summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/ct
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/ct')
-rw-r--r--src/lib/libcrypto/ct/ct_b64.c4
-rw-r--r--src/lib/libcrypto/ct/ct_log.c12
-rw-r--r--src/lib/libcrypto/ct/ct_oct.c8
-rw-r--r--src/lib/libcrypto/ct/ct_policy.c12
-rw-r--r--src/lib/libcrypto/ct/ct_prn.c5
-rw-r--r--src/lib/libcrypto/ct/ct_sct.c27
6 files changed, 62 insertions, 6 deletions
diff --git a/src/lib/libcrypto/ct/ct_b64.c b/src/lib/libcrypto/ct/ct_b64.c
index bfc69a7da3..101cd1e2b1 100644
--- a/src/lib/libcrypto/ct/ct_b64.c
+++ b/src/lib/libcrypto/ct/ct_b64.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ct_b64.c,v 1.6 2021/12/20 17:19:19 jsing Exp $ */ 1/* $OpenBSD: ct_b64.c,v 1.7 2023/07/08 07:22:58 beck Exp $ */
2/* 2/*
3 * Written by Rob Stradling (rob@comodo.com) and Stephen Henson 3 * Written by Rob Stradling (rob@comodo.com) and Stephen Henson
4 * (steve@openssl.org) for the OpenSSL project 2014. 4 * (steve@openssl.org) for the OpenSSL project 2014.
@@ -180,6 +180,7 @@ SCT_new_from_base64(unsigned char version, const char *logid_base64,
180 SCT_free(sct); 180 SCT_free(sct);
181 return NULL; 181 return NULL;
182} 182}
183LCRYPTO_ALIAS(SCT_new_from_base64);
183 184
184/* 185/*
185 * Allocate, build and returns a new |ct_log| from input |pkey_base64| 186 * Allocate, build and returns a new |ct_log| from input |pkey_base64|
@@ -222,3 +223,4 @@ CTLOG_new_from_base64(CTLOG **ct_log, const char *pkey_base64, const char *name)
222 223
223 return 1; 224 return 1;
224} 225}
226LCRYPTO_ALIAS(CTLOG_new_from_base64);
diff --git a/src/lib/libcrypto/ct/ct_log.c b/src/lib/libcrypto/ct/ct_log.c
index f6e3aa25d5..eb503a3816 100644
--- a/src/lib/libcrypto/ct/ct_log.c
+++ b/src/lib/libcrypto/ct/ct_log.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ct_log.c,v 1.5 2021/12/18 16:34:52 tb Exp $ */ 1/* $OpenBSD: ct_log.c,v 1.6 2023/07/08 07:22:58 beck Exp $ */
2/* Author: Adam Eijdenberg <adam.eijdenberg@gmail.com>. */ 2/* Author: Adam Eijdenberg <adam.eijdenberg@gmail.com>. */
3/* ==================================================================== 3/* ====================================================================
4 * Copyright (c) 1998-2016 The OpenSSL Project. All rights reserved. 4 * Copyright (c) 1998-2016 The OpenSSL Project. All rights reserved.
@@ -162,6 +162,7 @@ CTLOG_STORE_new(void)
162 free(ret); 162 free(ret);
163 return NULL; 163 return NULL;
164} 164}
165LCRYPTO_ALIAS(CTLOG_STORE_new);
165 166
166void 167void
167CTLOG_STORE_free(CTLOG_STORE *store) 168CTLOG_STORE_free(CTLOG_STORE *store)
@@ -171,6 +172,7 @@ CTLOG_STORE_free(CTLOG_STORE *store)
171 free(store); 172 free(store);
172 } 173 }
173} 174}
175LCRYPTO_ALIAS(CTLOG_STORE_free);
174 176
175static int 177static int
176ctlog_new_from_conf(CTLOG **ct_log, const CONF *conf, const char *section) 178ctlog_new_from_conf(CTLOG **ct_log, const CONF *conf, const char *section)
@@ -198,6 +200,7 @@ CTLOG_STORE_load_default_file(CTLOG_STORE *store)
198{ 200{
199 return CTLOG_STORE_load_file(store, CTLOG_FILE); 201 return CTLOG_STORE_load_file(store, CTLOG_FILE);
200} 202}
203LCRYPTO_ALIAS(CTLOG_STORE_load_default_file);
201 204
202/* 205/*
203 * Called by CONF_parse_list, which stops if this returns <= 0, 206 * Called by CONF_parse_list, which stops if this returns <= 0,
@@ -283,6 +286,7 @@ CTLOG_STORE_load_file(CTLOG_STORE *store, const char *file)
283 ctlog_store_load_ctx_free(load_ctx); 286 ctlog_store_load_ctx_free(load_ctx);
284 return ret; 287 return ret;
285} 288}
289LCRYPTO_ALIAS(CTLOG_STORE_load_file);
286 290
287/* 291/*
288 * Initialize a new CTLOG object. 292 * Initialize a new CTLOG object.
