diff options
Diffstat (limited to 'src/lib/libcrypto/ct/ct_sct.c')
-rw-r--r-- | src/lib/libcrypto/ct/ct_sct.c | 27 |
1 files changed, 26 insertions, 1 deletions
diff --git a/src/lib/libcrypto/ct/ct_sct.c b/src/lib/libcrypto/ct/ct_sct.c index a05b0f92a2..16ee8d5576 100644 --- a/src/lib/libcrypto/ct/ct_sct.c +++ b/src/lib/libcrypto/ct/ct_sct.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ct_sct.c,v 1.8 2022/01/22 00:29:59 inoguchi Exp $ */ | 1 | /* $OpenBSD: ct_sct.c,v 1.9 2023/07/08 07:22:58 beck Exp $ */ |
2 | /* | 2 | /* |
3 | * Written by Rob Stradling (rob@comodo.com), Stephen Henson (steve@openssl.org) | 3 | * Written by Rob Stradling (rob@comodo.com), Stephen Henson (steve@openssl.org) |
4 | * and Adam Eijdenberg (adam.eijdenberg@gmail.com) for the OpenSSL project 2016. | 4 | * and Adam Eijdenberg (adam.eijdenberg@gmail.com) for the OpenSSL project 2016. |
@@ -85,6 +85,7 @@ SCT_new(void) | |||
85 | sct->version = SCT_VERSION_NOT_SET; | 85 | sct->version = SCT_VERSION_NOT_SET; |
86 | return sct; | 86 | return sct; |
87 | } | 87 | } |
88 | LCRYPTO_ALIAS(SCT_new); | ||
88 | 89 | ||
89 | void | 90 | void |
90 | SCT_free(SCT *sct) | 91 | SCT_free(SCT *sct) |
@@ -98,12 +99,14 @@ SCT_free(SCT *sct) | |||
98 | free(sct->sct); | 99 | free(sct->sct); |
99 | free(sct); | 100 | free(sct); |
100 | } | 101 | } |
102 | LCRYPTO_ALIAS(SCT_free); | ||
101 | 103 | ||
102 | void | 104 | void |
103 | SCT_LIST_free(STACK_OF(SCT) *scts) | 105 | SCT_LIST_free(STACK_OF(SCT) *scts) |
104 | { | 106 | { |
105 | sk_SCT_pop_free(scts, SCT_free); | 107 | sk_SCT_pop_free(scts, SCT_free); |
106 | } | 108 | } |
109 | LCRYPTO_ALIAS(SCT_LIST_free); | ||
107 | 110 | ||
108 | int | 111 | int |
109 | SCT_set_version(SCT *sct, sct_version_t version) | 112 | SCT_set_version(SCT *sct, sct_version_t version) |
@@ -116,6 +119,7 @@ SCT_set_version(SCT *sct, sct_version_t version) | |||
116 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 119 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
117 | return 1; | 120 | return 1; |
118 | } | 121 | } |
122 | LCRYPTO_ALIAS(SCT_set_version); | ||
119 | 123 | ||
120 | int | 124 | int |
121 | SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type) | 125 | SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type) |
@@ -133,6 +137,7 @@ SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type) | |||
133 | CTerror(CT_R_UNSUPPORTED_ENTRY_TYPE); | 137 | CTerror(CT_R_UNSUPPORTED_ENTRY_TYPE); |
134 | return 0; | 138 | return 0; |
135 | } | 139 | } |
140 | LCRYPTO_ALIAS(SCT_set_log_entry_type); | ||
136 | 141 | ||
137 | int | 142 | int |
138 | SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len) | 143 | SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len) |
@@ -148,6 +153,7 @@ SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len) | |||
148 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 153 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
149 | return 1; | 154 | return 1; |
150 | } | 155 | } |
156 | LCRYPTO_ALIAS(SCT_set0_log_id); | ||
151 | 157 | ||
152 | int | 158 | int |
153 | SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len) | 159 | SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len) |
@@ -173,6 +179,7 @@ SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len) | |||
173 | } | 179 | } |
174 | return 1; | 180 | return 1; |
175 | } | 181 | } |
182 | LCRYPTO_ALIAS(SCT_set1_log_id); | ||
176 | 183 | ||
