summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/ct/ct_sct.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/ct/ct_sct.c')
-rw-r--r--src/lib/libcrypto/ct/ct_sct.c27
1 files changed, 26 insertions, 1 deletions
diff --git a/src/lib/libcrypto/ct/ct_sct.c b/src/lib/libcrypto/ct/ct_sct.c
index a05b0f92a2..16ee8d5576 100644
--- a/src/lib/libcrypto/ct/ct_sct.c
+++ b/src/lib/libcrypto/ct/ct_sct.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ct_sct.c,v 1.8 2022/01/22 00:29:59 inoguchi Exp $ */ 1/* $OpenBSD: ct_sct.c,v 1.9 2023/07/08 07:22:58 beck Exp $ */
2/* 2/*
3 * Written by Rob Stradling (rob@comodo.com), Stephen Henson (steve@openssl.org) 3 * Written by Rob Stradling (rob@comodo.com), Stephen Henson (steve@openssl.org)
4 * and Adam Eijdenberg (adam.eijdenberg@gmail.com) for the OpenSSL project 2016. 4 * and Adam Eijdenberg (adam.eijdenberg@gmail.com) for the OpenSSL project 2016.
@@ -85,6 +85,7 @@ SCT_new(void)
85 sct->version = SCT_VERSION_NOT_SET; 85 sct->version = SCT_VERSION_NOT_SET;
86 return sct; 86 return sct;
87} 87}
88LCRYPTO_ALIAS(SCT_new);
88 89
89void 90void
90SCT_free(SCT *sct) 91SCT_free(SCT *sct)
@@ -98,12 +99,14 @@ SCT_free(SCT *sct)
98 free(sct->sct); 99 free(sct->sct);
99 free(sct); 100 free(sct);
100} 101}
102LCRYPTO_ALIAS(SCT_free);
101 103
102void 104void
103SCT_LIST_free(STACK_OF(SCT) *scts) 105SCT_LIST_free(STACK_OF(SCT) *scts)
104{ 106{
105 sk_SCT_pop_free(scts, SCT_free); 107 sk_SCT_pop_free(scts, SCT_free);
106} 108}
109LCRYPTO_ALIAS(SCT_LIST_free);
107 110
108int 111int
109SCT_set_version(SCT *sct, sct_version_t version) 112SCT_set_version(SCT *sct, sct_version_t version)
@@ -116,6 +119,7 @@ SCT_set_version(SCT *sct, sct_version_t version)
116 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; 119 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
117 return 1; 120 return 1;
118} 121}
122LCRYPTO_ALIAS(SCT_set_version);
119 123
120int 124int
121SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type) 125SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type)
@@ -133,6 +137,7 @@ SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type)
133 CTerror(CT_R_UNSUPPORTED_ENTRY_TYPE); 137 CTerror(CT_R_UNSUPPORTED_ENTRY_TYPE);
134 return 0; 138 return 0;
135} 139}
140LCRYPTO_ALIAS(SCT_set_log_entry_type);
136 141
137int 142int
138SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len) 143SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len)
@@ -148,6 +153,7 @@ SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len)
148 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; 153 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
149 return 1; 154 return 1;
150} 155}
156LCRYPTO_ALIAS(SCT_set0_log_id);
151 157
152int 158int
153SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len) 159SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len)
@@ -173,6 +179,7 @@ SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len)
173 } 179 }
174 return 1; 180 return 1;
175} 181}
182LCRYPTO_ALIAS(SCT_set1_log_id);
176 183
177 184
178void 185void
@@ -181,6 +188,7 @@ SCT_set_timestamp(SCT *sct, uint64_t timestamp)
181 sct->timestamp = timestamp; 188 sct->timestamp = timestamp;
182 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; 189 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
183} 190}
191LCRYPTO_ALIAS(SCT_set_timestamp);
184 192
185int 193int
186SCT_set_signature_nid(SCT *sct, int nid) 194SCT_set_signature_nid(SCT *sct, int nid)
@@ -201,6 +209,7 @@ SCT_set_signature_nid(SCT *sct, int nid)
201 return 0; 209 return 0;
202 } 210 }
203} 211}
212LCRYPTO_ALIAS(SCT_set_signature_nid);
204 213
205void 214void
206SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len) 215SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len)
@@ -210,6 +219,7 @@ SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len)
210 sct->ext_len = ext_len; 219 sct->ext_len = ext_len;
211 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; 220 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
212} 221}
222LCRYPTO_ALIAS(SCT_set0_extensions);
213 223
214int 224int
215SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len) 225SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len)
@@ -230,6 +240,7 @@ SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len)
230 } 240 }
231 return 1; 241 return 1;
232} 242}
243LCRYPTO_ALIAS(SCT_set1_extensions);
233 244
