressFamily_free) | ||
311 | 327 | ||
312 | /* | 328 | /* |
313 | * Convenience accessors for IPAddressFamily. | 329 | * Convenience accessors for IPAddressFamily. |
@@ -518,6 +534,7 @@ X509v3_addr_get_afi(const IPAddressFamily *af) | |||
518 | 534 | ||
519 | return afi; | 535 | return afi; |
520 | } | 536 | } |
537 | LCRYPTO_ALIAS(X509v3_addr_get_afi) | ||
521 | 538 | ||
522 | /* | 539 | /* |
523 | * Expand the bitstring form (RFC 3779, section 2.1.2) of an address into | 540 | * Expand the bitstring form (RFC 3779, section 2.1.2) of an address into |
@@ -1093,6 +1110,7 @@ X509v3_addr_add_inherit(IPAddrBlocks *addr, const unsigned afi, | |||
1093 | 1110 | ||
1094 | return IPAddressFamily_set_inheritance(af); | 1111 | return IPAddressFamily_set_inheritance(af); |
1095 | } | 1112 | } |
1113 | LCRYPTO_ALIAS(X509v3_addr_add_inherit) | ||
1096 | 1114 | ||
1097 | /* | 1115 | /* |
1098 | * Construct an IPAddressOrRange sequence, or return an existing one. | 1116 | * Construct an IPAddressOrRange sequence, or return an existing one. |
@@ -1156,6 +1174,7 @@ X509v3_addr_add_prefix(IPAddrBlocks *addr, const unsigned afi, | |||
1156 | 1174 | ||
1157 | return 1; | 1175 | return 1; |
1158 | } | 1176 | } |
1177 | LCRYPTO_ALIAS(X509v3_addr_add_prefix) | ||
1159 | 1178 | ||
1160 | /* | 1179 | /* |
1161 | * Add a range. | 1180 | * Add a range. |
@@ -1183,6 +1202,7 @@ X509v3_addr_add_range(IPAddrBlocks *addr, const unsigned afi, | |||
1183 | 1202 | ||
1184 | return 1; | 1203 | return 1; |
1185 | } | 1204 | } |
1205 | LCRYPTO_ALIAS(X509v3_addr_add_range) | ||
1186 | 1206 | ||
1187 | static int | 1207 | static int |
1188 | extract_min_max_bitstr(IPAddressOrRange *aor, ASN1_BIT_STRING **out_min, | 1208 | extract_min_max_bitstr(IPAddressOrRange *aor, ASN1_BIT_STRING **out_min, |
@@ -1242,6 +1262,7 @@ X509v3_addr_get_range(IPAddressOrRange *aor, const unsigned afi, | |||
1242 | 1262 | ||
1243 | return afi_len; | 1263 | return afi_len; |
1244 | } | 1264 | } |
1265 | LCRYPTO_ALIAS(X509v3_addr_get_range) | ||
1245 | 1266 | ||
1246 | /* | 1267 | /* |
1247 | * Check whether an IPAddrBLocks is in canonical form. | 1268 | * Check whether an IPAddrBLocks is in canonical form. |
@@ -1360,6 +1381,7 @@ X509v3_addr_is_canonical(IPAddrBlocks *addr) | |||
1360 | */ | 1381 | */ |
1361 | return 1; | 1382 | return 1; |
1362 | } | 1383 | } |
1384 | LCRYPTO_ALIAS(X509v3_addr_is_canonical) | ||
1363 | 1385 | ||
1364 | /* | 1386 | /* |
1365 | * Whack an IPAddressOrRanges into canonical form. | 1387 | * Whack an IPAddressOrRanges into canonical form. |
@@ -1466,6 +1488,7 @@ X509v3_addr_canonize(IPAddrBlocks *addr) | |||
1466 | 1488 | ||
1467 | return X509v3_addr_is_canonical(addr); | 1489 | return X509v3_addr_is_canonical(addr); |
1468 | } | 1490 | } |
1491 | LCRYPTO_ALIAS(X509v3_addr_canonize) | ||
1469 | 1492 | ||
1470 | /* | 1493 | /* |
1471 | * v2i handler for the IPAddrBlocks extension. | 1494 | * v2i handler for the IPAddrBlocks extension. |
@@ -1709,6 +1732,7 @@ X509v3_addr_inherits(IPAddrBlocks *addr) | |||
1709 | 1732 | ||
1710 | return 0; | 1733 | return 0; |
1711 | } | 1734 | } |
1735 | LCRYPTO_ALIAS(X509v3_addr_inherits) | ||
1712 | 1736 | ||
1713 | /* | 1737 | /* |
1714 | * Figure out whether parent contains child. | 1738 | * Figure out whether parent contains child. |
@@ -1792,6 +1816,7 @@ X509v3_addr_subset(IPAddrBlocks *child, IPAddrBlocks *parent) | |||
1792 | } | 1816 | } |
1793 | return 1; | 1817 | return 1; |
1794 | } | 1818 | } |
1819 | LCRYPTO_ALIAS(X509v3_addr_subset) | ||
1795 | 1820 | ||
1796 | static int | 1821 | static int |
1797 | verify_error(X509_STORE_CTX *ctx, X509 *cert, int error, int depth) | 1822 | verify_error(X509_STORE_CTX *ctx, X509 *cert, int error, int depth) |
@@ -1997,6 +2022,7 @@ X509v3_addr_validate_path(X509_STORE_CTX *ctx) | |||
1997 | } | 2022 | } |
1998 | return addr_validate_path_internal(ctx, ctx->chain, NULL); | 2023 | return addr_validate_path_internal(ctx, ctx->chain, NULL); |
1999 | } | 2024 | } |
2025 | LCRYPTO_ALIAS(X509v3_addr_validate_path) | ||
2000 | 2026 | ||
2001 | /* | 2027 | /* |
2002 | * RFC 3779 2.3 path validation of an extension. | 2028 | * RFC 3779 2.3 path validation of an extension. |
@@ -2014,5 +2040,6 @@ X509v3_addr_validate_resource_set(STACK_OF(X509) *chain, IPAddrBlocks *ext, | |||
2014 | return 0; | 2040 | return 0; |
2015 | return addr_validate_path_internal(NULL, chain, ext); | 2041 | return addr_validate_path_internal(NULL, chain, ext); |
2016 | } | 2042 | } |
2043 | LCRYPTO_ALIAS(X509v3_addr_validate_resource_set) | ||
2017 | 2044 | ||
2018 | #endif /* OPENSSL_NO_RFC3779 */ | 2045 | #endif /* OPENSSL_NO_RFC3779 */ |
diff --git a/src/lib/libcrypto/x509/x509_akeya.c b/src/lib/libcrypto/x509/x509_akeya.c index aba8923caa..969cad1c3e 100644 --- a/src/lib/libcrypto/x509/x509_akeya.c +++ b/src/lib/libcrypto/x509/x509_akeya.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_akeya.c,v 1.1 2020/06/04 15:19:31 jsing Exp $ */ | 1 | /* $OpenBSD: x509_akeya.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -104,21 +104,25 @@ d2i_AUTHORITY_KEYID(AUTHORITY_KEYID **a, const unsigned char **in, long len) | |||
104 | return (AUTHORITY_KEYID *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 104 | return (AUTHORITY_KEYID *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
105 | &AUTHORITY_KEYID_it); | 105 | &AUTHORITY_KEYID_it); |
106 | } | 106 | } |
107 | LCRYPTO_ALIAS(d2i_AUTHORITY_KEYID) | ||
107 | 108 | ||
108 | int | 109 | int |
109 | i2d_AUTHORITY_KEYID(AUTHORITY_KEYID *a, unsigned char **out) | 110 | i2d_AUTHORITY_KEYID(AUTHORITY_KEYID *a, unsigned char **out) |
110 | { | 111 | { |
111 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &AUTHORITY_KEYID_it); | 112 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &AUTHORITY_KEYID_it); |
112 | } | 113 | } |
114 | LCRYPTO_ALIAS(i2d_AUTHORITY_KEYID) | ||
113 | 115 | ||
114 | AUTHORITY_KEYID * | 116 | AUTHORITY_KEYID * |
115 | AUTHORITY_KEYID_new(void) | 117 | AUTHORITY_KEYID_new(void) |
116 | { | 118 | { |
117 | return (AUTHORITY_KEYID *)ASN1_item_new(&AUTHORITY_KEYID_it); | 119 | return (AUTHORITY_KEYID *)ASN1_item_new(&AUTHORITY_KEYID_it); |
118 | } | 120 | } |
121 | LCRYPTO_ALIAS(AUTHORITY_KEYID_new) | ||
119 | 122 | ||
120 | void | 123 | void |
121 | AUTHORITY_KEYID_free(AUTHORITY_KEYID *a) | 124 | AUTHORITY_KEYID_free(AUTHORITY_KEYID *a) |
122 | { | 125 | { |
123 | ASN1_item_free((ASN1_VALUE *)a, &AUTHORITY_KEYID_it); | 126 | ASN1_item_free((ASN1_VALUE *)a, &AUTHORITY_KEYID_it); |
124 | } | 127 | } |
128 | LCRYPTO_ALIAS(AUTHORITY_KEYID_free) | ||
diff --git a/src/lib/libcrypto/x509/x509_alt.c b/src/lib/libcrypto/x509/x509_alt.c index cf8cbf0ce2..137a1c1c11 100644 --- a/src/lib/libcrypto/x509/x509_alt.c +++ b/src/lib/libcrypto/x509/x509_alt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_alt.c,v 1.13 2022/11/11 12:02:34 beck Exp $ */ | 1 | /* $OpenBSD: x509_alt.c,v 1.14 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -152,6 +152,7 @@ i2v_GENERAL_NAMES(X509V3_EXT_METHOD *method, GENERAL_NAMES *gens, | |||
152 | 152 | ||
153 | return NULL; | 153 | return NULL; |
154 | } | 154 | } |
155 | LCRYPTO_ALIAS(i2v_GENERAL_NAMES) | ||
155 | 156 | ||
156 | STACK_OF(CONF_VALUE) * | 157 | STACK_OF(CONF_VALUE) * |
157 | i2v_GENERAL_NAME(X509V3_EXT_METHOD *method, GENERAL_NAME *gen, | 158 | i2v_GENERAL_NAME(X509V3_EXT_METHOD *method, GENERAL_NAME *gen, |
@@ -244,6 +245,7 @@ i2v_GENERAL_NAME(X509V3_EXT_METHOD *method, GENERAL_NAME *gen, | |||
244 | 245 | ||
245 | return NULL; | 246 | return NULL; |
246 | } | 247 | } |
248 | LCRYPTO_ALIAS(i2v_GENERAL_NAME) | ||
247 | 249 | ||
248 | int | 250 | int |
249 | GENERAL_NAME_print(BIO *out, GENERAL_NAME *gen) | 251 | GENERAL_NAME_print(BIO *out, GENERAL_NAME *gen) |
@@ -310,6 +312,7 @@ GENERAL_NAME_print(BIO *out, GENERAL_NAME *gen) | |||
310 | } | 312 | } |
311 | return 1; | 313 | return 1; |
312 | } | 314 | } |
315 | LCRYPTO_ALIAS(GENERAL_NAME_print) | ||
313 | 316 | ||
314 | static GENERAL_NAMES * | 317 | static GENERAL_NAMES * |
315 | v2i_issuer_alt(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | 318 | v2i_issuer_alt(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
@@ -512,6 +515,7 @@ err: | |||
512 | sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free); | 515 | sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free); |
513 | return NULL; | 516 | return NULL; |
514 | } | 517 | } |
518 | LCRYPTO_ALIAS(v2i_GENERAL_NAMES) | ||
515 | 519 | ||
516 | GENERAL_NAME * | 520 | GENERAL_NAME * |
517 | v2i_GENERAL_NAME(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | 521 | v2i_GENERAL_NAME(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
@@ -519,6 +523,7 @@ v2i_GENERAL_NAME(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
519 | { | 523 | { |
520 | return v2i_GENERAL_NAME_ex(NULL, method, ctx, cnf, 0); | 524 | return v2i_GENERAL_NAME_ex(NULL, method, ctx, cnf, 0); |
521 | } | 525 | } |
526 | LCRYPTO_ALIAS(v2i_GENERAL_NAME) | ||
522 | 527 | ||
523 | GENERAL_NAME * | 528 | GENERAL_NAME * |
524 | a2i_GENERAL_NAME(GENERAL_NAME *out, const X509V3_EXT_METHOD *method, | 529 | a2i_GENERAL_NAME(GENERAL_NAME *out, const X509V3_EXT_METHOD *method, |
@@ -609,6 +614,7 @@ err: | |||
609 | GENERAL_NAME_free(gen); | 614 | GENERAL_NAME_free(gen); |
610 | return NULL; | 615 | return NULL; |
611 | } | 616 | } |
617 | LCRYPTO_ALIAS(a2i_GENERAL_NAME) | ||
612 | 618 | ||
613 | GENERAL_NAME * | 619 | GENERAL_NAME * |
614 | v2i_GENERAL_NAME_ex(GENERAL_NAME *out, const X509V3_EXT_METHOD *method, | 620 | v2i_GENERAL_NAME_ex(GENERAL_NAME *out, const X509V3_EXT_METHOD *method, |
@@ -712,6 +718,7 @@ v2i_GENERAL_NAME_ex(GENERAL_NAME *out, const X509V3_EXT_METHOD *method, | |||
712 | GENERAL_NAME_free(ret); | 718 | GENERAL_NAME_free(ret); |
713 | return NULL; | 719 | return NULL; |
714 | } | 720 | } |
721 | LCRYPTO_ALIAS(v2i_GENERAL_NAME_ex) | ||
715 | 722 | ||
716 | static int | 723 | static int |
717 | do_othername(GENERAL_NAME *gen, const char *value, X509V3_CTX *ctx) | 724 | do_othername(GENERAL_NAME *gen, const char *value, X509V3_CTX *ctx) |
diff --git a/src/lib/libcrypto/x509/x509_asid.c b/src/lib/libcrypto/x509/x509_asid.c index e9db8bdabd..c95816da04 100644 --- a/src/lib/libcrypto/x509/x509_asid.c +++ b/src/lib/libcrypto/x509/x509_asid.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_asid.c,v 1.36 2022/11/13 23:38:42 tb Exp $ */ | 1 | /* $OpenBSD: x509_asid.c,v 1.37 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* | 2 | /* |
3 | * Contributed to the OpenSSL Project by the American Registry for | 3 | * Contributed to the OpenSSL Project by the American Registry for |
4 | * Internet Numbers ("ARIN"). | 4 | * Internet Numbers ("ARIN"). |
@@ -191,24 +191,28 @@ d2i_ASRange(ASRange **a, const unsigned char **in, long len) | |||
191 | return (ASRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 191 | return (ASRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
192 | &ASRange_it); | 192 | &ASRange_it); |
193 | } | 193 | } |
194 | LCRYPTO_ALIAS(d2i_ASRange) | ||
194 | 195 | ||
195 | int | 196 | int |
196 | i2d_ASRange(ASRange *a, unsigned char **out) | 197 | i2d_ASRange(ASRange *a, unsigned char **out) |
197 | { | 198 | { |
198 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASRange_it); | 199 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASRange_it); |
199 | } | 200 | } |
201 | LCRYPTO_ALIAS(i2d_ASRange) | ||
200 | 202 | ||
201 | ASRange * | 203 | ASRange * |
202 | ASRange_new(void) | 204 | ASRange_new(void) |
203 | { | 205 | { |
204 | return (ASRange *)ASN1_item_new(&ASRange_it); | 206 | return (ASRange *)ASN1_item_new(&ASRange_it); |
205 | } | 207 | } |
208 | LCRYPTO_ALIAS(ASRange_new) | ||
206 | 209 | ||
207 | void | 210 | void |
208 | ASRange_free(ASRange *a) | 211 | ASRange_free(ASRange *a) |
209 | { | 212 | { |
210 | ASN1_item_free((ASN1_VALUE *)a, &ASRange_it); | 213 | ASN1_item_free((ASN1_VALUE *)a, &ASRange_it); |
211 | } | 214 | } |
215 | LCRYPTO_ALIAS(ASRange_free) | ||
212 | 216 | ||
213 | ASIdOrRange * | 217 | ASIdOrRange * |
214 | d2i_ASIdOrRange(ASIdOrRange **a, const unsigned char **in, long len) | 218 | d2i_ASIdOrRange(ASIdOrRange **a, const unsigned char **in, long len) |
@@ -216,24 +220,28 @@ d2i_ASIdOrRange(ASIdOrRange **a, const unsigned char **in, long len) | |||
216 | return (ASIdOrRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 220 | return (ASIdOrRange *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
217 | &ASIdOrRange_it); | 221 | &ASIdOrRange_it); |
218 | } | 222 | } |
223 | LCRYPTO_ALIAS(d2i_ASIdOrRange) | ||
219 | 224 | ||
220 | int | 225 | int |
221 | i2d_ASIdOrRange(ASIdOrRange *a, unsigned char **out) | 226 | i2d_ASIdOrRange(ASIdOrRange *a, unsigned char **out) |
222 | { | 227 | { |
223 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASIdOrRange_it); | 228 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASIdOrRange_it); |
224 | } | 229 | } |
230 | LCRYPTO_ALIAS(i2d_ASIdOrRange) | ||
225 | 231 | ||
226 | ASIdOrRange * | 232 | ASIdOrRange * |
227 | ASIdOrRange_new(void) | 233 | ASIdOrRange_new(void) |
228 | { | 234 | { |
229 | return (ASIdOrRange *)ASN1_item_new(&ASIdOrRange_it); | 235 | return (ASIdOrRange *)ASN1_item_new(&ASIdOrRange_it); |
230 | } | 236 | } |
237 | LCRYPTO_ALIAS(ASIdOrRange_new) | ||
231 | 238 | ||
232 | void | 239 | void |
233 | ASIdOrRange_free(ASIdOrRange *a) | 240 | ASIdOrRange_free(ASIdOrRange *a) |
234 | { | 241 | { |
235 | ASN1_item_free((ASN1_VALUE *)a, &ASIdOrRange_it); | 242 | ASN1_item_free((ASN1_VALUE *)a, &ASIdOrRange_it); |
236 | } | 243 | } |
244 | LCRYPTO_ALIAS(ASIdOrRange_free) | ||
237 | 245 | ||
238 | ASIdentifierChoice * | 246 | ASIdentifierChoice * |
239 | d2i_ASIdentifierChoice(ASIdentifierChoice **a, const unsigned char **in, | 247 | d2i_ASIdentifierChoice(ASIdentifierChoice **a, const unsigned char **in, |
@@ -242,24 +250,28 @@ d2i_ASIdentifierChoice(ASIdentifierChoice **a, const unsigned char **in, | |||
242 | return (ASIdentifierChoice *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 250 | return (ASIdentifierChoice *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
243 | &ASIdentifierChoice_it); | 251 | &ASIdentifierChoice_it); |
244 | } | 252 | } |
253 | LCRYPTO_ALIAS(d2i_ASIdentifierChoice) | ||
245 | 254 | ||
246 | int | 255 | int |
247 | i2d_ASIdentifierChoice(ASIdentifierChoice *a, unsigned char **out) | 256 | i2d_ASIdentifierChoice(ASIdentifierChoice *a, unsigned char **out) |
248 | { | 257 | { |
249 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASIdentifierChoice_it); | 258 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASIdentifierChoice_it); |
250 | } | 259 | } |
260 | LCRYPTO_ALIAS(i2d_ASIdentifierChoice) | ||
251 | 261 | ||
252 | ASIdentifierChoice * | 262 | ASIdentifierChoice * |
253 | ASIdentifierChoice_new(void) | 263 | ASIdentifierChoice_new(void) |
254 | { | 264 | { |
255 | return (ASIdentifierChoice *)ASN1_item_new(&ASIdentifierChoice_it); | 265 | return (ASIdentifierChoice *)ASN1_item_new(&ASIdentifierChoice_it); |
256 | } | 266 | } |
267 | LCRYPTO_ALIAS(ASIdentifierChoice_new) | ||
257 | 268 | ||
258 | void | 269 | void |
259 | ASIdentifierChoice_free(ASIdentifierChoice *a) | 270 | ASIdentifierChoice_free(ASIdentifierChoice *a) |
260 | { | 271 | { |
261 | ASN1_item_free((ASN1_VALUE *)a, &ASIdentifierChoice_it); | 272 | ASN1_item_free((ASN1_VALUE *)a, &ASIdentifierChoice_it); |
262 | } | 273 | } |
274 | LCRYPTO_ALIAS(ASIdentifierChoice_free) | ||
263 | 275 | ||
264 | ASIdentifiers * | 276 | ASIdentifiers * |
265 | d2i_ASIdentifiers(ASIdentifiers **a, const unsigned char **in, long len) | 277 | d2i_ASIdentifiers(ASIdentifiers **a, const unsigned char **in, long len) |
@@ -267,24 +279,28 @@ d2i_ASIdentifiers(ASIdentifiers **a, const unsigned char **in, long len) | |||
267 | return (ASIdentifiers *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 279 | return (ASIdentifiers *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
268 | &ASIdentifiers_it); | 280 | &ASIdentifiers_it); |
269 | } | 281 | } |
282 | LCRYPTO_ALIAS(d2i_ASIdentifiers) | ||
270 | 283 | ||
271 | int | 284 | int |
272 | i2d_ASIdentifiers(ASIdentifiers *a, unsigned char **out) | 285 | i2d_ASIdentifiers(ASIdentifiers *a, unsigned char **out) |
273 | { | 286 | { |
274 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASIdentifiers_it); | 287 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ASIdentifiers_it); |
275 | } | 288 | } |
289 | LCRYPTO_ALIAS(i2d_ASIdentifiers) | ||
276 | 290 | ||
277 | ASIdentifiers * | 291 | ASIdentifiers * |
278 | ASIdentifiers_new(void) | 292 | ASIdentifiers_new(void) |
279 | { | 293 | { |
280 | return (ASIdentifiers *)ASN1_item_new(&ASIdentifiers_it); | 294 | return (ASIdentifiers *)ASN1_item_new(&ASIdentifiers_it); |
281 | } | 295 | } |
296 | LCRYPTO_ALIAS(ASIdentifiers_new) | ||
282 | 297 | ||
283 | void | 298 | void |
284 | ASIdentifiers_free(ASIdentifiers *a) | 299 | ASIdentifiers_free(ASIdentifiers *a) |
285 | { | 300 | { |
286 | ASN1_item_free((ASN1_VALUE *)a, &ASIdentifiers_it); | 301 | ASN1_item_free((ASN1_VALUE *)a, &ASIdentifiers_it); |
287 | } | 302 | } |
303 | LCRYPTO_ALIAS(ASIdentifiers_free) | ||
288 | 304 | ||
289 | /* | 305 | /* |
290 | * i2r method for an ASIdentifierChoice. | 306 | * i2r method for an ASIdentifierChoice. |
@@ -412,6 +428,7 @@ X509v3_asid_add_inherit(ASIdentifiers *asid, int which) | |||
412 | } | 428 | } |
413 | return (*choice)->type == ASIdentifierChoice_inherit; | 429 | return (*choice)->type == ASIdentifierChoice_inherit; |
414 | } | 430 | } |
431 | LCRYPTO_ALIAS(X509v3_asid_add_inherit) | ||
415 | 432 | ||
416 | /* | 433 | /* |
417 | * Add an ID or range to an ASIdentifierChoice. | 434 | * Add an ID or range to an ASIdentifierChoice. |
@@ -466,6 +483,7 @@ X509v3_asid_add_id_or_range(ASIdentifiers *asid, int which, ASN1_INTEGER *min, | |||
466 | ASIdOrRange_free(aor); | 483 | ASIdOrRange_free(aor); |
467 | return 0; | 484 | return 0; |
468 | } | 485 | } |
486 | LCRYPTO_ALIAS(X509v3_asid_add_id_or_range) | ||
469 | 487 | ||
470 | /* | 488 | /* |
471 | * Extract min and max values from an ASIdOrRange. | 489 | * Extract min and max values from an ASIdOrRange. |
@@ -594,6 +612,7 @@ X509v3_asid_is_canonical(ASIdentifiers *asid) | |||
594 | (ASIdentifierChoice_is_canonical(asid->asnum) && | 612 | (ASIdentifierChoice_is_canonical(asid->asnum) && |
595 | ASIdentifierChoice_is_canonical(asid->rdi))); | 613 | ASIdentifierChoice_is_canonical(asid->rdi))); |
596 | } | 614 | } |
615 | LCRYPTO_ALIAS(X509v3_asid_is_canonical) | ||
597 | 616 | ||
598 | /* | 617 | /* |
599 | * Whack an ASIdentifierChoice into canonical form. | 618 | * Whack an ASIdentifierChoice into canonical form. |
@@ -761,6 +780,7 @@ X509v3_asid_canonize(ASIdentifiers *asid) | |||
761 | 780 | ||
762 | return ASIdentifierChoice_canonize(asid->rdi); | 781 | return ASIdentifierChoice_canonize(asid->rdi); |
763 | } | 782 | } |
783 | LCRYPTO_ALIAS(X509v3_asid_canonize) | ||
764 | 784 | ||
765 | /* | 785 | /* |
766 | * v2i method for an ASIdentifier extension. | 786 | * v2i method for an ASIdentifier extension. |
@@ -919,6 +939,7 @@ X509v3_asid_inherits(ASIdentifiers *asid) | |||
919 | 939 | ||
920 | return 0; | 940 | return 0; |
921 | } | 941 | } |
942 | LCRYPTO_ALIAS(X509v3_asid_inherits) | ||
922 | 943 | ||
923 | /* | 944 | /* |
924 | * Figure out whether parent contains child. | 945 | * Figure out whether parent contains child. |
@@ -992,6 +1013,7 @@ X509v3_asid_subset(ASIdentifiers *child, ASIdentifiers *parent) | |||
992 | 1013 | ||
993 | return 1; | 1014 | return 1; |
994 | } | 1015 | } |
1016 | LCRYPTO_ALIAS(X509v3_asid_subset) | ||
995 | 1017 | ||
996 | /* | 1018 | /* |
997 | * Validation error handling via callback. | 1019 | * Validation error handling via callback. |
@@ -1159,6 +1181,7 @@ X509v3_asid_validate_path(X509_STORE_CTX *ctx) | |||
1159 | } | 1181 | } |
1160 | return asid_validate_path_internal(ctx, ctx->chain, NULL); | 1182 | return asid_validate_path_internal(ctx, ctx->chain, NULL); |
1161 | } | 1183 | } |
1184 | LCRYPTO_ALIAS(X509v3_asid_validate_path) | ||
1162 | 1185 | ||
1163 | /* | 1186 | /* |
1164 | * RFC 3779 3.3 path validation of an extension. | 1187 | * RFC 3779 3.3 path validation of an extension. |
@@ -1176,5 +1199,6 @@ X509v3_asid_validate_resource_set(STACK_OF(X509) *chain, ASIdentifiers *ext, | |||
1176 | return 0; | 1199 | return 0; |
1177 | return asid_validate_path_internal(NULL, chain, ext); | 1200 | return asid_validate_path_internal(NULL, chain, ext); |
1178 | } | 1201 | } |
1202 | LCRYPTO_ALIAS(X509v3_asid_validate_resource_set) | ||
1179 | 1203 | ||
1180 | #endif /* OPENSSL_NO_RFC3779 */ | 1204 | #endif /* OPENSSL_NO_RFC3779 */ |
diff --git a/src/lib/libcrypto/x509/x509_att.c b/src/lib/libcrypto/x509/x509_att.c index 8d369df900..bff412173b 100644 --- a/src/lib/libcrypto/x509/x509_att.c +++ b/src/lib/libcrypto/x509/x509_att.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_att.c,v 1.19 2022/05/09 19:19:33 jsing Exp $ */ | 1 | /* $OpenBSD: x509_att.c,v 1.20 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -73,6 +73,7 @@ X509at_get_attr_count(const STACK_OF(X509_ATTRIBUTE) *x) | |||
73 | { | 73 | { |
74 | return sk_X509_ATTRIBUTE_num(x); | 74 | return sk_X509_ATTRIBUTE_num(x); |
75 | } | 75 | } |
76 | LCRYPTO_ALIAS(X509at_get_attr_count) | ||
76 | 77 | ||
77 | int | 78 | int |
78 | X509at_get_attr_by_NID(const STACK_OF(X509_ATTRIBUTE) *x, int nid, int lastpos) | 79 | X509at_get_attr_by_NID(const STACK_OF(X509_ATTRIBUTE) *x, int nid, int lastpos) |
@@ -84,6 +85,7 @@ X509at_get_attr_by_NID(const STACK_OF(X509_ATTRIBUTE) *x, int nid, int lastpos) | |||
84 | return (-2); | 85 | return (-2); |
85 | return (X509at_get_attr_by_OBJ(x, obj, lastpos)); | 86 | return (X509at_get_attr_by_OBJ(x, obj, lastpos)); |
86 | } | 87 | } |
88 | LCRYPTO_ALIAS(X509at_get_attr_by_NID) | ||
87 | 89 | ||
88 | int | 90 | int |
89 | X509at_get_attr_by_OBJ(const STACK_OF(X509_ATTRIBUTE) *sk, | 91 | X509at_get_attr_by_OBJ(const STACK_OF(X509_ATTRIBUTE) *sk, |
@@ -105,6 +107,7 @@ X509at_get_attr_by_OBJ(const STACK_OF(X509_ATTRIBUTE) *sk, | |||
105 | } | 107 | } |
106 | return (-1); | 108 | return (-1); |
107 | } | 109 | } |
110 | LCRYPTO_ALIAS(X509at_get_attr_by_OBJ) | ||
108 | 111 | ||
109 | X509_ATTRIBUTE * | 112 | X509_ATTRIBUTE * |
110 | X509at_get_attr(const STACK_OF(X509_ATTRIBUTE) *x, int loc) | 113 | X509at_get_attr(const STACK_OF(X509_ATTRIBUTE) *x, int loc) |
@@ -114,6 +117,7 @@ X509at_get_attr(const STACK_OF(X509_ATTRIBUTE) *x, int loc) | |||
114 | else | 117 | else |
115 | return sk_X509_ATTRIBUTE_value(x, loc); | 118 | return sk_X509_ATTRIBUTE_value(x, loc); |
116 | } | 119 | } |
120 | LCRYPTO_ALIAS(X509at_get_attr) | ||
117 | 121 | ||
118 | X509_ATTRIBUTE * | 122 | X509_ATTRIBUTE * |
119 | X509at_delete_attr(STACK_OF(X509_ATTRIBUTE) *x, int loc) | 123 | X509at_delete_attr(STACK_OF(X509_ATTRIBUTE) *x, int loc) |
@@ -125,6 +129,7 @@ X509at_delete_attr(STACK_OF(X509_ATTRIBUTE) *x, int loc) | |||
125 | ret = sk_X509_ATTRIBUTE_delete(x, loc); | 129 | ret = sk_X509_ATTRIBUTE_delete(x, loc); |
126 | return (ret); | 130 | return (ret); |
127 | } | 131 | } |
132 | LCRYPTO_ALIAS(X509at_delete_attr) | ||
128 | 133 | ||
129 | STACK_OF(X509_ATTRIBUTE) * | 134 | STACK_OF(X509_ATTRIBUTE) * |
130 | X509at_add1_attr(STACK_OF(X509_ATTRIBUTE) **x, X509_ATTRIBUTE *attr) | 135 | X509at_add1_attr(STACK_OF(X509_ATTRIBUTE) **x, X509_ATTRIBUTE *attr) |
@@ -160,6 +165,7 @@ err2: | |||
160 | sk_X509_ATTRIBUTE_free(sk); | 165 | sk_X509_ATTRIBUTE_free(sk); |
161 | return (NULL); | 166 | return (NULL); |
162 | } | 167 | } |
168 | LCRYPTO_ALIAS(X509at_add1_attr) | ||
163 | 169 | ||
164 | STACK_OF(X509_ATTRIBUTE) * | 170 | STACK_OF(X509_ATTRIBUTE) * |
165 | X509at_add1_attr_by_OBJ(STACK_OF(X509_ATTRIBUTE) **x, const ASN1_OBJECT *obj, | 171 | X509at_add1_attr_by_OBJ(STACK_OF(X509_ATTRIBUTE) **x, const ASN1_OBJECT *obj, |
@@ -175,6 +181,7 @@ X509at_add1_attr_by_OBJ(STACK_OF(X509_ATTRIBUTE) **x, const ASN1_OBJECT *obj, | |||
175 | X509_ATTRIBUTE_free(attr); | 181 | X509_ATTRIBUTE_free(attr); |
176 | return ret; | 182 | return ret; |
177 | } | 183 | } |
184 | LCRYPTO_ALIAS(X509at_add1_attr_by_OBJ) | ||
178 | 185 | ||
179 | STACK_OF(X509_ATTRIBUTE) * | 186 | STACK_OF(X509_ATTRIBUTE) * |
180 | X509at_add1_attr_by_NID(STACK_OF(X509_ATTRIBUTE) **x, int nid, int type, | 187 | X509at_add1_attr_by_NID(STACK_OF(X509_ATTRIBUTE) **x, int nid, int type, |
@@ -190,6 +197,7 @@ X509at_add1_attr_by_NID(STACK_OF(X509_ATTRIBUTE) **x, int nid, int type, | |||
190 | X509_ATTRIBUTE_free(attr); | 197 | X509_ATTRIBUTE_free(attr); |
191 | return ret; | 198 | return ret; |
192 | } | 199 | } |
200 | LCRYPTO_ALIAS(X509at_add1_attr_by_NID) | ||
193 | 201 | ||
194 | STACK_OF(X509_ATTRIBUTE) * | 202 | STACK_OF(X509_ATTRIBUTE) * |
195 | X509at_add1_attr_by_txt(STACK_OF(X509_ATTRIBUTE) **x, const char *attrname, | 203 | X509at_add1_attr_by_txt(STACK_OF(X509_ATTRIBUTE) **x, const char *attrname, |
@@ -205,6 +213,7 @@ X509at_add1_attr_by_txt(STACK_OF(X509_ATTRIBUTE) **x, const char *attrname, | |||
205 | X509_ATTRIBUTE_free(attr); | 213 | X509_ATTRIBUTE_free(attr); |
206 | return ret; | 214 | return ret; |
207 | } | 215 | } |
216 | LCRYPTO_ALIAS(X509at_add1_attr_by_txt) | ||
208 | 217 | ||
209 | void * | 218 | void * |
210 | X509at_get0_data_by_OBJ(STACK_OF(X509_ATTRIBUTE) *x, const ASN1_OBJECT *obj, | 219 | X509at_get0_data_by_OBJ(STACK_OF(X509_ATTRIBUTE) *x, const ASN1_OBJECT *obj, |
@@ -223,6 +232,7 @@ X509at_get0_data_by_OBJ(STACK_OF(X509_ATTRIBUTE) *x, const ASN1_OBJECT *obj, | |||
223 | return NULL; | 232 | return NULL; |
224 | return X509_ATTRIBUTE_get0_data(at, 0, type, NULL); | 233 | return X509_ATTRIBUTE_get0_data(at, 0, type, NULL); |
225 | } | 234 | } |
235 | LCRYPTO_ALIAS(X509at_get0_data_by_OBJ) | ||
226 | 236 | ||
227 | X509_ATTRIBUTE * | 237 | X509_ATTRIBUTE * |
228 | X509_ATTRIBUTE_create_by_NID(X509_ATTRIBUTE **attr, int nid, int atrtype, | 238 | X509_ATTRIBUTE_create_by_NID(X509_ATTRIBUTE **attr, int nid, int atrtype, |
@@ -241,6 +251,7 @@ X509_ATTRIBUTE_create_by_NID(X509_ATTRIBUTE **attr, int nid, int atrtype, | |||
241 | ASN1_OBJECT_free(obj); | 251 | ASN1_OBJECT_free(obj); |
242 | return (ret); | 252 | return (ret); |
243 | } | 253 | } |
254 | LCRYPTO_ALIAS(X509_ATTRIBUTE_create_by_NID) | ||
244 | 255 | ||
245 | X509_ATTRIBUTE * | 256 | X509_ATTRIBUTE * |
246 | X509_ATTRIBUTE_create_by_OBJ(X509_ATTRIBUTE **attr, const ASN1_OBJECT *obj, | 257 | X509_ATTRIBUTE_create_by_OBJ(X509_ATTRIBUTE **attr, const ASN1_OBJECT *obj, |
@@ -270,6 +281,7 @@ err: | |||
270 | X509_ATTRIBUTE_free(ret); | 281 | X509_ATTRIBUTE_free(ret); |
271 | return (NULL); | 282 | return (NULL); |
272 | } | 283 | } |
284 | LCRYPTO_ALIAS(X509_ATTRIBUTE_create_by_OBJ) | ||
273 | 285 | ||
274 | X509_ATTRIBUTE * | 286 | X509_ATTRIBUTE * |
275 | X509_ATTRIBUTE_create_by_txt(X509_ATTRIBUTE **attr, const char *atrname, | 287 | X509_ATTRIBUTE_create_by_txt(X509_ATTRIBUTE **attr, const char *atrname, |
@@ -288,6 +300,7 @@ X509_ATTRIBUTE_create_by_txt(X509_ATTRIBUTE **attr, const char *atrname, | |||
288 | ASN1_OBJECT_free(obj); | 300 | ASN1_OBJECT_free(obj); |
289 | return nattr; | 301 | return nattr; |
290 | } | 302 | } |
303 | LCRYPTO_ALIAS(X509_ATTRIBUTE_create_by_txt) | ||
291 | 304 | ||
292 | int | 305 | int |
293 | X509_ATTRIBUTE_set1_object(X509_ATTRIBUTE *attr, const ASN1_OBJECT *obj) | 306 | X509_ATTRIBUTE_set1_object(X509_ATTRIBUTE *attr, const ASN1_OBJECT *obj) |
@@ -298,6 +311,7 @@ X509_ATTRIBUTE_set1_object(X509_ATTRIBUTE *attr, const ASN1_OBJECT *obj) | |||
298 | attr->object = OBJ_dup(obj); | 311 | attr->object = OBJ_dup(obj); |
299 | return attr->object != NULL; | 312 | return attr->object != NULL; |
300 | } | 313 | } |
314 | LCRYPTO_ALIAS(X509_ATTRIBUTE_set1_object) | ||
301 | 315 | ||
302 | int | 316 | int |
303 | X509_ATTRIBUTE_set1_data(X509_ATTRIBUTE *attr, int attrtype, const void *data, | 317 | X509_ATTRIBUTE_set1_data(X509_ATTRIBUTE *attr, int attrtype, const void *data, |
@@ -351,6 +365,7 @@ err: | |||
351 | X509error(ERR_R_MALLOC_FAILURE); | 365 | X509error(ERR_R_MALLOC_FAILURE); |
352 | return 0; | 366 | return 0; |
353 | } | 367 | } |
368 | LCRYPTO_ALIAS(X509_ATTRIBUTE_set1_data) | ||
354 | 369 | ||
355 | int | 370 | int |
356 | X509_ATTRIBUTE_count(const X509_ATTRIBUTE *attr) | 371 | X509_ATTRIBUTE_count(const X509_ATTRIBUTE *attr) |
@@ -360,6 +375,7 @@ X509_ATTRIBUTE_count(const X509_ATTRIBUTE *attr) | |||
360 | 375 | ||
361 | return sk_ASN1_TYPE_num(attr->set); | 376 | return sk_ASN1_TYPE_num(attr->set); |
362 | } | 377 | } |
378 | LCRYPTO_ALIAS(X509_ATTRIBUTE_count) | ||
363 | 379 | ||
364 | ASN1_OBJECT * | 380 | ASN1_OBJECT * |
365 | X509_ATTRIBUTE_get0_object(X509_ATTRIBUTE *attr) | 381 | X509_ATTRIBUTE_get0_object(X509_ATTRIBUTE *attr) |
@@ -368,6 +384,7 @@ X509_ATTRIBUTE_get0_object(X509_ATTRIBUTE *attr) | |||
368 | return (NULL); | 384 | return (NULL); |
369 | return (attr->object); | 385 | return (attr->object); |
370 | } | 386 | } |
387 | LCRYPTO_ALIAS(X509_ATTRIBUTE_get0_object) | ||
371 | 388 | ||
372 | void * | 389 | void * |
373 | X509_ATTRIBUTE_get0_data(X509_ATTRIBUTE *attr, int idx, int atrtype, void *data) | 390 | X509_ATTRIBUTE_get0_data(X509_ATTRIBUTE *attr, int idx, int atrtype, void *data) |
@@ -383,6 +400,7 @@ X509_ATTRIBUTE_get0_data(X509_ATTRIBUTE *attr, int idx, int atrtype, void *data) | |||
383 | } | 400 | } |
384 | return ttmp->value.ptr; | 401 | return ttmp->value.ptr; |
385 | } | 402 | } |
403 | LCRYPTO_ALIAS(X509_ATTRIBUTE_get0_data) | ||
386 | 404 | ||
387 | ASN1_TYPE * | 405 | ASN1_TYPE * |
388 | X509_ATTRIBUTE_get0_type(X509_ATTRIBUTE *attr, int idx) | 406 | X509_ATTRIBUTE_get0_type(X509_ATTRIBUTE *attr, int idx) |
@@ -392,3 +410,4 @@ X509_ATTRIBUTE_get0_type(X509_ATTRIBUTE *attr, int idx) | |||
392 | 410 | ||
393 | return sk_ASN1_TYPE_value(attr->set, idx); | 411 | return sk_ASN1_TYPE_value(attr->set, idx); |
394 | } | 412 | } |
413 | LCRYPTO_ALIAS(X509_ATTRIBUTE_get0_type) | ||
diff --git a/src/lib/libcrypto/x509/x509_bcons.c b/src/lib/libcrypto/x509/x509_bcons.c index 48ce7d6087..8a9c1e419a 100644 --- a/src/lib/libcrypto/x509/x509_bcons.c +++ b/src/lib/libcrypto/x509/x509_bcons.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_bcons.c,v 1.1 2020/06/04 15:19:31 jsing Exp $ */ | 1 | /* $OpenBSD: x509_bcons.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -121,24 +121,28 @@ d2i_BASIC_CONSTRAINTS(BASIC_CONSTRAINTS **a, const unsigned char **in, long len) | |||
121 | return (BASIC_CONSTRAINTS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 121 | return (BASIC_CONSTRAINTS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
122 | &BASIC_CONSTRAINTS_it); | 122 | &BASIC_CONSTRAINTS_it); |
123 | } | 123 | } |
124 | LCRYPTO_ALIAS(d2i_BASIC_CONSTRAINTS) | ||
124 | 125 | ||
125 | int | 126 | int |
126 | i2d_BASIC_CONSTRAINTS(BASIC_CONSTRAINTS *a, unsigned char **out) | 127 | i2d_BASIC_CONSTRAINTS(BASIC_CONSTRAINTS *a, unsigned char **out) |
127 | { | 128 | { |
128 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &BASIC_CONSTRAINTS_it); | 129 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &BASIC_CONSTRAINTS_it); |
129 | } | 130 | } |
131 | LCRYPTO_ALIAS(i2d_BASIC_CONSTRAINTS) | ||
130 | 132 | ||
131 | BASIC_CONSTRAINTS * | 133 | BASIC_CONSTRAINTS * |
132 | BASIC_CONSTRAINTS_new(void) | 134 | BASIC_CONSTRAINTS_new(void) |
133 | { | 135 | { |
134 | return (BASIC_CONSTRAINTS *)ASN1_item_new(&BASIC_CONSTRAINTS_it); | 136 | return (BASIC_CONSTRAINTS *)ASN1_item_new(&BASIC_CONSTRAINTS_it); |
135 | } | 137 | } |
138 | LCRYPTO_ALIAS(BASIC_CONSTRAINTS_new) | ||
136 | 139 | ||
137 | void | 140 | void |
138 | BASIC_CONSTRAINTS_free(BASIC_CONSTRAINTS *a) | 141 | BASIC_CONSTRAINTS_free(BASIC_CONSTRAINTS *a) |
139 | { | 142 | { |
140 | ASN1_item_free((ASN1_VALUE *)a, &BASIC_CONSTRAINTS_it); | 143 | ASN1_item_free((ASN1_VALUE *)a, &BASIC_CONSTRAINTS_it); |
141 | } | 144 | } |
145 | LCRYPTO_ALIAS(BASIC_CONSTRAINTS_free) | ||
142 | 146 | ||
143 | 147 | ||
144 | static STACK_OF(CONF_VALUE) * | 148 | static STACK_OF(CONF_VALUE) * |
diff --git a/src/lib/libcrypto/x509/x509_bitst.c b/src/lib/libcrypto/x509/x509_bitst.c index 3d998188e8..bea089e31c 100644 --- a/src/lib/libcrypto/x509/x509_bitst.c +++ b/src/lib/libcrypto/x509/x509_bitst.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_bitst.c,v 1.1 2020/06/04 15:19:31 jsing Exp $ */ | 1 | /* $OpenBSD: x509_bitst.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -148,6 +148,7 @@ i2v_ASN1_BIT_STRING(X509V3_EXT_METHOD *method, ASN1_BIT_STRING *bits, | |||
148 | 148 | ||
149 | return NULL; | 149 | return NULL; |
150 | } | 150 | } |
151 | LCRYPTO_ALIAS(i2v_ASN1_BIT_STRING) | ||
151 | 152 | ||
152 | ASN1_BIT_STRING * | 153 | ASN1_BIT_STRING * |
153 | v2i_ASN1_BIT_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | 154 | v2i_ASN1_BIT_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
@@ -185,3 +186,4 @@ v2i_ASN1_BIT_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
185 | } | 186 | } |
186 | return bs; | 187 | return bs; |
187 | } | 188 | } |
189 | LCRYPTO_ALIAS(v2i_ASN1_BIT_STRING) | ||
diff --git a/src/lib/libcrypto/x509/x509_cmp.c b/src/lib/libcrypto/x509/x509_cmp.c index 4fd8d78fc3..542ae76c17 100644 --- a/src/lib/libcrypto/x509/x509_cmp.c +++ b/src/lib/libcrypto/x509/x509_cmp.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_cmp.c,v 1.39 2022/02/24 22:05:06 beck Exp $ */ | 1 | /* $OpenBSD: x509_cmp.c,v 1.40 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -84,6 +84,7 @@ X509_issuer_and_serial_cmp(const X509 *a, const X509 *b) | |||
84 | return (i); | 84 | return (i); |
85 | return (X509_NAME_cmp(ai->issuer, bi->issuer)); | 85 | return (X509_NAME_cmp(ai->issuer, bi->issuer)); |
86 | } | 86 | } |
87 | LCRYPTO_ALIAS(X509_issuer_and_serial_cmp) | ||
87 | 88 | ||
88 | #ifndef OPENSSL_NO_MD5 | 89 | #ifndef OPENSSL_NO_MD5 |
89 | unsigned long | 90 | unsigned long |