177 | 184 | ||
178 | void | 185 | void |
@@ -181,6 +188,7 @@ SCT_set_timestamp(SCT *sct, uint64_t timestamp) | |||
181 | sct->timestamp = timestamp; | 188 | sct->timestamp = timestamp; |
182 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 189 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
183 | } | 190 | } |
191 | LCRYPTO_ALIAS(SCT_set_timestamp); | ||
184 | 192 | ||
185 | int | 193 | int |
186 | SCT_set_signature_nid(SCT *sct, int nid) | 194 | SCT_set_signature_nid(SCT *sct, int nid) |
@@ -201,6 +209,7 @@ SCT_set_signature_nid(SCT *sct, int nid) | |||
201 | return 0; | 209 | return 0; |
202 | } | 210 | } |
203 | } | 211 | } |
212 | LCRYPTO_ALIAS(SCT_set_signature_nid); | ||
204 | 213 | ||
205 | void | 214 | void |
206 | SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len) | 215 | SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len) |
@@ -210,6 +219,7 @@ SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len) | |||
210 | sct->ext_len = ext_len; | 219 | sct->ext_len = ext_len; |
211 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 220 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
212 | } | 221 | } |
222 | LCRYPTO_ALIAS(SCT_set0_extensions); | ||
213 | 223 | ||
214 | int | 224 | int |
215 | SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len) | 225 | SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len) |
@@ -230,6 +240,7 @@ SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len) | |||
230 | } | 240 | } |
231 | return 1; | 241 | return 1; |
232 | } | 242 | } |
243 | LCRYPTO_ALIAS(SCT_set1_extensions); | ||
233 | 244 | ||
234 | void | 245 | void |
235 | SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) | 246 | SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) |
@@ -239,6 +250,7 @@ SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) | |||
239 | sct->sig_len = sig_len; | 250 | sct->sig_len = sig_len; |
240 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 251 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
241 | } | 252 | } |
253 | LCRYPTO_ALIAS(SCT_set0_signature); | ||
242 | 254 | ||
243 | int | 255 | int |
244 | SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) | 256 | SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) |
@@ -259,18 +271,21 @@ SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) | |||
259 | } | 271 | } |
260 | return 1; | 272 | return 1; |
261 | } | 273 | } |
274 | LCRYPTO_ALIAS(SCT_set1_signature); | ||
262 | 275 | ||
263 | sct_version_t | 276 | sct_version_t |
264 | SCT_get_version(const SCT *sct) | 277 | SCT_get_version(const SCT *sct) |
265 | { | 278 | { |
266 | return sct->version; | 279 | return sct->version; |
267 | } | 280 | } |
281 | LCRYPTO_ALIAS(SCT_get_version); | ||
268 | 282 | ||
269 | ct_log_entry_type_t | 283 | ct_log_entry_type_t |
270 | SCT_get_log_entry_type(const SCT *sct) | 284 | SCT_get_log_entry_type(const SCT *sct) |
271 | { | 285 | { |
272 | return sct->entry_type; | 286 | return sct->entry_type; |
273 | } | 287 | } |
288 | LCRYPTO_ALIAS(SCT_get_log_entry_type); | ||
274 | 289 | ||
275 | size_t | 290 | size_t |
276 | SCT_get0_log_id(const SCT *sct, unsigned char **log_id) | 291 | SCT_get0_log_id(const SCT *sct, unsigned char **log_id) |
@@ -278,12 +293,14 @@ SCT_get0_log_id(const SCT *sct, unsigned char **log_id) | |||
278 | *log_id = sct->log_id; | 293 | *log_id = sct->log_id; |
279 | return sct->log_id_len; | 294 | return sct->log_id_len; |