@@ -314,6 +318,7 @@ CTLOG_new(EVP_PKEY *public_key, const char *name)
314 CTLOG_free(ret); 318 CTLOG_free(ret);
315 return NULL; 319 return NULL;
316} 320}
321LCRYPTO_ALIAS(CTLOG_new);
317 322
318/* Frees CT log and associated structures */ 323/* Frees CT log and associated structures */
319void 324void
@@ -325,12 +330,14 @@ CTLOG_free(CTLOG *log)
325 free(log); 330 free(log);
326 } 331 }
327} 332}
333LCRYPTO_ALIAS(CTLOG_free);
328 334
329const char * 335const char *
330CTLOG_get0_name(const CTLOG *log) 336CTLOG_get0_name(const CTLOG *log)
331{ 337{
332 return log->name; 338 return log->name;
333} 339}
340LCRYPTO_ALIAS(CTLOG_get0_name);
334 341
335void 342void
336CTLOG_get0_log_id(const CTLOG *log, const uint8_t **log_id, size_t *log_id_len) 343CTLOG_get0_log_id(const CTLOG *log, const uint8_t **log_id, size_t *log_id_len)
@@ -338,12 +345,14 @@ CTLOG_get0_log_id(const CTLOG *log, const uint8_t **log_id, size_t *log_id_len)
338 *log_id = log->log_id; 345 *log_id = log->log_id;
339 *log_id_len = CT_V1_HASHLEN; 346 *log_id_len = CT_V1_HASHLEN;
340} 347}
348LCRYPTO_ALIAS(CTLOG_get0_log_id);
341 349
342EVP_PKEY * 350EVP_PKEY *
343CTLOG_get0_public_key(const CTLOG *log) 351CTLOG_get0_public_key(const CTLOG *log)
344{ 352{
345 return log->public_key; 353 return log->public_key;
346} 354}
355LCRYPTO_ALIAS(CTLOG_get0_public_key);
347 356
348/* 357/*
349 * Given a log ID, finds the matching log. 358 * Given a log ID, finds the matching log.
@@ -363,3 +372,4 @@ CTLOG_STORE_get0_log_by_id(const CTLOG_STORE *store, const uint8_t *log_id,
363 372
364 return NULL; 373 return NULL;
365} 374}
375LCRYPTO_ALIAS(CTLOG_STORE_get0_log_by_id);
diff --git a/src/lib/libcrypto/ct/ct_oct.c b/src/lib/libcrypto/ct/ct_oct.c
index 94e67c6bc3..1f5e5c75d0 100644
--- a/src/lib/libcrypto/ct/ct_oct.c
+++ b/src/lib/libcrypto/ct/ct_oct.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ct_oct.c,v 1.8 2021/12/20 17:23:07 jsing Exp $ */ 1/* $OpenBSD: ct_oct.c,v 1.9 2023/07/08 07:22:58 beck Exp $ */
2/* 2/*
3 * Written by Rob Stradling (rob@comodo.com) and Stephen Henson 3 * Written by Rob Stradling (rob@comodo.com) and Stephen Henson
4 * (steve@openssl.org) for the OpenSSL project 2014. 4 * (steve@openssl.org) for the OpenSSL project 2014.