@@ -119,6 +120,7 @@ err: | |||
119 | free(f); | 120 | free(f); |
120 | return (ret); | 121 | return (ret); |
121 | } | 122 | } |
123 | LCRYPTO_ALIAS(X509_issuer_and_serial_hash) | ||
122 | #endif | 124 | #endif |
123 | 125 | ||
124 | int | 126 | int |
@@ -126,18 +128,21 @@ X509_issuer_name_cmp(const X509 *a, const X509 *b) | |||
126 | { | 128 | { |
127 | return (X509_NAME_cmp(a->cert_info->issuer, b->cert_info->issuer)); | 129 | return (X509_NAME_cmp(a->cert_info->issuer, b->cert_info->issuer)); |
128 | } | 130 | } |
131 | LCRYPTO_ALIAS(X509_issuer_name_cmp) | ||
129 | 132 | ||
130 | int | 133 | int |
131 | X509_subject_name_cmp(const X509 *a, const X509 *b) | 134 | X509_subject_name_cmp(const X509 *a, const X509 *b) |
132 | { | 135 | { |
133 | return (X509_NAME_cmp(a->cert_info->subject, b->cert_info->subject)); | 136 | return (X509_NAME_cmp(a->cert_info->subject, b->cert_info->subject)); |
134 | } | 137 | } |
138 | LCRYPTO_ALIAS(X509_subject_name_cmp) | ||
135 | 139 | ||
136 | int | 140 | int |
137 | X509_CRL_cmp(const X509_CRL *a, const X509_CRL *b) | 141 | X509_CRL_cmp(const X509_CRL *a, const X509_CRL *b) |
138 | { | 142 | { |
139 | return (X509_NAME_cmp(a->crl->issuer, b->crl->issuer)); | 143 | return (X509_NAME_cmp(a->crl->issuer, b->crl->issuer)); |
140 | } | 144 | } |
145 | LCRYPTO_ALIAS(X509_CRL_cmp) | ||
141 | 146 | ||
142 | #ifndef OPENSSL_NO_SHA | 147 | #ifndef OPENSSL_NO_SHA |
143 | int | 148 | int |
@@ -145,6 +150,7 @@ X509_CRL_match(const X509_CRL *a, const X509_CRL *b) | |||
145 | { | 150 | { |
146 | return memcmp(a->hash, b->hash, X509_CRL_HASH_LEN); | 151 | return memcmp(a->hash, b->hash, X509_CRL_HASH_LEN); |
147 | } | 152 | } |
153 | LCRYPTO_ALIAS(X509_CRL_match) | ||
148 | #endif | 154 | #endif |
149 | 155 | ||
150 | X509_NAME * | 156 | X509_NAME * |
@@ -152,12 +158,14 @@ X509_get_issuer_name(const X509 *a) | |||
152 | { | 158 | { |
153 | return (a->cert_info->issuer); | 159 | return (a->cert_info->issuer); |
154 | } | 160 | } |
161 | LCRYPTO_ALIAS(X509_get_issuer_name) | ||
155 | 162 | ||
156 | unsigned long | 163 | unsigned long |
157 | X509_issuer_name_hash(X509 *x) | 164 | X509_issuer_name_hash(X509 *x) |
158 | { | 165 | { |
159 | return (X509_NAME_hash(x->cert_info->issuer)); | 166 | return (X509_NAME_hash(x->cert_info->issuer)); |
160 | } | 167 | } |
168 | LCRYPTO_ALIAS(X509_issuer_name_hash) | ||
161 | 169 | ||
162 | #ifndef OPENSSL_NO_MD5 | 170 | #ifndef OPENSSL_NO_MD5 |
163 | unsigned long | 171 | unsigned long |
@@ -165,6 +173,7 @@ X509_issuer_name_hash_old(X509 *x) | |||
165 | { | 173 | { |
166 | return (X509_NAME_hash_old(x->cert_info->issuer)); | 174 | return (X509_NAME_hash_old(x->cert_info->issuer)); |
167 | } | 175 | } |
176 | LCRYPTO_ALIAS(X509_issuer_name_hash_old) | ||
168 | #endif | 177 | #endif |
169 | 178 | ||
170 | X509_NAME * | 179 | X509_NAME * |
@@ -172,24 +181,28 @@ X509_get_subject_name(const X509 *a) | |||
172 | { | 181 | { |
173 | return (a->cert_info->subject); | 182 | return (a->cert_info->subject); |
174 | } | 183 | } |
184 | LCRYPTO_ALIAS(X509_get_subject_name) | ||
175 | 185 | ||
176 | ASN1_INTEGER * | 186 | ASN1_INTEGER * |
177 | X509_get_serialNumber(X509 *a) | 187 | X509_get_serialNumber(X509 *a) |
178 | { | 188 | { |
179 | return (a->cert_info->serialNumber); | 189 | return (a->cert_info->serialNumber); |
180 | } | 190 | } |
191 | LCRYPTO_ALIAS(X509_get_serialNumber) | ||
181 | 192 | ||
182 | const ASN1_INTEGER * | 193 | const ASN1_INTEGER * |
183 | X509_get0_serialNumber(const X509 *a) | 194 | X509_get0_serialNumber(const X509 *a) |
184 | { | 195 | { |
185 | return (a->cert_info->serialNumber); | 196 | return (a->cert_info->serialNumber); |
186 | } | 197 | } |
198 | LCRYPTO_ALIAS(X509_get0_serialNumber) | ||
187 | 199 | ||
188 | unsigned long | 200 | unsigned long |
189 | X509_subject_name_hash(X509 *x) | 201 | X509_subject_name_hash(X509 *x) |
190 | { | 202 | { |
191 | return (X509_NAME_hash(x->cert_info->subject)); | 203 | return (X509_NAME_hash(x->cert_info->subject)); |
192 | } | 204 | } |
205 | LCRYPTO_ALIAS(X509_subject_name_hash) | ||
193 | 206 | ||
194 | #ifndef OPENSSL_NO_MD5 | 207 | #ifndef OPENSSL_NO_MD5 |
195 | unsigned long | 208 | unsigned long |
@@ -197,6 +210,7 @@ X509_subject_name_hash_old(X509 *x) | |||
197 | { | 210 | { |
198 | return (X509_NAME_hash_old(x->cert_info->subject)); | 211 | return (X509_NAME_hash_old(x->cert_info->subject)); |
199 | } | 212 | } |
213 | LCRYPTO_ALIAS(X509_subject_name_hash_old) | ||
200 | #endif | 214 | #endif |
201 | 215 | ||
202 | #ifndef OPENSSL_NO_SHA | 216 | #ifndef OPENSSL_NO_SHA |
@@ -218,6 +232,7 @@ X509_cmp(const X509 *a, const X509 *b) | |||
218 | 232 | ||
219 | return memcmp(a->hash, b->hash, X509_CERT_HASH_LEN); | 233 | return memcmp(a->hash, b->hash, X509_CERT_HASH_LEN); |
220 | } | 234 | } |
235 | LCRYPTO_ALIAS(X509_cmp) | ||
221 | #endif | 236 | #endif |
222 | 237 | ||
223 | int | 238 | int |
@@ -241,6 +256,7 @@ X509_NAME_cmp(const X509_NAME *a, const X509_NAME *b) | |||
241 | return ret; | 256 | return ret; |
242 | return memcmp(a->canon_enc, b->canon_enc, a->canon_enclen); | 257 | return memcmp(a->canon_enc, b->canon_enc, a->canon_enclen); |
243 | } | 258 | } |
259 | LCRYPTO_ALIAS(X509_NAME_cmp) | ||
244 | 260 | ||
245 | unsigned long | 261 | unsigned long |
246 | X509_NAME_hash(X509_NAME *x) | 262 | X509_NAME_hash(X509_NAME *x) |
@@ -259,6 +275,7 @@ X509_NAME_hash(X509_NAME *x) | |||
259 | 0xffffffffL; | 275 | 0xffffffffL; |
260 | return (ret); | 276 | return (ret); |
261 | } | 277 | } |
278 | LCRYPTO_ALIAS(X509_NAME_hash) | ||
262 | 279 | ||
263 | 280 | ||
264 | #ifndef OPENSSL_NO_MD5 | 281 | #ifndef OPENSSL_NO_MD5 |
@@ -287,6 +304,7 @@ X509_NAME_hash_old(X509_NAME *x) | |||
287 | 304 | ||
288 | return (ret); | 305 | return (ret); |
289 | } | 306 | } |
307 | LCRYPTO_ALIAS(X509_NAME_hash_old) | ||
290 | #endif | 308 | #endif |
291 | 309 | ||
292 | /* Search a stack of X509 for a match */ | 310 | /* Search a stack of X509 for a match */ |
@@ -312,6 +330,7 @@ X509_find_by_issuer_and_serial(STACK_OF(X509) *sk, X509_NAME *name, | |||
312 | } | 330 | } |
313 | return (NULL); | 331 | return (NULL); |
314 | } | 332 | } |
333 | LCRYPTO_ALIAS(X509_find_by_issuer_and_serial) | ||
315 | 334 | ||
316 | X509 * | 335 | X509 * |
317 | X509_find_by_subject(STACK_OF(X509) *sk, X509_NAME *name) | 336 | X509_find_by_subject(STACK_OF(X509) *sk, X509_NAME *name) |
@@ -326,6 +345,7 @@ X509_find_by_subject(STACK_OF(X509) *sk, X509_NAME *name) | |||
326 | } | 345 | } |
327 | return (NULL); | 346 | return (NULL); |
328 | } | 347 | } |
348 | LCRYPTO_ALIAS(X509_find_by_subject) | ||
329 | 349 | ||
330 | EVP_PKEY * | 350 | EVP_PKEY * |
331 | X509_get_pubkey(X509 *x) | 351 | X509_get_pubkey(X509 *x) |
@@ -334,6 +354,7 @@ X509_get_pubkey(X509 *x) | |||
334 | return (NULL); | 354 | return (NULL); |
335 | return (X509_PUBKEY_get(x->cert_info->key)); | 355 | return (X509_PUBKEY_get(x->cert_info->key)); |
336 | } | 356 | } |
357 | LCRYPTO_ALIAS(X509_get_pubkey) | ||
337 | 358 | ||
338 | EVP_PKEY * | 359 | EVP_PKEY * |
339 | X509_get0_pubkey(const X509 *x) | 360 | X509_get0_pubkey(const X509 *x) |
@@ -342,6 +363,7 @@ X509_get0_pubkey(const X509 *x) | |||
342 | return (NULL); | 363 | return (NULL); |
343 | return (X509_PUBKEY_get0(x->cert_info->key)); | 364 | return (X509_PUBKEY_get0(x->cert_info->key)); |
344 | } | 365 | } |
366 | LCRYPTO_ALIAS(X509_get0_pubkey) | ||
345 | 367 | ||
346 | ASN1_BIT_STRING * | 368 | ASN1_BIT_STRING * |
347 | X509_get0_pubkey_bitstr(const X509 *x) | 369 | X509_get0_pubkey_bitstr(const X509 *x) |
@@ -350,6 +372,7 @@ X509_get0_pubkey_bitstr(const X509 *x) | |||
350 | return NULL; | 372 | return NULL; |
351 | return x->cert_info->key->public_key; | 373 | return x->cert_info->key->public_key; |
352 | } | 374 | } |
375 | LCRYPTO_ALIAS(X509_get0_pubkey_bitstr) | ||
353 | 376 | ||
354 | int | 377 | int |
355 | X509_check_private_key(const X509 *x, const EVP_PKEY *k) | 378 | X509_check_private_key(const X509 *x, const EVP_PKEY *k) |
@@ -380,6 +403,7 @@ X509_check_private_key(const X509 *x, const EVP_PKEY *k) | |||
380 | return 1; | 403 | return 1; |
381 | return 0; | 404 | return 0; |
382 | } | 405 | } |
406 | LCRYPTO_ALIAS(X509_check_private_key) | ||
383 | 407 | ||
384 | /* | 408 | /* |
385 | * Not strictly speaking an "up_ref" as a STACK doesn't have a reference | 409 | * Not strictly speaking an "up_ref" as a STACK doesn't have a reference |
@@ -398,3 +422,4 @@ X509_chain_up_ref(STACK_OF(X509) *chain) | |||
398 | 422 | ||
399 | return ret; | 423 | return ret; |
400 | } | 424 | } |
425 | LCRYPTO_ALIAS(X509_chain_up_ref) | ||
diff --git a/src/lib/libcrypto/x509/x509_conf.c b/src/lib/libcrypto/x509/x509_conf.c index cd703fc156..def1441f3f 100644 --- a/src/lib/libcrypto/x509/x509_conf.c +++ b/src/lib/libcrypto/x509/x509_conf.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_conf.c,v 1.2 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: x509_conf.c,v 1.3 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -104,6 +104,7 @@ X509V3_EXT_nconf(CONF *conf, X509V3_CTX *ctx, const char *name, | |||
104 | } | 104 | } |
105 | return ret; | 105 | return ret; |
106 | } | 106 | } |
107 | LCRYPTO_ALIAS(X509V3_EXT_nconf) | ||
107 | 108 | ||
108 | /* CONF *conf: Config file */ | 109 | /* CONF *conf: Config file */ |
109 | /* char *value: Value */ | 110 | /* char *value: Value */ |
@@ -120,6 +121,7 @@ X509V3_EXT_nconf_nid(CONF *conf, X509V3_CTX *ctx, int ext_nid, | |||
120 | value, crit, ext_type, ctx); | 121 | value, crit, ext_type, ctx); |
121 | return do_ext_nconf(conf, ctx, ext_nid, crit, value); | 122 | return do_ext_nconf(conf, ctx, ext_nid, crit, value); |
122 | } | 123 | } |
124 | LCRYPTO_ALIAS(X509V3_EXT_nconf_nid) | ||
123 | 125 | ||
124 | /* CONF *conf: Config file */ | 126 | /* CONF *conf: Config file */ |
125 | /* char *value: Value */ | 127 | /* char *value: Value */ |
@@ -238,6 +240,7 @@ X509V3_EXT_i2d(int ext_nid, int crit, void *ext_struc) | |||
238 | } | 240 | } |
239 | return do_ext_i2d(method, ext_nid, crit, ext_struc); | 241 | return do_ext_i2d(method, ext_nid, crit, ext_struc); |
240 | } | 242 | } |
243 | LCRYPTO_ALIAS(X509V3_EXT_i2d) | ||
241 | 244 | ||
242 | /* Check the extension string for critical flag */ | 245 | /* Check the extension string for critical flag */ |
243 | static int | 246 | static int |
@@ -364,6 +367,7 @@ X509V3_EXT_add_nconf_sk(CONF *conf, X509V3_CTX *ctx, const char *section, | |||
364 | } | 367 | } |
365 | return 1; | 368 | return 1; |
366 | } | 369 | } |
370 | LCRYPTO_ALIAS(X509V3_EXT_add_nconf_sk) | ||
367 | 371 | ||
368 | /* Convenience functions to add extensions to a certificate, CRL and request */ | 372 | /* Convenience functions to add extensions to a certificate, CRL and request */ |
369 | 373 | ||
@@ -377,6 +381,7 @@ X509V3_EXT_add_nconf(CONF *conf, X509V3_CTX *ctx, const char *section, | |||
377 | sk = &cert->cert_info->extensions; | 381 | sk = &cert->cert_info->extensions; |
378 | return X509V3_EXT_add_nconf_sk(conf, ctx, section, sk); | 382 | return X509V3_EXT_add_nconf_sk(conf, ctx, section, sk); |
379 | } | 383 | } |
384 | LCRYPTO_ALIAS(X509V3_EXT_add_nconf) | ||
380 | 385 | ||
381 | /* Same as above but for a CRL */ | 386 | /* Same as above but for a CRL */ |
382 | 387 | ||
@@ -390,6 +395,7 @@ X509V3_EXT_CRL_add_nconf(CONF *conf, X509V3_CTX *ctx, const char *section, | |||
390 | sk = &crl->crl->extensions; | 395 | sk = &crl->crl->extensions; |
391 | return X509V3_EXT_add_nconf_sk(conf, ctx, section, sk); | 396 | return X509V3_EXT_add_nconf_sk(conf, ctx, section, sk); |
392 | } | 397 | } |
398 | LCRYPTO_ALIAS(X509V3_EXT_CRL_add_nconf) | ||
393 | 399 | ||
394 | /* Add extensions to certificate request */ | 400 | /* Add extensions to certificate request */ |
395 | 401 | ||
@@ -409,6 +415,7 @@ X509V3_EXT_REQ_add_nconf(CONF *conf, X509V3_CTX *ctx, const char *section, | |||
409 | sk_X509_EXTENSION_pop_free(extlist, X509_EXTENSION_free); | 415 | sk_X509_EXTENSION_pop_free(extlist, X509_EXTENSION_free); |
410 | return i; | 416 | return i; |
411 | } | 417 | } |
418 | LCRYPTO_ALIAS(X509V3_EXT_REQ_add_nconf) | ||
412 | 419 | ||
413 | /* Config database functions */ | 420 | /* Config database functions */ |
414 | 421 | ||
@@ -421,6 +428,7 @@ X509V3_get_string(X509V3_CTX *ctx, const char *name, const char *section) | |||
421 | } | 428 | } |
422 | return ctx->db_meth->get_string(ctx->db, name, section); | 429 | return ctx->db_meth->get_string(ctx->db, name, section); |
423 | } | 430 | } |
431 | LCRYPTO_ALIAS(X509V3_get_string) | ||
424 | 432 | ||
425 | STACK_OF(CONF_VALUE) * | 433 | STACK_OF(CONF_VALUE) * |
426 | X509V3_get_section(X509V3_CTX *ctx, const char *section) | 434 | X509V3_get_section(X509V3_CTX *ctx, const char *section) |
@@ -431,6 +439,7 @@ X509V3_get_section(X509V3_CTX *ctx, const char *section) | |||
431 | } | 439 | } |
432 | return ctx->db_meth->get_section(ctx->db, section); | 440 | return ctx->db_meth->get_section(ctx->db, section); |
433 | } | 441 | } |
442 | LCRYPTO_ALIAS(X509V3_get_section) | ||
434 | 443 | ||
435 | void | 444 | void |
436 | X509V3_string_free(X509V3_CTX *ctx, char *str) | 445 | X509V3_string_free(X509V3_CTX *ctx, char *str) |
@@ -440,6 +449,7 @@ X509V3_string_free(X509V3_CTX *ctx, char *str) | |||
440 | if (ctx->db_meth->free_string) | 449 | if (ctx->db_meth->free_string) |
441 | ctx->db_meth->free_string(ctx->db, str); | 450 | ctx->db_meth->free_string(ctx->db, str); |
442 | } | 451 | } |
452 | LCRYPTO_ALIAS(X509V3_string_free) | ||
443 | 453 | ||
444 | void | 454 | void |
445 | X509V3_section_free(X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *section) | 455 | X509V3_section_free(X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *section) |
@@ -449,6 +459,7 @@ X509V3_section_free(X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *section) | |||
449 | if (ctx->db_meth->free_section) | 459 | if (ctx->db_meth->free_section) |
450 | ctx->db_meth->free_section(ctx->db, section); | 460 | ctx->db_meth->free_section(ctx->db, section); |
451 | } | 461 | } |
462 | LCRYPTO_ALIAS(X509V3_section_free) | ||
452 | 463 | ||
453 | static char * | 464 | static char * |
454 | nconf_get_string(void *db, const char *section, const char *value) | 465 | nconf_get_string(void *db, const char *section, const char *value) |
@@ -475,6 +486,7 @@ X509V3_set_nconf(X509V3_CTX *ctx, CONF *conf) | |||
475 | ctx->db_meth = &nconf_method; | 486 | ctx->db_meth = &nconf_method; |
476 | ctx->db = conf; | 487 | ctx->db = conf; |
477 | } | 488 | } |
489 | LCRYPTO_ALIAS(X509V3_set_nconf) | ||
478 | 490 | ||
479 | void | 491 | void |
480 | X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, | 492 | X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, |
@@ -486,6 +498,7 @@ X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subj, X509_REQ *req, | |||
486 | ctx->subject_req = req; | 498 | ctx->subject_req = req; |
487 | ctx->flags = flags; | 499 | ctx->flags = flags; |
488 | } | 500 | } |
501 | LCRYPTO_ALIAS(X509V3_set_ctx) | ||
489 | 502 | ||
490 | /* Old conf compatibility functions */ | 503 | /* Old conf compatibility functions */ |
491 | 504 | ||
@@ -498,6 +511,7 @@ X509V3_EXT_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, const char *name, | |||
498 | CONF_set_nconf(&ctmp, conf); | 511 | CONF_set_nconf(&ctmp, conf); |
499 | return X509V3_EXT_nconf(&ctmp, ctx, name, value); | 512 | return X509V3_EXT_nconf(&ctmp, ctx, name, value); |
500 | } | 513 | } |
514 | LCRYPTO_ALIAS(X509V3_EXT_conf) | ||
501 | 515 | ||
502 | /* LHASH *conf: Config file */ | 516 | /* LHASH *conf: Config file */ |
503 | /* char *value: Value */ | 517 | /* char *value: Value */ |
@@ -510,6 +524,7 @@ X509V3_EXT_conf_nid(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, int ext_nid, | |||
510 | CONF_set_nconf(&ctmp, conf); | 524 | CONF_set_nconf(&ctmp, conf); |
511 | return X509V3_EXT_nconf_nid(&ctmp, ctx, ext_nid, value); | 525 | return X509V3_EXT_nconf_nid(&ctmp, ctx, ext_nid, value); |
512 | } | 526 | } |
527 | LCRYPTO_ALIAS(X509V3_EXT_conf_nid) | ||
513 | 528 | ||
514 | static char * | 529 | static char * |
515 | conf_lhash_get_string(void *db, const char *section, const char *value) | 530 | conf_lhash_get_string(void *db, const char *section, const char *value) |
@@ -536,6 +551,7 @@ X509V3_set_conf_lhash(X509V3_CTX *ctx, LHASH_OF(CONF_VALUE) *lhash) | |||
536 | ctx->db_meth = &conf_lhash_method; | 551 | ctx->db_meth = &conf_lhash_method; |
537 | ctx->db = lhash; | 552 | ctx->db = lhash; |
538 | } | 553 | } |
554 | LCRYPTO_ALIAS(X509V3_set_conf_lhash) | ||
539 | 555 | ||
540 | int | 556 | int |
541 | X509V3_EXT_add_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, | 557 | X509V3_EXT_add_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, |
@@ -546,6 +562,7 @@ X509V3_EXT_add_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, | |||
546 | CONF_set_nconf(&ctmp, conf); | 562 | CONF_set_nconf(&ctmp, conf); |
547 | return X509V3_EXT_add_nconf(&ctmp, ctx, section, cert); | 563 | return X509V3_EXT_add_nconf(&ctmp, ctx, section, cert); |
548 | } | 564 | } |
565 | LCRYPTO_ALIAS(X509V3_EXT_add_conf) | ||
549 | 566 | ||
550 | /* Same as above but for a CRL */ | 567 | /* Same as above but for a CRL */ |
551 | 568 | ||
@@ -558,6 +575,7 @@ X509V3_EXT_CRL_add_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, | |||
558 | CONF_set_nconf(&ctmp, conf); | 575 | CONF_set_nconf(&ctmp, conf); |
559 | return X509V3_EXT_CRL_add_nconf(&ctmp, ctx, section, crl); | 576 | return X509V3_EXT_CRL_add_nconf(&ctmp, ctx, section, crl); |
560 | } | 577 | } |
578 | LCRYPTO_ALIAS(X509V3_EXT_CRL_add_conf) | ||
561 | 579 | ||
562 | /* Add extensions to certificate request */ | 580 | /* Add extensions to certificate request */ |
563 | 581 | ||
@@ -570,3 +588,4 @@ X509V3_EXT_REQ_add_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, | |||
570 | CONF_set_nconf(&ctmp, conf); | 588 | CONF_set_nconf(&ctmp, conf); |
571 | return X509V3_EXT_REQ_add_nconf(&ctmp, ctx, section, req); | 589 | return X509V3_EXT_REQ_add_nconf(&ctmp, ctx, section, req); |
572 | } | 590 | } |
591 | LCRYPTO_ALIAS(X509V3_EXT_REQ_add_conf) | ||
diff --git a/src/lib/libcrypto/x509/x509_cpols.c b/src/lib/libcrypto/x509/x509_cpols.c index 93527a4366..8d50c0545a 100644 --- a/src/lib/libcrypto/x509/x509_cpols.c +++ b/src/lib/libcrypto/x509/x509_cpols.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_cpols.c,v 1.4 2022/01/14 08:16:13 tb Exp $ */ | 1 | /* $OpenBSD: x509_cpols.c,v 1.5 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -125,24 +125,28 @@ d2i_CERTIFICATEPOLICIES(CERTIFICATEPOLICIES **a, const unsigned char **in, long | |||
125 | return (CERTIFICATEPOLICIES *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 125 | return (CERTIFICATEPOLICIES *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
126 | &CERTIFICATEPOLICIES_it); | 126 | &CERTIFICATEPOLICIES_it); |
127 | } | 127 | } |
128 | LCRYPTO_ALIAS(d2i_CERTIFICATEPOLICIES) | ||
128 | 129 | ||
129 | int | 130 | int |
130 | i2d_CERTIFICATEPOLICIES(CERTIFICATEPOLICIES *a, unsigned char **out) | 131 | i2d_CERTIFICATEPOLICIES(CERTIFICATEPOLICIES *a, unsigned char **out) |
131 | { | 132 | { |
132 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &CERTIFICATEPOLICIES_it); | 133 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &CERTIFICATEPOLICIES_it); |
133 | } | 134 | } |
135 | LCRYPTO_ALIAS(i2d_CERTIFICATEPOLICIES) | ||
134 | 136 | ||
135 | CERTIFICATEPOLICIES * | 137 | CERTIFICATEPOLICIES * |
136 | CERTIFICATEPOLICIES_new(void) | 138 | CERTIFICATEPOLICIES_new(void) |
137 | { | 139 | { |
138 | return (CERTIFICATEPOLICIES *)ASN1_item_new(&CERTIFICATEPOLICIES_it); | 140 | return (CERTIFICATEPOLICIES *)ASN1_item_new(&CERTIFICATEPOLICIES_it); |
139 | } | 141 | } |
142 | LCRYPTO_ALIAS(CERTIFICATEPOLICIES_new) | ||
140 | 143 | ||
141 | void | 144 | void |
142 | CERTIFICATEPOLICIES_free(CERTIFICATEPOLICIES *a) | 145 | CERTIFICATEPOLICIES_free(CERTIFICATEPOLICIES *a) |
143 | { | 146 | { |
144 | ASN1_item_free((ASN1_VALUE *)a, &CERTIFICATEPOLICIES_it); | 147 | ASN1_item_free((ASN1_VALUE *)a, &CERTIFICATEPOLICIES_it); |
145 | } | 148 | } |
149 | LCRYPTO_ALIAS(CERTIFICATEPOLICIES_free) | ||
146 | 150 | ||
147 | static const ASN1_TEMPLATE POLICYINFO_seq_tt[] = { | 151 | static const ASN1_TEMPLATE POLICYINFO_seq_tt[] = { |
148 | { | 152 | { |
@@ -178,24 +182,28 @@ d2i_POLICYINFO(POLICYINFO **a, const unsigned char **in, long len) | |||
178 | return (POLICYINFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 182 | return (POLICYINFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
179 | &POLICYINFO_it); | 183 | &POLICYINFO_it); |
180 | } | 184 | } |
185 | LCRYPTO_ALIAS(d2i_POLICYINFO) | ||
181 | 186 | ||
182 | int | 187 | int |
183 | i2d_POLICYINFO(POLICYINFO *a, unsigned char **out) | 188 | i2d_POLICYINFO(POLICYINFO *a, unsigned char **out) |
184 | { | 189 | { |
185 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &POLICYINFO_it); | 190 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &POLICYINFO_it); |
186 | } | 191 | } |
192 | LCRYPTO_ALIAS(i2d_POLICYINFO) | ||
187 | 193 | ||
188 | POLICYINFO * | 194 | POLICYINFO * |
189 | POLICYINFO_new(void) | 195 | POLICYINFO_new(void) |
190 | { | 196 | { |
191 | return (POLICYINFO *)ASN1_item_new(&POLICYINFO_it); | 197 | return (POLICYINFO *)ASN1_item_new(&POLICYINFO_it); |
192 | } | 198 | } |
199 | LCRYPTO_ALIAS(POLICYINFO_new) | ||
193 | 200 | ||
194 | void | 201 | void |
195 | POLICYINFO_free(POLICYINFO *a) | 202 | POLICYINFO_free(POLICYINFO *a) |
196 | { | 203 | { |
197 | ASN1_item_free((ASN1_VALUE *)a, &POLICYINFO_it); | 204 | ASN1_item_free((ASN1_VALUE *)a, &POLICYINFO_it); |
198 | } | 205 | } |
206 | LCRYPTO_ALIAS(POLICYINFO_free) | ||
199 | 207 | ||
200 | static const ASN1_TEMPLATE policydefault_tt = { | 208 | static const ASN1_TEMPLATE policydefault_tt = { |
201 | .flags = 0, | 209 | .flags = 0, |
@@ -273,24 +281,28 @@ d2i_POLICYQUALINFO(POLICYQUALINFO **a, const unsigned char **in, long len) | |||
273 | return (POLICYQUALINFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 281 | return (POLICYQUALINFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
274 | &POLICYQUALINFO_it); | 282 | &POLICYQUALINFO_it); |
275 | } | 283 | } |
284 | LCRYPTO_ALIAS(d2i_POLICYQUALINFO) | ||
276 | 285 | ||
277 | int | 286 | int |
278 | i2d_POLICYQUALINFO(POLICYQUALINFO *a, unsigned char **out) | 287 | i2d_POLICYQUALINFO(POLICYQUALINFO *a, unsigned char **out) |
279 | { | 288 | { |
280 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &POLICYQUALINFO_it); | 289 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &POLICYQUALINFO_it); |
281 | } | 290 | } |
291 | LCRYPTO_ALIAS(i2d_POLICYQUALINFO) | ||
282 | 292 | ||
283 | POLICYQUALINFO * | 293 | POLICYQUALINFO * |
284 | POLICYQUALINFO_new(void) | 294 | POLICYQUALINFO_new(void) |
285 | { | 295 | { |
286 | return (POLICYQUALINFO *)ASN1_item_new(&POLICYQUALINFO_it); | 296 | return (POLICYQUALINFO *)ASN1_item_new(&POLICYQUALINFO_it); |
287 | } | 297 | } |
298 | LCRYPTO_ALIAS(POLICYQUALINFO_new) | ||
288 | 299 | ||
289 | void | 300 | void |
290 | POLICYQUALINFO_free(POLICYQUALINFO *a) | 301 | POLICYQUALINFO_free(POLICYQUALINFO *a) |
291 | { | 302 | { |
292 | ASN1_item_free((ASN1_VALUE *)a, &POLICYQUALINFO_it); | 303 | ASN1_item_free((ASN1_VALUE *)a, &POLICYQUALINFO_it); |
293 | } | 304 | } |
305 | LCRYPTO_ALIAS(POLICYQUALINFO_free) | ||
294 | 306 | ||
295 | static const ASN1_TEMPLATE USERNOTICE_seq_tt[] = { | 307 | static const ASN1_TEMPLATE USERNOTICE_seq_tt[] = { |
296 | { | 308 | { |
@@ -326,24 +338,28 @@ d2i_USERNOTICE(USERNOTICE **a, const unsigned char **in, long len) | |||
326 | return (USERNOTICE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 338 | return (USERNOTICE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
327 | &USERNOTICE_it); | 339 | &USERNOTICE_it); |
328 | } | 340 | } |
341 | LCRYPTO_ALIAS(d2i_USERNOTICE) | ||
329 | 342 | ||
330 | int | 343 | int |
331 | i2d_USERNOTICE(USERNOTICE *a, unsigned char **out) | 344 | i2d_USERNOTICE(USERNOTICE *a, unsigned char **out) |
332 | { | 345 | { |
333 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &USERNOTICE_it); | 346 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &USERNOTICE_it); |
334 | } | 347 | } |
348 | LCRYPTO_ALIAS(i2d_USERNOTICE) | ||
335 | 349 | ||
336 | USERNOTICE * | 350 | USERNOTICE * |
337 | USERNOTICE_new(void) | 351 | USERNOTICE_new(void) |
338 | { | 352 | { |
339 | return (USERNOTICE *)ASN1_item_new(&USERNOTICE_it); | 353 | return (USERNOTICE *)ASN1_item_new(&USERNOTICE_it); |
340 | } | 354 | } |
355 | LCRYPTO_ALIAS(USERNOTICE_new) | ||
341 | 356 | ||
342 | void | 357 | void |
343 | USERNOTICE_free(USERNOTICE *a) | 358 | USERNOTICE_free(USERNOTICE *a) |
344 | { | 359 | { |
345 | ASN1_item_free((ASN1_VALUE *)a, &USERNOTICE_it); | 360 | ASN1_item_free((ASN1_VALUE *)a, &USERNOTICE_it); |
346 | } | 361 | } |
362 | LCRYPTO_ALIAS(USERNOTICE_free) | ||
347 | 363 | ||
348 | static const ASN1_TEMPLATE NOTICEREF_seq_tt[] = { | 364 | static const ASN1_TEMPLATE NOTICEREF_seq_tt[] = { |
349 | { | 365 | { |
@@ -379,24 +395,28 @@ d2i_NOTICEREF(NOTICEREF **a, const unsigned char **in, long len) | |||
379 | return (NOTICEREF *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 395 | return (NOTICEREF *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
380 | &NOTICEREF_it); | 396 | &NOTICEREF_it); |
381 | } | 397 | } |
398 | LCRYPTO_ALIAS(d2i_NOTICEREF) | ||
382 | 399 | ||
383 | int | 400 | int |
384 | i2d_NOTICEREF(NOTICEREF *a, unsigned char **out) | 401 | i2d_NOTICEREF(NOTICEREF *a, unsigned char **out) |
385 | { | 402 | { |
386 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &NOTICEREF_it); | 403 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &NOTICEREF_it); |
387 | } | 404 | } |
405 | LCRYPTO_ALIAS(i2d_NOTICEREF) | ||
388 | 406 | ||
389 | NOTICEREF * | 407 | NOTICEREF * |
390 | NOTICEREF_new(void) | 408 | NOTICEREF_new(void) |
391 | { | 409 | { |
392 | return (NOTICEREF *)ASN1_item_new(&NOTICEREF_it); | 410 | return (NOTICEREF *)ASN1_item_new(&NOTICEREF_it); |
393 | } | 411 | } |
412 | LCRYPTO_ALIAS(NOTICEREF_new) | ||
394 | 413 | ||
395 | void | 414 | void |
396 | NOTICEREF_free(NOTICEREF *a) | 415 | NOTICEREF_free(NOTICEREF *a) |
397 | { | 416 | { |
398 | ASN1_item_free((ASN1_VALUE *)a, &NOTICEREF_it); | 417 | ASN1_item_free((ASN1_VALUE *)a, &NOTICEREF_it); |
399 | } | 418 | } |
419 | LCRYPTO_ALIAS(NOTICEREF_free) | ||
400 | 420 | ||
401 | static STACK_OF(POLICYINFO) * | 421 | static STACK_OF(POLICYINFO) * |
402 | r2i_certpol(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *value) | 422 | r2i_certpol(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *value) |
@@ -762,3 +782,4 @@ X509_POLICY_NODE_print(BIO *out, X509_POLICY_NODE *node, int indent) | |||
762 | else | 782 | else |
763 | BIO_printf(out, "%*sNo Qualifiers\n", indent + 2, ""); | 783 | BIO_printf(out, "%*sNo Qualifiers\n", indent + 2, ""); |
764 | } | 784 | } |
785 | LCRYPTO_ALIAS(X509_POLICY_NODE_print) | ||
diff --git a/src/lib/libcrypto/x509/x509_crld.c b/src/lib/libcrypto/x509/x509_crld.c index 6b6f795378..43150b21a9 100644 --- a/src/lib/libcrypto/x509/x509_crld.c +++ b/src/lib/libcrypto/x509/x509_crld.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_crld.c,v 1.2 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: x509_crld.c,v 1.3 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -426,24 +426,28 @@ d2i_DIST_POINT_NAME(DIST_POINT_NAME **a, const unsigned char **in, long len) | |||
426 | return (DIST_POINT_NAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 426 | return (DIST_POINT_NAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
427 | &DIST_POINT_NAME_it); | 427 | &DIST_POINT_NAME_it); |
428 | } | 428 | } |
429 | LCRYPTO_ALIAS(d2i_DIST_POINT_NAME) | ||
429 | 430 | ||
430 | int | 431 | int |
431 | i2d_DIST_POINT_NAME(DIST_POINT_NAME *a, unsigned char **out) | 432 | i2d_DIST_POINT_NAME(DIST_POINT_NAME *a, unsigned char **out) |
432 | { | 433 | { |
433 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &DIST_POINT_NAME_it); | 434 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &DIST_POINT_NAME_it); |
434 | } | 435 | } |
436 | LCRYPTO_ALIAS(i2d_DIST_POINT_NAME) | ||
435 | 437 | ||
436 | DIST_POINT_NAME * | 438 | DIST_POINT_NAME * |
437 | DIST_POINT_NAME_new(void) | 439 | DIST_POINT_NAME_new(void) |
438 | { | 440 | { |
439 | return (DIST_POINT_NAME *)ASN1_item_new(&DIST_POINT_NAME_it); | 441 | return (DIST_POINT_NAME *)ASN1_item_new(&DIST_POINT_NAME_it); |
440 | } | 442 | } |
443 | LCRYPTO_ALIAS(DIST_POINT_NAME_new) | ||
441 | 444 | ||
442 | void | 445 | void |
443 | DIST_POINT_NAME_free(DIST_POINT_NAME *a) | 446 | DIST_POINT_NAME_free(DIST_POINT_NAME *a) |
444 | { | 447 | { |
445 | ASN1_item_free((ASN1_VALUE *)a, &DIST_POINT_NAME_it); | 448 | ASN1_item_free((ASN1_VALUE *)a, &DIST_POINT_NAME_it); |
446 | } | 449 | } |
450 | LCRYPTO_ALIAS(DIST_POINT_NAME_free) | ||
447 | 451 | ||
448 | static const ASN1_TEMPLATE DIST_POINT_seq_tt[] = { | 452 | static const ASN1_TEMPLATE DIST_POINT_seq_tt[] = { |
449 | { | 453 | { |
@@ -486,24 +490,28 @@ d2i_DIST_POINT(DIST_POINT **a, const unsigned char **in, long len) | |||
486 | return (DIST_POINT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 490 | return (DIST_POINT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
487 | &DIST_POINT_it); | 491 | &DIST_POINT_it); |
488 | } | 492 | } |
493 | LCRYPTO_ALIAS(d2i_DIST_POINT) | ||
489 | 494 | ||
490 | int | 495 | int |
491 | i2d_DIST_POINT(DIST_POINT *a, unsigned char **out) | 496 | i2d_DIST_POINT(DIST_POINT *a, unsigned char **out) |
492 | { | 497 | { |
493 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &DIST_POINT_it); | 498 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &DIST_POINT_it); |
494 | } | 499 | } |
500 | LCRYPTO_ALIAS(i2d_DIST_POINT) | ||
495 | 501 | ||
496 | DIST_POINT * | 502 | DIST_POINT * |
497 | DIST_POINT_new(void) | 503 | DIST_POINT_new(void) |
498 | { | 504 | { |
499 | return (DIST_POINT *)ASN1_item_new(&DIST_POINT_it); | 505 | return (DIST_POINT *)ASN1_item_new(&DIST_POINT_it); |
500 | } | 506 | } |
507 | LCRYPTO_ALIAS(DIST_POINT_new) | ||
501 | 508 | ||
502 | void | 509 | void |
503 | DIST_POINT_free(DIST_POINT *a) | 510 | DIST_POINT_free(DIST_POINT *a) |
504 | { | 511 | { |
505 | ASN1_item_free((ASN1_VALUE *)a, &DIST_POINT_it); | 512 | ASN1_item_free((ASN1_VALUE *)a, &DIST_POINT_it); |
506 | } | 513 | } |
514 | LCRYPTO_ALIAS(DIST_POINT_free) | ||
507 | 515 | ||
508 | static const ASN1_TEMPLATE CRL_DIST_POINTS_item_tt = { | 516 | static const ASN1_TEMPLATE CRL_DIST_POINTS_item_tt = { |
509 | .flags = ASN1_TFLG_SEQUENCE_OF, | 517 | .flags = ASN1_TFLG_SEQUENCE_OF, |
@@ -530,24 +538,28 @@ d2i_CRL_DIST_POINTS(CRL_DIST_POINTS **a, const unsigned char **in, long len) | |||
530 | return (CRL_DIST_POINTS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 538 | return (CRL_DIST_POINTS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
531 | &CRL_DIST_POINTS_it); | 539 | &CRL_DIST_POINTS_it); |
532 | } | 540 | } |
541 | LCRYPTO_ALIAS(d2i_CRL_DIST_POINTS) | ||
533 | 542 | ||
534 | int | 543 | int |
535 | i2d_CRL_DIST_POINTS(CRL_DIST_POINTS *a, unsigned char **out) | 544 | i2d_CRL_DIST_POINTS(CRL_DIST_POINTS *a, unsigned char **out) |
536 | { | 545 | { |
537 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &CRL_DIST_POINTS_it); | 546 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &CRL_DIST_POINTS_it); |
538 | } | 547 | } |
548 | LCRYPTO_ALIAS(i2d_CRL_DIST_POINTS) | ||
539 | 549 | ||
540 | CRL_DIST_POINTS * | 550 | CRL_DIST_POINTS * |
541 | CRL_DIST_POINTS_new(void) | 551 | CRL_DIST_POINTS_new(void) |
542 | { | 552 | { |
543 | return (CRL_DIST_POINTS *)ASN1_item_new(&CRL_DIST_POINTS_it); | 553 | return (CRL_DIST_POINTS *)ASN1_item_new(&CRL_DIST_POINTS_it); |
544 | } | 554 | } |
555 | LCRYPTO_ALIAS(CRL_DIST_POINTS_new) | ||
545 | 556 | ||
546 | void | 557 | void |
547 | CRL_DIST_POINTS_free(CRL_DIST_POINTS *a) | 558 | CRL_DIST_POINTS_free(CRL_DIST_POINTS *a) |
548 | { | 559 | { |
549 | ASN1_item_free((ASN1_VALUE *)a, &CRL_DIST_POINTS_it); | 560 | ASN1_item_free((ASN1_VALUE *)a, &CRL_DIST_POINTS_it); |
550 | } | 561 | } |
562 | LCRYPTO_ALIAS(CRL_DIST_POINTS_free) | ||
551 | 563 | ||
552 | static const ASN1_TEMPLATE ISSUING_DIST_POINT_seq_tt[] = { | 564 | static const ASN1_TEMPLATE ISSUING_DIST_POINT_seq_tt[] = { |
553 | { | 565 | { |
@@ -611,24 +623,28 @@ d2i_ISSUING_DIST_POINT(ISSUING_DIST_POINT **a, const unsigned char **in, long le | |||
611 | return (ISSUING_DIST_POINT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 623 | return (ISSUING_DIST_POINT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
612 | &ISSUING_DIST_POINT_it); | 624 | &ISSUING_DIST_POINT_it); |
613 | } | 625 | } |
626 | LCRYPTO_ALIAS(d2i_ISSUING_DIST_POINT) | ||
614 | 627 | ||
615 | int | 628 | int |
616 | i2d_ISSUING_DIST_POINT(ISSUING_DIST_POINT *a, unsigned char **out) | 629 | i2d_ISSUING_DIST_POINT(ISSUING_DIST_POINT *a, unsigned char **out) |
617 | { | 630 | { |
618 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ISSUING_DIST_POINT_it); | 631 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ISSUING_DIST_POINT_it); |
619 | } | 632 | } |
633 | LCRYPTO_ALIAS(i2d_ISSUING_DIST_POINT) | ||
620 | 634 | ||
621 | ISSUING_DIST_POINT * | 635 | ISSUING_DIST_POINT * |
622 | ISSUING_DIST_POINT_new(void) | 636 | ISSUING_DIST_POINT_new(void) |
623 | { | 637 | { |
624 | return (ISSUING_DIST_POINT *)ASN1_item_new(&ISSUING_DIST_POINT_it); | 638 | return (ISSUING_DIST_POINT *)ASN1_item_new(&ISSUING_DIST_POINT_it); |
625 | } | 639 | } |
640 | LCRYPTO_ALIAS(ISSUING_DIST_POINT_new) | ||
626 | 641 | ||
627 | void | 642 | void |
628 | ISSUING_DIST_POINT_free(ISSUING_DIST_POINT *a) | 643 | ISSUING_DIST_POINT_free(ISSUING_DIST_POINT *a) |
629 | { | 644 | { |
630 | ASN1_item_free((ASN1_VALUE *)a, &ISSUING_DIST_POINT_it); | 645 | ASN1_item_free((ASN1_VALUE *)a, &ISSUING_DIST_POINT_it); |
