diff options
Diffstat (limited to 'src/lib/libcrypto/ct')
| -rw-r--r-- | src/lib/libcrypto/ct/ct_b64.c | 4 | ||||
| -rw-r--r-- | src/lib/libcrypto/ct/ct_log.c | 12 | ||||
| -rw-r--r-- | src/lib/libcrypto/ct/ct_oct.c | 8 | ||||
| -rw-r--r-- | src/lib/libcrypto/ct/ct_policy.c | 12 | ||||
| -rw-r--r-- | src/lib/libcrypto/ct/ct_prn.c | 5 | ||||
| -rw-r--r-- | src/lib/libcrypto/ct/ct_sct.c | 27 |
6 files changed, 62 insertions, 6 deletions
diff --git a/src/lib/libcrypto/ct/ct_b64.c b/src/lib/libcrypto/ct/ct_b64.c index bfc69a7da3..101cd1e2b1 100644 --- a/src/lib/libcrypto/ct/ct_b64.c +++ b/src/lib/libcrypto/ct/ct_b64.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ct_b64.c,v 1.6 2021/12/20 17:19:19 jsing Exp $ */ | 1 | /* $OpenBSD: ct_b64.c,v 1.7 2023/07/08 07:22:58 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Written by Rob Stradling (rob@comodo.com) and Stephen Henson | 3 | * Written by Rob Stradling (rob@comodo.com) and Stephen Henson |
| 4 | * (steve@openssl.org) for the OpenSSL project 2014. | 4 | * (steve@openssl.org) for the OpenSSL project 2014. |
| @@ -180,6 +180,7 @@ SCT_new_from_base64(unsigned char version, const char *logid_base64, | |||
| 180 | SCT_free(sct); | 180 | SCT_free(sct); |
| 181 | return NULL; | 181 | return NULL; |
| 182 | } | 182 | } |
| 183 | LCRYPTO_ALIAS(SCT_new_from_base64); | ||
| 183 | 184 | ||
| 184 | /* | 185 | /* |
| 185 | * Allocate, build and returns a new |ct_log| from input |pkey_base64| | 186 | * Allocate, build and returns a new |ct_log| from input |pkey_base64| |
| @@ -222,3 +223,4 @@ CTLOG_new_from_base64(CTLOG **ct_log, const char *pkey_base64, const char *name) | |||
| 222 | 223 | ||
| 223 | return 1; | 224 | return 1; |
| 224 | } | 225 | } |
| 226 | LCRYPTO_ALIAS(CTLOG_new_from_base64); | ||
diff --git a/src/lib/libcrypto/ct/ct_log.c b/src/lib/libcrypto/ct/ct_log.c index f6e3aa25d5..eb503a3816 100644 --- a/src/lib/libcrypto/ct/ct_log.c +++ b/src/lib/libcrypto/ct/ct_log.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ct_log.c,v 1.5 2021/12/18 16:34:52 tb Exp $ */ | 1 | /* $OpenBSD: ct_log.c,v 1.6 2023/07/08 07:22:58 beck Exp $ */ |
| 2 | /* Author: Adam Eijdenberg <adam.eijdenberg@gmail.com>. */ | 2 | /* Author: Adam Eijdenberg <adam.eijdenberg@gmail.com>. */ |
| 3 | /* ==================================================================== | 3 | /* ==================================================================== |
| 4 | * Copyright (c) 1998-2016 The OpenSSL Project. All rights reserved. | 4 | * Copyright (c) 1998-2016 The OpenSSL Project. All rights reserved. |
| @@ -162,6 +162,7 @@ CTLOG_STORE_new(void) | |||
| 162 | free(ret); | 162 | free(ret); |
| 163 | return NULL; | 163 | return NULL; |
| 164 | } | 164 | } |
| 165 | LCRYPTO_ALIAS(CTLOG_STORE_new); | ||
| 165 | 166 | ||
| 166 | void | 167 | void |
| 167 | CTLOG_STORE_free(CTLOG_STORE *store) | 168 | CTLOG_STORE_free(CTLOG_STORE *store) |
| @@ -171,6 +172,7 @@ CTLOG_STORE_free(CTLOG_STORE *store) | |||
| 171 | free(store); | 172 | free(store); |
| 172 | } | 173 | } |
| 173 | } | 174 | } |
| 175 | LCRYPTO_ALIAS(CTLOG_STORE_free); | ||
| 174 | 176 | ||
| 175 | static int | 177 | static int |
| 176 | ctlog_new_from_conf(CTLOG **ct_log, const CONF *conf, const char *section) | 178 | ctlog_new_from_conf(CTLOG **ct_log, const CONF *conf, const char *section) |
| @@ -198,6 +200,7 @@ CTLOG_STORE_load_default_file(CTLOG_STORE *store) | |||
| 198 | { | 200 | { |
| 199 | return CTLOG_STORE_load_file(store, CTLOG_FILE); | 201 | return CTLOG_STORE_load_file(store, CTLOG_FILE); |
| 200 | } | 202 | } |
| 203 | LCRYPTO_ALIAS(CTLOG_STORE_load_default_file); | ||
| 201 | 204 | ||
| 202 | /* | 205 | /* |
| 203 | * Called by CONF_parse_list, which stops if this returns <= 0, | 206 | * Called by CONF_parse_list, which stops if this returns <= 0, |