234void 245void
235SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) 246SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len)
@@ -239,6 +250,7 @@ SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len)
239 sct->sig_len = sig_len; 250 sct->sig_len = sig_len;
240 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; 251 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
241} 252}
253LCRYPTO_ALIAS(SCT_set0_signature);
242 254
243int 255int
244SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) 256SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len)
@@ -259,18 +271,21 @@ SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len)
259 } 271 }
260 return 1; 272 return 1;
261} 273}
274LCRYPTO_ALIAS(SCT_set1_signature);
262 275
263sct_version_t 276sct_version_t
264SCT_get_version(const SCT *sct) 277SCT_get_version(const SCT *sct)
265{ 278{
266 return sct->version; 279 return sct->version;
267} 280}
281LCRYPTO_ALIAS(SCT_get_version);
268 282
269ct_log_entry_type_t 283ct_log_entry_type_t
270SCT_get_log_entry_type(const SCT *sct) 284SCT_get_log_entry_type(const SCT *sct)
271{ 285{
272 return sct->entry_type; 286 return sct->entry_type;
273} 287}
288LCRYPTO_ALIAS(SCT_get_log_entry_type);
274 289
275size_t 290size_t
276SCT_get0_log_id(const SCT *sct, unsigned char **log_id) 291SCT_get0_log_id(const SCT *sct, unsigned char **log_id)
@@ -278,12 +293,14 @@ SCT_get0_log_id(const SCT *sct, unsigned char **log_id)
278 *log_id = sct->log_id; 293 *log_id = sct->log_id;
279 return sct->log_id_len; 294 return sct->log_id_len;
280} 295}
296LCRYPTO_ALIAS(SCT_get0_log_id);
281 297
282uint64_t 298uint64_t
283SCT_get_timestamp(const SCT *sct) 299SCT_get_timestamp(const SCT *sct)
284{ 300{
285 return sct->timestamp; 301 return sct->timestamp;
286} 302}
303LCRYPTO_ALIAS(SCT_get_timestamp);
287 304
288int 305int
289SCT_get_signature_nid(const SCT *sct) 306SCT_get_signature_nid(const SCT *sct)
@@ -303,6 +320,7 @@ SCT_get_signature_nid(const SCT *sct)
303 } 320 }
304 return NID_undef; 321 return NID_undef;
305} 322}
323LCRYPTO_ALIAS(SCT_get_signature_nid);
306 324
307size_t 325size_t
308SCT_get0_extensions(const SCT *sct, unsigned char **ext) 326SCT_get0_extensions(const SCT *sct, unsigned char **ext)
@@ -310,6 +328,7 @@ SCT_get0_extensions(const SCT *sct, unsigned char **ext)
310 *ext = sct->ext; 328 *ext = sct->ext;
311 return sct->ext_len; 329 return sct->ext_len;
312} 330}
331LCRYPTO_ALIAS(SCT_get0_extensions);
313 332
314size_t 333size_t
315SCT_get0_signature(const SCT *sct, unsigned char **sig) 334SCT_get0_signature(const SCT *sct, unsigned char **sig)
@@ -317,6 +336,7 @@ SCT_get0_signature(const SCT *sct, unsigned char **sig)
317 *sig = sct->sig; 336 *sig = sct->sig;
318 return sct->sig_len; 337 return sct->sig_len;
319} 338}
339LCRYPTO_ALIAS(SCT_get0_signature);
320 340
321int 341int
322SCT_is_complete(const SCT *sct) 342SCT_is_complete(const SCT *sct)
@@ -343,6 +363,7 @@ SCT_get_source(const SCT *sct)
343{ 363{
344 return sct->source; 364 return sct->source;
345} 365}
366LCRYPTO_ALIAS(SCT_get_source);
346 367
347int 368int
348SCT_set_source(SCT *sct, sct_source_t source) 369SCT_set_source(SCT *sct, sct_source_t source)
@@ -361,12 +382,14 @@ SCT_set_source(SCT *sct, sct_source_t source)
361 /* if we aren't sure, leave the log entry type alone */ 382 /* if we aren't sure, leave the log entry type alone */
362 return 1; 383 return 1;
363} 384}
385LCRYPTO_ALIAS(SCT_set_source);
364 386
365sct_validation_status_t 387sct_validation_status_t
366SCT_get_validation_status(const SCT *sct) 388SCT_get_validation_status(const SCT *sct)
367{ 389{
368 return sct->validation_status; 390 return sct->validation_status;
369} 391}
392LCRYPTO_ALIAS(SCT_get_validation_status);
370 393
371int 394int
372SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx) 395SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx)
@@ -455,6 +478,7 @@ SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx)
455 478
456 return is_sct_valid; 479 return is_sct_valid;
457} 480}
481LCRYPTO_ALIAS(SCT_validate);
458 482
459int 483int
460SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) 484SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx)
@@ -478,3 +502,4 @@ SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx)
478 502
479 return are_scts_valid; 503 return are_scts_valid;
480} 504}
505LCRYPTO_ALIAS(SCT_LIST_validate);