631 | } | 646 | } |
647 | LCRYPTO_ALIAS(ISSUING_DIST_POINT_free) | ||
632 | 648 | ||
633 | static int i2r_idp(const X509V3_EXT_METHOD *method, void *pidp, BIO *out, | 649 | static int i2r_idp(const X509V3_EXT_METHOD *method, void *pidp, BIO *out, |
634 | int indent); | 650 | int indent); |
@@ -809,3 +825,4 @@ DIST_POINT_set_dpname(DIST_POINT_NAME *dpn, X509_NAME *iname) | |||
809 | } | 825 | } |
810 | return 1; | 826 | return 1; |
811 | } | 827 | } |
828 | LCRYPTO_ALIAS(DIST_POINT_set_dpname) | ||
diff --git a/src/lib/libcrypto/x509/x509_d2.c b/src/lib/libcrypto/x509/x509_d2.c index 5b0f80adda..522062a694 100644 --- a/src/lib/libcrypto/x509/x509_d2.c +++ b/src/lib/libcrypto/x509/x509_d2.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_d2.c,v 1.10 2015/01/22 09:06:39 reyk Exp $ */ | 1 | /* $OpenBSD: x509_d2.c,v 1.11 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -83,6 +83,7 @@ X509_STORE_set_default_paths(X509_STORE *ctx) | |||
83 | 83 | ||
84 | return (1); | 84 | return (1); |
85 | } | 85 | } |
86 | LCRYPTO_ALIAS(X509_STORE_set_default_paths) | ||
86 | 87 | ||
87 | int | 88 | int |
88 | X509_STORE_load_locations(X509_STORE *ctx, const char *file, const char *path) | 89 | X509_STORE_load_locations(X509_STORE *ctx, const char *file, const char *path) |
@@ -107,6 +108,7 @@ X509_STORE_load_locations(X509_STORE *ctx, const char *file, const char *path) | |||
107 | return (0); | 108 | return (0); |
108 | return (1); | 109 | return (1); |
109 | } | 110 | } |
111 | LCRYPTO_ALIAS(X509_STORE_load_locations) | ||
110 | 112 | ||
111 | int | 113 | int |
112 | X509_STORE_load_mem(X509_STORE *ctx, void *buf, int len) | 114 | X509_STORE_load_mem(X509_STORE *ctx, void *buf, int len) |
@@ -126,3 +128,4 @@ X509_STORE_load_mem(X509_STORE *ctx, void *buf, int len) | |||
126 | 128 | ||
127 | return (1); | 129 | return (1); |
128 | } | 130 | } |
131 | LCRYPTO_ALIAS(X509_STORE_load_mem) | ||
diff --git a/src/lib/libcrypto/x509/x509_def.c b/src/lib/libcrypto/x509/x509_def.c index 5e570eb9a2..0d8900a526 100644 --- a/src/lib/libcrypto/x509/x509_def.c +++ b/src/lib/libcrypto/x509/x509_def.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_def.c,v 1.5 2014/06/12 15:49:31 deraadt Exp $ */ | 1 | /* $OpenBSD: x509_def.c,v 1.6 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -66,33 +66,39 @@ X509_get_default_private_dir(void) | |||
66 | { | 66 | { |
67 | return (X509_PRIVATE_DIR); | 67 | return (X509_PRIVATE_DIR); |
68 | } | 68 | } |
69 | LCRYPTO_ALIAS(X509_get_default_private_dir) | ||
69 | 70 | ||
70 | const char * | 71 | const char * |
71 | X509_get_default_cert_area(void) | 72 | X509_get_default_cert_area(void) |
72 | { | 73 | { |
73 | return (X509_CERT_AREA); | 74 | return (X509_CERT_AREA); |
74 | } | 75 | } |
76 | LCRYPTO_ALIAS(X509_get_default_cert_area) | ||
75 | 77 | ||
76 | const char * | 78 | const char * |
77 | X509_get_default_cert_dir(void) | 79 | X509_get_default_cert_dir(void) |
78 | { | 80 | { |
79 | return (X509_CERT_DIR); | 81 | return (X509_CERT_DIR); |
80 | } | 82 | } |
83 | LCRYPTO_ALIAS(X509_get_default_cert_dir) | ||
81 | 84 | ||
82 | const char * | 85 | const char * |
83 | X509_get_default_cert_file(void) | 86 | X509_get_default_cert_file(void) |
84 | { | 87 | { |
85 | return (X509_CERT_FILE); | 88 | return (X509_CERT_FILE); |
86 | } | 89 | } |
90 | LCRYPTO_ALIAS(X509_get_default_cert_file) | ||
87 | 91 | ||
88 | const char * | 92 | const char * |
89 | X509_get_default_cert_dir_env(void) | 93 | X509_get_default_cert_dir_env(void) |
90 | { | 94 | { |
91 | return (X509_CERT_DIR_EVP); | 95 | return (X509_CERT_DIR_EVP); |
92 | } | 96 | } |
97 | LCRYPTO_ALIAS(X509_get_default_cert_dir_env) | ||
93 | 98 | ||
94 | const char * | 99 | const char * |
95 | X509_get_default_cert_file_env(void) | 100 | X509_get_default_cert_file_env(void) |
96 | { | 101 | { |
97 | return (X509_CERT_FILE_EVP); | 102 | return (X509_CERT_FILE_EVP); |
98 | } | 103 | } |
104 | LCRYPTO_ALIAS(X509_get_default_cert_file_env) | ||
diff --git a/src/lib/libcrypto/x509/x509_enum.c b/src/lib/libcrypto/x509/x509_enum.c index f18eea535f..f0ab60a4b0 100644 --- a/src/lib/libcrypto/x509/x509_enum.c +++ b/src/lib/libcrypto/x509/x509_enum.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_enum.c,v 1.1 2020/06/04 15:19:31 jsing Exp $ */ | 1 | /* $OpenBSD: x509_enum.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -105,3 +105,4 @@ i2s_ASN1_ENUMERATED_TABLE(X509V3_EXT_METHOD *method, const ASN1_ENUMERATED *e) | |||
105 | } | 105 | } |
106 | return i2s_ASN1_ENUMERATED(method, e); | 106 | return i2s_ASN1_ENUMERATED(method, e); |
107 | } | 107 | } |
108 | LCRYPTO_ALIAS(i2s_ASN1_ENUMERATED_TABLE) | ||
diff --git a/src/lib/libcrypto/x509/x509_err.c b/src/lib/libcrypto/x509/x509_err.c index 588ed85411..c83655046a 100644 --- a/src/lib/libcrypto/x509/x509_err.c +++ b/src/lib/libcrypto/x509/x509_err.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_err.c,v 1.17 2022/07/12 14:42:50 kn Exp $ */ | 1 | /* $OpenBSD: x509_err.c,v 1.18 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2006 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2006 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -191,6 +191,7 @@ ERR_load_X509_strings(void) | |||
191 | } | 191 | } |
192 | #endif | 192 | #endif |
193 | } | 193 | } |
194 | LCRYPTO_ALIAS(ERR_load_X509_strings) | ||
194 | 195 | ||
195 | 196 | ||
196 | void | 197 | void |
@@ -203,3 +204,4 @@ ERR_load_X509V3_strings(void) | |||
203 | } | 204 | } |
204 | #endif | 205 | #endif |
205 | } | 206 | } |
207 | LCRYPTO_ALIAS(ERR_load_X509V3_strings) | ||
diff --git a/src/lib/libcrypto/x509/x509_ext.c b/src/lib/libcrypto/x509/x509_ext.c index 1445951199..95679265c3 100644 --- a/src/lib/libcrypto/x509/x509_ext.c +++ b/src/lib/libcrypto/x509/x509_ext.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_ext.c,v 1.13 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: x509_ext.c,v 1.14 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -72,42 +72,49 @@ X509_CRL_get_ext_count(const X509_CRL *x) | |||
72 | { | 72 | { |
73 | return (X509v3_get_ext_count(x->crl->extensions)); | 73 | return (X509v3_get_ext_count(x->crl->extensions)); |
74 | } | 74 | } |
75 | LCRYPTO_ALIAS(X509_CRL_get_ext_count) | ||
75 | 76 | ||
76 | int | 77 | int |
77 | X509_CRL_get_ext_by_NID(const X509_CRL *x, int nid, int lastpos) | 78 | X509_CRL_get_ext_by_NID(const X509_CRL *x, int nid, int lastpos) |
78 | { | 79 | { |
79 | return (X509v3_get_ext_by_NID(x->crl->extensions, nid, lastpos)); | 80 | return (X509v3_get_ext_by_NID(x->crl->extensions, nid, lastpos)); |
80 | } | 81 | } |
82 | LCRYPTO_ALIAS(X509_CRL_get_ext_by_NID) | ||
81 | 83 | ||
82 | int | 84 | int |
83 | X509_CRL_get_ext_by_OBJ(const X509_CRL *x, const ASN1_OBJECT *obj, int lastpos) | 85 | X509_CRL_get_ext_by_OBJ(const X509_CRL *x, const ASN1_OBJECT *obj, int lastpos) |
84 | { | 86 | { |
85 | return (X509v3_get_ext_by_OBJ(x->crl->extensions, obj, lastpos)); | 87 | return (X509v3_get_ext_by_OBJ(x->crl->extensions, obj, lastpos)); |
86 | } | 88 | } |
89 | LCRYPTO_ALIAS(X509_CRL_get_ext_by_OBJ) | ||
87 | 90 | ||
88 | int | 91 | int |
89 | X509_CRL_get_ext_by_critical(const X509_CRL *x, int crit, int lastpos) | 92 | X509_CRL_get_ext_by_critical(const X509_CRL *x, int crit, int lastpos) |
90 | { | 93 | { |
91 | return (X509v3_get_ext_by_critical(x->crl->extensions, crit, lastpos)); | 94 | return (X509v3_get_ext_by_critical(x->crl->extensions, crit, lastpos)); |
92 | } | 95 | } |
96 | LCRYPTO_ALIAS(X509_CRL_get_ext_by_critical) | ||
93 | 97 | ||
94 | X509_EXTENSION * | 98 | X509_EXTENSION * |
95 | X509_CRL_get_ext(const X509_CRL *x, int loc) | 99 | X509_CRL_get_ext(const X509_CRL *x, int loc) |
96 | { | 100 | { |
97 | return (X509v3_get_ext(x->crl->extensions, loc)); | 101 | return (X509v3_get_ext(x->crl->extensions, loc)); |
98 | } | 102 | } |
103 | LCRYPTO_ALIAS(X509_CRL_get_ext) | ||
99 | 104 | ||
100 | X509_EXTENSION * | 105 | X509_EXTENSION * |
101 | X509_CRL_delete_ext(X509_CRL *x, int loc) | 106 | X509_CRL_delete_ext(X509_CRL *x, int loc) |
102 | { | 107 | { |
103 | return (X509v3_delete_ext(x->crl->extensions, loc)); | 108 | return (X509v3_delete_ext(x->crl->extensions, loc)); |
104 | } | 109 | } |
110 | LCRYPTO_ALIAS(X509_CRL_delete_ext) | ||
105 | 111 | ||
106 | void * | 112 | void * |
107 | X509_CRL_get_ext_d2i(const X509_CRL *x, int nid, int *crit, int *idx) | 113 | X509_CRL_get_ext_d2i(const X509_CRL *x, int nid, int *crit, int *idx) |
108 | { | 114 | { |
109 | return X509V3_get_d2i(x->crl->extensions, nid, crit, idx); | 115 | return X509V3_get_d2i(x->crl->extensions, nid, crit, idx); |
110 | } | 116 | } |
117 | LCRYPTO_ALIAS(X509_CRL_get_ext_d2i) | ||
111 | 118 | ||
112 | int | 119 | int |
113 | X509_CRL_add1_ext_i2d(X509_CRL *x, int nid, void *value, int crit, | 120 | X509_CRL_add1_ext_i2d(X509_CRL *x, int nid, void *value, int crit, |
@@ -115,30 +122,35 @@ X509_CRL_add1_ext_i2d(X509_CRL *x, int nid, void *value, int crit, | |||
115 | { | 122 | { |
116 | return X509V3_add1_i2d(&x->crl->extensions, nid, value, crit, flags); | 123 | return X509V3_add1_i2d(&x->crl->extensions, nid, value, crit, flags); |
117 | } | 124 | } |
125 | LCRYPTO_ALIAS(X509_CRL_add1_ext_i2d) | ||
118 | 126 | ||
119 | int | 127 | int |
120 | X509_CRL_add_ext(X509_CRL *x, X509_EXTENSION *ex, int loc) | 128 | X509_CRL_add_ext(X509_CRL *x, X509_EXTENSION *ex, int loc) |
121 | { | 129 | { |
122 | return (X509v3_add_ext(&(x->crl->extensions), ex, loc) != NULL); | 130 | return (X509v3_add_ext(&(x->crl->extensions), ex, loc) != NULL); |
123 | } | 131 | } |
132 | LCRYPTO_ALIAS(X509_CRL_add_ext) | ||
124 | 133 | ||
125 | int | 134 | int |
126 | X509_get_ext_count(const X509 *x) | 135 | X509_get_ext_count(const X509 *x) |
127 | { | 136 | { |
128 | return (X509v3_get_ext_count(x->cert_info->extensions)); | 137 | return (X509v3_get_ext_count(x->cert_info->extensions)); |
129 | } | 138 | } |
139 | LCRYPTO_ALIAS(X509_get_ext_count) | ||
130 | 140 | ||
131 | int | 141 | int |
132 | X509_get_ext_by_NID(const X509 *x, int nid, int lastpos) | 142 | X509_get_ext_by_NID(const X509 *x, int nid, int lastpos) |
133 | { | 143 | { |
134 | return (X509v3_get_ext_by_NID(x->cert_info->extensions, nid, lastpos)); | 144 | return (X509v3_get_ext_by_NID(x->cert_info->extensions, nid, lastpos)); |
135 | } | 145 | } |
146 | LCRYPTO_ALIAS(X509_get_ext_by_NID) | ||
136 | 147 | ||
137 | int | 148 | int |
138 | X509_get_ext_by_OBJ(const X509 *x, const ASN1_OBJECT *obj, int lastpos) | 149 | X509_get_ext_by_OBJ(const X509 *x, const ASN1_OBJECT *obj, int lastpos) |
139 | { | 150 | { |
140 | return (X509v3_get_ext_by_OBJ(x->cert_info->extensions, obj, lastpos)); | 151 | return (X509v3_get_ext_by_OBJ(x->cert_info->extensions, obj, lastpos)); |
141 | } | 152 | } |
153 | LCRYPTO_ALIAS(X509_get_ext_by_OBJ) | ||
142 | 154 | ||
143 | int | 155 | int |
144 | X509_get_ext_by_critical(const X509 *x, int crit, int lastpos) | 156 | X509_get_ext_by_critical(const X509 *x, int crit, int lastpos) |
@@ -146,30 +158,35 @@ X509_get_ext_by_critical(const X509 *x, int crit, int lastpos) | |||
146 | return (X509v3_get_ext_by_critical(x->cert_info->extensions, crit, | 158 | return (X509v3_get_ext_by_critical(x->cert_info->extensions, crit, |
147 | lastpos)); | 159 | lastpos)); |
148 | } | 160 | } |
161 | LCRYPTO_ALIAS(X509_get_ext_by_critical) | ||
149 | 162 | ||
150 | X509_EXTENSION * | 163 | X509_EXTENSION * |
151 | X509_get_ext(const X509 *x, int loc) | 164 | X509_get_ext(const X509 *x, int loc) |
152 | { | 165 | { |
153 | return (X509v3_get_ext(x->cert_info->extensions, loc)); | 166 | return (X509v3_get_ext(x->cert_info->extensions, loc)); |
154 | } | 167 | } |
168 | LCRYPTO_ALIAS(X509_get_ext) | ||
155 | 169 | ||
156 | X509_EXTENSION * | 170 | X509_EXTENSION * |
157 | X509_delete_ext(X509 *x, int loc) | 171 | X509_delete_ext(X509 *x, int loc) |
158 | { | 172 | { |
159 | return (X509v3_delete_ext(x->cert_info->extensions, loc)); | 173 | return (X509v3_delete_ext(x->cert_info->extensions, loc)); |
160 | } | 174 | } |
175 | LCRYPTO_ALIAS(X509_delete_ext) | ||
161 | 176 | ||
162 | int | 177 | int |
163 | X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc) | 178 | X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc) |
164 | { | 179 | { |
165 | return (X509v3_add_ext(&(x->cert_info->extensions), ex, loc) != NULL); | 180 | return (X509v3_add_ext(&(x->cert_info->extensions), ex, loc) != NULL); |
166 | } | 181 | } |
182 | LCRYPTO_ALIAS(X509_add_ext) | ||
167 | 183 | ||
168 | void * | 184 | void * |
169 | X509_get_ext_d2i(const X509 *x, int nid, int *crit, int *idx) | 185 | X509_get_ext_d2i(const X509 *x, int nid, int *crit, int *idx) |
170 | { | 186 | { |
171 | return X509V3_get_d2i(x->cert_info->extensions, nid, crit, idx); | 187 | return X509V3_get_d2i(x->cert_info->extensions, nid, crit, idx); |
172 | } | 188 | } |
189 | LCRYPTO_ALIAS(X509_get_ext_d2i) | ||
173 | 190 | ||
174 | int | 191 | int |
175 | X509_add1_ext_i2d(X509 *x, int nid, void *value, int crit, unsigned long flags) | 192 | X509_add1_ext_i2d(X509 *x, int nid, void *value, int crit, unsigned long flags) |
@@ -177,18 +194,21 @@ X509_add1_ext_i2d(X509 *x, int nid, void *value, int crit, unsigned long flags) | |||
177 | return X509V3_add1_i2d(&x->cert_info->extensions, nid, value, crit, | 194 | return X509V3_add1_i2d(&x->cert_info->extensions, nid, value, crit, |
178 | flags); | 195 | flags); |
179 | } | 196 | } |
197 | LCRYPTO_ALIAS(X509_add1_ext_i2d) | ||
180 | 198 | ||
181 | int | 199 | int |
182 | X509_REVOKED_get_ext_count(const X509_REVOKED *x) | 200 | X509_REVOKED_get_ext_count(const X509_REVOKED *x) |
183 | { | 201 | { |
184 | return (X509v3_get_ext_count(x->extensions)); | 202 | return (X509v3_get_ext_count(x->extensions)); |
185 | } | 203 | } |
204 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_count) | ||
186 | 205 | ||
187 | int | 206 | int |
188 | X509_REVOKED_get_ext_by_NID(const X509_REVOKED *x, int nid, int lastpos) | 207 | X509_REVOKED_get_ext_by_NID(const X509_REVOKED *x, int nid, int lastpos) |
189 | { | 208 | { |
190 | return (X509v3_get_ext_by_NID(x->extensions, nid, lastpos)); | 209 | return (X509v3_get_ext_by_NID(x->extensions, nid, lastpos)); |
191 | } | 210 | } |
211 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_by_NID) | ||
192 | 212 | ||
193 | int | 213 | int |
194 | X509_REVOKED_get_ext_by_OBJ(const X509_REVOKED *x, const ASN1_OBJECT *obj, | 214 | X509_REVOKED_get_ext_by_OBJ(const X509_REVOKED *x, const ASN1_OBJECT *obj, |
@@ -196,36 +216,42 @@ X509_REVOKED_get_ext_by_OBJ(const X509_REVOKED *x, const ASN1_OBJECT *obj, | |||
196 | { | 216 | { |
197 | return (X509v3_get_ext_by_OBJ(x->extensions, obj, lastpos)); | 217 | return (X509v3_get_ext_by_OBJ(x->extensions, obj, lastpos)); |
198 | } | 218 | } |
219 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_by_OBJ) | ||
199 | 220 | ||
200 | int | 221 | int |
201 | X509_REVOKED_get_ext_by_critical(const X509_REVOKED *x, int crit, int lastpos) | 222 | X509_REVOKED_get_ext_by_critical(const X509_REVOKED *x, int crit, int lastpos) |
202 | { | 223 | { |
203 | return (X509v3_get_ext_by_critical(x->extensions, crit, lastpos)); | 224 | return (X509v3_get_ext_by_critical(x->extensions, crit, lastpos)); |
204 | } | 225 | } |
226 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_by_critical) | ||
205 | 227 | ||
206 | X509_EXTENSION * | 228 | X509_EXTENSION * |
207 | X509_REVOKED_get_ext(const X509_REVOKED *x, int loc) | 229 | X509_REVOKED_get_ext(const X509_REVOKED *x, int loc) |
208 | { | 230 | { |
209 | return (X509v3_get_ext(x->extensions, loc)); | 231 | return (X509v3_get_ext(x->extensions, loc)); |
210 | } | 232 | } |
233 | LCRYPTO_ALIAS(X509_REVOKED_get_ext) | ||
211 | 234 | ||
212 | X509_EXTENSION * | 235 | X509_EXTENSION * |
213 | X509_REVOKED_delete_ext(X509_REVOKED *x, int loc) | 236 | X509_REVOKED_delete_ext(X509_REVOKED *x, int loc) |
214 | { | 237 | { |
215 | return (X509v3_delete_ext(x->extensions, loc)); | 238 | return (X509v3_delete_ext(x->extensions, loc)); |
216 | } | 239 | } |
240 | LCRYPTO_ALIAS(X509_REVOKED_delete_ext) | ||
217 | 241 | ||
218 | int | 242 | int |
219 | X509_REVOKED_add_ext(X509_REVOKED *x, X509_EXTENSION *ex, int loc) | 243 | X509_REVOKED_add_ext(X509_REVOKED *x, X509_EXTENSION *ex, int loc) |
220 | { | 244 | { |
221 | return (X509v3_add_ext(&(x->extensions), ex, loc) != NULL); | 245 | return (X509v3_add_ext(&(x->extensions), ex, loc) != NULL); |
222 | } | 246 | } |
247 | LCRYPTO_ALIAS(X509_REVOKED_add_ext) | ||
223 | 248 | ||
224 | void * | 249 | void * |
225 | X509_REVOKED_get_ext_d2i(const X509_REVOKED *x, int nid, int *crit, int *idx) | 250 | X509_REVOKED_get_ext_d2i(const X509_REVOKED *x, int nid, int *crit, int *idx) |
226 | { | 251 | { |
227 | return X509V3_get_d2i(x->extensions, nid, crit, idx); | 252 | return X509V3_get_d2i(x->extensions, nid, crit, idx); |
228 | } | 253 | } |
254 | LCRYPTO_ALIAS(X509_REVOKED_get_ext_d2i) | ||
229 | 255 | ||
230 | int | 256 | int |
231 | X509_REVOKED_add1_ext_i2d(X509_REVOKED *x, int nid, void *value, int crit, | 257 | X509_REVOKED_add1_ext_i2d(X509_REVOKED *x, int nid, void *value, int crit, |
@@ -233,3 +259,4 @@ X509_REVOKED_add1_ext_i2d(X509_REVOKED *x, int nid, void *value, int crit, | |||
233 | { | 259 | { |
234 | return X509V3_add1_i2d(&x->extensions, nid, value, crit, flags); | 260 | return X509V3_add1_i2d(&x->extensions, nid, value, crit, flags); |
235 | } | 261 | } |
262 | LCRYPTO_ALIAS(X509_REVOKED_add1_ext_i2d) | ||
diff --git a/src/lib/libcrypto/x509/x509_extku.c b/src/lib/libcrypto/x509/x509_extku.c index 09bec675ac..cfdb23df75 100644 --- a/src/lib/libcrypto/x509/x509_extku.c +++ b/src/lib/libcrypto/x509/x509_extku.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_extku.c,v 1.1 2020/06/04 15:19:31 jsing Exp $ */ | 1 | /* $OpenBSD: x509_extku.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -128,24 +128,28 @@ d2i_EXTENDED_KEY_USAGE(EXTENDED_KEY_USAGE **a, const unsigned char **in, long le | |||
128 | return (EXTENDED_KEY_USAGE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 128 | return (EXTENDED_KEY_USAGE *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
129 | &EXTENDED_KEY_USAGE_it); | 129 | &EXTENDED_KEY_USAGE_it); |
130 | } | 130 | } |
131 | LCRYPTO_ALIAS(d2i_EXTENDED_KEY_USAGE) | ||
131 | 132 | ||
132 | int | 133 | int |
133 | i2d_EXTENDED_KEY_USAGE(EXTENDED_KEY_USAGE *a, unsigned char **out) | 134 | i2d_EXTENDED_KEY_USAGE(EXTENDED_KEY_USAGE *a, unsigned char **out) |
134 | { | 135 | { |
135 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &EXTENDED_KEY_USAGE_it); | 136 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &EXTENDED_KEY_USAGE_it); |
136 | } | 137 | } |
138 | LCRYPTO_ALIAS(i2d_EXTENDED_KEY_USAGE) | ||
137 | 139 | ||
138 | EXTENDED_KEY_USAGE * | 140 | EXTENDED_KEY_USAGE * |
139 | EXTENDED_KEY_USAGE_new(void) | 141 | EXTENDED_KEY_USAGE_new(void) |
140 | { | 142 | { |
141 | return (EXTENDED_KEY_USAGE *)ASN1_item_new(&EXTENDED_KEY_USAGE_it); | 143 | return (EXTENDED_KEY_USAGE *)ASN1_item_new(&EXTENDED_KEY_USAGE_it); |
142 | } | 144 | } |
145 | LCRYPTO_ALIAS(EXTENDED_KEY_USAGE_new) | ||
143 | 146 | ||
144 | void | 147 | void |
145 | EXTENDED_KEY_USAGE_free(EXTENDED_KEY_USAGE *a) | 148 | EXTENDED_KEY_USAGE_free(EXTENDED_KEY_USAGE *a) |
146 | { | 149 | { |
147 | ASN1_item_free((ASN1_VALUE *)a, &EXTENDED_KEY_USAGE_it); | 150 | ASN1_item_free((ASN1_VALUE *)a, &EXTENDED_KEY_USAGE_it); |
148 | } | 151 | } |
152 | LCRYPTO_ALIAS(EXTENDED_KEY_USAGE_free) | ||
149 | 153 | ||
150 | static STACK_OF(CONF_VALUE) * | 154 | static STACK_OF(CONF_VALUE) * |
151 | i2v_EXTENDED_KEY_USAGE(const X509V3_EXT_METHOD *method, void *a, | 155 | i2v_EXTENDED_KEY_USAGE(const X509V3_EXT_METHOD *method, void *a, |
diff --git a/src/lib/libcrypto/x509/x509_genn.c b/src/lib/libcrypto/x509/x509_genn.c index dadf6f1e40..ce1fb6cc02 100644 --- a/src/lib/libcrypto/x509/x509_genn.c +++ b/src/lib/libcrypto/x509/x509_genn.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_genn.c,v 1.2 2020/12/08 15:06:42 tb Exp $ */ | 1 | /* $OpenBSD: x509_genn.c,v 1.3 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -98,24 +98,28 @@ d2i_OTHERNAME(OTHERNAME **a, const unsigned char **in, long len) | |||
98 | return (OTHERNAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 98 | return (OTHERNAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
99 | &OTHERNAME_it); | 99 | &OTHERNAME_it); |
100 | } | 100 | } |
101 | LCRYPTO_ALIAS(d2i_OTHERNAME) | ||
101 | 102 | ||
102 | int | 103 | int |
103 | i2d_OTHERNAME(OTHERNAME *a, unsigned char **out) | 104 | i2d_OTHERNAME(OTHERNAME *a, unsigned char **out) |
104 | { | 105 | { |
105 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &OTHERNAME_it); | 106 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &OTHERNAME_it); |
106 | } | 107 | } |
108 | LCRYPTO_ALIAS(i2d_OTHERNAME) | ||
107 | 109 | ||
108 | OTHERNAME * | 110 | OTHERNAME * |
109 | OTHERNAME_new(void) | 111 | OTHERNAME_new(void) |
110 | { | 112 | { |
111 | return (OTHERNAME *)ASN1_item_new(&OTHERNAME_it); | 113 | return (OTHERNAME *)ASN1_item_new(&OTHERNAME_it); |
112 | } | 114 | } |
115 | LCRYPTO_ALIAS(OTHERNAME_new) | ||
113 | 116 | ||
114 | void | 117 | void |
115 | OTHERNAME_free(OTHERNAME *a) | 118 | OTHERNAME_free(OTHERNAME *a) |
116 | { | 119 | { |
117 | ASN1_item_free((ASN1_VALUE *)a, &OTHERNAME_it); | 120 | ASN1_item_free((ASN1_VALUE *)a, &OTHERNAME_it); |
118 | } | 121 | } |
122 | LCRYPTO_ALIAS(OTHERNAME_free) | ||
119 | 123 | ||
120 | /* Uses explicit tagging since DIRECTORYSTRING is a CHOICE type */ | 124 | /* Uses explicit tagging since DIRECTORYSTRING is a CHOICE type */ |
121 | static const ASN1_TEMPLATE EDIPARTYNAME_seq_tt[] = { | 125 | static const ASN1_TEMPLATE EDIPARTYNAME_seq_tt[] = { |
@@ -152,24 +156,28 @@ d2i_EDIPARTYNAME(EDIPARTYNAME **a, const unsigned char **in, long len) | |||
152 | return (EDIPARTYNAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 156 | return (EDIPARTYNAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
153 | &EDIPARTYNAME_it); | 157 | &EDIPARTYNAME_it); |
154 | } | 158 | } |
159 | LCRYPTO_ALIAS(d2i_EDIPARTYNAME) | ||
155 | 160 | ||
156 | int | 161 | int |
157 | i2d_EDIPARTYNAME(EDIPARTYNAME *a, unsigned char **out) | 162 | i2d_EDIPARTYNAME(EDIPARTYNAME *a, unsigned char **out) |
158 | { | 163 | { |
159 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &EDIPARTYNAME_it); | 164 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &EDIPARTYNAME_it); |
160 | } | 165 | } |
166 | LCRYPTO_ALIAS(i2d_EDIPARTYNAME) | ||
161 | 167 | ||
162 | EDIPARTYNAME * | 168 | EDIPARTYNAME * |
163 | EDIPARTYNAME_new(void) | 169 | EDIPARTYNAME_new(void) |
164 | { | 170 | { |
165 | return (EDIPARTYNAME *)ASN1_item_new(&EDIPARTYNAME_it); | 171 | return (EDIPARTYNAME *)ASN1_item_new(&EDIPARTYNAME_it); |
166 | } | 172 | } |
173 | LCRYPTO_ALIAS(EDIPARTYNAME_new) | ||
167 | 174 | ||
168 | void | 175 | void |
169 | EDIPARTYNAME_free(EDIPARTYNAME *a) | 176 | EDIPARTYNAME_free(EDIPARTYNAME *a) |
170 | { | 177 | { |
171 | ASN1_item_free((ASN1_VALUE *)a, &EDIPARTYNAME_it); | 178 | ASN1_item_free((ASN1_VALUE *)a, &EDIPARTYNAME_it); |
172 | } | 179 | } |
180 | LCRYPTO_ALIAS(EDIPARTYNAME_free) | ||
173 | 181 | ||
174 | static const ASN1_TEMPLATE GENERAL_NAME_ch_tt[] = { | 182 | static const ASN1_TEMPLATE GENERAL_NAME_ch_tt[] = { |
175 | { | 183 | { |
@@ -256,24 +264,28 @@ d2i_GENERAL_NAME(GENERAL_NAME **a, const unsigned char **in, long len) | |||
256 | return (GENERAL_NAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 264 | return (GENERAL_NAME *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
257 | &GENERAL_NAME_it); | 265 | &GENERAL_NAME_it); |
258 | } | 266 | } |
267 | LCRYPTO_ALIAS(d2i_GENERAL_NAME) | ||
259 | 268 | ||
260 | int | 269 | int |
261 | i2d_GENERAL_NAME(GENERAL_NAME *a, unsigned char **out) | 270 | i2d_GENERAL_NAME(GENERAL_NAME *a, unsigned char **out) |
262 | { | 271 | { |
263 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &GENERAL_NAME_it); | 272 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &GENERAL_NAME_it); |
264 | } | 273 | } |
274 | LCRYPTO_ALIAS(i2d_GENERAL_NAME) | ||
265 | 275 | ||
266 | GENERAL_NAME * | 276 | GENERAL_NAME * |
267 | GENERAL_NAME_new(void) | 277 | GENERAL_NAME_new(void) |
268 | { | 278 | { |
269 | return (GENERAL_NAME *)ASN1_item_new(&GENERAL_NAME_it); | 279 | return (GENERAL_NAME *)ASN1_item_new(&GENERAL_NAME_it); |
270 | } | 280 | } |
281 | LCRYPTO_ALIAS(GENERAL_NAME_new) | ||
271 | 282 | ||
272 | void | 283 | void |
273 | GENERAL_NAME_free(GENERAL_NAME *a) | 284 | GENERAL_NAME_free(GENERAL_NAME *a) |
274 | { | 285 | { |
275 | ASN1_item_free((ASN1_VALUE *)a, &GENERAL_NAME_it); | 286 | ASN1_item_free((ASN1_VALUE *)a, &GENERAL_NAME_it); |
276 | } | 287 | } |
288 | LCRYPTO_ALIAS(GENERAL_NAME_free) | ||
277 | 289 | ||
278 | static const ASN1_TEMPLATE GENERAL_NAMES_item_tt = { | 290 | static const ASN1_TEMPLATE GENERAL_NAMES_item_tt = { |
279 | .flags = ASN1_TFLG_SEQUENCE_OF, | 291 | .flags = ASN1_TFLG_SEQUENCE_OF, |
@@ -300,30 +312,35 @@ d2i_GENERAL_NAMES(GENERAL_NAMES **a, const unsigned char **in, long len) | |||
300 | return (GENERAL_NAMES *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 312 | return (GENERAL_NAMES *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
301 | &GENERAL_NAMES_it); | 313 | &GENERAL_NAMES_it); |
302 | } | 314 | } |
315 | LCRYPTO_ALIAS(d2i_GENERAL_NAMES) | ||
303 | 316 | ||
304 | int | 317 | int |
305 | i2d_GENERAL_NAMES(GENERAL_NAMES *a, unsigned char **out) | 318 | i2d_GENERAL_NAMES(GENERAL_NAMES *a, unsigned char **out) |
306 | { | 319 | { |
307 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &GENERAL_NAMES_it); | 320 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &GENERAL_NAMES_it); |
308 | } | 321 | } |
322 | LCRYPTO_ALIAS(i2d_GENERAL_NAMES) | ||
309 | 323 | ||
310 | GENERAL_NAMES * | 324 | GENERAL_NAMES * |
311 | GENERAL_NAMES_new(void) | 325 | GENERAL_NAMES_new(void) |
312 | { | 326 | { |
313 | return (GENERAL_NAMES *)ASN1_item_new(&GENERAL_NAMES_it); | 327 | return (GENERAL_NAMES *)ASN1_item_new(&GENERAL_NAMES_it); |
314 | } | 328 | } |
329 | LCRYPTO_ALIAS(GENERAL_NAMES_new) | ||
315 | 330 | ||
316 | void | 331 | void |
317 | GENERAL_NAMES_free(GENERAL_NAMES *a) | 332 | GENERAL_NAMES_free(GENERAL_NAMES *a) |
318 | { | 333 | { |
319 | ASN1_item_free((ASN1_VALUE *)a, &GENERAL_NAMES_it); | 334 | ASN1_item_free((ASN1_VALUE *)a, &GENERAL_NAMES_it); |
320 | } | 335 | } |
336 | LCRYPTO_ALIAS(GENERAL_NAMES_free) | ||
321 | 337 | ||
322 | GENERAL_NAME * | 338 | GENERAL_NAME * |
323 | GENERAL_NAME_dup(GENERAL_NAME *a) | 339 | GENERAL_NAME_dup(GENERAL_NAME *a) |
324 | { | 340 | { |
325 | return ASN1_item_dup(&GENERAL_NAME_it, a); | 341 | return ASN1_item_dup(&GENERAL_NAME_it, a); |
326 | } | 342 | } |
343 | LCRYPTO_ALIAS(GENERAL_NAME_dup) | ||
327 | 344 | ||
328 | static int | 345 | static int |
329 | EDIPARTYNAME_cmp(const EDIPARTYNAME *a, const EDIPARTYNAME *b) | 346 | EDIPARTYNAME_cmp(const EDIPARTYNAME *a, const EDIPARTYNAME *b) |
@@ -397,6 +414,7 @@ GENERAL_NAME_cmp(GENERAL_NAME *a, GENERAL_NAME *b) | |||
397 | } | 414 | } |
398 | return result; | 415 | return result; |
399 | } | 416 | } |
417 | LCRYPTO_ALIAS(GENERAL_NAME_cmp) | ||
400 | 418 | ||
401 | /* Returns 0 if they are equal, != 0 otherwise. */ | 419 | /* Returns 0 if they are equal, != 0 otherwise. */ |
402 | int | 420 | int |
@@ -413,6 +431,7 @@ OTHERNAME_cmp(OTHERNAME *a, OTHERNAME *b) | |||
413 | result = ASN1_TYPE_cmp(a->value, b->value); | 431 | result = ASN1_TYPE_cmp(a->value, b->value); |
414 | return result; | 432 | return result; |
415 | } | 433 | } |
434 | LCRYPTO_ALIAS(OTHERNAME_cmp) | ||
416 | 435 | ||
417 | void | 436 | void |
418 | GENERAL_NAME_set0_value(GENERAL_NAME *a, int type, void *value) | 437 | GENERAL_NAME_set0_value(GENERAL_NAME *a, int type, void *value) |
@@ -450,6 +469,7 @@ GENERAL_NAME_set0_value(GENERAL_NAME *a, int type, void *value) | |||
450 | } | 469 | } |
451 | a->type = type; | 470 | a->type = type; |
452 | } | 471 | } |
472 | LCRYPTO_ALIAS(GENERAL_NAME_set0_value) | ||
453 | 473 | ||
454 | void * | 474 | void * |
455 | GENERAL_NAME_get0_value(GENERAL_NAME *a, int *ptype) | 475 | GENERAL_NAME_get0_value(GENERAL_NAME *a, int *ptype) |
@@ -484,6 +504,7 @@ GENERAL_NAME_get0_value(GENERAL_NAME *a, int *ptype) | |||
484 | return NULL; | 504 | return NULL; |
485 | } | 505 | } |
486 | } | 506 | } |
507 | LCRYPTO_ALIAS(GENERAL_NAME_get0_value) | ||
487 | 508 | ||
488 | int | 509 | int |
489 | GENERAL_NAME_set0_othername(GENERAL_NAME *gen, ASN1_OBJECT *oid, | 510 | GENERAL_NAME_set0_othername(GENERAL_NAME *gen, ASN1_OBJECT *oid, |
@@ -499,6 +520,7 @@ GENERAL_NAME_set0_othername(GENERAL_NAME *gen, ASN1_OBJECT *oid, | |||
499 | GENERAL_NAME_set0_value(gen, GEN_OTHERNAME, oth); | 520 | GENERAL_NAME_set0_value(gen, GEN_OTHERNAME, oth); |
500 | return 1; | 521 | return 1; |
501 | } | 522 | } |
523 | LCRYPTO_ALIAS(GENERAL_NAME_set0_othername) | ||
502 | 524 | ||
503 | int | 525 | int |
504 | GENERAL_NAME_get0_otherName(GENERAL_NAME *gen, ASN1_OBJECT **poid, | 526 | GENERAL_NAME_get0_otherName(GENERAL_NAME *gen, ASN1_OBJECT **poid, |
@@ -512,3 +534,4 @@ GENERAL_NAME_get0_otherName(GENERAL_NAME *gen, ASN1_OBJECT **poid, | |||
512 | *pvalue = gen->d.otherName->value; | 534 | *pvalue = gen->d.otherName->value; |
513 | return 1; | 535 | return 1; |
514 | } | 536 | } |
537 | LCRYPTO_ALIAS(GENERAL_NAME_get0_otherName) | ||
diff --git a/src/lib/libcrypto/x509/x509_info.c b/src/lib/libcrypto/x509/x509_info.c index 86ed6fadfa..6c7fd13601 100644 --- a/src/lib/libcrypto/x509/x509_info.c +++ b/src/lib/libcrypto/x509/x509_info.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_info.c,v 1.1 2020/06/04 15:19:31 jsing Exp $ */ | 1 | /* $OpenBSD: x509_info.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -139,24 +139,28 @@ d2i_ACCESS_DESCRIPTION(ACCESS_DESCRIPTION **a, const unsigned char **in, long le | |||
139 | return (ACCESS_DESCRIPTION *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 139 | return (ACCESS_DESCRIPTION *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
140 | &ACCESS_DESCRIPTION_it); | 140 | &ACCESS_DESCRIPTION_it); |
141 | } | 141 | } |
142 | LCRYPTO_ALIAS(d2i_ACCESS_DESCRIPTION) | ||
142 | 143 | ||
143 | int | 144 | int |
144 | i2d_ACCESS_DESCRIPTION(ACCESS_DESCRIPTION *a, unsigned char **out) | 145 | i2d_ACCESS_DESCRIPTION(ACCESS_DESCRIPTION *a, unsigned char **out) |
145 | { | 146 | { |
146 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ACCESS_DESCRIPTION_it); | 147 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ACCESS_DESCRIPTION_it); |
147 | } | 148 | } |
149 | LCRYPTO_ALIAS(i2d_ACCESS_DESCRIPTION) | ||
148 | 150 | ||
149 | ACCESS_DESCRIPTION * | 151 | ACCESS_DESCRIPTION * |
150 | ACCESS_DESCRIPTION_new(void) | 152 | ACCESS_DESCRIPTION_new(void) |
151 | { | 153 | { |
152 | return (ACCESS_DESCRIPTION *)ASN1_item_new(&ACCESS_DESCRIPTION_it); | 154 | return (ACCESS_DESCRIPTION *)ASN1_item_new(&ACCESS_DESCRIPTION_it); |
153 | } | 155 | } |
156 | LCRYPTO_ALIAS(ACCESS_DESCRIPTION_new) | ||
154 | 157 | ||
155 | void | 158 | void |
156 | ACCESS_DESCRIPTION_free(ACCESS_DESCRIPTION *a) | 159 | ACCESS_DESCRIPTION_free(ACCESS_DESCRIPTION *a) |
157 | { | 160 | { |
158 | ASN1_item_free((ASN1_VALUE *)a, &ACCESS_DESCRIPTION_it); | 161 | ASN1_item_free((ASN1_VALUE *)a, &ACCESS_DESCRIPTION_it); |
159 | } | 162 | } |
163 | LCRYPTO_ALIAS(ACCESS_DESCRIPTION_free) | ||
160 | 164 | ||
161 | static const ASN1_TEMPLATE AUTHORITY_INFO_ACCESS_item_tt = { | 165 | static const ASN1_TEMPLATE AUTHORITY_INFO_ACCESS_item_tt = { |
162 | .flags = ASN1_TFLG_SEQUENCE_OF, | 166 | .flags = ASN1_TFLG_SEQUENCE_OF, |
@@ -183,24 +187,28 @@ d2i_AUTHORITY_INFO_ACCESS(AUTHORITY_INFO_ACCESS **a, const unsigned char **in, l | |||
183 | return (AUTHORITY_INFO_ACCESS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 187 | return (AUTHORITY_INFO_ACCESS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
184 | &AUTHORITY_INFO_ACCESS_it); | 188 | &AUTHORITY_INFO_ACCESS_it); |
185 | } | 189 | } |
190 | LCRYPTO_ALIAS(d2i_AUTHORITY_INFO_ACCESS) | ||
186 | 191 | ||
187 | int | 192 | int |
188 | i2d_AUTHORITY_INFO_ACCESS(AUTHORITY_INFO_ACCESS *a, unsigned char **out) | 193 | i2d_AUTHORITY_INFO_ACCESS(AUTHORITY_INFO_ACCESS *a, unsigned char **out) |
189 | { | 194 | { |
190 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &AUTHORITY_INFO_ACCESS_it); | 195 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &AUTHORITY_INFO_ACCESS_it); |
191 | } | 196 | } |
197 | LCRYPTO_ALIAS(i2d_AUTHORITY_INFO_ACCESS) | ||
192 | 198 | ||
193 | AUTHORITY_INFO_ACCESS * | 199 | AUTHORITY_INFO_ACCESS * |
194 | AUTHORITY_INFO_ACCESS_new(void) | 200 | AUTHORITY_INFO_ACCESS_new(void) |
195 | { | 201 | { |
196 | return (AUTHORITY_INFO_ACCESS *)ASN1_item_new(&AUTHORITY_INFO_ACCESS_it); | 202 | return (AUTHORITY_INFO_ACCESS *)ASN1_item_new(&AUTHORITY_INFO_ACCESS_it); |
197 | } | 203 | } |
204 | LCRYPTO_ALIAS(AUTHORITY_INFO_ACCESS_new) | ||
198 | 205 | ||
199 | void | 206 | void |
200 | AUTHORITY_INFO_ACCESS_free(AUTHORITY_INFO_ACCESS *a) | 207 | AUTHORITY_INFO_ACCESS_free(AUTHORITY_INFO_ACCESS *a) |
201 | { | 208 | { |
202 | ASN1_item_free((ASN1_VALUE *)a, &AUTHORITY_INFO_ACCESS_it); | 209 | ASN1_item_free((ASN1_VALUE *)a, &AUTHORITY_INFO_ACCESS_it); |
203 | } | 210 | } |
211 | LCRYPTO_ALIAS(AUTHORITY_INFO_ACCESS_free) | ||
204 | 212 | ||
205 | static STACK_OF(CONF_VALUE) * | 213 | static STACK_OF(CONF_VALUE) * |
206 | i2v_AUTHORITY_INFO_ACCESS(X509V3_EXT_METHOD *method, | 214 | i2v_AUTHORITY_INFO_ACCESS(X509V3_EXT_METHOD *method, |
@@ -306,3 +314,4 @@ i2a_ACCESS_DESCRIPTION(BIO *bp, const ACCESS_DESCRIPTION* a) | |||
306 | i2a_ASN1_OBJECT(bp, a->method); | 314 | i2a_ASN1_OBJECT(bp, a->method); |
307 | return 2; | 315 | return 2; |
308 | } | 316 | } |
317 | LCRYPTO_ALIAS(i2a_ACCESS_DESCRIPTION) | ||