@@ -208,6 +208,7 @@ o2i_SCT(SCT **psct, const unsigned char **in, size_t len)
208 208
209 return sct; 209 return sct;
210} 210}
211LCRYPTO_ALIAS(o2i_SCT);
211 212
212int 213int
213i2o_SCT_signature(const SCT *sct, unsigned char **out) 214i2o_SCT_signature(const SCT *sct, unsigned char **out)
@@ -314,6 +315,7 @@ i2o_SCT(const SCT *sct, unsigned char **out)
314 free(pstart); 315 free(pstart);
315 return -1; 316 return -1;
316} 317}
318LCRYPTO_ALIAS(i2o_SCT);
317 319
318STACK_OF(SCT) * 320STACK_OF(SCT) *
319o2i_SCT_LIST(STACK_OF(SCT) **out_scts, const unsigned char **pp, size_t len) 321o2i_SCT_LIST(STACK_OF(SCT) **out_scts, const unsigned char **pp, size_t len)
@@ -366,6 +368,7 @@ o2i_SCT_LIST(STACK_OF(SCT) **out_scts, const unsigned char **pp, size_t len)
366 368
367 return NULL; 369 return NULL;
368} 370}
371LCRYPTO_ALIAS(o2i_SCT_LIST);
369 372
370int 373int
371i2o_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **pp) 374i2o_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **pp)
@@ -422,6 +425,7 @@ i2o_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **pp)
422 } 425 }
423 return -1; 426 return -1;
424} 427}
428LCRYPTO_ALIAS(i2o_SCT_LIST);
425 429
426STACK_OF(SCT) * 430STACK_OF(SCT) *
427d2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, long len) 431d2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, long len)
@@ -441,6 +445,7 @@ d2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, long len)
441 ASN1_OCTET_STRING_free(oct); 445 ASN1_OCTET_STRING_free(oct);
442 return sk; 446 return sk;
443} 447}
448LCRYPTO_ALIAS(d2i_SCT_LIST);
444 449
445int 450int
446i2d_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **out) 451i2d_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **out)
@@ -456,3 +461,4 @@ i2d_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **out)
456 free(oct.data); 461 free(oct.data);
457 return len; 462 return len;
458} 463}
464LCRYPTO_ALIAS(i2d_SCT_LIST);
diff --git a/src/lib/libcrypto/ct/ct_policy.c b/src/lib/libcrypto/ct/ct_policy.c
index 2cb3e69333..eb2b312019 100644
--- a/src/lib/libcrypto/ct/ct_policy.c
+++ b/src/lib/libcrypto/ct/ct_policy.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ct_policy.c,v 1.5 2021/12/18 16:34:52 tb Exp $ */ 1/* $OpenBSD: ct_policy.c,v 1.6 2023/07/08 07:22:58 beck Exp $ */
2/* 2/*
3 * Implementations of Certificate Transparency SCT policies. 3 * Implementations of Certificate Transparency SCT policies.
4 * Written by Rob Percival (robpercival@google.com) for the OpenSSL project. 4 * Written by Rob Percival (robpercival@google.com) for the OpenSSL project.
@@ -86,6 +86,7 @@ CT_POLICY_EVAL_CTX_new(void)
86 86
87 return ctx; 87 return ctx;
88} 88}
89LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_new);
89 90
90void 91void
91CT_POLICY_EVAL_CTX_free(CT_POLICY_EVAL_CTX *ctx) 92CT_POLICY_EVAL_CTX_free(CT_POLICY_EVAL_CTX *ctx)
@@ -96,6 +97,7 @@ CT_POLICY_EVAL_CTX_free(CT_POLICY_EVAL_CTX *ctx)
96 X509_free(ctx->issuer); 97 X509_free(ctx->issuer);
97 free(ctx); 98 free(ctx);
98} 99}
100LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_free);
99 101
100int 102int
101CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert) 103CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert)
@@ -105,6 +107,7 @@ CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert)
105 ctx->cert = cert; 107 ctx->cert = cert;
106 return 1; 108 return 1;
107} 109}
110LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_set1_cert);
108 111
109int 112int
110CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer) 113CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer)
@@ -114,6 +117,7 @@ CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer)
114 ctx->issuer = issuer; 117 ctx->issuer = issuer;
115 return 1; 118 return 1;
116} 119}
120LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_set1_issuer);
117 121
118void 122void
119CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(CT_POLICY_EVAL_CTX *ctx, 123CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(CT_POLICY_EVAL_CTX *ctx,
@@ -121,33 +125,39 @@ CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(CT_POLICY_EVAL_CTX *ctx,