280 | } | 295 | } |
296 | LCRYPTO_ALIAS(SCT_get0_log_id); | ||
281 | 297 | ||
282 | uint64_t | 298 | uint64_t |
283 | SCT_get_timestamp(const SCT *sct) | 299 | SCT_get_timestamp(const SCT *sct) |
284 | { | 300 | { |
285 | return sct->timestamp; | 301 | return sct->timestamp; |
286 | } | 302 | } |
303 | LCRYPTO_ALIAS(SCT_get_timestamp); | ||
287 | 304 | ||
288 | int | 305 | int |
289 | SCT_get_signature_nid(const SCT *sct) | 306 | SCT_get_signature_nid(const SCT *sct) |
@@ -303,6 +320,7 @@ SCT_get_signature_nid(const SCT *sct) | |||
303 | } | 320 | } |
304 | return NID_undef; | 321 | return NID_undef; |
305 | } | 322 | } |
323 | LCRYPTO_ALIAS(SCT_get_signature_nid); | ||
306 | 324 | ||
307 | size_t | 325 | size_t |
308 | SCT_get0_extensions(const SCT *sct, unsigned char **ext) | 326 | SCT_get0_extensions(const SCT *sct, unsigned char **ext) |
@@ -310,6 +328,7 @@ SCT_get0_extensions(const SCT *sct, unsigned char **ext) | |||
310 | *ext = sct->ext; | 328 | *ext = sct->ext; |
311 | return sct->ext_len; | 329 | return sct->ext_len; |
312 | } | 330 | } |
331 | LCRYPTO_ALIAS(SCT_get0_extensions); | ||
313 | 332 | ||
314 | size_t | 333 | size_t |
315 | SCT_get0_signature(const SCT *sct, unsigned char **sig) | 334 | SCT_get0_signature(const SCT *sct, unsigned char **sig) |
@@ -317,6 +336,7 @@ SCT_get0_signature(const SCT *sct, unsigned char **sig) | |||
317 | *sig = sct->sig; | 336 | *sig = sct->sig; |
318 | return sct->sig_len; | 337 | return sct->sig_len; |
319 | } | 338 | } |
339 | LCRYPTO_ALIAS(SCT_get0_signature); | ||
320 | 340 | ||
321 | int | 341 | int |
322 | SCT_is_complete(const SCT *sct) | 342 | SCT_is_complete(const SCT *sct) |
@@ -343,6 +363,7 @@ SCT_get_source(const SCT *sct) | |||
343 | { | 363 | { |
344 | return sct->source; | 364 | return sct->source; |
345 | } | 365 | } |
366 | LCRYPTO_ALIAS(SCT_get_source); | ||
346 | 367 | ||
347 | int | 368 | int |
348 | SCT_set_source(SCT *sct, sct_source_t source) | 369 | SCT_set_source(SCT *sct, sct_source_t source) |
@@ -361,12 +382,14 @@ SCT_set_source(SCT *sct, sct_source_t source) | |||
361 | /* if we aren't sure, leave the log entry type alone */ | 382 | /* if we aren't sure, leave the log entry type alone */ |
362 | return 1; | 383 | return 1; |
363 | } | 384 | } |
385 | LCRYPTO_ALIAS(SCT_set_source); | ||
364 | 386 | ||
365 | sct_validation_status_t | 387 | sct_validation_status_t |
366 | SCT_get_validation_status(const SCT *sct) | 388 | SCT_get_validation_status(const SCT *sct) |
367 | { | 389 | { |
368 | return sct->validation_status; | 390 | return sct->validation_status; |
369 | } | 391 | } |
392 | LCRYPTO_ALIAS(SCT_get_validation_status); | ||
370 | 393 | ||
371 | int | 394 | int |
372 | SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx) | 395 | SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx) |
@@ -455,6 +478,7 @@ SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx) | |||
455 | 478 | ||
456 | return is_sct_valid; | 479 | return is_sct_valid; |
457 | } | 480 | } |
481 | LCRYPTO_ALIAS(SCT_validate); | ||
458 | 482 | ||
459 | int | 483 | int |
460 | SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) | 484 | SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) |
@@ -478,3 +502,4 @@ SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) | |||
478 | 502 | ||
479 | return are_scts_valid; | 503 | return are_scts_valid; |
480 | } | 504 | } |
505 | LCRYPTO_ALIAS(SCT_LIST_validate); | ||