diff --git a/src/lib/libcrypto/x509/x509_lib.c b/src/lib/libcrypto/x509/x509_lib.c index e265d30f89..e209c055b6 100644 --- a/src/lib/libcrypto/x509/x509_lib.c +++ b/src/lib/libcrypto/x509/x509_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_lib.c,v 1.4 2022/07/24 21:41:29 tb Exp $ */ | 1 | /* $OpenBSD: x509_lib.c,v 1.5 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -85,6 +85,7 @@ X509V3_EXT_add(X509V3_EXT_METHOD *ext) | |||
85 | } | 85 | } |
86 | return 1; | 86 | return 1; |
87 | } | 87 | } |
88 | LCRYPTO_ALIAS(X509V3_EXT_add) | ||
88 | 89 | ||
89 | static int | 90 | static int |
90 | ext_cmp(const X509V3_EXT_METHOD * const *a, const X509V3_EXT_METHOD * const *b) | 91 | ext_cmp(const X509V3_EXT_METHOD * const *a, const X509V3_EXT_METHOD * const *b) |
@@ -132,6 +133,7 @@ X509V3_EXT_get_nid(int nid) | |||
132 | return NULL; | 133 | return NULL; |
133 | return sk_X509V3_EXT_METHOD_value(ext_list, idx); | 134 | return sk_X509V3_EXT_METHOD_value(ext_list, idx); |
134 | } | 135 | } |
136 | LCRYPTO_ALIAS(X509V3_EXT_get_nid) | ||
135 | 137 | ||
136 | const X509V3_EXT_METHOD * | 138 | const X509V3_EXT_METHOD * |
137 | X509V3_EXT_get(X509_EXTENSION *ext) | 139 | X509V3_EXT_get(X509_EXTENSION *ext) |
@@ -142,6 +144,7 @@ X509V3_EXT_get(X509_EXTENSION *ext) | |||
142 | return NULL; | 144 | return NULL; |
143 | return X509V3_EXT_get_nid(nid); | 145 | return X509V3_EXT_get_nid(nid); |
144 | } | 146 | } |
147 | LCRYPTO_ALIAS(X509V3_EXT_get) | ||
145 | 148 | ||
146 | int | 149 | int |
147 | X509V3_EXT_add_list(X509V3_EXT_METHOD *extlist) | 150 | X509V3_EXT_add_list(X509V3_EXT_METHOD *extlist) |
@@ -151,6 +154,7 @@ X509V3_EXT_add_list(X509V3_EXT_METHOD *extlist) | |||
151 | return 0; | 154 | return 0; |
152 | return 1; | 155 | return 1; |
153 | } | 156 | } |
157 | LCRYPTO_ALIAS(X509V3_EXT_add_list) | ||
154 | 158 | ||
155 | int | 159 | int |
156 | X509V3_EXT_add_alias(int nid_to, int nid_from) | 160 | X509V3_EXT_add_alias(int nid_to, int nid_from) |
@@ -175,6 +179,7 @@ X509V3_EXT_add_alias(int nid_to, int nid_from) | |||
175 | } | 179 | } |
176 | return 1; | 180 | return 1; |
177 | } | 181 | } |
182 | LCRYPTO_ALIAS(X509V3_EXT_add_alias) | ||
178 | 183 | ||
179 | void | 184 | void |
180 | X509V3_EXT_cleanup(void) | 185 | X509V3_EXT_cleanup(void) |
@@ -182,6 +187,7 @@ X509V3_EXT_cleanup(void) | |||
182 | sk_X509V3_EXT_METHOD_pop_free(ext_list, ext_list_free); | 187 | sk_X509V3_EXT_METHOD_pop_free(ext_list, ext_list_free); |
183 | ext_list = NULL; | 188 | ext_list = NULL; |
184 | } | 189 | } |
190 | LCRYPTO_ALIAS(X509V3_EXT_cleanup) | ||
185 | 191 | ||
186 | static void | 192 | static void |
187 | ext_list_free(X509V3_EXT_METHOD *ext) | 193 | ext_list_free(X509V3_EXT_METHOD *ext) |
@@ -199,6 +205,7 @@ X509V3_add_standard_extensions(void) | |||
199 | { | 205 | { |
200 | return 1; | 206 | return 1; |
201 | } | 207 | } |
208 | LCRYPTO_ALIAS(X509V3_add_standard_extensions) | ||
202 | 209 | ||
203 | /* Return an extension internal structure */ | 210 | /* Return an extension internal structure */ |
204 | 211 | ||
@@ -216,6 +223,7 @@ X509V3_EXT_d2i(X509_EXTENSION *ext) | |||
216 | method->it); | 223 | method->it); |
217 | return method->d2i(NULL, &p, ext->value->length); | 224 | return method->d2i(NULL, &p, ext->value->length); |
218 | } | 225 | } |
226 | LCRYPTO_ALIAS(X509V3_EXT_d2i) | ||
219 | 227 | ||
220 | /* Get critical flag and decoded version of extension from a NID. | 228 | /* Get critical flag and decoded version of extension from a NID. |
221 | * The "idx" variable returns the last found extension and can | 229 | * The "idx" variable returns the last found extension and can |
@@ -281,6 +289,7 @@ X509V3_get_d2i(const STACK_OF(X509_EXTENSION) *x, int nid, int *crit, int *idx) | |||
281 | *crit = -1; | 289 | *crit = -1; |
282 | return NULL; | 290 | return NULL; |
283 | } | 291 | } |
292 | LCRYPTO_ALIAS(X509V3_get_d2i) | ||
284 | 293 | ||
285 | /* This function is a general extension append, replace and delete utility. | 294 | /* This function is a general extension append, replace and delete utility. |
286 | * The precise operation is governed by the 'flags' value. The 'crit' and | 295 | * The precise operation is governed by the 'flags' value. The 'crit' and |
@@ -362,3 +371,4 @@ err: | |||
362 | X509V3error(errcode); | 371 | X509V3error(errcode); |
363 | return 0; | 372 | return 0; |
364 | } | 373 | } |
374 | LCRYPTO_ALIAS(X509V3_add1_i2d) | ||
diff --git a/src/lib/libcrypto/x509/x509_lu.c b/src/lib/libcrypto/x509/x509_lu.c index 90d75497dd..80ff1ed429 100644 --- a/src/lib/libcrypto/x509/x509_lu.c +++ b/src/lib/libcrypto/x509/x509_lu.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_lu.c,v 1.55 2022/01/14 07:53:45 tb Exp $ */ | 1 | /* $OpenBSD: x509_lu.c,v 1.56 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -84,6 +84,7 @@ X509_LOOKUP_new(X509_LOOKUP_METHOD *method) | |||
84 | 84 | ||
85 | return lu; | 85 | return lu; |
86 | } | 86 | } |
87 | LCRYPTO_ALIAS(X509_LOOKUP_new) | ||
87 | 88 | ||
88 | void | 89 | void |
89 | X509_LOOKUP_free(X509_LOOKUP *ctx) | 90 | X509_LOOKUP_free(X509_LOOKUP *ctx) |
@@ -94,6 +95,7 @@ X509_LOOKUP_free(X509_LOOKUP *ctx) | |||
94 | ctx->method->free(ctx); | 95 | ctx->method->free(ctx); |
95 | free(ctx); | 96 | free(ctx); |
96 | } | 97 | } |
98 | LCRYPTO_ALIAS(X509_LOOKUP_free) | ||
97 | 99 | ||
98 | int | 100 | int |
99 | X509_LOOKUP_init(X509_LOOKUP *ctx) | 101 | X509_LOOKUP_init(X509_LOOKUP *ctx) |
@@ -104,6 +106,7 @@ X509_LOOKUP_init(X509_LOOKUP *ctx) | |||
104 | return 1; | 106 | return 1; |
105 | return ctx->method->init(ctx); | 107 | return ctx->method->init(ctx); |
106 | } | 108 | } |
109 | LCRYPTO_ALIAS(X509_LOOKUP_init) | ||
107 | 110 | ||
108 | int | 111 | int |
109 | X509_LOOKUP_shutdown(X509_LOOKUP *ctx) | 112 | X509_LOOKUP_shutdown(X509_LOOKUP *ctx) |
@@ -114,6 +117,7 @@ X509_LOOKUP_shutdown(X509_LOOKUP *ctx) | |||
114 | return 1; | 117 | return 1; |
115 | return ctx->method->shutdown(ctx); | 118 | return ctx->method->shutdown(ctx); |
116 | } | 119 | } |
120 | LCRYPTO_ALIAS(X509_LOOKUP_shutdown) | ||
117 | 121 | ||
118 | int | 122 | int |
119 | X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl, | 123 | X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl, |
@@ -125,6 +129,7 @@ X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl, | |||
125 | return 1; | 129 | return 1; |
126 | return ctx->method->ctrl(ctx, cmd, argc, argl, ret); | 130 | return ctx->method->ctrl(ctx, cmd, argc, argl, ret); |
127 | } | 131 | } |
132 | LCRYPTO_ALIAS(X509_LOOKUP_ctrl) | ||
128 | 133 | ||
129 | int | 134 | int |
130 | X509_LOOKUP_by_subject(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, X509_NAME *name, | 135 | X509_LOOKUP_by_subject(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, X509_NAME *name, |
@@ -134,6 +139,7 @@ X509_LOOKUP_by_subject(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, X509_NAME *name, | |||
134 | return 0; | 139 | return 0; |
135 | return ctx->method->get_by_subject(ctx, type, name, ret); | 140 | return ctx->method->get_by_subject(ctx, type, name, ret); |
136 | } | 141 | } |
142 | LCRYPTO_ALIAS(X509_LOOKUP_by_subject) | ||
137 | 143 | ||
138 | int | 144 | int |
139 | X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, | 145 | X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, |
@@ -143,6 +149,7 @@ X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, | |||
143 | return 0; | 149 | return 0; |
144 | return ctx->method->get_by_issuer_serial(ctx, type, name, serial, ret); | 150 | return ctx->method->get_by_issuer_serial(ctx, type, name, serial, ret); |
145 | } | 151 | } |
152 | LCRYPTO_ALIAS(X509_LOOKUP_by_issuer_serial) | ||
146 | 153 | ||
147 | int | 154 | int |
148 | X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, | 155 | X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, |
@@ -152,6 +159,7 @@ X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, | |||
152 | return 0; | 159 | return 0; |
153 | return ctx->method->get_by_fingerprint(ctx, type, bytes, len, ret); | 160 | return ctx->method->get_by_fingerprint(ctx, type, bytes, len, ret); |
154 | } | 161 | } |
162 | LCRYPTO_ALIAS(X509_LOOKUP_by_fingerprint) | ||
155 | 163 | ||
156 | int | 164 | int |
157 | X509_LOOKUP_by_alias(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, const char *str, | 165 | X509_LOOKUP_by_alias(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, const char *str, |
@@ -161,6 +169,7 @@ X509_LOOKUP_by_alias(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, const char *str, | |||
161 | return 0; | 169 | return 0; |
162 | return ctx->method->get_by_alias(ctx, type, str, len, ret); | 170 | return ctx->method->get_by_alias(ctx, type, str, len, ret); |
163 | } | 171 | } |
172 | LCRYPTO_ALIAS(X509_LOOKUP_by_alias) | ||
164 | 173 | ||
165 | static int | 174 | static int |
166 | x509_object_cmp(const X509_OBJECT * const *a, const X509_OBJECT * const *b) | 175 | x509_object_cmp(const X509_OBJECT * const *a, const X509_OBJECT * const *b) |
@@ -208,6 +217,7 @@ X509_STORE_new(void) | |||
208 | 217 | ||
209 | return NULL; | 218 | return NULL; |
210 | } | 219 | } |
220 | LCRYPTO_ALIAS(X509_STORE_new) | ||
211 | 221 | ||
212 | X509_OBJECT * | 222 | X509_OBJECT * |
213 | X509_OBJECT_new(void) | 223 | X509_OBJECT_new(void) |
@@ -223,6 +233,7 @@ X509_OBJECT_new(void) | |||
223 | 233 | ||
224 | return obj; | 234 | return obj; |
225 | } | 235 | } |
236 | LCRYPTO_ALIAS(X509_OBJECT_new) | ||
226 | 237 | ||
227 | void | 238 | void |
228 | X509_OBJECT_free(X509_OBJECT *a) | 239 | X509_OBJECT_free(X509_OBJECT *a) |
@@ -241,6 +252,7 @@ X509_OBJECT_free(X509_OBJECT *a) | |||
241 | 252 | ||
242 | free(a); | 253 | free(a); |
243 | } | 254 | } |
255 | LCRYPTO_ALIAS(X509_OBJECT_free) | ||
244 | 256 | ||
245 | void | 257 | void |
246 | X509_STORE_free(X509_STORE *store) | 258 | X509_STORE_free(X509_STORE *store) |
@@ -268,12 +280,14 @@ X509_STORE_free(X509_STORE *store) | |||
268 | X509_VERIFY_PARAM_free(store->param); | 280 | X509_VERIFY_PARAM_free(store->param); |
269 | free(store); | 281 | free(store); |
270 | } | 282 | } |
283 | LCRYPTO_ALIAS(X509_STORE_free) | ||
271 | 284 | ||
272 | int | 285 | int |
273 | X509_STORE_up_ref(X509_STORE *store) | 286 | X509_STORE_up_ref(X509_STORE *store) |
274 | { | 287 | { |
275 | return CRYPTO_add(&store->references, 1, CRYPTO_LOCK_X509_STORE) > 1; | 288 | return CRYPTO_add(&store->references, 1, CRYPTO_LOCK_X509_STORE) > 1; |
276 | } | 289 | } |
290 | LCRYPTO_ALIAS(X509_STORE_up_ref) | ||
277 | 291 | ||
278 | X509_LOOKUP * | 292 | X509_LOOKUP * |
279 | X509_STORE_add_lookup(X509_STORE *store, X509_LOOKUP_METHOD *method) | 293 | X509_STORE_add_lookup(X509_STORE *store, X509_LOOKUP_METHOD *method) |
@@ -302,6 +316,7 @@ X509_STORE_add_lookup(X509_STORE *store, X509_LOOKUP_METHOD *method) | |||
302 | 316 | ||
303 | return lu; | 317 | return lu; |
304 | } | 318 | } |
319 | LCRYPTO_ALIAS(X509_STORE_add_lookup) | ||
305 | 320 | ||
306 | X509_OBJECT * | 321 | X509_OBJECT * |
307 | X509_STORE_CTX_get_obj_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type, | 322 | X509_STORE_CTX_get_obj_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type, |
@@ -318,6 +333,7 @@ X509_STORE_CTX_get_obj_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type, | |||
318 | 333 | ||
319 | return obj; | 334 | return obj; |
320 | } | 335 | } |
336 | LCRYPTO_ALIAS(X509_STORE_CTX_get_obj_by_subject) | ||
321 | 337 | ||
322 | int | 338 | int |
323 | X509_STORE_CTX_get_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type, | 339 | X509_STORE_CTX_get_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type, |
@@ -356,6 +372,7 @@ X509_STORE_CTX_get_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type, | |||
356 | 372 | ||
357 | return 1; | 373 | return 1; |
358 | } | 374 | } |
375 | LCRYPTO_ALIAS(X509_STORE_CTX_get_by_subject) | ||
359 | 376 | ||
360 | /* Add obj to the store. Takes ownership of obj. */ | 377 | /* Add obj to the store. Takes ownership of obj. */ |
361 | static int | 378 | static int |
@@ -407,6 +424,7 @@ X509_STORE_add_cert(X509_STORE *store, X509 *x) | |||
407 | 424 | ||
408 | return X509_STORE_add_object(store, obj); | 425 | return X509_STORE_add_object(store, obj); |
409 | } | 426 | } |
427 | LCRYPTO_ALIAS(X509_STORE_add_cert) | ||
410 | 428 | ||
411 | int | 429 | int |
412 | X509_STORE_add_crl(X509_STORE *store, X509_CRL *x) | 430 | X509_STORE_add_crl(X509_STORE *store, X509_CRL *x) |
@@ -429,6 +447,7 @@ X509_STORE_add_crl(X509_STORE *store, X509_CRL *x) | |||
429 | 447 | ||
430 | return X509_STORE_add_object(store, obj); | 448 | return X509_STORE_add_object(store, obj); |
431 | } | 449 | } |
450 | LCRYPTO_ALIAS(X509_STORE_add_crl) | ||
432 | 451 | ||
433 | int | 452 | int |
434 | X509_OBJECT_up_ref_count(X509_OBJECT *a) | 453 | X509_OBJECT_up_ref_count(X509_OBJECT *a) |
@@ -441,12 +460,14 @@ X509_OBJECT_up_ref_count(X509_OBJECT *a) | |||
441 | } | 460 | } |
442 | return 1; | 461 | return 1; |
443 | } | 462 | } |
463 | LCRYPTO_ALIAS(X509_OBJECT_up_ref_count) | ||
444 | 464 | ||
445 | X509_LOOKUP_TYPE | 465 | X509_LOOKUP_TYPE |
446 | X509_OBJECT_get_type(const X509_OBJECT *a) | 466 | X509_OBJECT_get_type(const X509_OBJECT *a) |
447 | { | 467 | { |
448 | return a->type; | 468 | return a->type; |
449 | } | 469 | } |
470 | LCRYPTO_ALIAS(X509_OBJECT_get_type) | ||
450 | 471 | ||
451 | static int | 472 | static int |
452 | x509_object_idx_cnt(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type, | 473 | x509_object_idx_cnt(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type, |
@@ -498,6 +519,7 @@ X509_OBJECT_idx_by_subject(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type, | |||
498 | { | 519 | { |
499 | return x509_object_idx_cnt(h, type, name, NULL); | 520 | return x509_object_idx_cnt(h, type, name, NULL); |
500 | } | 521 | } |
522 | LCRYPTO_ALIAS(X509_OBJECT_idx_by_subject) | ||
501 | 523 | ||
502 | X509_OBJECT * | 524 | X509_OBJECT * |
503 | X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type, | 525 | X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type, |
@@ -510,6 +532,7 @@ X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type, | |||
510 | return NULL; | 532 | return NULL; |
511 | return sk_X509_OBJECT_value(h, idx); | 533 | return sk_X509_OBJECT_value(h, idx); |
512 | } | 534 | } |
535 | LCRYPTO_ALIAS(X509_OBJECT_retrieve_by_subject) | ||
513 | 536 | ||
514 | X509 * | 537 | X509 * |
515 | X509_OBJECT_get0_X509(const X509_OBJECT *xo) | 538 | X509_OBJECT_get0_X509(const X509_OBJECT *xo) |
@@ -518,6 +541,7 @@ X509_OBJECT_get0_X509(const X509_OBJECT *xo) | |||
518 | return xo->data.x509; | 541 | return xo->data.x509; |
519 | return NULL; | 542 | return NULL; |
520 | } | 543 | } |
544 | LCRYPTO_ALIAS(X509_OBJECT_get0_X509) | ||
521 | 545 | ||
522 | X509_CRL * | 546 | X509_CRL * |
523 | X509_OBJECT_get0_X509_CRL(X509_OBJECT *xo) | 547 | X509_OBJECT_get0_X509_CRL(X509_OBJECT *xo) |
@@ -526,6 +550,7 @@ X509_OBJECT_get0_X509_CRL(X509_OBJECT *xo) | |||
526 | return xo->data.crl; | 550 | return xo->data.crl; |
527 | return NULL; | 551 | return NULL; |
528 | } | 552 | } |
553 | LCRYPTO_ALIAS(X509_OBJECT_get0_X509_CRL) | ||
529 | 554 | ||
530 | static STACK_OF(X509) * | 555 | static STACK_OF(X509) * |
531 | X509_get1_certs_from_cache(X509_STORE *store, X509_NAME *name) | 556 | X509_get1_certs_from_cache(X509_STORE *store, X509_NAME *name) |
@@ -589,6 +614,7 @@ X509_STORE_get1_certs(X509_STORE_CTX *ctx, X509_NAME *name) | |||
589 | 614 | ||
590 | return X509_get1_certs_from_cache(store, name); | 615 | return X509_get1_certs_from_cache(store, name); |
591 | } | 616 | } |
617 | LCRYPTO_ALIAS(X509_STORE_get1_certs) | ||
592 | 618 | ||
593 | STACK_OF(X509_CRL) * | 619 | STACK_OF(X509_CRL) * |
594 | X509_STORE_get1_crls(X509_STORE_CTX *ctx, X509_NAME *name) | 620 | X509_STORE_get1_crls(X509_STORE_CTX *ctx, X509_NAME *name) |
@@ -639,6 +665,7 @@ X509_STORE_get1_crls(X509_STORE_CTX *ctx, X509_NAME *name) | |||
639 | sk_X509_CRL_pop_free(sk, X509_CRL_free); | 665 | sk_X509_CRL_pop_free(sk, X509_CRL_free); |
640 | return NULL; | 666 | return NULL; |
641 | } | 667 | } |
668 | LCRYPTO_ALIAS(X509_STORE_get1_crls) | ||
642 | 669 | ||
643 | X509_OBJECT * | 670 | X509_OBJECT * |
644 | X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h, X509_OBJECT *x) | 671 | X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h, X509_OBJECT *x) |
@@ -667,6 +694,7 @@ X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h, X509_OBJECT *x) | |||
667 | } | 694 | } |
668 | return NULL; | 695 | return NULL; |
669 | } | 696 | } |
697 | LCRYPTO_ALIAS(X509_OBJECT_retrieve_match) | ||
670 | 698 | ||
671 | /* Try to get issuer certificate from store. Due to limitations | 699 | /* Try to get issuer certificate from store. Due to limitations |
672 | * of the API this can only retrieve a single certificate matching | 700 | * of the API this can only retrieve a single certificate matching |
@@ -757,30 +785,35 @@ X509_STORE_CTX_get1_issuer(X509 **out_issuer, X509_STORE_CTX *ctx, X509 *x) | |||
757 | CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE); | 785 | CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE); |
758 | return ret; | 786 | return ret; |
759 | } | 787 | } |
788 | LCRYPTO_ALIAS(X509_STORE_CTX_get1_issuer) | ||
760 | 789 | ||
761 | STACK_OF(X509_OBJECT) * | 790 | STACK_OF(X509_OBJECT) * |
762 | X509_STORE_get0_objects(X509_STORE *xs) | 791 | X509_STORE_get0_objects(X509_STORE *xs) |
763 | { | 792 | { |
764 | return xs->objs; | 793 | return xs->objs; |
765 | } | 794 | } |
795 | LCRYPTO_ALIAS(X509_STORE_get0_objects) | ||
766 | 796 | ||
767 | void * | 797 | void * |
768 | X509_STORE_get_ex_data(X509_STORE *xs, int idx) | 798 | X509_STORE_get_ex_data(X509_STORE *xs, int idx) |
769 | { | 799 | { |
770 | return CRYPTO_get_ex_data(&xs->ex_data, idx); | 800 | return CRYPTO_get_ex_data(&xs->ex_data, idx); |
771 | } | 801 | } |
802 | LCRYPTO_ALIAS(X509_STORE_get_ex_data) | ||
772 | 803 | ||
773 | int | 804 | int |
774 | X509_STORE_set_ex_data(X509_STORE *xs, int idx, void *data) | 805 | X509_STORE_set_ex_data(X509_STORE *xs, int idx, void *data) |
775 | { | 806 | { |
776 | return CRYPTO_set_ex_data(&xs->ex_data, idx, data); | 807 | return CRYPTO_set_ex_data(&xs->ex_data, idx, data); |
777 | } | 808 | } |
809 | LCRYPTO_ALIAS(X509_STORE_set_ex_data) | ||
778 | 810 | ||
779 | int | 811 | int |
780 | X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags) | 812 | X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags) |
781 | { | 813 | { |
782 | return X509_VERIFY_PARAM_set_flags(ctx->param, flags); | 814 | return X509_VERIFY_PARAM_set_flags(ctx->param, flags); |
783 | } | 815 | } |
816 | LCRYPTO_ALIAS(X509_STORE_set_flags) | ||
784 | 817 | ||
785 | int | 818 | int |
786 | X509_STORE_set_depth(X509_STORE *ctx, int depth) | 819 | X509_STORE_set_depth(X509_STORE *ctx, int depth) |
@@ -788,51 +821,60 @@ X509_STORE_set_depth(X509_STORE *ctx, int depth) | |||
788 | X509_VERIFY_PARAM_set_depth(ctx->param, depth); | 821 | X509_VERIFY_PARAM_set_depth(ctx->param, depth); |
789 | return 1; | 822 | return 1; |
790 | } | 823 | } |
824 | LCRYPTO_ALIAS(X509_STORE_set_depth) | ||
791 | 825 | ||
792 | int | 826 | int |
793 | X509_STORE_set_purpose(X509_STORE *ctx, int purpose) | 827 | X509_STORE_set_purpose(X509_STORE *ctx, int purpose) |
794 | { | 828 | { |
795 | return X509_VERIFY_PARAM_set_purpose(ctx->param, purpose); | 829 | return X509_VERIFY_PARAM_set_purpose(ctx->param, purpose); |
796 | } | 830 | } |
831 | LCRYPTO_ALIAS(X509_STORE_set_purpose) | ||
797 | 832 | ||
798 | int | 833 | int |
799 | X509_STORE_set_trust(X509_STORE *ctx, int trust) | 834 | X509_STORE_set_trust(X509_STORE *ctx, int trust) |
800 | { | 835 | { |
801 | return X509_VERIFY_PARAM_set_trust(ctx->param, trust); | 836 | return X509_VERIFY_PARAM_set_trust(ctx->param, trust); |
802 | } | 837 | } |
838 | LCRYPTO_ALIAS(X509_STORE_set_trust) | ||
803 | 839 | ||
804 | int | 840 | int |
805 | X509_STORE_set1_param(X509_STORE *ctx, X509_VERIFY_PARAM *param) | 841 | X509_STORE_set1_param(X509_STORE *ctx, X509_VERIFY_PARAM *param) |
806 | { | 842 | { |
807 | return X509_VERIFY_PARAM_set1(ctx->param, param); | 843 | return X509_VERIFY_PARAM_set1(ctx->param, param); |
808 | } | 844 | } |
845 | LCRYPTO_ALIAS(X509_STORE_set1_param) | ||
809 | 846 | ||
810 | X509_VERIFY_PARAM * | 847 | X509_VERIFY_PARAM * |
811 | X509_STORE_get0_param(X509_STORE *ctx) | 848 | X509_STORE_get0_param(X509_STORE *ctx) |
812 | { | 849 | { |
813 | return ctx->param; | 850 | return ctx->param; |
814 | } | 851 | } |
852 | LCRYPTO_ALIAS(X509_STORE_get0_param) | ||
815 | 853 | ||
816 | void | 854 | void |
817 | X509_STORE_set_verify(X509_STORE *store, X509_STORE_CTX_verify_fn verify) | 855 | X509_STORE_set_verify(X509_STORE *store, X509_STORE_CTX_verify_fn verify) |
818 | { | 856 | { |
819 | store->verify = verify; | 857 | store->verify = verify; |
820 | } | 858 | } |
859 | LCRYPTO_ALIAS(X509_STORE_set_verify) | ||
821 | 860 | ||
822 | X509_STORE_CTX_verify_fn | 861 | X509_STORE_CTX_verify_fn |
823 | X509_STORE_get_verify(X509_STORE *store) | 862 | X509_STORE_get_verify(X509_STORE *store) |
824 | { | 863 | { |
825 | return store->verify; | 864 | return store->verify; |
826 | } | 865 | } |
866 | LCRYPTO_ALIAS(X509_STORE_get_verify) | ||
827 | 867 | ||
828 | void | 868 | void |
829 | X509_STORE_set_verify_cb(X509_STORE *store, X509_STORE_CTX_verify_cb verify_cb) | 869 | X509_STORE_set_verify_cb(X509_STORE *store, X509_STORE_CTX_verify_cb verify_cb) |
830 | { | 870 | { |
831 | store->verify_cb = verify_cb; | 871 | store->verify_cb = verify_cb; |
832 | } | 872 | } |
873 | LCRYPTO_ALIAS(X509_STORE_set_verify_cb) | ||
833 | 874 | ||
834 | X509_STORE_CTX_verify_cb | 875 | X509_STORE_CTX_verify_cb |
835 | X509_STORE_get_verify_cb(X509_STORE *store) | 876 | X509_STORE_get_verify_cb(X509_STORE *store) |
836 | { | 877 | { |
837 | return store->verify_cb; | 878 | return store->verify_cb; |
838 | } | 879 | } |
880 | LCRYPTO_ALIAS(X509_STORE_get_verify_cb) | ||
diff --git a/src/lib/libcrypto/x509/x509_ncons.c b/src/lib/libcrypto/x509/x509_ncons.c index 613527005a..a5d055ae9f 100644 --- a/src/lib/libcrypto/x509/x509_ncons.c +++ b/src/lib/libcrypto/x509/x509_ncons.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_ncons.c,v 1.5 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: x509_ncons.c,v 1.6 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -165,24 +165,28 @@ GENERAL_SUBTREE_new(void) | |||
165 | { | 165 | { |
166 | return (GENERAL_SUBTREE*)ASN1_item_new(&GENERAL_SUBTREE_it); | 166 | return (GENERAL_SUBTREE*)ASN1_item_new(&GENERAL_SUBTREE_it); |
167 | } | 167 | } |
168 | LCRYPTO_ALIAS(GENERAL_SUBTREE_new) | ||
168 | 169 | ||
169 | void | 170 | void |
170 | GENERAL_SUBTREE_free(GENERAL_SUBTREE *a) | 171 | GENERAL_SUBTREE_free(GENERAL_SUBTREE *a) |
171 | { | 172 | { |
172 | ASN1_item_free((ASN1_VALUE *)a, &GENERAL_SUBTREE_it); | 173 | ASN1_item_free((ASN1_VALUE *)a, &GENERAL_SUBTREE_it); |
173 | } | 174 | } |
175 | LCRYPTO_ALIAS(GENERAL_SUBTREE_free) | ||
174 | 176 | ||
175 | NAME_CONSTRAINTS * | 177 | NAME_CONSTRAINTS * |
176 | NAME_CONSTRAINTS_new(void) | 178 | NAME_CONSTRAINTS_new(void) |
177 | { | 179 | { |
178 | return (NAME_CONSTRAINTS*)ASN1_item_new(&NAME_CONSTRAINTS_it); | 180 | return (NAME_CONSTRAINTS*)ASN1_item_new(&NAME_CONSTRAINTS_it); |
179 | } | 181 | } |
182 | LCRYPTO_ALIAS(NAME_CONSTRAINTS_new) | ||
180 | 183 | ||
181 | void | 184 | void |
182 | NAME_CONSTRAINTS_free(NAME_CONSTRAINTS *a) | 185 | NAME_CONSTRAINTS_free(NAME_CONSTRAINTS *a) |
183 | { | 186 | { |
184 | ASN1_item_free((ASN1_VALUE *)a, &NAME_CONSTRAINTS_it); | 187 | ASN1_item_free((ASN1_VALUE *)a, &NAME_CONSTRAINTS_it); |
185 | } | 188 | } |
189 | LCRYPTO_ALIAS(NAME_CONSTRAINTS_free) | ||
186 | 190 | ||
187 | static void * | 191 | static void * |
188 | v2i_NAME_CONSTRAINTS(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | 192 | v2i_NAME_CONSTRAINTS(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
@@ -349,6 +353,7 @@ NAME_CONSTRAINTS_check(X509 *x, NAME_CONSTRAINTS *nc) | |||
349 | } | 353 | } |
350 | return X509_V_OK; | 354 | return X509_V_OK; |
351 | } | 355 | } |
356 | LCRYPTO_ALIAS(NAME_CONSTRAINTS_check) | ||
352 | static int | 357 | static int |
353 | nc_match(GENERAL_NAME *gen, NAME_CONSTRAINTS *nc) | 358 | nc_match(GENERAL_NAME *gen, NAME_CONSTRAINTS *nc) |
354 | { | 359 | { |
diff --git a/src/lib/libcrypto/x509/x509_obj.c b/src/lib/libcrypto/x509/x509_obj.c index 58ffa3a2f2..d27e59c741 100644 --- a/src/lib/libcrypto/x509/x509_obj.c +++ b/src/lib/libcrypto/x509/x509_obj.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_obj.c,v 1.19 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: x509_obj.c,v 1.20 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -179,3 +179,4 @@ err: | |||
179 | BUF_MEM_free(b); | 179 | BUF_MEM_free(b); |
180 | return (NULL); | 180 | return (NULL); |
181 | } | 181 | } |
182 | LCRYPTO_ALIAS(X509_NAME_oneline) | ||
diff --git a/src/lib/libcrypto/x509/x509_pcia.c b/src/lib/libcrypto/x509/x509_pcia.c index b639aa336d..fb14384e99 100644 --- a/src/lib/libcrypto/x509/x509_pcia.c +++ b/src/lib/libcrypto/x509/x509_pcia.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_pcia.c,v 1.1 2020/06/04 15:19:32 jsing Exp $ */ | 1 | /* $OpenBSD: x509_pcia.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Contributed to the OpenSSL Project 2004 | 2 | /* Contributed to the OpenSSL Project 2004 |
3 | * by Richard Levitte (richard@levitte.org) | 3 | * by Richard Levitte (richard@levitte.org) |
4 | */ | 4 | */ |
@@ -72,24 +72,28 @@ d2i_PROXY_POLICY(PROXY_POLICY **a, const unsigned char **in, long len) | |||
72 | return (PROXY_POLICY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 72 | return (PROXY_POLICY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
73 | &PROXY_POLICY_it); | 73 | &PROXY_POLICY_it); |
74 | } | 74 | } |
75 | LCRYPTO_ALIAS(d2i_PROXY_POLICY) | ||
75 | 76 | ||
76 | int | 77 | int |
77 | i2d_PROXY_POLICY(PROXY_POLICY *a, unsigned char **out) | 78 | i2d_PROXY_POLICY(PROXY_POLICY *a, unsigned char **out) |
78 | { | 79 | { |
79 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PROXY_POLICY_it); | 80 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PROXY_POLICY_it); |
80 | } | 81 | } |
82 | LCRYPTO_ALIAS(i2d_PROXY_POLICY) | ||
81 | 83 | ||
82 | PROXY_POLICY * | 84 | PROXY_POLICY * |
83 | PROXY_POLICY_new(void) | 85 | PROXY_POLICY_new(void) |
84 | { | 86 | { |
85 | return (PROXY_POLICY *)ASN1_item_new(&PROXY_POLICY_it); | 87 | return (PROXY_POLICY *)ASN1_item_new(&PROXY_POLICY_it); |
86 | } | 88 | } |
89 | LCRYPTO_ALIAS(PROXY_POLICY_new) | ||
87 | 90 | ||
88 | void | 91 | void |
89 | PROXY_POLICY_free(PROXY_POLICY *a) | 92 | PROXY_POLICY_free(PROXY_POLICY *a) |
90 | { | 93 | { |
91 | ASN1_item_free((ASN1_VALUE *)a, &PROXY_POLICY_it); | 94 | ASN1_item_free((ASN1_VALUE *)a, &PROXY_POLICY_it); |
92 | } | 95 | } |
96 | LCRYPTO_ALIAS(PROXY_POLICY_free) | ||
93 | 97 | ||
94 | static const ASN1_TEMPLATE PROXY_CERT_INFO_EXTENSION_seq_tt[] = { | 98 | static const ASN1_TEMPLATE PROXY_CERT_INFO_EXTENSION_seq_tt[] = { |
95 | { | 99 | { |
@@ -125,21 +129,25 @@ d2i_PROXY_CERT_INFO_EXTENSION(PROXY_CERT_INFO_EXTENSION **a, const unsigned char | |||
125 | return (PROXY_CERT_INFO_EXTENSION *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 129 | return (PROXY_CERT_INFO_EXTENSION *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
126 | &PROXY_CERT_INFO_EXTENSION_it); | 130 | &PROXY_CERT_INFO_EXTENSION_it); |
127 | } | 131 | } |
132 | LCRYPTO_ALIAS(d2i_PROXY_CERT_INFO_EXTENSION) | ||
128 | 133 | ||
129 | int | 134 | int |
130 | i2d_PROXY_CERT_INFO_EXTENSION(PROXY_CERT_INFO_EXTENSION *a, unsigned char **out) | 135 | i2d_PROXY_CERT_INFO_EXTENSION(PROXY_CERT_INFO_EXTENSION *a, unsigned char **out) |
131 | { | 136 | { |
132 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PROXY_CERT_INFO_EXTENSION_it); | 137 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PROXY_CERT_INFO_EXTENSION_it); |
133 | } | 138 | } |
139 | LCRYPTO_ALIAS(i2d_PROXY_CERT_INFO_EXTENSION) | ||
134 | 140 | ||
135 | PROXY_CERT_INFO_EXTENSION * | 141 | PROXY_CERT_INFO_EXTENSION * |
136 | PROXY_CERT_INFO_EXTENSION_new(void) | 142 | PROXY_CERT_INFO_EXTENSION_new(void) |
137 | { | 143 | { |
138 | return (PROXY_CERT_INFO_EXTENSION *)ASN1_item_new(&PROXY_CERT_INFO_EXTENSION_it); | 144 | return (PROXY_CERT_INFO_EXTENSION *)ASN1_item_new(&PROXY_CERT_INFO_EXTENSION_it); |
139 | } | 145 | } |
146 | LCRYPTO_ALIAS(PROXY_CERT_INFO_EXTENSION_new) | ||
140 | 147 | ||
141 | void | 148 | void |
142 | PROXY_CERT_INFO_EXTENSION_free(PROXY_CERT_INFO_EXTENSION *a) | 149 | PROXY_CERT_INFO_EXTENSION_free(PROXY_CERT_INFO_EXTENSION *a) |
143 | { | 150 | { |
144 | ASN1_item_free((ASN1_VALUE *)a, &PROXY_CERT_INFO_EXTENSION_it); | 151 | ASN1_item_free((ASN1_VALUE *)a, &PROXY_CERT_INFO_EXTENSION_it); |
145 | } | 152 | } |
153 | LCRYPTO_ALIAS(PROXY_CERT_INFO_EXTENSION_free) | ||
diff --git a/src/lib/libcrypto/x509/x509_pcons.c b/src/lib/libcrypto/x509/x509_pcons.c index 69bf43377f..2448147fdb 100644 --- a/src/lib/libcrypto/x509/x509_pcons.c +++ b/src/lib/libcrypto/x509/x509_pcons.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_pcons.c,v 1.1 2020/06/04 15:19:32 jsing Exp $ */ | 1 | /* $OpenBSD: x509_pcons.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -121,12 +121,14 @@ POLICY_CONSTRAINTS_new(void) | |||
121 | { | 121 | { |
122 | return (POLICY_CONSTRAINTS*)ASN1_item_new(&POLICY_CONSTRAINTS_it); | 122 | return (POLICY_CONSTRAINTS*)ASN1_item_new(&POLICY_CONSTRAINTS_it); |
123 | } | 123 | } |
124 | LCRYPTO_ALIAS(POLICY_CONSTRAINTS_new) | ||
124 | 125 | ||
125 | void | 126 | void |
126 | POLICY_CONSTRAINTS_free(POLICY_CONSTRAINTS *a) | 127 | POLICY_CONSTRAINTS_free(POLICY_CONSTRAINTS *a) |
127 | { | 128 | { |
128 | ASN1_item_free((ASN1_VALUE *)a, &POLICY_CONSTRAINTS_it); | 129 | ASN1_item_free((ASN1_VALUE *)a, &POLICY_CONSTRAINTS_it); |
129 | } | 130 | } |
131 | LCRYPTO_ALIAS(POLICY_CONSTRAINTS_free) | ||
130 | 132 | ||
131 | static STACK_OF(CONF_VALUE) * | 133 | static STACK_OF(CONF_VALUE) * |
132 | i2v_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, void *a, | 134 | i2v_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, void *a, |
diff --git a/src/lib/libcrypto/x509/x509_pku.c b/src/lib/libcrypto/x509/x509_pku.c index 9b82ad3d5f..f65d0dfc69 100644 --- a/src/lib/libcrypto/x509/x509_pku.c +++ b/src/lib/libcrypto/x509/x509_pku.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_pku.c,v 1.1 2020/06/04 15:19:32 jsing Exp $ */ | 1 | /* $OpenBSD: x509_pku.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -116,24 +116,28 @@ d2i_PKEY_USAGE_PERIOD(PKEY_USAGE_PERIOD **a, const unsigned char **in, long len) | |||
116 | return (PKEY_USAGE_PERIOD *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 116 | return (PKEY_USAGE_PERIOD *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
117 | &PKEY_USAGE_PERIOD_it); | 117 | &PKEY_USAGE_PERIOD_it); |
118 | } | 118 | } |
119 | LCRYPTO_ALIAS(d2i_PKEY_USAGE_PERIOD) | ||
119 | 120 | ||
120 | int | 121 | int |
121 | i2d_PKEY_USAGE_PERIOD(PKEY_USAGE_PERIOD *a, unsigned char **out) | 122 | i2d_PKEY_USAGE_PERIOD(PKEY_USAGE_PERIOD *a, unsigned char **out) |
122 | { | 123 | { |
123 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKEY_USAGE_PERIOD_it); | 124 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKEY_USAGE_PERIOD_it); |
124 | } | 125 | } |
126 | LCRYPTO_ALIAS(i2d_PKEY_USAGE_PERIOD) | ||
125 | 127 | ||
126 | PKEY_USAGE_PERIOD * | 128 | PKEY_USAGE_PERIOD * |
127 | PKEY_USAGE_PERIOD_new(void) | 129 | PKEY_USAGE_PERIOD_new(void) |
128 | { | 130 | { |
129 | return (PKEY_USAGE_PERIOD *)ASN1_item_new(&PKEY_USAGE_PERIOD_it); | 131 | return (PKEY_USAGE_PERIOD *)ASN1_item_new(&PKEY_USAGE_PERIOD_it); |
130 | } | 132 | } |
133 | LCRYPTO_ALIAS(PKEY_USAGE_PERIOD_new) | ||
131 | 134 | ||
132 | void | 135 | void |
133 | PKEY_USAGE_PERIOD_free(PKEY_USAGE_PERIOD *a) | 136 | PKEY_USAGE_PERIOD_free(PKEY_USAGE_PERIOD *a) |
134 | { | 137 | { |
135 | ASN1_item_free((ASN1_VALUE *)a, &PKEY_USAGE_PERIOD_it); | 138 | ASN1_item_free((ASN1_VALUE *)a, &PKEY_USAGE_PERIOD_it); |
136 | } | 139 | } |
140 | LCRYPTO_ALIAS(PKEY_USAGE_PERIOD_free) | ||
137 | 141 | ||
138 | static int | 142 | static int |
139 | i2r_PKEY_USAGE_PERIOD(X509V3_EXT_METHOD *method, PKEY_USAGE_PERIOD *usage, | 143 | i2r_PKEY_USAGE_PERIOD(X509V3_EXT_METHOD *method, PKEY_USAGE_PERIOD *usage, |
diff --git a/src/lib/libcrypto/x509/x509_pmaps.c b/src/lib/libcrypto/x509/x509_pmaps.c index 352f85a025..3bc4b9d637 100644 --- a/src/lib/libcrypto/x509/x509_pmaps.c +++ b/src/lib/libcrypto/x509/x509_pmaps.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_pmaps.c,v 1.1 2020/06/04 15:19:32 jsing Exp $ */ | 1 | /* $OpenBSD: x509_pmaps.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -137,12 +137,14 @@ POLICY_MAPPING_new(void) | |||
137 | { | 137 | { |
138 | return (POLICY_MAPPING*)ASN1_item_new(&POLICY_MAPPING_it); | 138 | return (POLICY_MAPPING*)ASN1_item_new(&POLICY_MAPPING_it); |
139 | } | 139 | } |
140 | LCRYPTO_ALIAS(POLICY_MAPPING_new) | ||
140 | 141 | ||
141 | void | 142 | void |
142 | POLICY_MAPPING_free(POLICY_MAPPING *a) | 143 | POLICY_MAPPING_free(POLICY_MAPPING *a) |
143 | { | 144 | { |
144 | ASN1_item_free((ASN1_VALUE *)a, &POLICY_MAPPING_it); | 145 | ASN1_item_free((ASN1_VALUE *)a, &POLICY_MAPPING_it); |
145 | } | 146 | } |
147 | LCRYPTO_ALIAS(POLICY_MAPPING_free) | ||
146 | 148 | ||
147 | static STACK_OF(CONF_VALUE) * | 149 | static STACK_OF(CONF_VALUE) * |
148 | i2v_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method, void *a, | 150 | i2v_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method, void *a, |
diff --git a/src/lib/libcrypto/x509/x509_prn.c b/src/lib/libcrypto/x509/x509_prn.c index 4977051d4a..b7db631500 100644 --- a/src/lib/libcrypto/x509/x509_prn.c +++ b/src/lib/libcrypto/x509/x509_prn.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_prn.c,v 1.2 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: x509_prn.c,v 1.3 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -99,6 +99,7 @@ X509V3_EXT_val_prn(BIO *out, STACK_OF(CONF_VALUE) *val, int indent, int ml) | |||