121{ 125{
122 ctx->log_store = log_store; 126 ctx->log_store = log_store;
123} 127}
128LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE);
124 129
125void 130void
126CT_POLICY_EVAL_CTX_set_time(CT_POLICY_EVAL_CTX *ctx, uint64_t time_in_ms) 131CT_POLICY_EVAL_CTX_set_time(CT_POLICY_EVAL_CTX *ctx, uint64_t time_in_ms)
127{ 132{
128 ctx->epoch_time_in_ms = time_in_ms; 133 ctx->epoch_time_in_ms = time_in_ms;
129} 134}
135LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_set_time);
130 136
131X509 * 137X509 *
132CT_POLICY_EVAL_CTX_get0_cert(const CT_POLICY_EVAL_CTX *ctx) 138CT_POLICY_EVAL_CTX_get0_cert(const CT_POLICY_EVAL_CTX *ctx)
133{ 139{
134 return ctx->cert; 140 return ctx->cert;
135} 141}
142LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_get0_cert);
136 143
137X509 * 144X509 *
138CT_POLICY_EVAL_CTX_get0_issuer(const CT_POLICY_EVAL_CTX *ctx) 145CT_POLICY_EVAL_CTX_get0_issuer(const CT_POLICY_EVAL_CTX *ctx)
139{ 146{
140 return ctx->issuer; 147 return ctx->issuer;
141} 148}
149LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_get0_issuer);
142 150
143const CTLOG_STORE * 151const CTLOG_STORE *
144CT_POLICY_EVAL_CTX_get0_log_store(const CT_POLICY_EVAL_CTX *ctx) 152CT_POLICY_EVAL_CTX_get0_log_store(const CT_POLICY_EVAL_CTX *ctx)
145{ 153{
146 return ctx->log_store; 154 return ctx->log_store;
147} 155}
156LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_get0_log_store);
148 157
149uint64_t 158uint64_t
150CT_POLICY_EVAL_CTX_get_time(const CT_POLICY_EVAL_CTX *ctx) 159CT_POLICY_EVAL_CTX_get_time(const CT_POLICY_EVAL_CTX *ctx)
151{ 160{
152 return ctx->epoch_time_in_ms; 161 return ctx->epoch_time_in_ms;
153} 162}
163LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_get_time);
diff --git a/src/lib/libcrypto/ct/ct_prn.c b/src/lib/libcrypto/ct/ct_prn.c
index ea4f3b2474..e6931eeb09 100644
--- a/src/lib/libcrypto/ct/ct_prn.c
+++ b/src/lib/libcrypto/ct/ct_prn.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ct_prn.c,v 1.6 2021/12/18 16:34:52 tb Exp $ */ 1/* $OpenBSD: ct_prn.c,v 1.7 2023/07/08 07:22:58 beck Exp $ */
2/* 2/*
3 * Written by Rob Stradling (rob@comodo.com) and Stephen Henson 3 * Written by Rob Stradling (rob@comodo.com) and Stephen Henson
4 * (steve@openssl.org) for the OpenSSL project 2014. 4 * (steve@openssl.org) for the OpenSSL project 2014.
@@ -146,6 +146,7 @@ SCT_validation_status_string(const SCT *sct)
146 } 146 }
147 return "unknown status"; 147 return "unknown status";
148} 148}
149LCRYPTO_ALIAS(SCT_validation_status_string);
149 150
150void 151void
151SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *log_store) 152SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *log_store)
@@ -190,6 +191,7 @@ SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *log_store)
190 BIO_printf(out, "\n%*s ", indent + 4, ""); 191 BIO_printf(out, "\n%*s ", indent + 4, "");
191 BIO_hex_string(out, indent + 16, 16, sct->sig, sct->sig_len); 192 BIO_hex_string(out, indent + 16, 16, sct->sig, sct->sig_len);
192} 193}
194LCRYPTO_ALIAS(SCT_print);
193 195
194void 196void
195SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent, 197SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent,
@@ -206,3 +208,4 @@ SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent,
206 BIO_printf(out, "%s", separator); 208 BIO_printf(out, "%s", separator);
207 } 209 }
208} 210}
211LCRYPTO_ALIAS(SCT_LIST_print);
diff --git a/src/lib/libcrypto/ct/ct_sct.c b/src/lib/libcrypto/ct/ct_sct.c
index a05b0f92a2..16ee8d5576 100644
--- a/src/lib/libcrypto/ct/ct_sct.c
+++ b/src/lib/libcrypto/ct/ct_sct.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ct_sct.c,v 1.8 2022/01/22 00:29:59 inoguchi Exp $ */ 1/* $OpenBSD: ct_sct.c,v 1.9 2023/07/08 07:22:58 beck Exp $ */
2/* 2/*
3 * Written by Rob Stradling (rob@comodo.com), Stephen Henson (steve@openssl.org) 3 * Written by Rob Stradling (rob@comodo.com), Stephen Henson (steve@openssl.org)
4 * and Adam Eijdenberg (adam.eijdenberg@gmail.com) for the OpenSSL project 2016. 4 * and Adam Eijdenberg (adam.eijdenberg@gmail.com) for the OpenSSL project 2016.