99 | BIO_puts(out, "\n"); | 99 | BIO_puts(out, "\n"); |
100 | } | 100 | } |
101 | } | 101 | } |
102 | LCRYPTO_ALIAS(X509V3_EXT_val_prn) | ||
102 | 103 | ||
103 | /* Main routine: print out a general extension */ | 104 | /* Main routine: print out a general extension */ |
104 | 105 | ||
@@ -152,6 +153,7 @@ err: | |||
152 | method->ext_free(ext_str); | 153 | method->ext_free(ext_str); |
153 | return ok; | 154 | return ok; |
154 | } | 155 | } |
156 | LCRYPTO_ALIAS(X509V3_EXT_print) | ||
155 | 157 | ||
156 | int | 158 | int |
157 | X509V3_extensions_print(BIO *bp, const char *title, | 159 | X509V3_extensions_print(BIO *bp, const char *title, |
@@ -187,6 +189,7 @@ X509V3_extensions_print(BIO *bp, const char *title, | |||
187 | } | 189 | } |
188 | return 1; | 190 | return 1; |
189 | } | 191 | } |
192 | LCRYPTO_ALIAS(X509V3_extensions_print) | ||
190 | 193 | ||
191 | static int | 194 | static int |
192 | unknown_ext_print(BIO *out, X509_EXTENSION *ext, unsigned long flag, | 195 | unknown_ext_print(BIO *out, X509_EXTENSION *ext, unsigned long flag, |
@@ -225,3 +228,4 @@ X509V3_EXT_print_fp(FILE *fp, X509_EXTENSION *ext, int flag, int indent) | |||
225 | BIO_free(bio_tmp); | 228 | BIO_free(bio_tmp); |
226 | return ret; | 229 | return ret; |
227 | } | 230 | } |
231 | LCRYPTO_ALIAS(X509V3_EXT_print_fp) | ||
diff --git a/src/lib/libcrypto/x509/x509_purp.c b/src/lib/libcrypto/x509/x509_purp.c index ab5e7cb3c9..d5027377bf 100644 --- a/src/lib/libcrypto/x509/x509_purp.c +++ b/src/lib/libcrypto/x509/x509_purp.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_purp.c,v 1.16 2022/05/10 19:42:52 tb Exp $ */ | 1 | /* $OpenBSD: x509_purp.c,v 1.17 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2001. | 3 | * project 2001. |
4 | */ | 4 | */ |
@@ -146,6 +146,7 @@ X509_check_purpose(X509 *x, int id, int ca) | |||
146 | pt = X509_PURPOSE_get0(idx); | 146 | pt = X509_PURPOSE_get0(idx); |
147 | return pt->check_purpose(pt, x, ca); | 147 | return pt->check_purpose(pt, x, ca); |
148 | } | 148 | } |
149 | LCRYPTO_ALIAS(X509_check_purpose) | ||
149 | 150 | ||
150 | int | 151 | int |
151 | X509_PURPOSE_set(int *p, int purpose) | 152 | X509_PURPOSE_set(int *p, int purpose) |
@@ -157,6 +158,7 @@ X509_PURPOSE_set(int *p, int purpose) | |||
157 | *p = purpose; | 158 | *p = purpose; |
158 | return 1; | 159 | return 1; |
159 | } | 160 | } |
161 | LCRYPTO_ALIAS(X509_PURPOSE_set) | ||
160 | 162 | ||
161 | int | 163 | int |
162 | X509_PURPOSE_get_count(void) | 164 | X509_PURPOSE_get_count(void) |
@@ -165,6 +167,7 @@ X509_PURPOSE_get_count(void) | |||
165 | return X509_PURPOSE_COUNT; | 167 | return X509_PURPOSE_COUNT; |
166 | return sk_X509_PURPOSE_num(xptable) + X509_PURPOSE_COUNT; | 168 | return sk_X509_PURPOSE_num(xptable) + X509_PURPOSE_COUNT; |
167 | } | 169 | } |
170 | LCRYPTO_ALIAS(X509_PURPOSE_get_count) | ||
168 | 171 | ||
169 | X509_PURPOSE * | 172 | X509_PURPOSE * |
170 | X509_PURPOSE_get0(int idx) | 173 | X509_PURPOSE_get0(int idx) |
@@ -175,6 +178,7 @@ X509_PURPOSE_get0(int idx) | |||
175 | return xstandard + idx; | 178 | return xstandard + idx; |
176 | return sk_X509_PURPOSE_value(xptable, idx - X509_PURPOSE_COUNT); | 179 | return sk_X509_PURPOSE_value(xptable, idx - X509_PURPOSE_COUNT); |
177 | } | 180 | } |
181 | LCRYPTO_ALIAS(X509_PURPOSE_get0) | ||
178 | 182 | ||
179 | int | 183 | int |
180 | X509_PURPOSE_get_by_sname(const char *sname) | 184 | X509_PURPOSE_get_by_sname(const char *sname) |
@@ -189,6 +193,7 @@ X509_PURPOSE_get_by_sname(const char *sname) | |||
189 | } | 193 | } |
190 | return -1; | 194 | return -1; |
191 | } | 195 | } |
196 | LCRYPTO_ALIAS(X509_PURPOSE_get_by_sname) | ||
192 | 197 | ||
193 | int | 198 | int |
194 | X509_PURPOSE_get_by_id(int purpose) | 199 | X509_PURPOSE_get_by_id(int purpose) |
@@ -206,6 +211,7 @@ X509_PURPOSE_get_by_id(int purpose) | |||
206 | return -1; | 211 | return -1; |
207 | return idx + X509_PURPOSE_COUNT; | 212 | return idx + X509_PURPOSE_COUNT; |
208 | } | 213 | } |
214 | LCRYPTO_ALIAS(X509_PURPOSE_get_by_id) | ||
209 | 215 | ||
210 | int | 216 | int |
211 | X509_PURPOSE_add(int id, int trust, int flags, | 217 | X509_PURPOSE_add(int id, int trust, int flags, |
@@ -280,6 +286,7 @@ err: | |||
280 | X509V3error(ERR_R_MALLOC_FAILURE); | 286 | X509V3error(ERR_R_MALLOC_FAILURE); |
281 | return 0; | 287 | return 0; |
282 | } | 288 | } |
289 | LCRYPTO_ALIAS(X509_PURPOSE_add) | ||
283 | 290 | ||
284 | static void | 291 | static void |
285 | xptable_free(X509_PURPOSE *p) | 292 | xptable_free(X509_PURPOSE *p) |
@@ -301,30 +308,35 @@ X509_PURPOSE_cleanup(void) | |||
301 | sk_X509_PURPOSE_pop_free(xptable, xptable_free); | 308 | sk_X509_PURPOSE_pop_free(xptable, xptable_free); |
302 | xptable = NULL; | 309 | xptable = NULL; |
303 | } | 310 | } |
311 | LCRYPTO_ALIAS(X509_PURPOSE_cleanup) | ||
304 | 312 | ||
305 | int | 313 | int |
306 | X509_PURPOSE_get_id(const X509_PURPOSE *xp) | 314 | X509_PURPOSE_get_id(const X509_PURPOSE *xp) |
307 | { | 315 | { |
308 | return xp->purpose; | 316 | return xp->purpose; |
309 | } | 317 | } |
318 | LCRYPTO_ALIAS(X509_PURPOSE_get_id) | ||
310 | 319 | ||
311 | char * | 320 | char * |
312 | X509_PURPOSE_get0_name(const X509_PURPOSE *xp) | 321 | X509_PURPOSE_get0_name(const X509_PURPOSE *xp) |
313 | { | 322 | { |
314 | return xp->name; | 323 | return xp->name; |
315 | } | 324 | } |
325 | LCRYPTO_ALIAS(X509_PURPOSE_get0_name) | ||
316 | 326 | ||
317 | char * | 327 | char * |
318 | X509_PURPOSE_get0_sname(const X509_PURPOSE *xp) | 328 | X509_PURPOSE_get0_sname(const X509_PURPOSE *xp) |
319 | { | 329 | { |
320 | return xp->sname; | 330 | return xp->sname; |
321 | } | 331 | } |
332 | LCRYPTO_ALIAS(X509_PURPOSE_get0_sname) | ||
322 | 333 | ||
323 | int | 334 | int |
324 | X509_PURPOSE_get_trust(const X509_PURPOSE *xp) | 335 | X509_PURPOSE_get_trust(const X509_PURPOSE *xp) |
325 | { | 336 | { |
326 | return xp->trust; | 337 | return xp->trust; |
327 | } | 338 | } |
339 | LCRYPTO_ALIAS(X509_PURPOSE_get_trust) | ||
328 | 340 | ||
329 | static int | 341 | static int |
330 | nid_cmp(const int *a, const int *b) | 342 | nid_cmp(const int *a, const int *b) |
@@ -390,6 +402,7 @@ X509_supported_extension(X509_EXTENSION *ex) | |||
390 | return 1; | 402 | return 1; |
391 | return 0; | 403 | return 0; |
392 | } | 404 | } |
405 | LCRYPTO_ALIAS(X509_supported_extension) | ||
393 | 406 | ||
394 | static void | 407 | static void |
395 | setup_dp(X509 *x, DIST_POINT *dp) | 408 | setup_dp(X509 *x, DIST_POINT *dp) |
@@ -675,6 +688,7 @@ X509_check_ca(X509 *x) | |||
675 | 688 | ||
676 | return check_ca(x); | 689 | return check_ca(x); |
677 | } | 690 | } |
691 | LCRYPTO_ALIAS(X509_check_ca) | ||
678 | 692 | ||
679 | /* Check SSL CA: common checks for SSL client and server */ | 693 | /* Check SSL CA: common checks for SSL client and server */ |
680 | static int | 694 | static int |
@@ -909,6 +923,7 @@ X509_check_issued(X509 *issuer, X509 *subject) | |||
909 | return X509_V_ERR_KEYUSAGE_NO_CERTSIGN; | 923 | return X509_V_ERR_KEYUSAGE_NO_CERTSIGN; |
910 | return X509_V_OK; | 924 | return X509_V_OK; |
911 | } | 925 | } |
926 | LCRYPTO_ALIAS(X509_check_issued) | ||
912 | 927 | ||
913 | int | 928 | int |
914 | X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid) | 929 | X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid) |
@@ -948,6 +963,7 @@ X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid) | |||
948 | } | 963 | } |
949 | return X509_V_OK; | 964 | return X509_V_OK; |
950 | } | 965 | } |
966 | LCRYPTO_ALIAS(X509_check_akid) | ||
951 | 967 | ||
952 | uint32_t | 968 | uint32_t |
953 | X509_get_extension_flags(X509 *x) | 969 | X509_get_extension_flags(X509 *x) |
@@ -958,6 +974,7 @@ X509_get_extension_flags(X509 *x) | |||
958 | 974 | ||
959 | return x->ex_flags; | 975 | return x->ex_flags; |
960 | } | 976 | } |
977 | LCRYPTO_ALIAS(X509_get_extension_flags) | ||
961 | 978 | ||
962 | uint32_t | 979 | uint32_t |
963 | X509_get_key_usage(X509 *x) | 980 | X509_get_key_usage(X509 *x) |
@@ -971,6 +988,7 @@ X509_get_key_usage(X509 *x) | |||
971 | 988 | ||
972 | return UINT32_MAX; | 989 | return UINT32_MAX; |
973 | } | 990 | } |
991 | LCRYPTO_ALIAS(X509_get_key_usage) | ||
974 | 992 | ||
975 | uint32_t | 993 | uint32_t |
976 | X509_get_extended_key_usage(X509 *x) | 994 | X509_get_extended_key_usage(X509 *x) |
@@ -984,3 +1002,4 @@ X509_get_extended_key_usage(X509 *x) | |||
984 | 1002 | ||
985 | return UINT32_MAX; | 1003 | return UINT32_MAX; |
986 | } | 1004 | } |
1005 | LCRYPTO_ALIAS(X509_get_extended_key_usage) | ||
diff --git a/src/lib/libcrypto/x509/x509_r2x.c b/src/lib/libcrypto/x509/x509_r2x.c index b3b8aa75ed..e69b54fc5b 100644 --- a/src/lib/libcrypto/x509/x509_r2x.c +++ b/src/lib/libcrypto/x509/x509_r2x.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_r2x.c,v 1.13 2021/11/03 14:36:21 schwarze Exp $ */ | 1 | /* $OpenBSD: x509_r2x.c,v 1.14 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -116,3 +116,4 @@ err: | |||
116 | X509_free(ret); | 116 | X509_free(ret); |
117 | return NULL; | 117 | return NULL; |
118 | } | 118 | } |
119 | LCRYPTO_ALIAS(X509_REQ_to_X509) | ||
diff --git a/src/lib/libcrypto/x509/x509_req.c b/src/lib/libcrypto/x509/x509_req.c index c0a2a64a0b..5155d743ab 100644 --- a/src/lib/libcrypto/x509/x509_req.c +++ b/src/lib/libcrypto/x509/x509_req.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_req.c,v 1.29 2022/08/18 16:26:33 tb Exp $ */ | 1 | /* $OpenBSD: x509_req.c,v 1.30 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -115,6 +115,7 @@ err: | |||
115 | X509_REQ_free(ret); | 115 | X509_REQ_free(ret); |
116 | return (NULL); | 116 | return (NULL); |
117 | } | 117 | } |
118 | LCRYPTO_ALIAS(X509_to_X509_REQ) | ||
118 | 119 | ||
119 | EVP_PKEY * | 120 | EVP_PKEY * |
120 | X509_REQ_get_pubkey(X509_REQ *req) | 121 | X509_REQ_get_pubkey(X509_REQ *req) |
@@ -123,6 +124,7 @@ X509_REQ_get_pubkey(X509_REQ *req) | |||
123 | return (NULL); | 124 | return (NULL); |
124 | return (X509_PUBKEY_get(req->req_info->pubkey)); | 125 | return (X509_PUBKEY_get(req->req_info->pubkey)); |
125 | } | 126 | } |
127 | LCRYPTO_ALIAS(X509_REQ_get_pubkey) | ||
126 | 128 | ||
127 | EVP_PKEY * | 129 | EVP_PKEY * |
128 | X509_REQ_get0_pubkey(X509_REQ *req) | 130 | X509_REQ_get0_pubkey(X509_REQ *req) |
@@ -131,6 +133,7 @@ X509_REQ_get0_pubkey(X509_REQ *req) | |||
131 | return NULL; | 133 | return NULL; |
132 | return X509_PUBKEY_get0(req->req_info->pubkey); | 134 | return X509_PUBKEY_get0(req->req_info->pubkey); |
133 | } | 135 | } |
136 | LCRYPTO_ALIAS(X509_REQ_get0_pubkey) | ||
134 | 137 | ||
135 | int | 138 | int |
136 | X509_REQ_check_private_key(X509_REQ *x, EVP_PKEY *k) | 139 | X509_REQ_check_private_key(X509_REQ *x, EVP_PKEY *k) |
@@ -170,6 +173,7 @@ X509_REQ_check_private_key(X509_REQ *x, EVP_PKEY *k) | |||
170 | 173 | ||
171 | return (ok); | 174 | return (ok); |
172 | } | 175 | } |
176 | LCRYPTO_ALIAS(X509_REQ_check_private_key) | ||
173 | 177 | ||
174 | /* It seems several organisations had the same idea of including a list of | 178 | /* It seems several organisations had the same idea of including a list of |
175 | * extensions in a certificate request. There are at least two OIDs that are | 179 | * extensions in a certificate request. There are at least two OIDs that are |
@@ -193,18 +197,21 @@ X509_REQ_extension_nid(int req_nid) | |||
193 | return 1; | 197 | return 1; |
194 | } | 198 | } |
195 | } | 199 | } |
200 | LCRYPTO_ALIAS(X509_REQ_extension_nid) | ||
196 | 201 | ||
197 | int * | 202 | int * |
198 | X509_REQ_get_extension_nids(void) | 203 | X509_REQ_get_extension_nids(void) |
199 | { | 204 | { |
200 | return ext_nids; | 205 | return ext_nids; |
201 | } | 206 | } |
207 | LCRYPTO_ALIAS(X509_REQ_get_extension_nids) | ||
202 | 208 | ||
203 | void | 209 | void |
204 | X509_REQ_set_extension_nids(int *nids) | 210 | X509_REQ_set_extension_nids(int *nids) |
205 | { | 211 | { |
206 | ext_nids = nids; | 212 | ext_nids = nids; |
207 | } | 213 | } |
214 | LCRYPTO_ALIAS(X509_REQ_set_extension_nids) | ||
208 | 215 | ||
209 | STACK_OF(X509_EXTENSION) * | 216 | STACK_OF(X509_EXTENSION) * |
210 | X509_REQ_get_extensions(X509_REQ *req) | 217 | X509_REQ_get_extensions(X509_REQ *req) |
@@ -231,6 +238,7 @@ X509_REQ_get_extensions(X509_REQ *req) | |||
231 | p = ext->value.sequence->data; | 238 | p = ext->value.sequence->data; |
232 | return d2i_X509_EXTENSIONS(NULL, &p, ext->value.sequence->length); | 239 | return d2i_X509_EXTENSIONS(NULL, &p, ext->value.sequence->length); |
233 | } | 240 | } |
241 | LCRYPTO_ALIAS(X509_REQ_get_extensions) | ||
234 | 242 | ||
235 | /* | 243 | /* |
236 | * Add a STACK_OF extensions to a certificate request: allow alternative OIDs | 244 | * Add a STACK_OF extensions to a certificate request: allow alternative OIDs |
@@ -254,6 +262,7 @@ X509_REQ_add_extensions_nid(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts, | |||
254 | 262 | ||
255 | return rv; | 263 | return rv; |
256 | } | 264 | } |
265 | LCRYPTO_ALIAS(X509_REQ_add_extensions_nid) | ||
257 | 266 | ||
258 | /* This is the normal usage: use the "official" OID */ | 267 | /* This is the normal usage: use the "official" OID */ |
259 | int | 268 | int |
@@ -261,6 +270,7 @@ X509_REQ_add_extensions(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts) | |||
261 | { | 270 | { |
262 | return X509_REQ_add_extensions_nid(req, exts, NID_ext_req); | 271 | return X509_REQ_add_extensions_nid(req, exts, NID_ext_req); |
263 | } | 272 | } |
273 | LCRYPTO_ALIAS(X509_REQ_add_extensions) | ||
264 | 274 | ||
265 | /* Request attribute functions */ | 275 | /* Request attribute functions */ |
266 | 276 | ||
@@ -269,12 +279,14 @@ X509_REQ_get_attr_count(const X509_REQ *req) | |||
269 | { | 279 | { |
270 | return X509at_get_attr_count(req->req_info->attributes); | 280 | return X509at_get_attr_count(req->req_info->attributes); |
271 | } | 281 | } |
282 | LCRYPTO_ALIAS(X509_REQ_get_attr_count) | ||
272 | 283 | ||
273 | int | 284 | int |
274 | X509_REQ_get_attr_by_NID(const X509_REQ *req, int nid, int lastpos) | 285 | X509_REQ_get_attr_by_NID(const X509_REQ *req, int nid, int lastpos) |
275 | { | 286 | { |
276 | return X509at_get_attr_by_NID(req->req_info->attributes, nid, lastpos); | 287 | return X509at_get_attr_by_NID(req->req_info->attributes, nid, lastpos); |
277 | } | 288 | } |
289 | LCRYPTO_ALIAS(X509_REQ_get_attr_by_NID) | ||
278 | 290 | ||
279 | int | 291 | int |
280 | X509_REQ_get_attr_by_OBJ(const X509_REQ *req, const ASN1_OBJECT *obj, | 292 | X509_REQ_get_attr_by_OBJ(const X509_REQ *req, const ASN1_OBJECT *obj, |
@@ -282,18 +294,21 @@ X509_REQ_get_attr_by_OBJ(const X509_REQ *req, const ASN1_OBJECT *obj, | |||
282 | { | 294 | { |
283 | return X509at_get_attr_by_OBJ(req->req_info->attributes, obj, lastpos); | 295 | return X509at_get_attr_by_OBJ(req->req_info->attributes, obj, lastpos); |
284 | } | 296 | } |
297 | LCRYPTO_ALIAS(X509_REQ_get_attr_by_OBJ) | ||
285 | 298 | ||
286 | X509_ATTRIBUTE * | 299 | X509_ATTRIBUTE * |
287 | X509_REQ_get_attr(const X509_REQ *req, int loc) | 300 | X509_REQ_get_attr(const X509_REQ *req, int loc) |
288 | { | 301 | { |
289 | return X509at_get_attr(req->req_info->attributes, loc); | 302 | return X509at_get_attr(req->req_info->attributes, loc); |
290 | } | 303 | } |
304 | LCRYPTO_ALIAS(X509_REQ_get_attr) | ||
291 | 305 | ||
292 | X509_ATTRIBUTE * | 306 | X509_ATTRIBUTE * |
293 | X509_REQ_delete_attr(X509_REQ *req, int loc) | 307 | X509_REQ_delete_attr(X509_REQ *req, int loc) |
294 | { | 308 | { |
295 | return X509at_delete_attr(req->req_info->attributes, loc); | 309 | return X509at_delete_attr(req->req_info->attributes, loc); |
296 | } | 310 | } |
311 | LCRYPTO_ALIAS(X509_REQ_delete_attr) | ||
297 | 312 | ||
298 | int | 313 | int |
299 | X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr) | 314 | X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr) |
@@ -302,6 +317,7 @@ X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr) | |||
302 | return 1; | 317 | return 1; |
303 | return 0; | 318 | return 0; |
304 | } | 319 | } |
320 | LCRYPTO_ALIAS(X509_REQ_add1_attr) | ||
305 | 321 | ||
306 | int | 322 | int |
307 | X509_REQ_add1_attr_by_OBJ(X509_REQ *req, const ASN1_OBJECT *obj, int type, | 323 | X509_REQ_add1_attr_by_OBJ(X509_REQ *req, const ASN1_OBJECT *obj, int type, |
@@ -312,6 +328,7 @@ X509_REQ_add1_attr_by_OBJ(X509_REQ *req, const ASN1_OBJECT *obj, int type, | |||
312 | return 1; | 328 | return 1; |
313 | return 0; | 329 | return 0; |
314 | } | 330 | } |
331 | LCRYPTO_ALIAS(X509_REQ_add1_attr_by_OBJ) | ||
315 | 332 | ||
316 | int | 333 | int |
317 | X509_REQ_add1_attr_by_NID(X509_REQ *req, int nid, int type, | 334 | X509_REQ_add1_attr_by_NID(X509_REQ *req, int nid, int type, |
@@ -322,6 +339,7 @@ X509_REQ_add1_attr_by_NID(X509_REQ *req, int nid, int type, | |||
322 | return 1; | 339 | return 1; |
323 | return 0; | 340 | return 0; |
324 | } | 341 | } |
342 | LCRYPTO_ALIAS(X509_REQ_add1_attr_by_NID) | ||
325 | 343 | ||
326 | int | 344 | int |
327 | X509_REQ_add1_attr_by_txt(X509_REQ *req, const char *attrname, int type, | 345 | X509_REQ_add1_attr_by_txt(X509_REQ *req, const char *attrname, int type, |
@@ -332,6 +350,7 @@ X509_REQ_add1_attr_by_txt(X509_REQ *req, const char *attrname, int type, | |||
332 | return 1; | 350 | return 1; |
333 | return 0; | 351 | return 0; |
334 | } | 352 | } |
353 | LCRYPTO_ALIAS(X509_REQ_add1_attr_by_txt) | ||
335 | 354 | ||
336 | int | 355 | int |
337 | i2d_re_X509_REQ_tbs(X509_REQ *req, unsigned char **pp) | 356 | i2d_re_X509_REQ_tbs(X509_REQ *req, unsigned char **pp) |
@@ -339,3 +358,4 @@ i2d_re_X509_REQ_tbs(X509_REQ *req, unsigned char **pp) | |||
339 | req->req_info->enc.modified = 1; | 358 | req->req_info->enc.modified = 1; |
340 | return i2d_X509_REQ_INFO(req->req_info, pp); | 359 | return i2d_X509_REQ_INFO(req->req_info, pp); |
341 | } | 360 | } |
361 | LCRYPTO_ALIAS(i2d_re_X509_REQ_tbs) | ||
diff --git a/src/lib/libcrypto/x509/x509_set.c b/src/lib/libcrypto/x509/x509_set.c index 5784f2203e..91d6483a3b 100644 --- a/src/lib/libcrypto/x509/x509_set.c +++ b/src/lib/libcrypto/x509/x509_set.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_set.c,v 1.20 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: x509_set.c,v 1.21 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -70,12 +70,14 @@ X509_get0_extensions(const X509 *x) | |||
70 | { | 70 | { |
71 | return x->cert_info->extensions; | 71 | return x->cert_info->extensions; |
72 | } | 72 | } |
73 | LCRYPTO_ALIAS(X509_get0_extensions) | ||
73 | 74 | ||
74 | const X509_ALGOR * | 75 | const X509_ALGOR * |
75 | X509_get0_tbs_sigalg(const X509 *x) | 76 | X509_get0_tbs_sigalg(const X509 *x) |
76 | { | 77 | { |
77 | return x->cert_info->signature; | 78 | return x->cert_info->signature; |
78 | } | 79 | } |
80 | LCRYPTO_ALIAS(X509_get0_tbs_sigalg) | ||
79 | 81 | ||
80 | int | 82 | int |
81 | X509_set_version(X509 *x, long version) | 83 | X509_set_version(X509 *x, long version) |
@@ -88,12 +90,14 @@ X509_set_version(X509 *x, long version) | |||
88 | } | 90 | } |
89 | return (ASN1_INTEGER_set(x->cert_info->version, version)); | 91 | return (ASN1_INTEGER_set(x->cert_info->version, version)); |
90 | } | 92 | } |
93 | LCRYPTO_ALIAS(X509_set_version) | ||
91 | 94 | ||
92 | long | 95 | long |
93 | X509_get_version(const X509 *x) | 96 | X509_get_version(const X509 *x) |
94 | { | 97 | { |
95 | return ASN1_INTEGER_get(x->cert_info->version); | 98 | return ASN1_INTEGER_get(x->cert_info->version); |
96 | } | 99 | } |
100 | LCRYPTO_ALIAS(X509_get_version) | ||
97 | 101 | ||
98 | int | 102 | int |
99 | X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial) | 103 | X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial) |
@@ -112,6 +116,7 @@ X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial) | |||
112 | } | 116 | } |
113 | return (in != NULL); | 117 | return (in != NULL); |
114 | } | 118 | } |
119 | LCRYPTO_ALIAS(X509_set_serialNumber) | ||
115 | 120 | ||
116 | int | 121 | int |
117 | X509_set_issuer_name(X509 *x, X509_NAME *name) | 122 | X509_set_issuer_name(X509 *x, X509_NAME *name) |
@@ -120,6 +125,7 @@ X509_set_issuer_name(X509 *x, X509_NAME *name) | |||
120 | return (0); | 125 | return (0); |
121 | return (X509_NAME_set(&x->cert_info->issuer, name)); | 126 | return (X509_NAME_set(&x->cert_info->issuer, name)); |
122 | } | 127 | } |
128 | LCRYPTO_ALIAS(X509_set_issuer_name) | ||
123 | 129 | ||
124 | int | 130 | int |
125 | X509_set_subject_name(X509 *x, X509_NAME *name) | 131 | X509_set_subject_name(X509 *x, X509_NAME *name) |
@@ -128,12 +134,14 @@ X509_set_subject_name(X509 *x, X509_NAME *name) | |||
128 | return (0); | 134 | return (0); |
129 | return (X509_NAME_set(&x->cert_info->subject, name)); | 135 | return (X509_NAME_set(&x->cert_info->subject, name)); |
130 | } | 136 | } |
137 | LCRYPTO_ALIAS(X509_set_subject_name) | ||
131 | 138 | ||
132 | const ASN1_TIME * | 139 | const ASN1_TIME * |
133 | X509_get0_notBefore(const X509 *x) | 140 | X509_get0_notBefore(const X509 *x) |
134 | { | 141 | { |
135 | return X509_getm_notBefore(x); | 142 | return X509_getm_notBefore(x); |
136 | } | 143 | } |
144 | LCRYPTO_ALIAS(X509_get0_notBefore) | ||
137 | 145 | ||
138 | ASN1_TIME * | 146 | ASN1_TIME * |
139 | X509_getm_notBefore(const X509 *x) | 147 | X509_getm_notBefore(const X509 *x) |
@@ -142,6 +150,7 @@ X509_getm_notBefore(const X509 *x) | |||
142 | return (NULL); | 150 | return (NULL); |
143 | return x->cert_info->validity->notBefore; | 151 | return x->cert_info->validity->notBefore; |
144 | } | 152 | } |
153 | LCRYPTO_ALIAS(X509_getm_notBefore) | ||
145 | 154 | ||
146 | int | 155 | int |
147 | X509_set_notBefore(X509 *x, const ASN1_TIME *tm) | 156 | X509_set_notBefore(X509 *x, const ASN1_TIME *tm) |
@@ -160,18 +169,21 @@ X509_set_notBefore(X509 *x, const ASN1_TIME *tm) | |||
160 | } | 169 | } |
161 | return (in != NULL); | 170 | return (in != NULL); |
162 | } | 171 | } |
172 | LCRYPTO_ALIAS(X509_set_notBefore) | ||
163 | 173 | ||
164 | int | 174 | int |
165 | X509_set1_notBefore(X509 *x, const ASN1_TIME *tm) | 175 | X509_set1_notBefore(X509 *x, const ASN1_TIME *tm) |
166 | { | 176 | { |
167 | return X509_set_notBefore(x, tm); | 177 | return X509_set_notBefore(x, tm); |
168 | } | 178 | } |
179 | LCRYPTO_ALIAS(X509_set1_notBefore) | ||
169 | 180 | ||
170 | const ASN1_TIME * | 181 | const ASN1_TIME * |
171 | X509_get0_notAfter(const X509 *x) | 182 | X509_get0_notAfter(const X509 *x) |
172 | { | 183 | { |
173 | return X509_getm_notAfter(x); | 184 | return X509_getm_notAfter(x); |
174 | } | 185 | } |
186 | LCRYPTO_ALIAS(X509_get0_notAfter) | ||
175 | 187 | ||
176 | ASN1_TIME * | 188 | ASN1_TIME * |
177 | X509_getm_notAfter(const X509 *x) | 189 | X509_getm_notAfter(const X509 *x) |
@@ -180,6 +192,7 @@ X509_getm_notAfter(const X509 *x) | |||
180 | return (NULL); | 192 | return (NULL); |
181 | return x->cert_info->validity->notAfter; | 193 | return x->cert_info->validity->notAfter; |
182 | } | 194 | } |
195 | LCRYPTO_ALIAS(X509_getm_notAfter) | ||
183 | 196 | ||
184 | int | 197 | int |
185 | X509_set_notAfter(X509 *x, const ASN1_TIME *tm) | 198 | X509_set_notAfter(X509 *x, const ASN1_TIME *tm) |
@@ -198,12 +211,14 @@ X509_set_notAfter(X509 *x, const ASN1_TIME *tm) | |||
198 | } | 211 | } |
199 | return (in != NULL); | 212 | return (in != NULL); |
200 | } | 213 | } |
214 | LCRYPTO_ALIAS(X509_set_notAfter) | ||
201 | 215 | ||
202 | int | 216 | int |
203 | X509_set1_notAfter(X509 *x, const ASN1_TIME *tm) | 217 | X509_set1_notAfter(X509 *x, const ASN1_TIME *tm) |
204 | { | 218 | { |
205 | return X509_set_notAfter(x, tm); | 219 | return X509_set_notAfter(x, tm); |
206 | } | 220 | } |
221 | LCRYPTO_ALIAS(X509_set1_notAfter) | ||
207 | 222 | ||
208 | int | 223 | int |
209 | X509_set_pubkey(X509 *x, EVP_PKEY *pkey) | 224 | X509_set_pubkey(X509 *x, EVP_PKEY *pkey) |
@@ -212,15 +227,18 @@ X509_set_pubkey(X509 *x, EVP_PKEY *pkey) | |||
212 | return (0); | 227 | return (0); |
213 | return (X509_PUBKEY_set(&(x->cert_info->key), pkey)); | 228 | return (X509_PUBKEY_set(&(x->cert_info->key), pkey)); |
214 | } | 229 | } |
230 | LCRYPTO_ALIAS(X509_set_pubkey) | ||
215 | 231 | ||
216 | int | 232 | int |
217 | X509_get_signature_type(const X509 *x) | 233 | X509_get_signature_type(const X509 *x) |
218 | { | 234 | { |
219 | return EVP_PKEY_type(OBJ_obj2nid(x->sig_alg->algorithm)); | 235 | return EVP_PKEY_type(OBJ_obj2nid(x->sig_alg->algorithm)); |
220 | } | 236 | } |
237 | LCRYPTO_ALIAS(X509_get_signature_type) | ||
221 | 238 | ||
222 | X509_PUBKEY * | 239 | X509_PUBKEY * |
223 | X509_get_X509_PUBKEY(const X509 *x) | 240 | X509_get_X509_PUBKEY(const X509 *x) |
224 | { | 241 | { |
225 | return x->cert_info->key; | 242 | return x->cert_info->key; |
226 | } | 243 | } |
244 | LCRYPTO_ALIAS(X509_get_X509_PUBKEY) | ||
diff --git a/src/lib/libcrypto/x509/x509_skey.c b/src/lib/libcrypto/x509/x509_skey.c index 58bb66bc05..813a8de199 100644 --- a/src/lib/libcrypto/x509/x509_skey.c +++ b/src/lib/libcrypto/x509/x509_skey.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_skey.c,v 1.2 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: x509_skey.c,v 1.3 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -89,6 +89,7 @@ i2s_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, const ASN1_OCTET_STRING *oct) | |||
89 | { | 89 | { |
90 | return hex_to_string(oct->data, oct->length); | 90 | return hex_to_string(oct->data, oct->length); |
91 | } | 91 | } |
92 | LCRYPTO_ALIAS(i2s_ASN1_OCTET_STRING) | ||
92 | 93 | ||
93 | ASN1_OCTET_STRING * | 94 | ASN1_OCTET_STRING * |
94 | s2i_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | 95 | s2i_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, |
@@ -111,6 +112,7 @@ s2i_ASN1_OCTET_STRING(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | |||
111 | 112 | ||
112 | return oct; | 113 | return oct; |
113 | } | 114 | } |
115 | LCRYPTO_ALIAS(s2i_ASN1_OCTET_STRING) | ||
114 | 116 | ||
115 | static ASN1_OCTET_STRING * | 117 | static ASN1_OCTET_STRING * |
116 | s2i_skey_id(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *str) | 118 | s2i_skey_id(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *str) |
diff --git a/src/lib/libcrypto/x509/x509_sxnet.c b/src/lib/libcrypto/x509/x509_sxnet.c index e5e98bcecc..9c66a6b769 100644 --- a/src/lib/libcrypto/x509/x509_sxnet.c +++ b/src/lib/libcrypto/x509/x509_sxnet.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_sxnet.c,v 1.1 2020/06/04 15:19:32 jsing Exp $ */ | 1 | /* $OpenBSD: x509_sxnet.c,v 1.2 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -131,24 +131,28 @@ d2i_SXNETID(SXNETID **a, const unsigned char **in, long len) | |||
131 | return (SXNETID *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 131 | return (SXNETID *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
132 | &SXNETID_it); | 132 | &SXNETID_it); |
133 | } | 133 | } |
134 | LCRYPTO_ALIAS(d2i_SXNETID) | ||
134 | 135 | ||
135 | int | 136 | int |
136 | i2d_SXNETID(SXNETID *a, unsigned char **out) | 137 | i2d_SXNETID(SXNETID *a, unsigned char **out) |
137 | { | 138 | { |
138 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &SXNETID_it); | 139 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &SXNETID_it); |
139 | } | 140 | } |
141 | LCRYPTO_ALIAS(i2d_SXNETID) | ||
140 | 142 | ||
141 | SXNETID * | 143 | SXNETID * |
142 | SXNETID_new(void) | 144 | SXNETID_new(void) |
143 | { | 145 | { |
144 | return (SXNETID *)ASN1_item_new(&SXNETID_it); | 146 | return (SXNETID *)ASN1_item_new(&SXNETID_it); |
145 | } | 147 | } |
148 | LCRYPTO_ALIAS(SXNETID_new) | ||
146 | 149 | ||
147 | void | 150 | void |
148 | SXNETID_free(SXNETID *a) | 151 | SXNETID_free(SXNETID *a) |
149 | { | 152 | { |
150 | ASN1_item_free((ASN1_VALUE *)a, &SXNETID_it); | 153 | ASN1_item_free((ASN1_VALUE *)a, &SXNETID_it); |
151 | } | 154 | } |
155 | LCRYPTO_ALIAS(SXNETID_free) | ||
152 | 156 | ||
153 | static const ASN1_TEMPLATE SXNET_seq_tt[] = { | 157 | static const ASN1_TEMPLATE SXNET_seq_tt[] = { |
154 | { | 158 | { |
@@ -184,24 +188,28 @@ d2i_SXNET(SXNET **a, const unsigned char **in, long len) | |||
184 | return (SXNET *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 188 | return (SXNET *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
185 | &SXNET_it); | 189 | &SXNET_it); |
186 | } | 190 | } |
191 | LCRYPTO_ALIAS(d2i_SXNET) | ||
187 | 192 | ||
188 | int | 193 | int |
189 | i2d_SXNET(SXNET *a, unsigned char **out) | 194 | i2d_SXNET(SXNET *a, unsigned char **out) |
190 | { | 195 | { |
191 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &SXNET_it); | 196 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &SXNET_it); |
192 | } | 197 | } |
198 | LCRYPTO_ALIAS(i2d_SXNET) | ||
193 | 199 | ||
194 | SXNET * | 200 | SXNET * |
195 | SXNET_new(void) | 201 | SXNET_new(void) |
196 | { | 202 | { |
197 | return (SXNET *)ASN1_item_new(&SXNET_it); | 203 | return (SXNET *)ASN1_item_new(&SXNET_it); |
198 | } | 204 | } |
205 | LCRYPTO_ALIAS(SXNET_new) | ||
199 | 206 | ||
200 | void | 207 | void |
201 | SXNET_free(SXNET *a) | 208 | SXNET_free(SXNET *a) |
202 | { | 209 | { |
203 | ASN1_item_free((ASN1_VALUE *)a, &SXNET_it); | 210 | ASN1_item_free((ASN1_VALUE *)a, &SXNET_it); |
204 | } | 211 | } |
212 | LCRYPTO_ALIAS(SXNET_free) | ||
205 | 213 | ||
206 | static int | 214 | static int |
207 | sxnet_i2r(X509V3_EXT_METHOD *method, SXNET *sx, BIO *out, int indent) | 215 | sxnet_i2r(X509V3_EXT_METHOD *method, SXNET *sx, BIO *out, int indent) |
@@ -263,6 +271,7 @@ SXNET_add_id_asc(SXNET **psx, const char *zone, const char *user, int userlen) | |||
263 | } | 271 | } |
264 | return SXNET_add_id_INTEGER(psx, izone, user, userlen); | 272 | return SXNET_add_id_INTEGER(psx, izone, user, userlen); |
265 | } | 273 | } |
274 | LCRYPTO_ALIAS(SXNET_add_id_asc) | ||
266 | 275 | ||
267 | /* Add an id given the zone as an unsigned long */ | 276 | /* Add an id given the zone as an unsigned long */ |
268 | 277 | ||
@@ -280,6 +289,7 @@ SXNET_add_id_ulong(SXNET **psx, unsigned long lzone, const char *user, | |||
280 | } | 289 | } |
281 | return SXNET_add_id_INTEGER(psx, izone, user, userlen); | 290 | return SXNET_add_id_INTEGER(psx, izone, user, userlen); |
282 | } | 291 | } |
292 | LCRYPTO_ALIAS(SXNET_add_id_ulong) | ||
283 | 293 | ||
284 | /* Add an id given the zone as an ASN1_INTEGER. | 294 | /* Add an id given the zone as an ASN1_INTEGER. |
285 | * Note this version uses the passed integer and doesn't make a copy so don't | 295 | * Note this version uses the passed integer and doesn't make a copy so don't |
@@ -335,6 +345,7 @@ err: | |||
335 | *psx = NULL; | 345 | *psx = NULL; |
336 | return 0; | 346 | return 0; |
337 | } | 347 | } |
348 | LCRYPTO_ALIAS(SXNET_add_id_INTEGER) | ||
338 | 349 | ||
339 | ASN1_OCTET_STRING * | 350 | ASN1_OCTET_STRING * |
340 | SXNET_get_id_asc(SXNET *sx, const char *zone) | 351 | SXNET_get_id_asc(SXNET *sx, const char *zone) |
@@ -350,6 +361,7 @@ SXNET_get_id_asc(SXNET *sx, const char *zone) | |||
350 | ASN1_INTEGER_free(izone); | 361 | ASN1_INTEGER_free(izone); |
351 | return oct; | 362 | return oct; |
352 | } | 363 | } |
364 | LCRYPTO_ALIAS(SXNET_get_id_asc) | ||
353 | 365 | ||
354 | ASN1_OCTET_STRING * | 366 | ASN1_OCTET_STRING * |
355 | SXNET_get_id_ulong(SXNET *sx, unsigned long lzone) | 367 | SXNET_get_id_ulong(SXNET *sx, unsigned long lzone) |
@@ -367,6 +379,7 @@ SXNET_get_id_ulong(SXNET *sx, unsigned long lzone) | |||
367 | ASN1_INTEGER_free(izone); | 379 | ASN1_INTEGER_free(izone); |
368 | return oct; | 380 | return oct; |
369 | } | 381 | } |
382 | LCRYPTO_ALIAS(SXNET_get_id_ulong) | ||
370 | 383 | ||
371 | ASN1_OCTET_STRING * | 384 | ASN1_OCTET_STRING * |
372 | SXNET_get_id_INTEGER(SXNET *sx, ASN1_INTEGER *zone) | 385 | SXNET_get_id_INTEGER(SXNET *sx, ASN1_INTEGER *zone) |
@@ -381,3 +394,4 @@ SXNET_get_id_INTEGER(SXNET *sx, ASN1_INTEGER *zone) | |||
381 | } | 394 | } |
382 | return NULL; | 395 | return NULL; |
383 | } | 396 | } |
397 | LCRYPTO_ALIAS(SXNET_get_id_INTEGER) | ||
diff --git a/src/lib/libcrypto/x509/x509_trs.c b/src/lib/libcrypto/x509/x509_trs.c index 23eca4927b..b075d1b6c8 100644 --- a/src/lib/libcrypto/x509/x509_trs.c +++ b/src/lib/libcrypto/x509/x509_trs.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_trs.c,v 1.27 2022/11/13 18:37:32 beck Exp $ */ | 1 | /* $OpenBSD: x509_trs.c,v 1.28 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -109,6 +109,7 @@ int | |||
109 | default_trust = trust; | 109 | default_trust = trust; |
110 | return oldtrust; | 110 | return oldtrust; |
111 | } | 111 | } |
112 | LCRYPTO_ALIAS(X509_TRUST_set_default) | ||
112 | 113 | ||
113 | static int | 114 | static int |
114 | X509_check_trust_internal(X509 *x, int id, int flags, int compat) | 115 | X509_check_trust_internal(X509 *x, int id, int flags, int compat) |
@@ -140,6 +141,7 @@ X509_check_trust_internal(X509 *x, int id, int flags, int compat) | |||
140 | pt = X509_TRUST_get0(idx); | 141 | pt = X509_TRUST_get0(idx); |
141 | return pt->check_trust(pt, x, flags); | 142 | return pt->check_trust(pt, x, flags); |
142 | } | 143 | } |
144 | LCRYPTO_ALIAS(X509_check_trust) | ||
143 | 145 | ||
144 | int | 146 | int |
145 | X509_check_trust(X509 *x, int id, int flags) | 147 | X509_check_trust(X509 *x, int id, int flags) |
@@ -160,6 +162,7 @@ X509_TRUST_get_count(void) | |||
160 | return X509_TRUST_COUNT; | 162 | return X509_TRUST_COUNT; |
161 | return sk_X509_TRUST_num(trtable) + X509_TRUST_COUNT; | 163 | return sk_X509_TRUST_num(trtable) + X509_TRUST_COUNT; |
162 | } | 164 | } |
165 | LCRYPTO_ALIAS(X509_TRUST_get_count) | ||
163 | 166 | ||
164 | X509_TRUST * | 167 | X509_TRUST * |
165 | X509_TRUST_get0(int idx) | 168 | X509_TRUST_get0(int idx) |
@@ -170,6 +173,7 @@ X509_TRUST_get0(int idx) | |||
170 | return trstandard + idx; | 173 | return trstandard + idx; |
171 | return sk_X509_TRUST_value(trtable, idx - X509_TRUST_COUNT); | 174 | return sk_X509_TRUST_value(trtable, idx - X509_TRUST_COUNT); |
172 | } | 175 | } |
176 | LCRYPTO_ALIAS(X509_TRUST_get0) | ||
173 | 177 | ||
174 | int | 178 | int |
175 | X509_TRUST_get_by_id(int id) | 179 | X509_TRUST_get_by_id(int id) |
@@ -187,6 +191,7 @@ X509_TRUST_get_by_id(int id) | |||
187 | return -1; | 191 | return -1; |
188 | return idx + X509_TRUST_COUNT; | 192 | return idx + X509_TRUST_COUNT; |
189 | } | 193 | } |
194 | LCRYPTO_ALIAS(X509_TRUST_get_by_id) | ||
190 | 195 | ||
191 | int | 196 | int |
192 | X509_TRUST_set(int *t, int trust) | 197 | X509_TRUST_set(int *t, int trust) |
@@ -198,6 +203,7 @@ X509_TRUST_set(int *t, int trust) | |||
198 | *t = trust; | 203 | *t = trust; |
199 | return 1; | 204 | return 1; |
200 | } | 205 | } |
206 | LCRYPTO_ALIAS(X509_TRUST_set) | ||
201 | 207 | ||
202 | int | 208 | int |
203 | X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), | 209 | X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), |
@@ -263,6 +269,7 @@ err: | |||
263 | X509error(ERR_R_MALLOC_FAILURE); | 269 | X509error(ERR_R_MALLOC_FAILURE); |
264 | return 0; | 270 | return 0; |
265 | } | 271 | } |
272 | LCRYPTO_ALIAS(X509_TRUST_add) | ||
266 | 273 | ||
267 | static void | 274 | static void |
268 | trtable_free(X509_TRUST *p) | 275 | trtable_free(X509_TRUST *p) |
@@ -282,24 +289,28 @@ X509_TRUST_cleanup(void) | |||
282 | sk_X509_TRUST_pop_free(trtable, trtable_free); | 289 | sk_X509_TRUST_pop_free(trtable, trtable_free); |
283 | trtable = NULL; | 290 | trtable = NULL; |
284 | } | 291 | } |
292 | LCRYPTO_ALIAS(X509_TRUST_cleanup) | ||
285 | 293 | ||
286 | int | 294 | int |
287 | X509_TRUST_get_flags(const X509_TRUST *xp) | 295 | X509_TRUST_get_flags(const X509_TRUST *xp) |
288 | { | 296 | { |
289 | return xp->flags; | 297 | return xp->flags; |
290 | } | 298 | } |
299 | LCRYPTO_ALIAS(X509_TRUST_get_flags) | ||
291 | 300 | ||
292 | char * | 301 | char * |
293 | X509_TRUST_get0_name(const X509_TRUST *xp) | 302 | X509_TRUST_get0_name(const X509_TRUST *xp) |
294 | { | 303 | { |
295 | return xp->name; | 304 | return xp->name; |
296 | } | 305 | } |
306 | LCRYPTO_ALIAS(X509_TRUST_get0_name) | ||
297 | 307 | ||
298 | int | 308 | int |
299 | X509_TRUST_get_trust(const X509_TRUST *xp) | 309 | X509_TRUST_get_trust(const X509_TRUST *xp) |
300 | { | 310 | { |
301 | return xp->trust; | 311 | return xp->trust; |
302 | } | 312 | } |
313 | LCRYPTO_ALIAS(X509_TRUST_get_trust) | ||
303 | 314 | ||
304 | static int | 315 | static int |
305 | trust_1oidany(X509_TRUST *trust, X509 *x, int flags) | 316 | trust_1oidany(X509_TRUST *trust, X509 *x, int flags) |
diff --git a/src/lib/libcrypto/x509/x509_txt.c b/src/lib/libcrypto/x509/x509_txt.c index 2dfadf6ba6..129757494c 100644 --- a/src/lib/libcrypto/x509/x509_txt.c +++ b/src/lib/libcrypto/x509/x509_txt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_txt.c,v 1.20 2022/07/05 20:31:46 tb Exp $ */ | 1 | /* $OpenBSD: x509_txt.c,v 1.21 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -203,3 +203,4 @@ X509_verify_cert_error_string(long n) | |||
203 | return(buf); | 203 | return(buf); |
204 | } | 204 | } |
205 | } | 205 | } |
206 | LCRYPTO_ALIAS(X509_verify_cert_error_string) | ||
diff --git a/src/lib/libcrypto/x509/x509_utl.c b/src/lib/libcrypto/x509/x509_utl.c index 47b25fe6c4..525939d4ca 100644 --- a/src/lib/libcrypto/x509/x509_utl.c +++ b/src/lib/libcrypto/x509/x509_utl.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_utl.c,v 1.3 2022/05/20 07:58:54 tb Exp $ */ | 1 | /* $OpenBSD: x509_utl.c,v 1.4 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -117,6 +117,7 @@ X509V3_add_value(const char *name, const char *value, | |||
117 | } | 117 | } |
118 | return 0; | 118 | return 0; |
119 | } | 119 | } |
120 | LCRYPTO_ALIAS(X509V3_add_value) | ||
120 | 121 | ||
121 | int | 122 | int |
122 | X509V3_add_value_uchar(const char *name, const unsigned char *value, | 123 | X509V3_add_value_uchar(const char *name, const unsigned char *value, |
@@ -124,6 +125,7 @@ X509V3_add_value_uchar(const char *name, const unsigned char *value, | |||
124 | { | 125 | { |
125 | return X509V3_add_value(name, (const char *)value, extlist); | 126 | return X509V3_add_value(name, (const char *)value, extlist); |
126 | } | 127 | } |
128 | LCRYPTO_ALIAS(X509V3_add_value_uchar) | ||
127 | 129 | ||
128 | /* Free function for STACK_OF(CONF_VALUE) */ | 130 | /* Free function for STACK_OF(CONF_VALUE) */ |
129 | 131 | ||
@@ -137,6 +139,7 @@ X509V3_conf_free(CONF_VALUE *conf) | |||
137 | free(conf->section); | 139 | free(conf->section); |
138 | free(conf); | 140 | free(conf); |
139 | } | 141 | } |
142 | LCRYPTO_ALIAS(X509V3_conf_free) | ||
140 | 143 | ||
141 | int | 144 | int |
142 | X509V3_add_value_bool(const char *name, int asn1_bool, | 145 | X509V3_add_value_bool(const char *name, int asn1_bool, |
@@ -146,6 +149,7 @@ X509V3_add_value_bool(const char *name, int asn1_bool, | |||
146 | return X509V3_add_value(name, "TRUE", extlist); | 149 | return X509V3_add_value(name, "TRUE", extlist); |
147 | return X509V3_add_value(name, "FALSE", extlist); | 150 | return X509V3_add_value(name, "FALSE", extlist); |
148 | } | 151 | } |
152 | LCRYPTO_ALIAS(X509V3_add_value_bool) | ||
149 | 153 | ||
150 | int | 154 | int |
151 | X509V3_add_value_bool_nf(const char *name, int asn1_bool, | 155 | X509V3_add_value_bool_nf(const char *name, int asn1_bool, |
@@ -155,6 +159,7 @@ X509V3_add_value_bool_nf(const char *name, int asn1_bool, | |||
155 | return X509V3_add_value(name, "TRUE", extlist); | 159 | return X509V3_add_value(name, "TRUE", extlist); |
156 | return 1; | 160 | return 1; |
157 | } | 161 | } |
162 | LCRYPTO_ALIAS(X509V3_add_value_bool_nf) | ||
158 | 163 | ||
159 | char * | 164 | char * |
160 | bn_to_string(const BIGNUM *bn) | 165 | bn_to_string(const BIGNUM *bn) |
@@ -197,6 +202,7 @@ i2s_ASN1_ENUMERATED(X509V3_EXT_METHOD *method, const ASN1_ENUMERATED *a) | |||
197 | BN_free(bntmp); | 202 | BN_free(bntmp); |
198 | return strtmp; | 203 | return strtmp; |
199 | } | 204 | } |
205 | LCRYPTO_ALIAS(i2s_ASN1_ENUMERATED) | ||
200 | 206 | ||
201 | char * | 207 | char * |
202 | i2s_ASN1_INTEGER(X509V3_EXT_METHOD *method, const ASN1_INTEGER *a) | 208 | i2s_ASN1_INTEGER(X509V3_EXT_METHOD *method, const ASN1_INTEGER *a) |
@@ -212,6 +218,7 @@ i2s_ASN1_INTEGER(X509V3_EXT_METHOD *method, const ASN1_INTEGER *a) | |||
212 | BN_free(bntmp); | 218 | BN_free(bntmp); |
213 | return strtmp; | 219 | return strtmp; |
214 | } | 220 | } |
221 | LCRYPTO_ALIAS(i2s_ASN1_INTEGER) | ||
215 | 222 | ||
216 | ASN1_INTEGER * | 223 | ASN1_INTEGER * |
217 | s2i_ASN1_INTEGER(X509V3_EXT_METHOD *method, const char *value) | 224 | s2i_ASN1_INTEGER(X509V3_EXT_METHOD *method, const char *value) |
@@ -262,6 +269,7 @@ s2i_ASN1_INTEGER(X509V3_EXT_METHOD *method, const char *value) | |||
262 | aint->type |= V_ASN1_NEG; | 269 | aint->type |= V_ASN1_NEG; |
263 | return aint; | 270 | return aint; |
264 | } | 271 | } |
272 | LCRYPTO_ALIAS(s2i_ASN1_INTEGER) | ||
265 | 273 | ||
266 | int | 274 | int |
267 | X509V3_add_value_int(const char *name, const ASN1_INTEGER *aint, | 275 | X509V3_add_value_int(const char *name, const ASN1_INTEGER *aint, |
@@ -278,6 +286,7 @@ X509V3_add_value_int(const char *name, const ASN1_INTEGER *aint, | |||
278 | free(strtmp); | 286 | free(strtmp); |
279 | return ret; | 287 | return ret; |
280 | } | 288 | } |
289 | LCRYPTO_ALIAS(X509V3_add_value_int) | ||
281 | 290 | ||
282 | int | 291 | int |
283 | X509V3_get_value_bool(const CONF_VALUE *value, int *asn1_bool) | 292 | X509V3_get_value_bool(const CONF_VALUE *value, int *asn1_bool) |
@@ -303,6 +312,7 @@ X509V3_get_value_bool(const CONF_VALUE *value, int *asn1_bool) | |||
303 | X509V3_conf_err(value); | 312 | X509V3_conf_err(value); |
304 | return 0; | 313 | return 0; |
305 | } | 314 | } |
315 | LCRYPTO_ALIAS(X509V3_get_value_bool) | ||
306 | 316 | ||
307 | int | 317 | int |
308 | X509V3_get_value_int(const CONF_VALUE *value, ASN1_INTEGER **aint) | 318 | X509V3_get_value_int(const CONF_VALUE *value, ASN1_INTEGER **aint) |
@@ -316,6 +326,7 @@ X509V3_get_value_int(const CONF_VALUE *value, ASN1_INTEGER **aint) | |||
316 | *aint = itmp; | 326 | *aint = itmp; |
317 | return 1; | 327 | return 1; |
318 | } | 328 | } |
329 | LCRYPTO_ALIAS(X509V3_get_value_int) | ||
319 | 330 | ||
320 | #define HDR_NAME 1 | 331 | #define HDR_NAME 1 |
321 | #define HDR_VALUE 2 | 332 | #define HDR_VALUE 2 |
@@ -407,6 +418,7 @@ X509V3_parse_list(const char *line) | |||
407 | return NULL; | 418 | return NULL; |
408 | 419 | ||
409 | } | 420 | } |
421 | LCRYPTO_ALIAS(X509V3_parse_list) | ||
410 | 422 | ||
411 | /* Delete leading and trailing spaces from a string */ | 423 | /* Delete leading and trailing spaces from a string */ |
412 | static char * | 424 | static char * |
@@ -458,6 +470,7 @@ hex_to_string(const unsigned char *buffer, long len) | |||
458 | q[-1] = 0; | 470 | q[-1] = 0; |
459 | return tmp; | 471 | return tmp; |
460 | } | 472 | } |
473 | LCRYPTO_ALIAS(hex_to_string) | ||
461 | 474 | ||
462 | /* Give a string of hex digits convert to | 475 | /* Give a string of hex digits convert to |
463 | * a buffer | 476 | * a buffer |
@@ -519,6 +532,7 @@ string_to_hex(const char *str, long *len) | |||
519 | X509V3error(X509V3_R_ILLEGAL_HEX_DIGIT); | 532 | X509V3error(X509V3_R_ILLEGAL_HEX_DIGIT); |
520 | return NULL; | 533 | return NULL; |
521 | } | 534 | } |
535 | LCRYPTO_ALIAS(string_to_hex) | ||
522 | 536 | ||
523 | /* V2I name comparison function: returns zero if 'name' matches | 537 | /* V2I name comparison function: returns zero if 'name' matches |
524 | * cmp or cmp.* | 538 | * cmp or cmp.* |
@@ -556,6 +570,7 @@ X509_get1_email(X509 *x) | |||
556 | sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free); | 570 | sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free); |
557 | return ret; | 571 | return ret; |
558 | } | 572 | } |
573 | LCRYPTO_ALIAS(X509_get1_email) | ||
559 | 574 | ||
560 | STACK_OF(OPENSSL_STRING) * | 575 | STACK_OF(OPENSSL_STRING) * |
561 | X509_get1_ocsp(X509 *x) | 576 | X509_get1_ocsp(X509 *x) |
@@ -580,6 +595,7 @@ X509_get1_ocsp(X509 *x) | |||
580 | AUTHORITY_INFO_ACCESS_free(info); | 595 | AUTHORITY_INFO_ACCESS_free(info); |
581 | return ret; | 596 | return ret; |
582 | } | 597 | } |
598 | LCRYPTO_ALIAS(X509_get1_ocsp) | ||
583 | 599 | ||
584 | STACK_OF(OPENSSL_STRING) * | 600 | STACK_OF(OPENSSL_STRING) * |
585 | X509_REQ_get1_email(X509_REQ *x) | 601 | X509_REQ_get1_email(X509_REQ *x) |
@@ -595,6 +611,7 @@ X509_REQ_get1_email(X509_REQ *x) | |||
595 | sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free); | 611 | sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free); |
596 | return ret; | 612 | return ret; |
597 | } | 613 | } |
614 | LCRYPTO_ALIAS(X509_REQ_get1_email) | ||
598 | 615 | ||
599 | 616 | ||
600 | static STACK_OF(OPENSSL_STRING) * | 617 | static STACK_OF(OPENSSL_STRING) * |
@@ -664,6 +681,7 @@ X509_email_free(STACK_OF(OPENSSL_STRING) *sk) | |||
664 | { | 681 | { |
665 | sk_OPENSSL_STRING_pop_free(sk, str_free); | 682 | sk_OPENSSL_STRING_pop_free(sk, str_free); |
666 | } | 683 | } |
684 | LCRYPTO_ALIAS(X509_email_free) | ||
667 | 685 | ||
668 | typedef int (*equal_fn)(const unsigned char *pattern, size_t pattern_len, | 686 | typedef int (*equal_fn)(const unsigned char *pattern, size_t pattern_len, |
669 | const unsigned char *subject, size_t subject_len, unsigned int flags); | 687 | const unsigned char *subject, size_t subject_len, unsigned int flags); |
@@ -1065,6 +1083,7 @@ X509_check_host(X509 *x, const char *chk, size_t chklen, unsigned int flags, | |||
1065 | return -2; | 1083 | return -2; |
1066 | return do_x509_check(x, chk, chklen, flags, GEN_DNS, peername); | 1084 | return do_x509_check(x, chk, chklen, flags, GEN_DNS, peername); |
1067 | } | 1085 | } |
1086 | LCRYPTO_ALIAS(X509_check_host) | ||
1068 | 1087 | ||
1069 | int | 1088 | int |
1070 | X509_check_email(X509 *x, const char *chk, size_t chklen, unsigned int flags) | 1089 | X509_check_email(X509 *x, const char *chk, size_t chklen, unsigned int flags) |
@@ -1077,6 +1096,7 @@ X509_check_email(X509 *x, const char *chk, size_t chklen, unsigned int flags) | |||
1077 | return -2; | 1096 | return -2; |
1078 | return do_x509_check(x, chk, chklen, flags, GEN_EMAIL, NULL); | 1097 | return do_x509_check(x, chk, chklen, flags, GEN_EMAIL, NULL); |
1079 | } | 1098 | } |
1099 | LCRYPTO_ALIAS(X509_check_email) | ||
1080 | 1100 | ||
1081 | int | 1101 | int |
1082 | X509_check_ip(X509 *x, const unsigned char *chk, size_t chklen, | 1102 | X509_check_ip(X509 *x, const unsigned char *chk, size_t chklen, |
@@ -1086,6 +1106,7 @@ X509_check_ip(X509 *x, const unsigned char *chk, size_t chklen, | |||
1086 | return -2; | 1106 | return -2; |
1087 | return do_x509_check(x, (char *)chk, chklen, flags, GEN_IPADD, NULL); | 1107 | return do_x509_check(x, (char *)chk, chklen, flags, GEN_IPADD, NULL); |
1088 | } | 1108 | } |
1109 | LCRYPTO_ALIAS(X509_check_ip) | ||
1089 | 1110 | ||
1090 | int | 1111 | int |
1091 | X509_check_ip_asc(X509 *x, const char *ipasc, unsigned int flags) | 1112 | X509_check_ip_asc(X509 *x, const char *ipasc, unsigned int flags) |
@@ -1100,6 +1121,7 @@ X509_check_ip_asc(X509 *x, const char *ipasc, unsigned int flags) | |||
1100 | return -2; | 1121 | return -2; |
1101 | return do_x509_check(x, (char *)ipout, iplen, flags, GEN_IPADD, NULL); | 1122 | return do_x509_check(x, (char *)ipout, iplen, flags, GEN_IPADD, NULL); |
1102 | } | 1123 | } |
1124 | LCRYPTO_ALIAS(X509_check_ip_asc) | ||
1103 | 1125 | ||
1104 | /* Convert IP addresses both IPv4 and IPv6 into an | 1126 | /* Convert IP addresses both IPv4 and IPv6 into an |
1105 | * OCTET STRING compatible with RFC3280. | 1127 | * OCTET STRING compatible with RFC3280. |
@@ -1128,6 +1150,7 @@ a2i_IPADDRESS(const char *ipasc) | |||
1128 | } | 1150 | } |
1129 | return ret; | 1151 | return ret; |
1130 | } | 1152 | } |
1153 | LCRYPTO_ALIAS(a2i_IPADDRESS) | ||
1131 | 1154 | ||
1132 | ASN1_OCTET_STRING * | 1155 | ASN1_OCTET_STRING * |
1133 | a2i_IPADDRESS_NC(const char *ipasc) | 1156 | a2i_IPADDRESS_NC(const char *ipasc) |
@@ -1173,6 +1196,7 @@ a2i_IPADDRESS_NC(const char *ipasc) | |||
1173 | ASN1_OCTET_STRING_free(ret); | 1196 | ASN1_OCTET_STRING_free(ret); |
1174 | return NULL; | 1197 | return NULL; |
1175 | } | 1198 | } |
1199 | LCRYPTO_ALIAS(a2i_IPADDRESS_NC) | ||
1176 | 1200 | ||
1177 | 1201 | ||
1178 | int | 1202 | int |
@@ -1190,6 +1214,7 @@ a2i_ipadd(unsigned char *ipout, const char *ipasc) | |||
1190 | return 4; | 1214 | return 4; |
1191 | } | 1215 | } |
1192 | } | 1216 | } |
1217 | LCRYPTO_ALIAS(a2i_ipadd) | ||
1193 | 1218 | ||
1194 | static int | 1219 | static int |
1195 | ipv4_from_asc(unsigned char *v4, const char *in) | 1220 | ipv4_from_asc(unsigned char *v4, const char *in) |
@@ -1386,3 +1411,4 @@ X509V3_NAME_from_section(X509_NAME *nm, STACK_OF(CONF_VALUE)*dn_sk, | |||
1386 | } | 1411 | } |
1387 | return 1; | 1412 | return 1; |
1388 | } | 1413 | } |
1414 | LCRYPTO_ALIAS(X509V3_NAME_from_section) | ||
diff --git a/src/lib/libcrypto/x509/x509_v3.c b/src/lib/libcrypto/x509/x509_v3.c index 9aefb8d99d..4f66524f51 100644 --- a/src/lib/libcrypto/x509/x509_v3.c +++ b/src/lib/libcrypto/x509/x509_v3.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_v3.c,v 1.18 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: x509_v3.c,v 1.19 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -75,6 +75,7 @@ X509v3_get_ext_count(const STACK_OF(X509_EXTENSION) *x) | |||
75 | return (0); | 75 | return (0); |
76 | return (sk_X509_EXTENSION_num(x)); | 76 | return (sk_X509_EXTENSION_num(x)); |
77 | } | 77 | } |
78 | LCRYPTO_ALIAS(X509v3_get_ext_count) | ||
78 | 79 | ||
79 | int | 80 | int |
80 | X509v3_get_ext_by_NID(const STACK_OF(X509_EXTENSION) *x, int nid, int lastpos) | 81 | X509v3_get_ext_by_NID(const STACK_OF(X509_EXTENSION) *x, int nid, int lastpos) |
@@ -86,6 +87,7 @@ X509v3_get_ext_by_NID(const STACK_OF(X509_EXTENSION) *x, int nid, int lastpos) | |||
86 | return (-2); | 87 | return (-2); |
87 | return (X509v3_get_ext_by_OBJ(x, obj, lastpos)); | 88 | return (X509v3_get_ext_by_OBJ(x, obj, lastpos)); |
88 | } | 89 | } |
90 | LCRYPTO_ALIAS(X509v3_get_ext_by_NID) | ||
89 | 91 | ||
90 | int | 92 | int |
91 | X509v3_get_ext_by_OBJ(const STACK_OF(X509_EXTENSION) *sk, | 93 | X509v3_get_ext_by_OBJ(const STACK_OF(X509_EXTENSION) *sk, |
@@ -107,6 +109,7 @@ X509v3_get_ext_by_OBJ(const STACK_OF(X509_EXTENSION) *sk, | |||
107 | } | 109 | } |
108 | return (-1); | 110 | return (-1); |
109 | } | 111 | } |
112 | LCRYPTO_ALIAS(X509v3_get_ext_by_OBJ) | ||
110 | 113 | ||
111 | int | 114 | int |
112 | X509v3_get_ext_by_critical(const STACK_OF(X509_EXTENSION) *sk, int crit, | 115 | X509v3_get_ext_by_critical(const STACK_OF(X509_EXTENSION) *sk, int crit, |
@@ -129,6 +132,7 @@ X509v3_get_ext_by_critical(const STACK_OF(X509_EXTENSION) *sk, int crit, | |||
129 | } | 132 | } |
130 | return (-1); | 133 | return (-1); |
131 | } | 134 | } |
135 | LCRYPTO_ALIAS(X509v3_get_ext_by_critical) | ||
132 | 136 | ||
133 | X509_EXTENSION * | 137 | X509_EXTENSION * |
134 | X509v3_get_ext(const STACK_OF(X509_EXTENSION) *x, int loc) | 138 | X509v3_get_ext(const STACK_OF(X509_EXTENSION) *x, int loc) |
@@ -138,6 +142,7 @@ X509v3_get_ext(const STACK_OF(X509_EXTENSION) *x, int loc) | |||
138 | else | 142 | else |
139 | return sk_X509_EXTENSION_value(x, loc); | 143 | return sk_X509_EXTENSION_value(x, loc); |
140 | } | 144 | } |
145 | LCRYPTO_ALIAS(X509v3_get_ext) | ||
141 | 146 | ||
142 | X509_EXTENSION * | 147 | X509_EXTENSION * |
143 | X509v3_delete_ext(STACK_OF(X509_EXTENSION) *x, int loc) | 148 | X509v3_delete_ext(STACK_OF(X509_EXTENSION) *x, int loc) |
@@ -149,6 +154,7 @@ X509v3_delete_ext(STACK_OF(X509_EXTENSION) *x, int loc) | |||
149 | ret = sk_X509_EXTENSION_delete(x, loc); | 154 | ret = sk_X509_EXTENSION_delete(x, loc); |
150 | return (ret); | 155 | return (ret); |
151 | } | 156 | } |
157 | LCRYPTO_ALIAS(X509v3_delete_ext) | ||
152 | 158 | ||
153 | STACK_OF(X509_EXTENSION) * | 159 | STACK_OF(X509_EXTENSION) * |
154 | X509v3_add_ext(STACK_OF(X509_EXTENSION) **x, X509_EXTENSION *ex, int loc) | 160 | X509v3_add_ext(STACK_OF(X509_EXTENSION) **x, X509_EXTENSION *ex, int loc) |
@@ -191,6 +197,7 @@ err2: | |||
191 | sk_X509_EXTENSION_free(sk); | 197 | sk_X509_EXTENSION_free(sk); |
192 | return (NULL); | 198 | return (NULL); |
193 | } | 199 | } |
200 | LCRYPTO_ALIAS(X509v3_add_ext) | ||
194 | 201 | ||
195 | X509_EXTENSION * | 202 | X509_EXTENSION * |
196 | X509_EXTENSION_create_by_NID(X509_EXTENSION **ex, int nid, int crit, | 203 | X509_EXTENSION_create_by_NID(X509_EXTENSION **ex, int nid, int crit, |
@@ -209,6 +216,7 @@ X509_EXTENSION_create_by_NID(X509_EXTENSION **ex, int nid, int crit, | |||
209 | ASN1_OBJECT_free(obj); | 216 | ASN1_OBJECT_free(obj); |
210 | return (ret); | 217 | return (ret); |
211 | } | 218 | } |
219 | LCRYPTO_ALIAS(X509_EXTENSION_create_by_NID) | ||
212 | 220 | ||
213 | X509_EXTENSION * | 221 | X509_EXTENSION * |
214 | X509_EXTENSION_create_by_OBJ(X509_EXTENSION **ex, const ASN1_OBJECT *obj, | 222 | X509_EXTENSION_create_by_OBJ(X509_EXTENSION **ex, const ASN1_OBJECT *obj, |
@@ -240,6 +248,7 @@ err: | |||
240 | X509_EXTENSION_free(ret); | 248 | X509_EXTENSION_free(ret); |
241 | return (NULL); | 249 | return (NULL); |
242 | } | 250 | } |
251 | LCRYPTO_ALIAS(X509_EXTENSION_create_by_OBJ) | ||
243 | 252 | ||
244 | int | 253 | int |
245 | X509_EXTENSION_set_object(X509_EXTENSION *ex, const ASN1_OBJECT *obj) | 254 | X509_EXTENSION_set_object(X509_EXTENSION *ex, const ASN1_OBJECT *obj) |
@@ -250,6 +259,7 @@ X509_EXTENSION_set_object(X509_EXTENSION *ex, const ASN1_OBJECT *obj) | |||
250 | ex->object = OBJ_dup(obj); | 259 | ex->object = OBJ_dup(obj); |
251 | return ex->object != NULL; | 260 | return ex->object != NULL; |
252 | } | 261 | } |
262 | LCRYPTO_ALIAS(X509_EXTENSION_set_object) | ||
253 | 263 | ||
254 | int | 264 | int |
255 | X509_EXTENSION_set_critical(X509_EXTENSION *ex, int crit) | 265 | X509_EXTENSION_set_critical(X509_EXTENSION *ex, int crit) |
@@ -259,6 +269,7 @@ X509_EXTENSION_set_critical(X509_EXTENSION *ex, int crit) | |||
259 | ex->critical = (crit) ? 0xFF : -1; | 269 | ex->critical = (crit) ? 0xFF : -1; |
260 | return (1); | 270 | return (1); |
261 | } | 271 | } |
272 | LCRYPTO_ALIAS(X509_EXTENSION_set_critical) | ||
262 | 273 | ||
263 | int | 274 | int |
264 | X509_EXTENSION_set_data(X509_EXTENSION *ex, ASN1_OCTET_STRING *data) | 275 | X509_EXTENSION_set_data(X509_EXTENSION *ex, ASN1_OCTET_STRING *data) |
@@ -272,6 +283,7 @@ X509_EXTENSION_set_data(X509_EXTENSION *ex, ASN1_OCTET_STRING *data) | |||
272 | return (0); | 283 | return (0); |
273 | return (1); | 284 | return (1); |
274 | } | 285 | } |
286 | LCRYPTO_ALIAS(X509_EXTENSION_set_data) | ||
275 | 287 | ||
276 | ASN1_OBJECT * | 288 | ASN1_OBJECT * |
277 | X509_EXTENSION_get_object(X509_EXTENSION *ex) | 289 | X509_EXTENSION_get_object(X509_EXTENSION *ex) |
@@ -280,6 +292,7 @@ X509_EXTENSION_get_object(X509_EXTENSION *ex) | |||
280 | return (NULL); | 292 | return (NULL); |
281 | return (ex->object); | 293 | return (ex->object); |
282 | } | 294 | } |
295 | LCRYPTO_ALIAS(X509_EXTENSION_get_object) | ||
283 | 296 | ||
284 | ASN1_OCTET_STRING * | 297 | ASN1_OCTET_STRING * |
285 | X509_EXTENSION_get_data(X509_EXTENSION *ex) | 298 | X509_EXTENSION_get_data(X509_EXTENSION *ex) |
@@ -288,6 +301,7 @@ X509_EXTENSION_get_data(X509_EXTENSION *ex) | |||
288 | return (NULL); | 301 | return (NULL); |
289 | return (ex->value); | 302 | return (ex->value); |
290 | } | 303 | } |
304 | LCRYPTO_ALIAS(X509_EXTENSION_get_data) | ||
291 | 305 | ||
292 | int | 306 | int |
293 | X509_EXTENSION_get_critical(const X509_EXTENSION *ex) | 307 | X509_EXTENSION_get_critical(const X509_EXTENSION *ex) |
@@ -298,3 +312,4 @@ X509_EXTENSION_get_critical(const X509_EXTENSION *ex) | |||
298 | return 1; | 312 | return 1; |
299 | return 0; | 313 | return 0; |
300 | } | 314 | } |
315 | LCRYPTO_ALIAS(X509_EXTENSION_get_critical) | ||
diff --git a/src/lib/libcrypto/x509/x509_vfy.c b/src/lib/libcrypto/x509/x509_vfy.c index 11bf3d9292..09c0b8105e 100644 --- a/src/lib/libcrypto/x509/x509_vfy.c +++ b/src/lib/libcrypto/x509/x509_vfy.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_vfy.c,v 1.104 2022/11/13 18:37:32 beck Exp $ */ | 1 | /* $OpenBSD: x509_vfy.c,v 1.105 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -668,6 +668,7 @@ X509_verify_cert(X509_STORE_CTX *ctx) | |||
668 | /* if we succeed we have a chain in ctx->chain */ | 668 | /* if we succeed we have a chain in ctx->chain */ |
669 | return (chain_count > 0 && ctx->chain != NULL); | 669 | return (chain_count > 0 && ctx->chain != NULL); |
670 | } | 670 | } |
671 | LCRYPTO_ALIAS(X509_verify_cert) | ||
671 | 672 | ||
672 | /* Given a STACK_OF(X509) find the issuer of cert (if any) | 673 | /* Given a STACK_OF(X509) find the issuer of cert (if any) |
673 | */ | 674 | */ |
@@ -2062,6 +2063,7 @@ X509_cmp_current_time(const ASN1_TIME *ctm) | |||
2062 | { | 2063 | { |
2063 | return X509_cmp_time(ctm, NULL); | 2064 | return X509_cmp_time(ctm, NULL); |
2064 | } | 2065 | } |
2066 | LCRYPTO_ALIAS(X509_cmp_current_time) | ||
2065 | 2067 | ||
2066 | /* | 2068 | /* |
2067 | * Compare a possibly unvalidated ASN1_TIME string against a time_t | 2069 | * Compare a possibly unvalidated ASN1_TIME string against a time_t |
@@ -2101,6 +2103,7 @@ X509_cmp_time(const ASN1_TIME *ctm, time_t *cmp_time) | |||
2101 | { | 2103 | { |
2102 | return X509_cmp_time_internal(ctm, cmp_time, 0); | 2104 | return X509_cmp_time_internal(ctm, cmp_time, 0); |
2103 | } | 2105 | } |
2106 | LCRYPTO_ALIAS(X509_cmp_time) | ||
2104 | 2107 | ||
2105 | 2108 | ||
2106 | ASN1_TIME * | 2109 | ASN1_TIME * |
@@ -2108,12 +2111,14 @@ X509_gmtime_adj(ASN1_TIME *s, long adj) | |||
2108 | { | 2111 | { |
2109 | return X509_time_adj(s, adj, NULL); | 2112 | return X509_time_adj(s, adj, NULL); |
2110 | } | 2113 | } |
2114 | LCRYPTO_ALIAS(X509_gmtime_adj) | ||
2111 | 2115 | ||
2112 | ASN1_TIME * | 2116 | ASN1_TIME * |
2113 | X509_time_adj(ASN1_TIME *s, long offset_sec, time_t *in_time) | 2117 | X509_time_adj(ASN1_TIME *s, long offset_sec, time_t *in_time) |
2114 | { | 2118 | { |
2115 | return X509_time_adj_ex(s, 0, offset_sec, in_time); | 2119 | return X509_time_adj_ex(s, 0, offset_sec, in_time); |
2116 | } | 2120 | } |
2121 | LCRYPTO_ALIAS(X509_time_adj) | ||
2117 | 2122 | ||
2118 | ASN1_TIME * | 2123 | ASN1_TIME * |
2119 | X509_time_adj_ex(ASN1_TIME *s, int offset_day, long offset_sec, time_t *in_time) | 2124 | X509_time_adj_ex(ASN1_TIME *s, int offset_day, long offset_sec, time_t *in_time) |
@@ -2126,6 +2131,7 @@ X509_time_adj_ex(ASN1_TIME *s, int offset_day, long offset_sec, time_t *in_time) | |||
2126 | 2131 | ||
2127 | return ASN1_TIME_adj(s, t, offset_day, offset_sec); | 2132 | return ASN1_TIME_adj(s, t, offset_day, offset_sec); |
2128 | } | 2133 | } |
2134 | LCRYPTO_ALIAS(X509_time_adj_ex) | ||
2129 | 2135 | ||
2130 | int | 2136 | int |
2131 | X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) | 2137 | X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) |
@@ -2165,6 +2171,7 @@ X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) | |||
2165 | return 0; | 2171 | return 0; |
2166 | return 1; | 2172 | return 1; |
2167 | } | 2173 | } |
2174 | LCRYPTO_ALIAS(X509_get_pubkey_parameters) | ||
2168 | 2175 | ||
2169 | int | 2176 | int |
2170 | X509_STORE_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | 2177 | X509_STORE_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, |
@@ -2175,66 +2182,77 @@ X509_STORE_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | |||
2175 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_X509_STORE_CTX, | 2182 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_X509_STORE_CTX, |
2176 | argl, argp, new_func, dup_func, free_func); | 2183 | argl, argp, new_func, dup_func, free_func); |
2177 | } | 2184 | } |
2185 | LCRYPTO_ALIAS(X509_STORE_CTX_get_ex_new_index) | ||
2178 | 2186 | ||
2179 | int | 2187 | int |
2180 | X509_STORE_CTX_set_ex_data(X509_STORE_CTX *ctx, int idx, void *data) | 2188 | X509_STORE_CTX_set_ex_data(X509_STORE_CTX *ctx, int idx, void *data) |
2181 | { | 2189 | { |
2182 | return CRYPTO_set_ex_data(&ctx->ex_data, idx, data); | 2190 | return CRYPTO_set_ex_data(&ctx->ex_data, idx, data); |
2183 | } | 2191 | } |
2192 | LCRYPTO_ALIAS(X509_STORE_CTX_set_ex_data) | ||
2184 | 2193 | ||
2185 | void * | 2194 | void * |
2186 | X509_STORE_CTX_get_ex_data(X509_STORE_CTX *ctx, int idx) | 2195 | X509_STORE_CTX_get_ex_data(X509_STORE_CTX *ctx, int idx) |
2187 | { | 2196 | { |
2188 | return CRYPTO_get_ex_data(&ctx->ex_data, idx); | 2197 | return CRYPTO_get_ex_data(&ctx->ex_data, idx); |
2189 | } | 2198 | } |
2199 | LCRYPTO_ALIAS(X509_STORE_CTX_get_ex_data) | ||
2190 | 2200 | ||
2191 | int | 2201 | int |
2192 | X509_STORE_CTX_get_error(X509_STORE_CTX *ctx) | 2202 | X509_STORE_CTX_get_error(X509_STORE_CTX *ctx) |
2193 | { | 2203 | { |
2194 | return ctx->error; | 2204 | return ctx->error; |
2195 | } | 2205 | } |
2206 | LCRYPTO_ALIAS(X509_STORE_CTX_get_error) | ||
2196 | 2207 | ||
2197 | void | 2208 | void |
2198 | X509_STORE_CTX_set_error(X509_STORE_CTX *ctx, int err) | 2209 | X509_STORE_CTX_set_error(X509_STORE_CTX *ctx, int err) |
2199 | { | 2210 | { |
2200 | ctx->error = err; | 2211 | ctx->error = err; |
2201 | } | 2212 | } |
2213 | LCRYPTO_ALIAS(X509_STORE_CTX_set_error) | ||
2202 | 2214 | ||
2203 | int | 2215 | int |
2204 | X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx) | 2216 | X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx) |
2205 | { | 2217 | { |
2206 | return ctx->error_depth; | 2218 | return ctx->error_depth; |
2207 | } | 2219 | } |
2220 | LCRYPTO_ALIAS(X509_STORE_CTX_get_error_depth) | ||
2208 | 2221 | ||
2209 | void | 2222 | void |
2210 | X509_STORE_CTX_set_error_depth(X509_STORE_CTX *ctx, int depth) | 2223 | X509_STORE_CTX_set_error_depth(X509_STORE_CTX *ctx, int depth) |
2211 | { | 2224 | { |
2212 | ctx->error_depth = depth; | 2225 | ctx->error_depth = depth; |
2213 | } | 2226 | } |
2227 | LCRYPTO_ALIAS(X509_STORE_CTX_set_error_depth) | ||
2214 | 2228 | ||
2215 | X509 * | 2229 | X509 * |
2216 | X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx) | 2230 | X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx) |
2217 | { | 2231 | { |
2218 | return ctx->current_cert; | 2232 | return ctx->current_cert; |
2219 | } | 2233 | } |
2234 | LCRYPTO_ALIAS(X509_STORE_CTX_get_current_cert) | ||
2220 | 2235 | ||
2221 | void | 2236 | void |
2222 | X509_STORE_CTX_set_current_cert(X509_STORE_CTX *ctx, X509 *x) | 2237 | X509_STORE_CTX_set_current_cert(X509_STORE_CTX *ctx, X509 *x) |
2223 | { | 2238 | { |
2224 | ctx->current_cert = x; | 2239 | ctx->current_cert = x; |
2225 | } | 2240 | } |
2241 | LCRYPTO_ALIAS(X509_STORE_CTX_set_current_cert) | ||
2226 | 2242 | ||
2227 | STACK_OF(X509) * | 2243 | STACK_OF(X509) * |
2228 | X509_STORE_CTX_get_chain(X509_STORE_CTX *ctx) | 2244 | X509_STORE_CTX_get_chain(X509_STORE_CTX *ctx) |
2229 | { | 2245 | { |
2230 | return ctx->chain; | 2246 | return ctx->chain; |
2231 | } | 2247 | } |
2248 | LCRYPTO_ALIAS(X509_STORE_CTX_get_chain) | ||
2232 | 2249 | ||
2233 | STACK_OF(X509) * | 2250 | STACK_OF(X509) * |
2234 | X509_STORE_CTX_get0_chain(X509_STORE_CTX *xs) | 2251 | X509_STORE_CTX_get0_chain(X509_STORE_CTX *xs) |
2235 | { | 2252 | { |
2236 | return xs->chain; | 2253 | return xs->chain; |
2237 | } | 2254 | } |
2255 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_chain) | ||
2238 | 2256 | ||
2239 | STACK_OF(X509) * | 2257 | STACK_OF(X509) * |
2240 | X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx) | 2258 | X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx) |
@@ -2251,60 +2269,70 @@ X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx) | |||
2251 | } | 2269 | } |
2252 | return chain; | 2270 | return chain; |
2253 | } | 2271 | } |
2272 | LCRYPTO_ALIAS(X509_STORE_CTX_get1_chain) | ||
2254 | 2273 | ||
2255 | X509 * | 2274 | X509 * |
2256 | X509_STORE_CTX_get0_current_issuer(X509_STORE_CTX *ctx) | 2275 | X509_STORE_CTX_get0_current_issuer(X509_STORE_CTX *ctx) |
2257 | { | 2276 | { |
2258 | return ctx->current_issuer; | 2277 | return ctx->current_issuer; |
2259 | } | 2278 | } |
2279 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_current_issuer) | ||
2260 | 2280 | ||
2261 | X509_CRL * | 2281 | X509_CRL * |
2262 | X509_STORE_CTX_get0_current_crl(X509_STORE_CTX *ctx) | 2282 | X509_STORE_CTX_get0_current_crl(X509_STORE_CTX *ctx) |
2263 | { | 2283 | { |
2264 | return ctx->current_crl; | 2284 | return ctx->current_crl; |
2265 | } | 2285 | } |
2286 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_current_crl) | ||
2266 | 2287 | ||
2267 | X509_STORE_CTX * | 2288 | X509_STORE_CTX * |
2268 | X509_STORE_CTX_get0_parent_ctx(X509_STORE_CTX *ctx) | 2289 | X509_STORE_CTX_get0_parent_ctx(X509_STORE_CTX *ctx) |
2269 | { | 2290 | { |
2270 | return ctx->parent; | 2291 | return ctx->parent; |
2271 | } | 2292 | } |
2293 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_parent_ctx) | ||
2272 | 2294 | ||
2273 | X509_STORE * | 2295 | X509_STORE * |
2274 | X509_STORE_CTX_get0_store(X509_STORE_CTX *xs) | 2296 | X509_STORE_CTX_get0_store(X509_STORE_CTX *xs) |
2275 | { | 2297 | { |
2276 | return xs->store; | 2298 | return xs->store; |
2277 | } | 2299 | } |
2300 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_store) | ||
2278 | 2301 | ||
2279 | void | 2302 | void |
2280 | X509_STORE_CTX_set_cert(X509_STORE_CTX *ctx, X509 *x) | 2303 | X509_STORE_CTX_set_cert(X509_STORE_CTX *ctx, X509 *x) |
2281 | { | 2304 | { |
2282 | ctx->cert = x; | 2305 | ctx->cert = x; |
2283 | } | 2306 | } |
2307 | LCRYPTO_ALIAS(X509_STORE_CTX_set_cert) | ||
2284 | 2308 | ||
2285 | void | 2309 | void |
2286 | X509_STORE_CTX_set_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | 2310 | X509_STORE_CTX_set_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) |
2287 | { | 2311 | { |
2288 | ctx->untrusted = sk; | 2312 | ctx->untrusted = sk; |
2289 | } | 2313 | } |
2314 | LCRYPTO_ALIAS(X509_STORE_CTX_set_chain) | ||
2290 | 2315 | ||
2291 | void | 2316 | void |
2292 | X509_STORE_CTX_set0_crls(X509_STORE_CTX *ctx, STACK_OF(X509_CRL) *sk) | 2317 | X509_STORE_CTX_set0_crls(X509_STORE_CTX *ctx, STACK_OF(X509_CRL) *sk) |
2293 | { | 2318 | { |
2294 | ctx->crls = sk; | 2319 | ctx->crls = sk; |
2295 | } | 2320 | } |
2321 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_crls) | ||
2296 | 2322 | ||
2297 | int | 2323 | int |
2298 | X509_STORE_CTX_set_purpose(X509_STORE_CTX *ctx, int purpose) | 2324 | X509_STORE_CTX_set_purpose(X509_STORE_CTX *ctx, int purpose) |
2299 | { | 2325 | { |
2300 | return X509_STORE_CTX_purpose_inherit(ctx, 0, purpose, 0); | 2326 | return X509_STORE_CTX_purpose_inherit(ctx, 0, purpose, 0); |
2301 | } | 2327 | } |
2328 | LCRYPTO_ALIAS(X509_STORE_CTX_set_purpose) | ||
2302 | 2329 | ||
2303 | int | 2330 | int |
2304 | X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) | 2331 | X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) |
2305 | { | 2332 | { |
2306 | return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); | 2333 | return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); |
2307 | } | 2334 | } |
2335 | LCRYPTO_ALIAS(X509_STORE_CTX_set_trust) | ||
2308 | 2336 | ||
2309 | /* This function is used to set the X509_STORE_CTX purpose and trust | 2337 | /* This function is used to set the X509_STORE_CTX purpose and trust |
2310 | * values. This is intended to be used when another structure has its | 2338 | * values. This is intended to be used when another structure has its |
@@ -2360,6 +2388,7 @@ X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, | |||
2360 | ctx->param->trust = trust; | 2388 | ctx->param->trust = trust; |
2361 | return 1; | 2389 | return 1; |
2362 | } | 2390 | } |
2391 | LCRYPTO_ALIAS(X509_STORE_CTX_purpose_inherit) | ||
2363 | 2392 | ||
2364 | X509_STORE_CTX * | 2393 | X509_STORE_CTX * |