@@ -85,6 +85,7 @@ SCT_new(void)
85 sct->version = SCT_VERSION_NOT_SET; 85 sct->version = SCT_VERSION_NOT_SET;
86 return sct; 86 return sct;
87} 87}
88LCRYPTO_ALIAS(SCT_new);
88 89
89void 90void
90SCT_free(SCT *sct) 91SCT_free(SCT *sct)
@@ -98,12 +99,14 @@ SCT_free(SCT *sct)
98 free(sct->sct); 99 free(sct->sct);
99 free(sct); 100 free(sct);
100} 101}
102LCRYPTO_ALIAS(SCT_free);
101 103
102void 104void
103SCT_LIST_free(STACK_OF(SCT) *scts) 105SCT_LIST_free(STACK_OF(SCT) *scts)
104{ 106{
105 sk_SCT_pop_free(scts, SCT_free); 107 sk_SCT_pop_free(scts, SCT_free);
106} 108}
109LCRYPTO_ALIAS(SCT_LIST_free);
107 110
108int 111int
109SCT_set_version(SCT *sct, sct_version_t version) 112SCT_set_version(SCT *sct, sct_version_t version)
@@ -116,6 +119,7 @@ SCT_set_version(SCT *sct, sct_version_t version)
116 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; 119 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
117 return 1; 120 return 1;
118} 121}
122LCRYPTO_ALIAS(SCT_set_version);
119 123
120int 124int
121SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type) 125SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type)
@@ -133,6 +137,7 @@ SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type)
133 CTerror(CT_R_UNSUPPORTED_ENTRY_TYPE); 137 CTerror(CT_R_UNSUPPORTED_ENTRY_TYPE);
134 return 0; 138 return 0;
135} 139}
140LCRYPTO_ALIAS(SCT_set_log_entry_type);
136 141
137int 142int
138SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len) 143SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len)
@@ -148,6 +153,7 @@ SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len)
148 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; 153 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
149 return 1; 154 return 1;
150} 155}
156LCRYPTO_ALIAS(SCT_set0_log_id);
151 157
152int 158int
153SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len) 159SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len)
@@ -173,6 +179,7 @@ SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len)
173 } 179 }
174 return 1; 180 return 1;
175} 181}
182LCRYPTO_ALIAS(SCT_set1_log_id);
176 183
177 184
178void 185void
@@ -181,6 +188,7 @@ SCT_set_timestamp(SCT *sct, uint64_t timestamp)
181 sct->timestamp = timestamp; 188 sct->timestamp = timestamp;
182 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; 189 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
183} 190}
191LCRYPTO_ALIAS(SCT_set_timestamp);
184 192
185int 193int
186SCT_set_signature_nid(SCT *sct, int nid) 194SCT_set_signature_nid(SCT *sct, int nid)
@@ -201,6 +209,7 @@ SCT_set_signature_nid(SCT *sct, int nid)
201 return 0; 209 return 0;
202 } 210 }
203} 211}
212LCRYPTO_ALIAS(SCT_set_signature_nid);
204 213
205void 214void
206SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len) 215SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len)
@@ -210,6 +219,7 @@ SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len)
210 sct->ext_len = ext_len; 219 sct->ext_len = ext_len;
211 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; 220 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
212} 221}
222LCRYPTO_ALIAS(SCT_set0_extensions);
213 223
214int 224int
215SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len) 225SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len)
@@ -230,6 +240,7 @@ SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len)
230 } 240 }
231 return 1; 241 return 1;
232} 242}
243LCRYPTO_ALIAS(SCT_set1_extensions);
233 244
234void 245void
235SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) 246SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len)
@@ -239,6 +250,7 @@ SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len)
239 sct->sig_len = sig_len; 250 sct->sig_len = sig_len;
240 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; 251 sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
241} 252}
253LCRYPTO_ALIAS(SCT_set0_signature);
242 254