2365 | X509_STORE_CTX_new(void) | 2394 | X509_STORE_CTX_new(void) |
@@ -2373,6 +2402,7 @@ X509_STORE_CTX_new(void) | |||
2373 | } | 2402 | } |
2374 | return ctx; | 2403 | return ctx; |
2375 | } | 2404 | } |
2405 | LCRYPTO_ALIAS(X509_STORE_CTX_new) | ||
2376 | 2406 | ||
2377 | void | 2407 | void |
2378 | X509_STORE_CTX_free(X509_STORE_CTX *ctx) | 2408 | X509_STORE_CTX_free(X509_STORE_CTX *ctx) |
@@ -2383,6 +2413,7 @@ X509_STORE_CTX_free(X509_STORE_CTX *ctx) | |||
2383 | X509_STORE_CTX_cleanup(ctx); | 2413 | X509_STORE_CTX_cleanup(ctx); |
2384 | free(ctx); | 2414 | free(ctx); |
2385 | } | 2415 | } |
2416 | LCRYPTO_ALIAS(X509_STORE_CTX_free) | ||
2386 | 2417 | ||
2387 | int | 2418 | int |
2388 | X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, | 2419 | X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, |
@@ -2504,6 +2535,7 @@ X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, | |||
2504 | } | 2535 | } |
2505 | return 1; | 2536 | return 1; |
2506 | } | 2537 | } |
2538 | LCRYPTO_ALIAS(X509_STORE_CTX_init) | ||
2507 | 2539 | ||
2508 | /* Set alternative lookup method: just a STACK of trusted certificates. | 2540 | /* Set alternative lookup method: just a STACK of trusted certificates. |
2509 | * This avoids X509_STORE nastiness where it isn't needed. | 2541 | * This avoids X509_STORE nastiness where it isn't needed. |
@@ -2515,12 +2547,14 @@ X509_STORE_CTX_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | |||
2515 | ctx->other_ctx = sk; | 2547 | ctx->other_ctx = sk; |
2516 | ctx->get_issuer = get_issuer_sk; | 2548 | ctx->get_issuer = get_issuer_sk; |
2517 | } | 2549 | } |
2550 | LCRYPTO_ALIAS(X509_STORE_CTX_trusted_stack) | ||
2518 | 2551 | ||
2519 | void | 2552 | void |
2520 | X509_STORE_CTX_set0_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | 2553 | X509_STORE_CTX_set0_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) |
2521 | { | 2554 | { |
2522 | X509_STORE_CTX_trusted_stack(ctx, sk); | 2555 | X509_STORE_CTX_trusted_stack(ctx, sk); |
2523 | } | 2556 | } |
2557 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_trusted_stack) | ||
2524 | 2558 | ||
2525 | void | 2559 | void |
2526 | X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) | 2560 | X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) |
@@ -2544,30 +2578,35 @@ X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) | |||
2544 | ctx, &(ctx->ex_data)); | 2578 | ctx, &(ctx->ex_data)); |
2545 | memset(&ctx->ex_data, 0, sizeof(CRYPTO_EX_DATA)); | 2579 | memset(&ctx->ex_data, 0, sizeof(CRYPTO_EX_DATA)); |
2546 | } | 2580 | } |
2581 | LCRYPTO_ALIAS(X509_STORE_CTX_cleanup) | ||
2547 | 2582 | ||
2548 | void | 2583 | void |
2549 | X509_STORE_CTX_set_depth(X509_STORE_CTX *ctx, int depth) | 2584 | X509_STORE_CTX_set_depth(X509_STORE_CTX *ctx, int depth) |
2550 | { | 2585 | { |
2551 | X509_VERIFY_PARAM_set_depth(ctx->param, depth); | 2586 | X509_VERIFY_PARAM_set_depth(ctx->param, depth); |
2552 | } | 2587 | } |
2588 | LCRYPTO_ALIAS(X509_STORE_CTX_set_depth) | ||
2553 | 2589 | ||
2554 | void | 2590 | void |
2555 | X509_STORE_CTX_set_flags(X509_STORE_CTX *ctx, unsigned long flags) | 2591 | X509_STORE_CTX_set_flags(X509_STORE_CTX *ctx, unsigned long flags) |
2556 | { | 2592 | { |
2557 | X509_VERIFY_PARAM_set_flags(ctx->param, flags); | 2593 | X509_VERIFY_PARAM_set_flags(ctx->param, flags); |
2558 | } | 2594 | } |
2595 | LCRYPTO_ALIAS(X509_STORE_CTX_set_flags) | ||
2559 | 2596 | ||
2560 | void | 2597 | void |
2561 | X509_STORE_CTX_set_time(X509_STORE_CTX *ctx, unsigned long flags, time_t t) | 2598 | X509_STORE_CTX_set_time(X509_STORE_CTX *ctx, unsigned long flags, time_t t) |
2562 | { | 2599 | { |
2563 | X509_VERIFY_PARAM_set_time(ctx->param, t); | 2600 | X509_VERIFY_PARAM_set_time(ctx->param, t); |
2564 | } | 2601 | } |
2602 | LCRYPTO_ALIAS(X509_STORE_CTX_set_time) | ||
2565 | 2603 | ||
2566 | int | 2604 | int |
2567 | (*X509_STORE_CTX_get_verify_cb(X509_STORE_CTX *ctx))(int, X509_STORE_CTX *) | 2605 | (*X509_STORE_CTX_get_verify_cb(X509_STORE_CTX *ctx))(int, X509_STORE_CTX *) |
2568 | { | 2606 | { |
2569 | return ctx->verify_cb; | 2607 | return ctx->verify_cb; |
2570 | } | 2608 | } |
2609 | LCRYPTO_ALIAS(X509_STORE_CTX_get_verify_cb) | ||
2571 | 2610 | ||
2572 | void | 2611 | void |
2573 | X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx, | 2612 | X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx, |
@@ -2575,36 +2614,42 @@ X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx, | |||
2575 | { | 2614 | { |
2576 | ctx->verify_cb = verify_cb; | 2615 | ctx->verify_cb = verify_cb; |
2577 | } | 2616 | } |
2617 | LCRYPTO_ALIAS(X509_STORE_CTX_set_verify_cb) | ||
2578 | 2618 | ||
2579 | int | 2619 | int |
2580 | (*X509_STORE_CTX_get_verify(X509_STORE_CTX *ctx))(X509_STORE_CTX *) | 2620 | (*X509_STORE_CTX_get_verify(X509_STORE_CTX *ctx))(X509_STORE_CTX *) |
2581 | { | 2621 | { |
2582 | return ctx->verify; | 2622 | return ctx->verify; |
2583 | } | 2623 | } |
2624 | LCRYPTO_ALIAS(X509_STORE_CTX_get_verify) | ||
2584 | 2625 | ||
2585 | void | 2626 | void |
2586 | X509_STORE_CTX_set_verify(X509_STORE_CTX *ctx, int (*verify)(X509_STORE_CTX *)) | 2627 | X509_STORE_CTX_set_verify(X509_STORE_CTX *ctx, int (*verify)(X509_STORE_CTX *)) |
2587 | { | 2628 | { |
2588 | ctx->verify = verify; | 2629 | ctx->verify = verify; |
2589 | } | 2630 | } |
2631 | LCRYPTO_ALIAS(X509_STORE_CTX_set_verify) | ||
2590 | 2632 | ||
2591 | X509 * | 2633 | X509 * |
2592 | X509_STORE_CTX_get0_cert(X509_STORE_CTX *ctx) | 2634 | X509_STORE_CTX_get0_cert(X509_STORE_CTX *ctx) |
2593 | { | 2635 | { |
2594 | return ctx->cert; | 2636 | return ctx->cert; |
2595 | } | 2637 | } |
2638 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_cert) | ||
2596 | 2639 | ||
2597 | STACK_OF(X509) * | 2640 | STACK_OF(X509) * |
2598 | X509_STORE_CTX_get0_untrusted(X509_STORE_CTX *ctx) | 2641 | X509_STORE_CTX_get0_untrusted(X509_STORE_CTX *ctx) |
2599 | { | 2642 | { |
2600 | return ctx->untrusted; | 2643 | return ctx->untrusted; |
2601 | } | 2644 | } |
2645 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_untrusted) | ||
2602 | 2646 | ||
2603 | void | 2647 | void |
2604 | X509_STORE_CTX_set0_untrusted(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | 2648 | X509_STORE_CTX_set0_untrusted(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) |
2605 | { | 2649 | { |
2606 | ctx->untrusted = sk; | 2650 | ctx->untrusted = sk; |
2607 | } | 2651 | } |
2652 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_untrusted) | ||
2608 | 2653 | ||
2609 | void | 2654 | void |
2610 | X509_STORE_CTX_set0_verified_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | 2655 | X509_STORE_CTX_set0_verified_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) |
@@ -2612,24 +2657,28 @@ X509_STORE_CTX_set0_verified_chain(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | |||
2612 | sk_X509_pop_free(ctx->chain, X509_free); | 2657 | sk_X509_pop_free(ctx->chain, X509_free); |
2613 | ctx->chain = sk; | 2658 | ctx->chain = sk; |
2614 | } | 2659 | } |
2660 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_verified_chain) | ||
2615 | 2661 | ||
2616 | X509_POLICY_TREE * | 2662 | X509_POLICY_TREE * |
2617 | X509_STORE_CTX_get0_policy_tree(X509_STORE_CTX *ctx) | 2663 | X509_STORE_CTX_get0_policy_tree(X509_STORE_CTX *ctx) |
2618 | { | 2664 | { |
2619 | return ctx->tree; | 2665 | return ctx->tree; |
2620 | } | 2666 | } |
2667 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_policy_tree) | ||
2621 | 2668 | ||
2622 | int | 2669 | int |
2623 | X509_STORE_CTX_get_explicit_policy(X509_STORE_CTX *ctx) | 2670 | X509_STORE_CTX_get_explicit_policy(X509_STORE_CTX *ctx) |
2624 | { | 2671 | { |
2625 | return ctx->explicit_policy; | 2672 | return ctx->explicit_policy; |
2626 | } | 2673 | } |
2674 | LCRYPTO_ALIAS(X509_STORE_CTX_get_explicit_policy) | ||
2627 | 2675 | ||
2628 | int | 2676 | int |
2629 | X509_STORE_CTX_get_num_untrusted(X509_STORE_CTX *ctx) | 2677 | X509_STORE_CTX_get_num_untrusted(X509_STORE_CTX *ctx) |
2630 | { | 2678 | { |
2631 | return ctx->num_untrusted; | 2679 | return ctx->num_untrusted; |
2632 | } | 2680 | } |
2681 | LCRYPTO_ALIAS(X509_STORE_CTX_get_num_untrusted) | ||
2633 | 2682 | ||
2634 | int | 2683 | int |
2635 | X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name) | 2684 | X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name) |
@@ -2640,12 +2689,14 @@ X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name) | |||
2640 | return 0; | 2689 | return 0; |
2641 | return X509_VERIFY_PARAM_inherit(ctx->param, param); | 2690 | return X509_VERIFY_PARAM_inherit(ctx->param, param); |
2642 | } | 2691 | } |
2692 | LCRYPTO_ALIAS(X509_STORE_CTX_set_default) | ||
2643 | 2693 | ||
2644 | X509_VERIFY_PARAM * | 2694 | X509_VERIFY_PARAM * |
2645 | X509_STORE_CTX_get0_param(X509_STORE_CTX *ctx) | 2695 | X509_STORE_CTX_get0_param(X509_STORE_CTX *ctx) |
2646 | { | 2696 | { |
2647 | return ctx->param; | 2697 | return ctx->param; |
2648 | } | 2698 | } |
2699 | LCRYPTO_ALIAS(X509_STORE_CTX_get0_param) | ||
2649 | 2700 | ||
2650 | void | 2701 | void |
2651 | X509_STORE_CTX_set0_param(X509_STORE_CTX *ctx, X509_VERIFY_PARAM *param) | 2702 | X509_STORE_CTX_set0_param(X509_STORE_CTX *ctx, X509_VERIFY_PARAM *param) |
@@ -2654,6 +2705,7 @@ X509_STORE_CTX_set0_param(X509_STORE_CTX *ctx, X509_VERIFY_PARAM *param) | |||
2654 | X509_VERIFY_PARAM_free(ctx->param); | 2705 | X509_VERIFY_PARAM_free(ctx->param); |
2655 | ctx->param = param; | 2706 | ctx->param = param; |
2656 | } | 2707 | } |
2708 | LCRYPTO_ALIAS(X509_STORE_CTX_set0_param) | ||
2657 | 2709 | ||
2658 | /* | 2710 | /* |
2659 | * Check if |bits| are adequate for |security level|. | 2711 | * Check if |bits| are adequate for |security level|. |
diff --git a/src/lib/libcrypto/x509/x509_vpm.c b/src/lib/libcrypto/x509/x509_vpm.c index e14d7a36fd..56e2c34127 100644 --- a/src/lib/libcrypto/x509/x509_vpm.c +++ b/src/lib/libcrypto/x509/x509_vpm.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_vpm.c,v 1.30 2022/07/04 12:17:32 tb Exp $ */ | 1 | /* $OpenBSD: x509_vpm.c,v 1.31 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2004. | 3 | * project 2004. |
4 | */ | 4 | */ |
@@ -218,6 +218,7 @@ X509_VERIFY_PARAM_new(void) | |||
218 | x509_verify_param_zero(param); | 218 | x509_verify_param_zero(param); |
219 | return param; | 219 | return param; |
220 | } | 220 | } |
221 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_new) | ||
221 | 222 | ||
222 | void | 223 | void |
223 | X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param) | 224 | X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param) |
@@ -228,6 +229,7 @@ X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param) | |||
228 | free(param->id); | 229 | free(param->id); |
229 | free(param); | 230 | free(param); |
230 | } | 231 | } |
232 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_free) | ||
231 | 233 | ||
232 | /* | 234 | /* |
233 | * This function determines how parameters are "inherited" from one structure | 235 | * This function determines how parameters are "inherited" from one structure |
@@ -356,6 +358,7 @@ X509_VERIFY_PARAM_inherit(X509_VERIFY_PARAM *dest, const X509_VERIFY_PARAM *src) | |||
356 | 358 | ||
357 | return 1; | 359 | return 1; |
358 | } | 360 | } |
361 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_inherit) | ||
359 | 362 | ||
360 | int | 363 | int |
361 | X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, const X509_VERIFY_PARAM *from) | 364 | X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, const X509_VERIFY_PARAM *from) |
@@ -368,6 +371,7 @@ X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, const X509_VERIFY_PARAM *from) | |||
368 | to->inh_flags = save_flags; | 371 | to->inh_flags = save_flags; |
369 | return ret; | 372 | return ret; |
370 | } | 373 | } |
374 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1) | ||
371 | 375 | ||
372 | static int | 376 | static int |
373 | x509_param_set1_internal(char **pdest, size_t *pdestlen, const char *src, | 377 | x509_param_set1_internal(char **pdest, size_t *pdestlen, const char *src, |
@@ -412,6 +416,7 @@ X509_VERIFY_PARAM_set1_name(X509_VERIFY_PARAM *param, const char *name) | |||
412 | return 1; | 416 | return 1; |
413 | return 0; | 417 | return 0; |
414 | } | 418 | } |
419 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_name) | ||
415 | 420 | ||
416 | int | 421 | int |
417 | X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags) | 422 | X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags) |
@@ -421,6 +426,7 @@ X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, unsigned long flags) | |||
421 | param->flags |= X509_V_FLAG_POLICY_CHECK; | 426 | param->flags |= X509_V_FLAG_POLICY_CHECK; |
422 | return 1; | 427 | return 1; |
423 | } | 428 | } |
429 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_flags) | ||
424 | 430 | ||
425 | int | 431 | int |
426 | X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, unsigned long flags) | 432 | X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, unsigned long flags) |
@@ -428,42 +434,49 @@ X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, unsigned long flags) | |||
428 | param->flags &= ~flags; | 434 | param->flags &= ~flags; |
429 | return 1; | 435 | return 1; |
430 | } | 436 | } |
437 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_clear_flags) | ||
431 | 438 | ||
432 | unsigned long | 439 | unsigned long |
433 | X509_VERIFY_PARAM_get_flags(X509_VERIFY_PARAM *param) | 440 | X509_VERIFY_PARAM_get_flags(X509_VERIFY_PARAM *param) |
434 | { | 441 | { |
435 | return param->flags; | 442 | return param->flags; |
436 | } | 443 | } |
444 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_flags) | ||
437 | 445 | ||
438 | int | 446 | int |
439 | X509_VERIFY_PARAM_set_purpose(X509_VERIFY_PARAM *param, int purpose) | 447 | X509_VERIFY_PARAM_set_purpose(X509_VERIFY_PARAM *param, int purpose) |
440 | { | 448 | { |
441 | return X509_PURPOSE_set(¶m->purpose, purpose); | 449 | return X509_PURPOSE_set(¶m->purpose, purpose); |
442 | } | 450 | } |
451 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_purpose) | ||
443 | 452 | ||
444 | int | 453 | int |
445 | X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) | 454 | X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) |
446 | { | 455 | { |
447 | return X509_TRUST_set(¶m->trust, trust); | 456 | return X509_TRUST_set(¶m->trust, trust); |
448 | } | 457 | } |
458 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_trust) | ||
449 | 459 | ||
450 | void | 460 | void |
451 | X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth) | 461 | X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth) |
452 | { | 462 | { |
453 | param->depth = depth; | 463 | param->depth = depth; |
454 | } | 464 | } |
465 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_depth) | ||
455 | 466 | ||
456 | void | 467 | void |
457 | X509_VERIFY_PARAM_set_auth_level(X509_VERIFY_PARAM *param, int auth_level) | 468 | X509_VERIFY_PARAM_set_auth_level(X509_VERIFY_PARAM *param, int auth_level) |
458 | { | 469 | { |
459 | param->security_level = auth_level; | 470 | param->security_level = auth_level; |
460 | } | 471 | } |
472 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_auth_level) | ||
461 | 473 | ||
462 | time_t | 474 | time_t |
463 | X509_VERIFY_PARAM_get_time(const X509_VERIFY_PARAM *param) | 475 | X509_VERIFY_PARAM_get_time(const X509_VERIFY_PARAM *param) |
464 | { | 476 | { |
465 | return param->check_time; | 477 | return param->check_time; |
466 | } | 478 | } |
479 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_time) | ||
467 | 480 | ||
468 | void | 481 | void |
469 | X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t) | 482 | X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t) |
@@ -471,6 +484,7 @@ X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t) | |||
471 | param->check_time = t; | 484 | param->check_time = t; |
472 | param->flags |= X509_V_FLAG_USE_CHECK_TIME; | 485 | param->flags |= X509_V_FLAG_USE_CHECK_TIME; |
473 | } | 486 | } |
487 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_time) | ||
474 | 488 | ||
475 | int | 489 | int |
476 | X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) | 490 | X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) |
@@ -484,6 +498,7 @@ X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) | |||
484 | return 0; | 498 | return 0; |
485 | return 1; | 499 | return 1; |
486 | } | 500 | } |
501 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add0_policy) | ||
487 | 502 | ||
488 | int | 503 | int |
489 | X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, | 504 | X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, |
@@ -519,6 +534,7 @@ X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, | |||
519 | param->flags |= X509_V_FLAG_POLICY_CHECK; | 534 | param->flags |= X509_V_FLAG_POLICY_CHECK; |
520 | return 1; | 535 | return 1; |
521 | } | 536 | } |
537 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_policies) | ||
522 | 538 | ||
523 | int | 539 | int |
524 | X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, | 540 | X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, |
@@ -529,6 +545,7 @@ X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, | |||
529 | param->id->poisoned = 1; | 545 | param->id->poisoned = 1; |
530 | return 0; | 546 | return 0; |
531 | } | 547 | } |
548 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_host) | ||
532 | 549 | ||
533 | int | 550 | int |
534 | X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, | 551 | X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, |
@@ -539,18 +556,21 @@ X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, | |||
539 | param->id->poisoned = 1; | 556 | param->id->poisoned = 1; |
540 | return 0; | 557 | return 0; |
541 | } | 558 | } |
559 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add1_host) | ||
542 | 560 | ||
543 | void | 561 | void |
544 | X509_VERIFY_PARAM_set_hostflags(X509_VERIFY_PARAM *param, unsigned int flags) | 562 | X509_VERIFY_PARAM_set_hostflags(X509_VERIFY_PARAM *param, unsigned int flags) |
545 | { | 563 | { |
546 | param->id->hostflags = flags; | 564 | param->id->hostflags = flags; |
547 | } | 565 | } |
566 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set_hostflags) | ||
548 | 567 | ||
549 | char * | 568 | char * |
550 | X509_VERIFY_PARAM_get0_peername(X509_VERIFY_PARAM *param) | 569 | X509_VERIFY_PARAM_get0_peername(X509_VERIFY_PARAM *param) |
551 | { | 570 | { |
552 | return param->id->peername; | 571 | return param->id->peername; |
553 | } | 572 | } |
573 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0_peername) | ||
554 | 574 | ||
555 | int | 575 | int |
556 | X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param, const char *email, | 576 | X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param, const char *email, |
@@ -562,6 +582,7 @@ X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param, const char *email, | |||
562 | param->id->poisoned = 1; | 582 | param->id->poisoned = 1; |
563 | return 0; | 583 | return 0; |
564 | } | 584 | } |
585 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_email) | ||
565 | 586 | ||
566 | int | 587 | int |
567 | X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param, const unsigned char *ip, | 588 | X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param, const unsigned char *ip, |
@@ -576,6 +597,7 @@ X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param, const unsigned char *ip, | |||
576 | param->id->poisoned = 1; | 597 | param->id->poisoned = 1; |
577 | return 0; | 598 | return 0; |
578 | } | 599 | } |
600 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_ip) | ||
579 | 601 | ||
580 | int | 602 | int |
581 | X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, const char *ipasc) | 603 | X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, const char *ipasc) |
@@ -586,18 +608,21 @@ X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, const char *ipasc) | |||
586 | iplen = (size_t)a2i_ipadd(ipout, ipasc); | 608 | iplen = (size_t)a2i_ipadd(ipout, ipasc); |
587 | return X509_VERIFY_PARAM_set1_ip(param, ipout, iplen); | 609 | return X509_VERIFY_PARAM_set1_ip(param, ipout, iplen); |
588 | } | 610 | } |
611 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_set1_ip_asc) | ||
589 | 612 | ||
590 | int | 613 | int |
591 | X509_VERIFY_PARAM_get_depth(const X509_VERIFY_PARAM *param) | 614 | X509_VERIFY_PARAM_get_depth(const X509_VERIFY_PARAM *param) |
592 | { | 615 | { |
593 | return param->depth; | 616 | return param->depth; |
594 | } | 617 | } |
618 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_depth) | ||
595 | 619 | ||
596 | const char * | 620 | const char * |
597 | X509_VERIFY_PARAM_get0_name(const X509_VERIFY_PARAM *param) | 621 | X509_VERIFY_PARAM_get0_name(const X509_VERIFY_PARAM *param) |
598 | { | 622 | { |
599 | return param->name; | 623 | return param->name; |
600 | } | 624 | } |
625 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0_name) | ||
601 | 626 | ||
602 | static const X509_VERIFY_PARAM_ID _empty_id = { NULL }; | 627 | static const X509_VERIFY_PARAM_ID _empty_id = { NULL }; |
603 | 628 | ||
@@ -679,6 +704,7 @@ X509_VERIFY_PARAM_add0_table(X509_VERIFY_PARAM *param) | |||
679 | return 0; | 704 | return 0; |
680 | return 1; | 705 | return 1; |
681 | } | 706 | } |
707 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_add0_table) | ||
682 | 708 | ||
683 | int | 709 | int |
684 | X509_VERIFY_PARAM_get_count(void) | 710 | X509_VERIFY_PARAM_get_count(void) |
@@ -688,6 +714,7 @@ X509_VERIFY_PARAM_get_count(void) | |||
688 | num += sk_X509_VERIFY_PARAM_num(param_table); | 714 | num += sk_X509_VERIFY_PARAM_num(param_table); |
689 | return num; | 715 | return num; |
690 | } | 716 | } |
717 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get_count) | ||
691 | 718 | ||
692 | const X509_VERIFY_PARAM * | 719 | const X509_VERIFY_PARAM * |
693 | X509_VERIFY_PARAM_get0(int id) | 720 | X509_VERIFY_PARAM_get0(int id) |
@@ -697,6 +724,7 @@ X509_VERIFY_PARAM_get0(int id) | |||
697 | return default_table + id; | 724 | return default_table + id; |
698 | return sk_X509_VERIFY_PARAM_value(param_table, id - num); | 725 | return sk_X509_VERIFY_PARAM_value(param_table, id - num); |
699 | } | 726 | } |
727 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_get0) | ||
700 | 728 | ||
701 | const X509_VERIFY_PARAM * | 729 | const X509_VERIFY_PARAM * |
702 | X509_VERIFY_PARAM_lookup(const char *name) | 730 | X509_VERIFY_PARAM_lookup(const char *name) |
@@ -719,6 +747,7 @@ X509_VERIFY_PARAM_lookup(const char *name) | |||
719 | } | 747 | } |
720 | return NULL; | 748 | return NULL; |
721 | } | 749 | } |
750 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_lookup) | ||
722 | 751 | ||
723 | void | 752 | void |
724 | X509_VERIFY_PARAM_table_cleanup(void) | 753 | X509_VERIFY_PARAM_table_cleanup(void) |
@@ -728,3 +757,4 @@ X509_VERIFY_PARAM_table_cleanup(void) | |||
728 | X509_VERIFY_PARAM_free); | 757 | X509_VERIFY_PARAM_free); |
729 | param_table = NULL; | 758 | param_table = NULL; |
730 | } | 759 | } |
760 | LCRYPTO_ALIAS(X509_VERIFY_PARAM_table_cleanup) | ||
diff --git a/src/lib/libcrypto/x509/x509cset.c b/src/lib/libcrypto/x509/x509cset.c index b3af77d90e..7002238394 100644 --- a/src/lib/libcrypto/x509/x509cset.c +++ b/src/lib/libcrypto/x509/x509cset.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509cset.c,v 1.16 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: x509cset.c,v 1.17 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2001. | 3 | * project 2001. |
4 | */ | 4 | */ |
@@ -71,6 +71,7 @@ X509_CRL_up_ref(X509_CRL *x) | |||
71 | int refs = CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509_CRL); | 71 | int refs = CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509_CRL); |
72 | return (refs > 1) ? 1 : 0; | 72 | return (refs > 1) ? 1 : 0; |
73 | } | 73 | } |
74 | LCRYPTO_ALIAS(X509_CRL_up_ref) | ||
74 | 75 | ||
75 | int | 76 | int |
76 | X509_CRL_set_version(X509_CRL *x, long version) | 77 | X509_CRL_set_version(X509_CRL *x, long version) |
@@ -83,6 +84,7 @@ X509_CRL_set_version(X509_CRL *x, long version) | |||
83 | } | 84 | } |
84 | return (ASN1_INTEGER_set(x->crl->version, version)); | 85 | return (ASN1_INTEGER_set(x->crl->version, version)); |
85 | } | 86 | } |
87 | LCRYPTO_ALIAS(X509_CRL_set_version) | ||
86 | 88 | ||
87 | int | 89 | int |
88 | X509_CRL_set_issuer_name(X509_CRL *x, X509_NAME *name) | 90 | X509_CRL_set_issuer_name(X509_CRL *x, X509_NAME *name) |
@@ -91,6 +93,7 @@ X509_CRL_set_issuer_name(X509_CRL *x, X509_NAME *name) | |||
91 | return (0); | 93 | return (0); |
92 | return (X509_NAME_set(&x->crl->issuer, name)); | 94 | return (X509_NAME_set(&x->crl->issuer, name)); |
93 | } | 95 | } |
96 | LCRYPTO_ALIAS(X509_CRL_set_issuer_name) | ||
94 | 97 | ||
95 | int | 98 | int |
96 | X509_CRL_set_lastUpdate(X509_CRL *x, const ASN1_TIME *tm) | 99 | X509_CRL_set_lastUpdate(X509_CRL *x, const ASN1_TIME *tm) |
@@ -109,12 +112,14 @@ X509_CRL_set_lastUpdate(X509_CRL *x, const ASN1_TIME *tm) | |||
109 | } | 112 | } |
110 | return (in != NULL); | 113 | return (in != NULL); |
111 | } | 114 | } |
115 | LCRYPTO_ALIAS(X509_CRL_set_lastUpdate) | ||
112 | 116 | ||
113 | int | 117 | int |
114 | X509_CRL_set1_lastUpdate(X509_CRL *x, const ASN1_TIME *tm) | 118 | X509_CRL_set1_lastUpdate(X509_CRL *x, const ASN1_TIME *tm) |
115 | { | 119 | { |
116 | return X509_CRL_set_lastUpdate(x, tm); | 120 | return X509_CRL_set_lastUpdate(x, tm); |
117 | } | 121 | } |
122 | LCRYPTO_ALIAS(X509_CRL_set1_lastUpdate) | ||
118 | 123 | ||
119 | int | 124 | int |
120 | X509_CRL_set_nextUpdate(X509_CRL *x, const ASN1_TIME *tm) | 125 | X509_CRL_set_nextUpdate(X509_CRL *x, const ASN1_TIME *tm) |
@@ -133,12 +138,14 @@ X509_CRL_set_nextUpdate(X509_CRL *x, const ASN1_TIME *tm) | |||
133 | } | 138 | } |
134 | return (in != NULL); | 139 | return (in != NULL); |
135 | } | 140 | } |
141 | LCRYPTO_ALIAS(X509_CRL_set_nextUpdate) | ||
136 | 142 | ||
137 | int | 143 | int |
138 | X509_CRL_set1_nextUpdate(X509_CRL *x, const ASN1_TIME *tm) | 144 | X509_CRL_set1_nextUpdate(X509_CRL *x, const ASN1_TIME *tm) |
139 | { | 145 | { |
140 | return X509_CRL_set_nextUpdate(x, tm); | 146 | return X509_CRL_set_nextUpdate(x, tm); |
141 | } | 147 | } |
148 | LCRYPTO_ALIAS(X509_CRL_set1_nextUpdate) | ||
142 | 149 | ||
143 | int | 150 | int |
144 | X509_CRL_sort(X509_CRL *c) | 151 | X509_CRL_sort(X509_CRL *c) |
@@ -156,24 +163,28 @@ X509_CRL_sort(X509_CRL *c) | |||
156 | c->crl->enc.modified = 1; | 163 | c->crl->enc.modified = 1; |
157 | return 1; | 164 | return 1; |
158 | } | 165 | } |
166 | LCRYPTO_ALIAS(X509_CRL_sort) | ||
159 | 167 | ||
160 | const STACK_OF(X509_EXTENSION) * | 168 | const STACK_OF(X509_EXTENSION) * |
161 | X509_REVOKED_get0_extensions(const X509_REVOKED *x) | 169 | X509_REVOKED_get0_extensions(const X509_REVOKED *x) |
162 | { | 170 | { |
163 | return x->extensions; | 171 | return x->extensions; |
164 | } | 172 | } |
173 | LCRYPTO_ALIAS(X509_REVOKED_get0_extensions) | ||
165 | 174 | ||
166 | const ASN1_TIME * | 175 | const ASN1_TIME * |
167 | X509_REVOKED_get0_revocationDate(const X509_REVOKED *x) | 176 | X509_REVOKED_get0_revocationDate(const X509_REVOKED *x) |
168 | { | 177 | { |
169 | return x->revocationDate; | 178 | return x->revocationDate; |
170 | } | 179 | } |
180 | LCRYPTO_ALIAS(X509_REVOKED_get0_revocationDate) | ||
171 | 181 | ||
172 | const ASN1_INTEGER * | 182 | const ASN1_INTEGER * |
173 | X509_REVOKED_get0_serialNumber(const X509_REVOKED *x) | 183 | X509_REVOKED_get0_serialNumber(const X509_REVOKED *x) |
174 | { | 184 | { |
175 | return x->serialNumber; | 185 | return x->serialNumber; |
176 | } | 186 | } |
187 | LCRYPTO_ALIAS(X509_REVOKED_get0_serialNumber) | ||
177 | 188 | ||
178 | int | 189 | int |
179 | X509_REVOKED_set_revocationDate(X509_REVOKED *x, ASN1_TIME *tm) | 190 | X509_REVOKED_set_revocationDate(X509_REVOKED *x, ASN1_TIME *tm) |
@@ -192,6 +203,7 @@ X509_REVOKED_set_revocationDate(X509_REVOKED *x, ASN1_TIME *tm) | |||
192 | } | 203 | } |
193 | return (in != NULL); | 204 | return (in != NULL); |
194 | } | 205 | } |
206 | LCRYPTO_ALIAS(X509_REVOKED_set_revocationDate) | ||
195 | 207 | ||
196 | int | 208 | int |
197 | X509_REVOKED_set_serialNumber(X509_REVOKED *x, ASN1_INTEGER *serial) | 209 | X509_REVOKED_set_serialNumber(X509_REVOKED *x, ASN1_INTEGER *serial) |
@@ -210,6 +222,7 @@ X509_REVOKED_set_serialNumber(X509_REVOKED *x, ASN1_INTEGER *serial) | |||
210 | } | 222 | } |
211 | return (in != NULL); | 223 | return (in != NULL); |
212 | } | 224 | } |
225 | LCRYPTO_ALIAS(X509_REVOKED_set_serialNumber) | ||
213 | 226 | ||
214 | int | 227 | int |
215 | i2d_re_X509_CRL_tbs(X509_CRL *crl, unsigned char **pp) | 228 | i2d_re_X509_CRL_tbs(X509_CRL *crl, unsigned char **pp) |
@@ -217,3 +230,4 @@ i2d_re_X509_CRL_tbs(X509_CRL *crl, unsigned char **pp) | |||
217 | crl->crl->enc.modified = 1; | 230 | crl->crl->enc.modified = 1; |
218 | return i2d_X509_CRL_INFO(crl->crl, pp); | 231 | return i2d_X509_CRL_INFO(crl->crl, pp); |
219 | } | 232 | } |
233 | LCRYPTO_ALIAS(i2d_re_X509_CRL_tbs) | ||
diff --git a/src/lib/libcrypto/x509/x509name.c b/src/lib/libcrypto/x509/x509name.c index 878d787846..88f4efa149 100644 --- a/src/lib/libcrypto/x509/x509name.c +++ b/src/lib/libcrypto/x509/x509name.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509name.c,v 1.27 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: x509name.c,v 1.28 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -78,6 +78,7 @@ X509_NAME_get_text_by_NID(X509_NAME *name, int nid, char *buf, int len) | |||
78 | return (-1); | 78 | return (-1); |
79 | return (X509_NAME_get_text_by_OBJ(name, obj, buf, len)); | 79 | return (X509_NAME_get_text_by_OBJ(name, obj, buf, len)); |
80 | } | 80 | } |
81 | LCRYPTO_ALIAS(X509_NAME_get_text_by_NID) | ||
81 | 82 | ||
82 | int | 83 | int |
83 | X509_NAME_get_text_by_OBJ(X509_NAME *name, const ASN1_OBJECT *obj, char *buf, | 84 | X509_NAME_get_text_by_OBJ(X509_NAME *name, const ASN1_OBJECT *obj, char *buf, |
@@ -99,6 +100,7 @@ X509_NAME_get_text_by_OBJ(X509_NAME *name, const ASN1_OBJECT *obj, char *buf, | |||
99 | } | 100 | } |
100 | return (i); | 101 | return (i); |
101 | } | 102 | } |
103 | LCRYPTO_ALIAS(X509_NAME_get_text_by_OBJ) | ||
102 | 104 | ||
103 | int | 105 | int |
104 | X509_NAME_entry_count(const X509_NAME *name) | 106 | X509_NAME_entry_count(const X509_NAME *name) |
@@ -107,6 +109,7 @@ X509_NAME_entry_count(const X509_NAME *name) | |||
107 | return (0); | 109 | return (0); |
108 | return (sk_X509_NAME_ENTRY_num(name->entries)); | 110 | return (sk_X509_NAME_ENTRY_num(name->entries)); |
109 | } | 111 | } |
112 | LCRYPTO_ALIAS(X509_NAME_entry_count) | ||
110 | 113 | ||
111 | int | 114 | int |
112 | X509_NAME_get_index_by_NID(const X509_NAME *name, int nid, int lastpos) | 115 | X509_NAME_get_index_by_NID(const X509_NAME *name, int nid, int lastpos) |
@@ -118,6 +121,7 @@ X509_NAME_get_index_by_NID(const X509_NAME *name, int nid, int lastpos) | |||
118 | return (-2); | 121 | return (-2); |
119 | return (X509_NAME_get_index_by_OBJ(name, obj, lastpos)); | 122 | return (X509_NAME_get_index_by_OBJ(name, obj, lastpos)); |
120 | } | 123 | } |
124 | LCRYPTO_ALIAS(X509_NAME_get_index_by_NID) | ||
121 | 125 | ||
122 | /* NOTE: you should be passsing -1, not 0 as lastpos */ | 126 | /* NOTE: you should be passsing -1, not 0 as lastpos */ |
123 | int | 127 | int |
@@ -141,6 +145,7 @@ X509_NAME_get_index_by_OBJ(const X509_NAME *name, const ASN1_OBJECT *obj, | |||
141 | } | 145 | } |
142 | return (-1); | 146 | return (-1); |
143 | } | 147 | } |
148 | LCRYPTO_ALIAS(X509_NAME_get_index_by_OBJ) | ||
144 | 149 | ||
145 | X509_NAME_ENTRY * | 150 | X509_NAME_ENTRY * |
146 | X509_NAME_get_entry(const X509_NAME *name, int loc) | 151 | X509_NAME_get_entry(const X509_NAME *name, int loc) |
@@ -151,6 +156,7 @@ X509_NAME_get_entry(const X509_NAME *name, int loc) | |||
151 | else | 156 | else |
152 | return (sk_X509_NAME_ENTRY_value(name->entries, loc)); | 157 | return (sk_X509_NAME_ENTRY_value(name->entries, loc)); |
153 | } | 158 | } |
159 | LCRYPTO_ALIAS(X509_NAME_get_entry) | ||
154 | 160 | ||
155 | X509_NAME_ENTRY * | 161 | X509_NAME_ENTRY * |
156 | X509_NAME_delete_entry(X509_NAME *name, int loc) | 162 | X509_NAME_delete_entry(X509_NAME *name, int loc) |
@@ -189,6 +195,7 @@ X509_NAME_delete_entry(X509_NAME *name, int loc) | |||
189 | sk_X509_NAME_ENTRY_value(sk, i)->set--; | 195 | sk_X509_NAME_ENTRY_value(sk, i)->set--; |
190 | return (ret); | 196 | return (ret); |
191 | } | 197 | } |
198 | LCRYPTO_ALIAS(X509_NAME_delete_entry) | ||
192 | 199 | ||
193 | int | 200 | int |
194 | X509_NAME_add_entry_by_OBJ(X509_NAME *name, const ASN1_OBJECT *obj, int type, | 201 | X509_NAME_add_entry_by_OBJ(X509_NAME *name, const ASN1_OBJECT *obj, int type, |
@@ -204,6 +211,7 @@ X509_NAME_add_entry_by_OBJ(X509_NAME *name, const ASN1_OBJECT *obj, int type, | |||
204 | X509_NAME_ENTRY_free(ne); | 211 | X509_NAME_ENTRY_free(ne); |
205 | return ret; | 212 | return ret; |
206 | } | 213 | } |
214 | LCRYPTO_ALIAS(X509_NAME_add_entry_by_OBJ) | ||
207 | 215 | ||
208 | int | 216 | int |
209 | X509_NAME_add_entry_by_NID(X509_NAME *name, int nid, int type, | 217 | X509_NAME_add_entry_by_NID(X509_NAME *name, int nid, int type, |
@@ -219,6 +227,7 @@ X509_NAME_add_entry_by_NID(X509_NAME *name, int nid, int type, | |||
219 | X509_NAME_ENTRY_free(ne); | 227 | X509_NAME_ENTRY_free(ne); |
220 | return ret; | 228 | return ret; |
221 | } | 229 | } |
230 | LCRYPTO_ALIAS(X509_NAME_add_entry_by_NID) | ||
222 | 231 | ||
223 | int | 232 | int |
224 | X509_NAME_add_entry_by_txt(X509_NAME *name, const char *field, int type, | 233 | X509_NAME_add_entry_by_txt(X509_NAME *name, const char *field, int type, |
@@ -234,6 +243,7 @@ X509_NAME_add_entry_by_txt(X509_NAME *name, const char *field, int type, | |||
234 | X509_NAME_ENTRY_free(ne); | 243 | X509_NAME_ENTRY_free(ne); |
235 | return ret; | 244 | return ret; |
236 | } | 245 | } |
246 | LCRYPTO_ALIAS(X509_NAME_add_entry_by_txt) | ||
237 | 247 | ||
238 | /* if set is -1, append to previous set, 0 'a new one', and 1, | 248 | /* if set is -1, append to previous set, 0 'a new one', and 1, |
239 | * prepend to the guy we are about to stomp on. */ | 249 | * prepend to the guy we are about to stomp on. */ |
@@ -292,6 +302,7 @@ err: | |||
292 | X509_NAME_ENTRY_free(new_name); | 302 | X509_NAME_ENTRY_free(new_name); |
293 | return (0); | 303 | return (0); |
294 | } | 304 | } |
305 | LCRYPTO_ALIAS(X509_NAME_add_entry) | ||
295 | 306 | ||
296 | X509_NAME_ENTRY * | 307 | X509_NAME_ENTRY * |
297 | X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY **ne, | 308 | X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY **ne, |
@@ -310,6 +321,7 @@ X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY **ne, | |||
310 | ASN1_OBJECT_free(obj); | 321 | ASN1_OBJECT_free(obj); |
311 | return nentry; | 322 | return nentry; |
312 | } | 323 | } |
324 | LCRYPTO_ALIAS(X509_NAME_ENTRY_create_by_txt) | ||
313 | 325 | ||
314 | X509_NAME_ENTRY * | 326 | X509_NAME_ENTRY * |
315 | X509_NAME_ENTRY_create_by_NID(X509_NAME_ENTRY **ne, int nid, int type, | 327 | X509_NAME_ENTRY_create_by_NID(X509_NAME_ENTRY **ne, int nid, int type, |
@@ -327,6 +339,7 @@ X509_NAME_ENTRY_create_by_NID(X509_NAME_ENTRY **ne, int nid, int type, | |||
327 | ASN1_OBJECT_free(obj); | 339 | ASN1_OBJECT_free(obj); |
328 | return nentry; | 340 | return nentry; |
329 | } | 341 | } |
342 | LCRYPTO_ALIAS(X509_NAME_ENTRY_create_by_NID) | ||
330 | 343 | ||
331 | X509_NAME_ENTRY * | 344 | X509_NAME_ENTRY * |
332 | X509_NAME_ENTRY_create_by_OBJ(X509_NAME_ENTRY **ne, const ASN1_OBJECT *obj, | 345 | X509_NAME_ENTRY_create_by_OBJ(X509_NAME_ENTRY **ne, const ASN1_OBJECT *obj, |
@@ -354,6 +367,7 @@ err: | |||
354 | X509_NAME_ENTRY_free(ret); | 367 | X509_NAME_ENTRY_free(ret); |
355 | return (NULL); | 368 | return (NULL); |
356 | } | 369 | } |
370 | LCRYPTO_ALIAS(X509_NAME_ENTRY_create_by_OBJ) | ||
357 | 371 | ||
358 | int | 372 | int |
359 | X509_NAME_ENTRY_set_object(X509_NAME_ENTRY *ne, const ASN1_OBJECT *obj) | 373 | X509_NAME_ENTRY_set_object(X509_NAME_ENTRY *ne, const ASN1_OBJECT *obj) |
@@ -366,6 +380,7 @@ X509_NAME_ENTRY_set_object(X509_NAME_ENTRY *ne, const ASN1_OBJECT *obj) | |||
366 | ne->object = OBJ_dup(obj); | 380 | ne->object = OBJ_dup(obj); |
367 | return ((ne->object == NULL) ? 0 : 1); | 381 | return ((ne->object == NULL) ? 0 : 1); |
368 | } | 382 | } |
383 | LCRYPTO_ALIAS(X509_NAME_ENTRY_set_object) | ||
369 | 384 | ||
370 | int | 385 | int |
371 | X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *ne, int type, | 386 | X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *ne, int type, |
@@ -391,6 +406,7 @@ X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *ne, int type, | |||
391 | } | 406 | } |
392 | return (1); | 407 | return (1); |
393 | } | 408 | } |
409 | LCRYPTO_ALIAS(X509_NAME_ENTRY_set_data) | ||
394 | 410 | ||
395 | ASN1_OBJECT * | 411 | ASN1_OBJECT * |
396 | X509_NAME_ENTRY_get_object(const X509_NAME_ENTRY *ne) | 412 | X509_NAME_ENTRY_get_object(const X509_NAME_ENTRY *ne) |
@@ -399,6 +415,7 @@ X509_NAME_ENTRY_get_object(const X509_NAME_ENTRY *ne) | |||
399 | return (NULL); | 415 | return (NULL); |
400 | return (ne->object); | 416 | return (ne->object); |
401 | } | 417 | } |
418 | LCRYPTO_ALIAS(X509_NAME_ENTRY_get_object) | ||
402 | 419 | ||
403 | ASN1_STRING * | 420 | ASN1_STRING * |
404 | X509_NAME_ENTRY_get_data(const X509_NAME_ENTRY *ne) | 421 | X509_NAME_ENTRY_get_data(const X509_NAME_ENTRY *ne) |
@@ -407,9 +424,11 @@ X509_NAME_ENTRY_get_data(const X509_NAME_ENTRY *ne) | |||
407 | return (NULL); | 424 | return (NULL); |
408 | return (ne->value); | 425 | return (ne->value); |
409 | } | 426 | } |
427 | LCRYPTO_ALIAS(X509_NAME_ENTRY_get_data) | ||
410 | 428 | ||
411 | int | 429 | int |
412 | X509_NAME_ENTRY_set(const X509_NAME_ENTRY *ne) | 430 | X509_NAME_ENTRY_set(const X509_NAME_ENTRY *ne) |
413 | { | 431 | { |
414 | return (ne->set); | 432 | return (ne->set); |
415 | } | 433 | } |
434 | LCRYPTO_ALIAS(X509_NAME_ENTRY_set) | ||
diff --git a/src/lib/libcrypto/x509/x509rset.c b/src/lib/libcrypto/x509/x509rset.c index a2dd9e4cd2..6fb622e3cb 100644 --- a/src/lib/libcrypto/x509/x509rset.c +++ b/src/lib/libcrypto/x509/x509rset.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509rset.c,v 1.9 2021/11/01 20:53:08 tb Exp $ */ | 1 | /* $OpenBSD: x509rset.c,v 1.10 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -73,12 +73,14 @@ X509_REQ_set_version(X509_REQ *x, long version) | |||
73 | x->req_info->enc.modified = 1; | 73 | x->req_info->enc.modified = 1; |
74 | return (ASN1_INTEGER_set(x->req_info->version, version)); | 74 | return (ASN1_INTEGER_set(x->req_info->version, version)); |
75 | } | 75 | } |
76 | LCRYPTO_ALIAS(X509_REQ_set_version) | ||
76 | 77 | ||
77 | long | 78 | long |
78 | X509_REQ_get_version(const X509_REQ *x) | 79 | X509_REQ_get_version(const X509_REQ *x) |
79 | { | 80 | { |
80 | return ASN1_INTEGER_get(x->req_info->version); | 81 | return ASN1_INTEGER_get(x->req_info->version); |
81 | } | 82 | } |
83 | LCRYPTO_ALIAS(X509_REQ_get_version) | ||
82 | 84 | ||
83 | int | 85 | int |
84 | X509_REQ_set_subject_name(X509_REQ *x, X509_NAME *name) | 86 | X509_REQ_set_subject_name(X509_REQ *x, X509_NAME *name) |
@@ -88,12 +90,14 @@ X509_REQ_set_subject_name(X509_REQ *x, X509_NAME *name) | |||
88 | x->req_info->enc.modified = 1; | 90 | x->req_info->enc.modified = 1; |
89 | return (X509_NAME_set(&x->req_info->subject, name)); | 91 | return (X509_NAME_set(&x->req_info->subject, name)); |
90 | } | 92 | } |
93 | LCRYPTO_ALIAS(X509_REQ_set_subject_name) | ||
91 | 94 | ||
92 | X509_NAME * | 95 | X509_NAME * |
93 | X509_REQ_get_subject_name(const X509_REQ *x) | 96 | X509_REQ_get_subject_name(const X509_REQ *x) |
94 | { | 97 | { |
95 | return x->req_info->subject; | 98 | return x->req_info->subject; |
96 | } | 99 | } |
100 | LCRYPTO_ALIAS(X509_REQ_get_subject_name) | ||
97 | 101 | ||
98 | int | 102 | int |
99 | X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey) | 103 | X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey) |
@@ -103,3 +107,4 @@ X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey) | |||
103 | x->req_info->enc.modified = 1; | 107 | x->req_info->enc.modified = 1; |
104 | return (X509_PUBKEY_set(&x->req_info->pubkey, pkey)); | 108 | return (X509_PUBKEY_set(&x->req_info->pubkey, pkey)); |
105 | } | 109 | } |
110 | LCRYPTO_ALIAS(X509_REQ_set_pubkey) | ||
diff --git a/src/lib/libcrypto/x509/x509spki.c b/src/lib/libcrypto/x509/x509spki.c index 66bbd1e036..2c1b506dcd 100644 --- a/src/lib/libcrypto/x509/x509spki.c +++ b/src/lib/libcrypto/x509/x509spki.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509spki.c,v 1.14 2019/05/23 02:08:34 bcook Exp $ */ | 1 | /* $OpenBSD: x509spki.c,v 1.15 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 1999. | 3 | * project 1999. |
4 | */ | 4 | */ |
@@ -70,6 +70,7 @@ NETSCAPE_SPKI_set_pubkey(NETSCAPE_SPKI *x, EVP_PKEY *pkey) | |||
70 | return (0); | 70 | return (0); |
71 | return (X509_PUBKEY_set(&(x->spkac->pubkey), pkey)); | 71 | return (X509_PUBKEY_set(&(x->spkac->pubkey), pkey)); |
72 | } | 72 | } |
73 | LCRYPTO_ALIAS(NETSCAPE_SPKI_set_pubkey) | ||
73 | 74 | ||
74 | EVP_PKEY * | 75 | EVP_PKEY * |
75 | NETSCAPE_SPKI_get_pubkey(NETSCAPE_SPKI *x) | 76 | NETSCAPE_SPKI_get_pubkey(NETSCAPE_SPKI *x) |
@@ -78,6 +79,7 @@ NETSCAPE_SPKI_get_pubkey(NETSCAPE_SPKI *x) | |||
78 | return (NULL); | 79 | return (NULL); |
79 | return (X509_PUBKEY_get(x->spkac->pubkey)); | 80 | return (X509_PUBKEY_get(x->spkac->pubkey)); |
80 | } | 81 | } |
82 | LCRYPTO_ALIAS(NETSCAPE_SPKI_get_pubkey) | ||
81 | 83 | ||
82 | /* Load a Netscape SPKI from a base64 encoded string */ | 84 | /* Load a Netscape SPKI from a base64 encoded string */ |
83 | 85 | ||
@@ -106,6 +108,7 @@ NETSCAPE_SPKI_b64_decode(const char *str, int len) | |||
106 | free(spki_der); | 108 | free(spki_der); |
107 | return spki; | 109 | return spki; |
108 | } | 110 | } |
111 | LCRYPTO_ALIAS(NETSCAPE_SPKI_b64_decode) | ||
109 | 112 | ||
110 | /* Generate a base64 encoded string from an SPKI */ | 113 | /* Generate a base64 encoded string from an SPKI */ |
111 | 114 | ||
@@ -130,3 +133,4 @@ NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *spki) | |||
130 | free(der_spki); | 133 | free(der_spki); |
131 | return b64_str; | 134 | return b64_str; |
132 | } | 135 | } |
136 | LCRYPTO_ALIAS(NETSCAPE_SPKI_b64_encode) | ||
diff --git a/src/lib/libcrypto/x509/x509type.c b/src/lib/libcrypto/x509/x509type.c index 7495b9ef04..2d80434d95 100644 --- a/src/lib/libcrypto/x509/x509type.c +++ b/src/lib/libcrypto/x509/x509type.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509type.c,v 1.15 2021/12/12 21:30:14 tb Exp $ */ | 1 | /* $OpenBSD: x509type.c,v 1.16 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -124,3 +124,4 @@ X509_certificate_type(const X509 *x, const EVP_PKEY *pkey) | |||
124 | ret |= EVP_PKT_EXP; | 124 | ret |= EVP_PKT_EXP; |
125 | return (ret); | 125 | return (ret); |
126 | } | 126 | } |
127 | LCRYPTO_ALIAS(X509_certificate_type) | ||
diff --git a/src/lib/libcrypto/x509/x_all.c b/src/lib/libcrypto/x509/x_all.c index ec5ed3dc6f..442a27bc7f 100644 --- a/src/lib/libcrypto/x509/x_all.c +++ b/src/lib/libcrypto/x509/x_all.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x_all.c,v 1.27 2022/11/12 12:11:14 beck Exp $ */ | 1 | /* $OpenBSD: x_all.c,v 1.28 2022/11/14 17:48:50 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -80,72 +80,84 @@ d2i_X509_bio(BIO *bp, X509 **x509) | |||
80 | { | 80 | { |
81 | return ASN1_item_d2i_bio(&X509_it, bp, x509); | 81 | return ASN1_item_d2i_bio(&X509_it, bp, x509); |
82 | } | 82 | } |
83 | LCRYPTO_ALIAS(d2i_X509_bio) | ||
83 | 84 | ||
84 | int | 85 | int |
85 | i2d_X509_bio(BIO *bp, X509 *x509) | 86 | i2d_X509_bio(BIO *bp, X509 *x509) |
86 | { | 87 | { |
87 | return ASN1_item_i2d_bio(&X509_it, bp, x509); | 88 | return ASN1_item_i2d_bio(&X509_it, bp, x509); |
88 | } | 89 | } |
90 | LCRYPTO_ALIAS(i2d_X509_bio) | ||
89 | 91 | ||
90 | X509 * | 92 | X509 * |
91 | d2i_X509_fp(FILE *fp, X509 **x509) | 93 | d2i_X509_fp(FILE *fp, X509 **x509) |
92 | { | 94 | { |
93 | return ASN1_item_d2i_fp(&X509_it, fp, x509); | 95 | return ASN1_item_d2i_fp(&X509_it, fp, x509); |
94 | } | 96 | } |
97 | LCRYPTO_ALIAS(d2i_X509_fp) | ||
95 | 98 | ||
96 | int | 99 | int |
97 | i2d_X509_fp(FILE *fp, X509 *x509) | 100 | i2d_X509_fp(FILE *fp, X509 *x509) |
98 | { | 101 | { |
99 | return ASN1_item_i2d_fp(&X509_it, fp, x509); | 102 | return ASN1_item_i2d_fp(&X509_it, fp, x509); |
100 | } | 103 | } |
104 | LCRYPTO_ALIAS(i2d_X509_fp) | ||
101 | 105 | ||
102 | X509_CRL * | 106 | X509_CRL * |
103 | d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) | 107 | d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) |
104 | { | 108 | { |
105 | return ASN1_item_d2i_bio(&X509_CRL_it, bp, crl); | 109 | return ASN1_item_d2i_bio(&X509_CRL_it, bp, crl); |
106 | } | 110 | } |
111 | LCRYPTO_ALIAS(d2i_X509_CRL_bio) | ||
107 | 112 | ||
108 | int | 113 | int |
109 | i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) | 114 | i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) |
110 | { | 115 | { |
111 | return ASN1_item_i2d_bio(&X509_CRL_it, bp, crl); | 116 | return ASN1_item_i2d_bio(&X509_CRL_it, bp, crl); |
112 | } | 117 | } |
118 | LCRYPTO_ALIAS(i2d_X509_CRL_bio) | ||
113 | 119 | ||
114 | X509_CRL * | 120 | X509_CRL * |
115 | d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) | 121 | d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) |
116 | { | 122 | { |
117 | return ASN1_item_d2i_fp(&X509_CRL_it, fp, crl); | 123 | return ASN1_item_d2i_fp(&X509_CRL_it, fp, crl); |
118 | } | 124 | } |
125 | LCRYPTO_ALIAS(d2i_X509_CRL_fp) | ||
119 | 126 | ||
120 | int | 127 | int |
121 | i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) | 128 | i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) |
122 | { | 129 | { |
123 | return ASN1_item_i2d_fp(&X509_CRL_it, fp, crl); | 130 | return ASN1_item_i2d_fp(&X509_CRL_it, fp, crl); |
124 | } | 131 | } |
132 | LCRYPTO_ALIAS(i2d_X509_CRL_fp) | ||
125 | 133 | ||
126 | X509_REQ * | 134 | X509_REQ * |
127 | d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) | 135 | d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) |
128 | { | 136 | { |
129 | return ASN1_item_d2i_bio(&X509_REQ_it, bp, req); | 137 | return ASN1_item_d2i_bio(&X509_REQ_it, bp, req); |
130 | } | 138 | } |
139 | LCRYPTO_ALIAS(d2i_X509_REQ_bio) | ||
131 | 140 | ||
132 | int | 141 | int |
133 | i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) | 142 | i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) |
134 | { | 143 | { |
135 | return ASN1_item_i2d_bio(&X509_REQ_it, bp, req); | 144 | return ASN1_item_i2d_bio(&X509_REQ_it, bp, req); |
136 | } | 145 | } |
146 | LCRYPTO_ALIAS(i2d_X509_REQ_bio) | ||
137 | 147 | ||
138 | X509_REQ * | 148 | X509_REQ * |
139 | d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) | 149 | d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) |
140 | { | 150 | { |
141 | return ASN1_item_d2i_fp(&X509_REQ_it, fp, req); | 151 | return ASN1_item_d2i_fp(&X509_REQ_it, fp, req); |
142 | } | 152 | } |
153 | LCRYPTO_ALIAS(d2i_X509_REQ_fp) | ||
143 | 154 | ||
144 | int | 155 | int |
145 | i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) | 156 | i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) |
146 | { | 157 | { |
147 | return ASN1_item_i2d_fp(&X509_REQ_it, fp, req); | 158 | return ASN1_item_i2d_fp(&X509_REQ_it, fp, req); |
148 | } | 159 | } |
160 | LCRYPTO_ALIAS(i2d_X509_REQ_fp) | ||
149 | 161 | ||
150 | #ifndef OPENSSL_NO_RSA | 162 | #ifndef OPENSSL_NO_RSA |
151 | RSA * | 163 | RSA * |
@@ -153,48 +165,56 @@ d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) | |||
153 | { | 165 | { |
154 | return ASN1_item_d2i_bio(&RSAPrivateKey_it, bp, rsa); | 166 | return ASN1_item_d2i_bio(&RSAPrivateKey_it, bp, rsa); |
155 | } | 167 | } |
168 | LCRYPTO_ALIAS(d2i_RSAPrivateKey_bio) | ||
156 | 169 | ||
157 | int | 170 | int |
158 | i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) | 171 | i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) |
159 | { | 172 | { |
160 | return ASN1_item_i2d_bio(&RSAPrivateKey_it, bp, rsa); | 173 | return ASN1_item_i2d_bio(&RSAPrivateKey_it, bp, rsa); |
161 | } | 174 | } |
175 | LCRYPTO_ALIAS(i2d_RSAPrivateKey_bio) | ||
162 | 176 | ||
163 | RSA * | 177 | RSA * |
164 | d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) | 178 | d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) |
165 | { | 179 | { |
166 | return ASN1_item_d2i_fp(&RSAPrivateKey_it, fp, rsa); | 180 | return ASN1_item_d2i_fp(&RSAPrivateKey_it, fp, rsa); |
167 | } | 181 | } |
182 | LCRYPTO_ALIAS(d2i_RSAPrivateKey_fp) | ||
168 | 183 | ||
169 | int | 184 | int |
170 | i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) | 185 | i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) |
171 | { | 186 | { |
172 | return ASN1_item_i2d_fp(&RSAPrivateKey_it, fp, rsa); | 187 | return ASN1_item_i2d_fp(&RSAPrivateKey_it, fp, rsa); |
173 | } | 188 | } |
189 | LCRYPTO_ALIAS(i2d_RSAPrivateKey_fp) | ||
174 | 190 | ||
175 | RSA * | 191 | RSA * |
176 | d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) | 192 | d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) |
177 | { | 193 | { |
178 | return ASN1_item_d2i_bio(&RSAPublicKey_it, bp, rsa); | 194 | return ASN1_item_d2i_bio(&RSAPublicKey_it, bp, rsa); |
179 | } | 195 | } |
196 | LCRYPTO_ALIAS(d2i_RSAPublicKey_bio) | ||
180 | 197 | ||
181 | int | 198 | int |
182 | i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa) | 199 | i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa) |
183 | { | 200 | { |
184 | return ASN1_item_i2d_bio(&RSAPublicKey_it, bp, rsa); | 201 | return ASN1_item_i2d_bio(&RSAPublicKey_it, bp, rsa); |
185 | } | 202 | } |
203 | LCRYPTO_ALIAS(i2d_RSAPublicKey_bio) | ||
186 | 204 | ||
187 | RSA * | 205 | RSA * |
188 | d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) | 206 | d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) |
189 | { | 207 | { |
190 | return ASN1_item_d2i_fp(&RSAPublicKey_it, fp, rsa); | 208 | return ASN1_item_d2i_fp(&RSAPublicKey_it, fp, rsa); |
191 | } | 209 | } |
210 | LCRYPTO_ALIAS(d2i_RSAPublicKey_fp) | ||
192 | 211 | ||
193 | int | 212 | int |
194 | i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) | 213 | i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) |
195 | { | 214 | { |
196 | return ASN1_item_i2d_fp(&RSAPublicKey_it, fp, rsa); | 215 | return ASN1_item_i2d_fp(&RSAPublicKey_it, fp, rsa); |
197 | } | 216 | } |
217 | LCRYPTO_ALIAS(i2d_RSAPublicKey_fp) | ||
198 | #endif | 218 | #endif |
199 | 219 | ||
200 | #ifndef OPENSSL_NO_DSA | 220 | #ifndef OPENSSL_NO_DSA |
@@ -203,24 +223,28 @@ d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa) | |||
203 | { | 223 | { |
204 | return ASN1_item_d2i_bio(&DSAPrivateKey_it, bp, dsa); | 224 | return ASN1_item_d2i_bio(&DSAPrivateKey_it, bp, dsa); |
205 | } | 225 | } |
226 | LCRYPTO_ALIAS(d2i_DSAPrivateKey_bio) | ||
206 | 227 | ||
207 | int | 228 | int |
208 | i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa) | 229 | i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa) |
209 | { | 230 | { |
210 | return ASN1_item_i2d_bio(&DSAPrivateKey_it, bp, dsa); | 231 | return ASN1_item_i2d_bio(&DSAPrivateKey_it, bp, dsa); |
211 | } | 232 | } |
233 | LCRYPTO_ALIAS(i2d_DSAPrivateKey_bio) | ||
212 | 234 | ||
213 | DSA * | 235 | DSA * |
214 | d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) | 236 | d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) |
215 | { | 237 | { |
216 | return ASN1_item_d2i_fp(&DSAPrivateKey_it, fp, dsa); | 238 | return ASN1_item_d2i_fp(&DSAPrivateKey_it, fp, dsa); |
217 | } | 239 | } |
240 | LCRYPTO_ALIAS(d2i_DSAPrivateKey_fp) | ||
218 | 241 | ||
219 | int | 242 | int |
220 | i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) | 243 | i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) |
221 | { | 244 | { |
222 | return ASN1_item_i2d_fp(&DSAPrivateKey_it, fp, dsa); | 245 | return ASN1_item_i2d_fp(&DSAPrivateKey_it, fp, dsa); |
223 | } | 246 | } |
247 | LCRYPTO_ALIAS(i2d_DSAPrivateKey_fp) | ||
224 | #endif | 248 | #endif |
225 | 249 | ||
226 | #ifndef OPENSSL_NO_EC | 250 | #ifndef OPENSSL_NO_EC |
@@ -229,24 +253,28 @@ d2i_ECPrivateKey_bio(BIO *bp, EC_KEY **eckey) | |||
229 | { | 253 | { |
230 | return ASN1_d2i_bio_of(EC_KEY, EC_KEY_new, d2i_ECPrivateKey, bp, eckey); | 254 | return ASN1_d2i_bio_of(EC_KEY, EC_KEY_new, d2i_ECPrivateKey, bp, eckey); |
231 | } | 255 | } |
256 | LCRYPTO_ALIAS(d2i_ECPrivateKey_bio) | ||
232 | 257 | ||
233 | int | 258 | int |
234 | i2d_ECPrivateKey_bio(BIO *bp, EC_KEY *eckey) | 259 | i2d_ECPrivateKey_bio(BIO *bp, EC_KEY *eckey) |
235 | { | 260 | { |
236 | return ASN1_i2d_bio_of(EC_KEY, i2d_ECPrivateKey, bp, eckey); | 261 | return ASN1_i2d_bio_of(EC_KEY, i2d_ECPrivateKey, bp, eckey); |
237 | } | 262 | } |
263 | LCRYPTO_ALIAS(i2d_ECPrivateKey_bio) | ||
238 | 264 | ||
239 | EC_KEY * | 265 | EC_KEY * |
240 | d2i_ECPrivateKey_fp(FILE *fp, EC_KEY **eckey) | 266 | d2i_ECPrivateKey_fp(FILE *fp, EC_KEY **eckey) |
241 | { | 267 | { |
242 | return ASN1_d2i_fp_of(EC_KEY, EC_KEY_new, d2i_ECPrivateKey, fp, eckey); | 268 | return ASN1_d2i_fp_of(EC_KEY, EC_KEY_new, d2i_ECPrivateKey, fp, eckey); |
243 | } | 269 | } |
270 | LCRYPTO_ALIAS(d2i_ECPrivateKey_fp) | ||
244 | 271 | ||
245 | int | 272 | int |
246 | i2d_ECPrivateKey_fp(FILE *fp, EC_KEY *eckey) | 273 | i2d_ECPrivateKey_fp(FILE *fp, EC_KEY *eckey) |
247 | { | 274 | { |
248 | return ASN1_i2d_fp_of(EC_KEY, i2d_ECPrivateKey, fp, eckey); | 275 | return ASN1_i2d_fp_of(EC_KEY, i2d_ECPrivateKey, fp, eckey); |
249 | } | 276 | } |
277 | LCRYPTO_ALIAS(i2d_ECPrivateKey_fp) | ||
250 | #endif | 278 | #endif |
251 | 279 | ||
252 | X509_SIG * | 280 | X509_SIG * |
@@ -254,24 +282,28 @@ d2i_PKCS8_bio(BIO *bp, X509_SIG **p8) | |||
254 | { | 282 | { |
255 | return ASN1_item_d2i_bio(&X509_SIG_it, bp, p8); | 283 | return ASN1_item_d2i_bio(&X509_SIG_it, bp, p8); |
256 | } | 284 | } |
285 | LCRYPTO_ALIAS(d2i_PKCS8_bio) | ||
257 | 286 | ||
258 | int | 287 | int |
259 | i2d_PKCS8_bio(BIO *bp, X509_SIG *p8) | 288 | i2d_PKCS8_bio(BIO *bp, X509_SIG *p8) |
260 | { | 289 | { |
261 | return ASN1_item_i2d_bio(&X509_SIG_it, bp, p8); | 290 | return ASN1_item_i2d_bio(&X509_SIG_it, bp, p8); |
262 | } | 291 | } |
292 | LCRYPTO_ALIAS(i2d_PKCS8_bio) | ||
263 | 293 | ||
264 | X509_SIG * | 294 | X509_SIG * |
265 | d2i_PKCS8_fp(FILE *fp, X509_SIG **p8) | 295 | d2i_PKCS8_fp(FILE *fp, X509_SIG **p8) |
266 | { | 296 | { |
267 | return ASN1_item_d2i_fp(&X509_SIG_it, fp, p8); | 297 | return ASN1_item_d2i_fp(&X509_SIG_it, fp, p8); |
268 | } | 298 | } |
299 | LCRYPTO_ALIAS(d2i_PKCS8_fp) | ||
269 | 300 | ||
270 | int | 301 | int |
271 | i2d_PKCS8_fp(FILE *fp, X509_SIG *p8) | 302 | i2d_PKCS8_fp(FILE *fp, X509_SIG *p8) |
272 | { | 303 | { |
273 | return ASN1_item_i2d_fp(&X509_SIG_it, fp, p8); | 304 | return ASN1_item_i2d_fp(&X509_SIG_it, fp, p8); |
274 | } | 305 | } |
306 | LCRYPTO_ALIAS(i2d_PKCS8_fp) | ||
275 | 307 | ||
276 | PKCS8_PRIV_KEY_INFO * | 308 | PKCS8_PRIV_KEY_INFO * |
277 | d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO **p8inf) | 309 | d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO **p8inf) |
@@ -279,6 +311,7 @@ d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO **p8inf) | |||
279 | return ASN1_item_d2i_bio(&PKCS8_PRIV_KEY_INFO_it, bp, | 311 | return ASN1_item_d2i_bio(&PKCS8_PRIV_KEY_INFO_it, bp, |
280 | p8inf); | 312 | p8inf); |
281 | } | 313 | } |
314 | LCRYPTO_ALIAS(d2i_PKCS8_PRIV_KEY_INFO_bio) | ||
282 | 315 | ||
283 | int | 316 | int |
284 | i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf) | 317 | i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf) |
@@ -286,6 +319,7 @@ i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf) | |||
286 | return ASN1_item_i2d_bio(&PKCS8_PRIV_KEY_INFO_it, bp, | 319 | return ASN1_item_i2d_bio(&PKCS8_PRIV_KEY_INFO_it, bp, |
287 | p8inf); | 320 | p8inf); |
288 | } | 321 | } |
322 | LCRYPTO_ALIAS(i2d_PKCS8_PRIV_KEY_INFO_bio) | ||
289 | 323 | ||
290 | PKCS8_PRIV_KEY_INFO * | 324 | PKCS8_PRIV_KEY_INFO * |
291 | d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO **p8inf) | 325 | d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO **p8inf) |
@@ -293,6 +327,7 @@ d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO **p8inf) | |||
293 | return ASN1_item_d2i_fp(&PKCS8_PRIV_KEY_INFO_it, fp, | 327 | return ASN1_item_d2i_fp(&PKCS8_PRIV_KEY_INFO_it, fp, |
294 | p8inf); | 328 | p8inf); |
295 | } | 329 | } |
330 | LCRYPTO_ALIAS(d2i_PKCS8_PRIV_KEY_INFO_fp) | ||
296 | 331 | ||
297 | int | 332 | int |
298 | i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf) | 333 | i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf) |
@@ -300,6 +335,7 @@ i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf) | |||
300 | return ASN1_item_i2d_fp(&PKCS8_PRIV_KEY_INFO_it, fp, | 335 | return ASN1_item_i2d_fp(&PKCS8_PRIV_KEY_INFO_it, fp, |
301 | p8inf); | 336 | p8inf); |
302 | } | 337 | } |
338 | LCRYPTO_ALIAS(i2d_PKCS8_PRIV_KEY_INFO_fp) | ||
303 | 339 | ||
304 | EVP_PKEY * | 340 | EVP_PKEY * |
305 | d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a) | 341 | d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a) |
@@ -307,12 +343,14 @@ d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a) | |||
307 | return ASN1_d2i_bio_of(EVP_PKEY, EVP_PKEY_new, d2i_AutoPrivateKey, | 343 | return ASN1_d2i_bio_of(EVP_PKEY, EVP_PKEY_new, d2i_AutoPrivateKey, |
308 | bp, a); | 344 | bp, a); |
309 | } | 345 | } |
346 | LCRYPTO_ALIAS(d2i_PrivateKey_bio) | ||
310 | 347 | ||
311 | int | 348 | int |
312 | i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey) | 349 | i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey) |
313 | { | 350 | { |
314 | return ASN1_i2d_bio_of(EVP_PKEY, i2d_PrivateKey, bp, pkey); | 351 | return ASN1_i2d_bio_of(EVP_PKEY, i2d_PrivateKey, bp, pkey); |
315 | } | 352 | } |
353 | LCRYPTO_ALIAS(i2d_PrivateKey_bio) | ||
316 | 354 | ||
317 | EVP_PKEY * | 355 | EVP_PKEY * |
318 | d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a) | 356 | d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a) |
@@ -320,12 +358,14 @@ d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a) | |||
320 | return ASN1_d2i_fp_of(EVP_PKEY, EVP_PKEY_new, d2i_AutoPrivateKey, | 358 | return ASN1_d2i_fp_of(EVP_PKEY, EVP_PKEY_new, d2i_AutoPrivateKey, |
321 | fp, a); | 359 | fp, a); |
322 | } | 360 | } |
361 | LCRYPTO_ALIAS(d2i_PrivateKey_fp) | ||
323 | 362 | ||
324 | int | 363 | int |
325 | i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey) | 364 | i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey) |
326 | { | 365 | { |
327 | return ASN1_i2d_fp_of(EVP_PKEY, i2d_PrivateKey, fp, pkey); | 366 | return ASN1_i2d_fp_of(EVP_PKEY, i2d_PrivateKey, fp, pkey); |
328 | } | 367 | } |
368 | LCRYPTO_ALIAS(i2d_PrivateKey_fp) | ||
329 | 369 | ||
330 | int | 370 | int |
331 | i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key) | 371 | i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key) |
@@ -340,6 +380,7 @@ i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key) | |||
340 | PKCS8_PRIV_KEY_INFO_free(p8inf); | 380 | PKCS8_PRIV_KEY_INFO_free(p8inf); |
341 | return ret; | 381 | return ret; |
342 | } | 382 | } |
383 | LCRYPTO_ALIAS(i2d_PKCS8PrivateKeyInfo_bio) | ||
343 | 384 | ||
344 | int | 385 | int |
345 | i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key) | 386 | i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key) |
@@ -353,6 +394,7 @@ i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key) | |||
353 | PKCS8_PRIV_KEY_INFO_free(p8inf); | 394 | PKCS8_PRIV_KEY_INFO_free(p8inf); |
354 | return ret; | 395 | return ret; |
355 | } | 396 | } |
397 | LCRYPTO_ALIAS(i2d_PKCS8PrivateKeyInfo_fp) | ||
356 | 398 | ||
357 | int | 399 | int |
358 | X509_verify(X509 *a, EVP_PKEY *r) | 400 | X509_verify(X509 *a, EVP_PKEY *r) |
@@ -362,6 +404,7 @@ X509_verify(X509 *a, EVP_PKEY *r) | |||
362 | return (ASN1_item_verify(&X509_CINF_it, a->sig_alg, | 404 | return (ASN1_item_verify(&X509_CINF_it, a->sig_alg, |
363 | a->signature, a->cert_info, r)); | 405 | a->signature, a->cert_info, r)); |
364 | } | 406 | } |
407 | LCRYPTO_ALIAS(X509_verify) | ||
365 | 408 | ||
366 | int | 409 | int |
367 | X509_REQ_verify(X509_REQ *a, EVP_PKEY *r) | 410 | X509_REQ_verify(X509_REQ *a, EVP_PKEY *r) |
@@ -369,6 +412,7 @@ X509_REQ_verify(X509_REQ *a, EVP_PKEY *r) | |||
369 | return (ASN1_item_verify(&X509_REQ_INFO_it, | 412 | return (ASN1_item_verify(&X509_REQ_INFO_it, |
370 | a->sig_alg, a->signature, a->req_info, r)); | 413 | a->sig_alg, a->signature, a->req_info, r)); |
371 | } | 414 | } |
415 | LCRYPTO_ALIAS(X509_REQ_verify) | ||
372 | 416 | ||
373 | int | 417 | int |
374 | NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r) | 418 | NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r) |
@@ -376,6 +420,7 @@ NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r) | |||
376 | return (ASN1_item_verify(&NETSCAPE_SPKAC_it, | 420 | return (ASN1_item_verify(&NETSCAPE_SPKAC_it, |
377 | a->sig_algor, a->signature, a->spkac, r)); | 421 | a->sig_algor, a->signature, a->spkac, r)); |
378 | } | 422 | } |
423 | LCRYPTO_ALIAS(NETSCAPE_SPKI_verify) | ||
379 | 424 | ||
380 | int | 425 | int |
381 | X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) | 426 | X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) |
@@ -385,6 +430,7 @@ X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) | |||
385 | x->cert_info->signature, x->sig_alg, x->signature, | 430 | x->cert_info->signature, x->sig_alg, x->signature, |
386 | x->cert_info, pkey, md)); | 431 | x->cert_info, pkey, md)); |
387 | } | 432 | } |
433 | LCRYPTO_ALIAS(X509_sign) | ||
388 | 434 | ||
389 | int | 435 | int |
390 | X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx) | 436 | X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx) |
@@ -394,6 +440,7 @@ X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx) | |||
394 | x->cert_info->signature, x->sig_alg, x->signature, | 440 | x->cert_info->signature, x->sig_alg, x->signature, |
395 | x->cert_info, ctx); | 441 | x->cert_info, ctx); |
396 | } | 442 | } |
443 | LCRYPTO_ALIAS(X509_sign_ctx) | ||
397 | 444 | ||
398 | int | 445 | int |
399 | X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) | 446 | X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) |
@@ -401,6 +448,7 @@ X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) | |||
401 | return (ASN1_item_sign(&X509_REQ_INFO_it, | 448 | return (ASN1_item_sign(&X509_REQ_INFO_it, |
402 | x->sig_alg, NULL, x->signature, x->req_info, pkey, md)); | 449 | x->sig_alg, NULL, x->signature, x->req_info, pkey, md)); |
403 | } | 450 | } |
451 | LCRYPTO_ALIAS(X509_REQ_sign) | ||
404 | 452 | ||
405 | int | 453 | int |
406 | X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx) | 454 | X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx) |
@@ -408,6 +456,7 @@ X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx) | |||
408 | return ASN1_item_sign_ctx(&X509_REQ_INFO_it, | 456 | return ASN1_item_sign_ctx(&X509_REQ_INFO_it, |
409 | x->sig_alg, NULL, x->signature, x->req_info, ctx); | 457 | x->sig_alg, NULL, x->signature, x->req_info, ctx); |
410 | } | 458 | } |
459 | LCRYPTO_ALIAS(X509_REQ_sign_ctx) | ||
411 | 460 | ||
412 | int | 461 | int |
413 | X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) | 462 | X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) |
@@ -416,6 +465,7 @@ X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) | |||
416 | return(ASN1_item_sign(&X509_CRL_INFO_it, x->crl->sig_alg, | 465 | return(ASN1_item_sign(&X509_CRL_INFO_it, x->crl->sig_alg, |
417 | x->sig_alg, x->signature, x->crl, pkey, md)); | 466 | x->sig_alg, x->signature, x->crl, pkey, md)); |
418 | } | 467 | } |
468 | LCRYPTO_ALIAS(X509_CRL_sign) | ||
419 | 469 | ||
420 | int | 470 | int |
421 | X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx) | 471 | X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx) |
@@ -424,6 +474,7 @@ X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx) | |||
424 | return ASN1_item_sign_ctx(&X509_CRL_INFO_it, | 474 | return ASN1_item_sign_ctx(&X509_CRL_INFO_it, |
425 | x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx); | 475 | x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx); |
426 | } | 476 | } |
477 | LCRYPTO_ALIAS(X509_CRL_sign_ctx) | ||
427 | 478 | ||
428 | int | 479 | int |
429 | NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) | 480 | NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) |
@@ -431,6 +482,7 @@ NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) | |||
431 | return (ASN1_item_sign(&NETSCAPE_SPKAC_it, | 482 | return (ASN1_item_sign(&NETSCAPE_SPKAC_it, |
432 | x->sig_algor, NULL, x->signature, x->spkac, pkey, md)); | 483 | x->sig_algor, NULL, x->signature, x->spkac, pkey, md)); |
433 | } | 484 | } |
485 | LCRYPTO_ALIAS(NETSCAPE_SPKI_sign) | ||
434 | 486 | ||
435 | int | 487 | int |
436 | X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md, | 488 | X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md, |
@@ -442,6 +494,7 @@ X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md, | |||
442 | return 0; | 494 | return 0; |
443 | return EVP_Digest(key->data, key->length, md, len, type, NULL); | 495 | return EVP_Digest(key->data, key->length, md, len, type, NULL); |
444 | } | 496 | } |
497 | LCRYPTO_ALIAS(X509_pubkey_digest) | ||
445 | 498 | ||
446 | int | 499 | int |
447 | X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, | 500 | X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, |
@@ -450,6 +503,7 @@ X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, | |||
450 | return (ASN1_item_digest(&X509_it, type, (char *)data, | 503 | return (ASN1_item_digest(&X509_it, type, (char *)data, |
451 | md, len)); | 504 | md, len)); |
452 | } | 505 | } |
506 | LCRYPTO_ALIAS(X509_digest) | ||
453 | 507 | ||
454 | int | 508 | int |
455 | X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, | 509 | X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, |
@@ -458,6 +512,7 @@ X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, | |||
458 | return (ASN1_item_digest(&X509_CRL_it, type, (char *)data, | 512 | return (ASN1_item_digest(&X509_CRL_it, type, (char *)data, |
459 | md, len)); | 513 | md, len)); |
460 | } | 514 | } |
515 | LCRYPTO_ALIAS(X509_CRL_digest) | ||
461 | 516 | ||
462 | int | 517 | int |
463 | X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, | 518 | X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, |
@@ -466,6 +521,7 @@ X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, | |||
466 | return (ASN1_item_digest(&X509_REQ_it, type, (char *)data, | 521 | return (ASN1_item_digest(&X509_REQ_it, type, (char *)data, |
467 | md, len)); | 522 | md, len)); |
468 | } | 523 | } |
524 | LCRYPTO_ALIAS(X509_REQ_digest) | ||
469 | 525 | ||
470 | int | 526 | int |
471 | X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, | 527 | X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, |
@@ -474,6 +530,7 @@ X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, | |||
474 | return (ASN1_item_digest(&X509_NAME_it, type, (char *)data, | 530 | return (ASN1_item_digest(&X509_NAME_it, type, (char *)data, |
475 | md, len)); | 531 | md, len)); |
476 | } | 532 | } |
533 | LCRYPTO_ALIAS(X509_NAME_digest) | ||
477 | 534 | ||
478 | int | 535 | int |
479 | X509_up_ref(X509 *x) | 536 | X509_up_ref(X509 *x) |
@@ -481,3 +538,4 @@ X509_up_ref(X509 *x) | |||
481 | int i = CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509); | 538 | int i = CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509); |
482 | return i > 1 ? 1 : 0; | 539 | return i > 1 ? 1 : 0; |
483 | } | 540 | } |
541 | LCRYPTO_ALIAS(X509_up_ref) | ||