243int 255int
244SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) 256SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len)
@@ -259,18 +271,21 @@ SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len)
259 } 271 }
260 return 1; 272 return 1;
261} 273}
274LCRYPTO_ALIAS(SCT_set1_signature);
262 275
263sct_version_t 276sct_version_t
264SCT_get_version(const SCT *sct) 277SCT_get_version(const SCT *sct)
265{ 278{
266 return sct->version; 279 return sct->version;
267} 280}
281LCRYPTO_ALIAS(SCT_get_version);
268 282
269ct_log_entry_type_t 283ct_log_entry_type_t
270SCT_get_log_entry_type(const SCT *sct) 284SCT_get_log_entry_type(const SCT *sct)
271{ 285{
272 return sct->entry_type; 286 return sct->entry_type;
273} 287}
288LCRYPTO_ALIAS(SCT_get_log_entry_type);
274 289
275size_t 290size_t
276SCT_get0_log_id(const SCT *sct, unsigned char **log_id) 291SCT_get0_log_id(const SCT *sct, unsigned char **log_id)
@@ -278,12 +293,14 @@ SCT_get0_log_id(const SCT *sct, unsigned char **log_id)
278 *log_id = sct->log_id; 293 *log_id = sct->log_id;
279 return sct->log_id_len; 294 return sct->log_id_len;
280} 295}
296LCRYPTO_ALIAS(SCT_get0_log_id);
281 297
282uint64_t 298uint64_t
283SCT_get_timestamp(const SCT *sct) 299SCT_get_timestamp(const SCT *sct)
284{ 300{
285 return sct->timestamp; 301 return sct->timestamp;
286} 302}
303LCRYPTO_ALIAS(SCT_get_timestamp);
287 304
288int 305int
289SCT_get_signature_nid(const SCT *sct) 306SCT_get_signature_nid(const SCT *sct)
@@ -303,6 +320,7 @@ SCT_get_signature_nid(const SCT *sct)
303 } 320 }
304 return NID_undef; 321 return NID_undef;
305} 322}
323LCRYPTO_ALIAS(SCT_get_signature_nid);
306 324
307size_t 325size_t
308SCT_get0_extensions(const SCT *sct, unsigned char **ext) 326SCT_get0_extensions(const SCT *sct, unsigned char **ext)
@@ -310,6 +328,7 @@ SCT_get0_extensions(const SCT *sct, unsigned char **ext)
310 *ext = sct->ext; 328 *ext = sct->ext;
311 return sct->ext_len; 329 return sct->ext_len;
312} 330}
331LCRYPTO_ALIAS(SCT_get0_extensions);
313 332
314size_t 333size_t
315SCT_get0_signature(const SCT *sct, unsigned char **sig) 334SCT_get0_signature(const SCT *sct, unsigned char **sig)
@@ -317,6 +336,7 @@ SCT_get0_signature(const SCT *sct, unsigned char **sig)
317 *sig = sct->sig; 336 *sig = sct->sig;
318 return sct->sig_len; 337 return sct->sig_len;
319} 338}
339LCRYPTO_ALIAS(SCT_get0_signature);
320 340
321int 341int
322SCT_is_complete(const SCT *sct) 342SCT_is_complete(const SCT *sct)
@@ -343,6 +363,7 @@ SCT_get_source(const SCT *sct)
343{ 363{
344 return sct->source; 364 return sct->source;
345} 365}
366LCRYPTO_ALIAS(SCT_get_source);
346 367
347int 368int
348SCT_set_source(SCT *sct, sct_source_t source) 369SCT_set_source(SCT *sct, sct_source_t source)
@@ -361,12 +382,14 @@ SCT_set_source(SCT *sct, sct_source_t source)
361 /* if we aren't sure, leave the log entry type alone */ 382 /* if we aren't sure, leave the log entry type alone */
362 return 1; 383 return 1;
363} 384}
385LCRYPTO_ALIAS(SCT_set_source);
364 386
365sct_validation_status_t 387sct_validation_status_t
366SCT_get_validation_status(const SCT *sct) 388SCT_get_validation_status(const SCT *sct)
367{ 389{
368 return sct->validation_status; 390 return sct->validation_status;
369} 391}
392LCRYPTO_ALIAS(SCT_get_validation_status);
370 393
371int 394int
372SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx) 395SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx)
@@ -455,6 +478,7 @@ SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx)
455 478
456 return is_sct_valid; 479 return is_sct_valid;
457} 480}
481LCRYPTO_ALIAS(SCT_validate);
458 482
459int 483int
460SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) 484SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx)
@@ -478,3 +502,4 @@ SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx)
478 502
479 return are_scts_valid; 503 return are_scts_valid;
480} 504}
505LCRYPTO_ALIAS(SCT_LIST_validate);