| @@ -283,6 +286,7 @@ CTLOG_STORE_load_file(CTLOG_STORE *store, const char *file) | |||
| 283 | ctlog_store_load_ctx_free(load_ctx); | 286 | ctlog_store_load_ctx_free(load_ctx); |
| 284 | return ret; | 287 | return ret; |
| 285 | } | 288 | } |
| 289 | LCRYPTO_ALIAS(CTLOG_STORE_load_file); | ||
| 286 | 290 | ||
| 287 | /* | 291 | /* |
| 288 | * Initialize a new CTLOG object. | 292 | * Initialize a new CTLOG object. |
| @@ -314,6 +318,7 @@ CTLOG_new(EVP_PKEY *public_key, const char *name) | |||
| 314 | CTLOG_free(ret); | 318 | CTLOG_free(ret); |
| 315 | return NULL; | 319 | return NULL; |
| 316 | } | 320 | } |
| 321 | LCRYPTO_ALIAS(CTLOG_new); | ||
| 317 | 322 | ||
| 318 | /* Frees CT log and associated structures */ | 323 | /* Frees CT log and associated structures */ |
| 319 | void | 324 | void |
| @@ -325,12 +330,14 @@ CTLOG_free(CTLOG *log) | |||
| 325 | free(log); | 330 | free(log); |
| 326 | } | 331 | } |
| 327 | } | 332 | } |
| 333 | LCRYPTO_ALIAS(CTLOG_free); | ||
| 328 | 334 | ||
| 329 | const char * | 335 | const char * |
| 330 | CTLOG_get0_name(const CTLOG *log) | 336 | CTLOG_get0_name(const CTLOG *log) |
| 331 | { | 337 | { |
| 332 | return log->name; | 338 | return log->name; |
| 333 | } | 339 | } |
| 340 | LCRYPTO_ALIAS(CTLOG_get0_name); | ||
| 334 | 341 | ||
| 335 | void | 342 | void |
| 336 | CTLOG_get0_log_id(const CTLOG *log, const uint8_t **log_id, size_t *log_id_len) | 343 | CTLOG_get0_log_id(const CTLOG *log, const uint8_t **log_id, size_t *log_id_len) |
| @@ -338,12 +345,14 @@ CTLOG_get0_log_id(const CTLOG *log, const uint8_t **log_id, size_t *log_id_len) | |||
| 338 | *log_id = log->log_id; | 345 | *log_id = log->log_id; |
| 339 | *log_id_len = CT_V1_HASHLEN; | 346 | *log_id_len = CT_V1_HASHLEN; |
| 340 | } | 347 | } |
| 348 | LCRYPTO_ALIAS(CTLOG_get0_log_id); | ||
| 341 | 349 | ||
| 342 | EVP_PKEY * | 350 | EVP_PKEY * |
| 343 | CTLOG_get0_public_key(const CTLOG *log) | 351 | CTLOG_get0_public_key(const CTLOG *log) |
| 344 | { | 352 | { |
| 345 | return log->public_key; | 353 | return log->public_key; |
| 346 | } | 354 | } |
| 355 | LCRYPTO_ALIAS(CTLOG_get0_public_key); | ||
| 347 | 356 | ||
| 348 | /* | 357 | /* |
| 349 | * Given a log ID, finds the matching log. | 358 | * Given a log ID, finds the matching log. |
| @@ -363,3 +372,4 @@ CTLOG_STORE_get0_log_by_id(const CTLOG_STORE *store, const uint8_t *log_id, | |||
| 363 | 372 | ||
| 364 | return NULL; | 373 | return NULL; |
| 365 | } | 374 | } |
| 375 | LCRYPTO_ALIAS(CTLOG_STORE_get0_log_by_id); | ||
diff --git a/src/lib/libcrypto/ct/ct_oct.c b/src/lib/libcrypto/ct/ct_oct.c index 94e67c6bc3..1f5e5c75d0 100644 --- a/src/lib/libcrypto/ct/ct_oct.c +++ b/src/lib/libcrypto/ct/ct_oct.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ct_oct.c,v 1.8 2021/12/20 17:23:07 jsing Exp $ */ | 1 | /* $OpenBSD: ct_oct.c,v 1.9 2023/07/08 07:22:58 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Written by Rob Stradling (rob@comodo.com) and Stephen Henson | 3 | * Written by Rob Stradling (rob@comodo.com) and Stephen Henson |
| 4 | * (steve@openssl.org) for the OpenSSL project 2014. | 4 | * (steve@openssl.org) for the OpenSSL project 2014. |
| @@ -208,6 +208,7 @@ o2i_SCT(SCT **psct, const unsigned char **in, size_t len) | |||
| 208 | 208 | ||
| 209 | return sct; | 209 | return sct; |
| 210 | } | 210 | } |
| 211 | LCRYPTO_ALIAS(o2i_SCT); | ||
| 211 | 212 | ||
| 212 | int | 213 | int |
| 213 | i2o_SCT_signature(const SCT *sct, unsigned char **out) | 214 | i2o_SCT_signature(const SCT *sct, unsigned char **out) |
| @@ -314,6 +315,7 @@ i2o_SCT(const SCT *sct, unsigned char **out) | |||
| 314 | free(pstart); | 315 | free(pstart); |
| 315 | return -1; | 316 | return -1; |
| 316 | } | 317 | } |
| 318 | LCRYPTO_ALIAS(i2o_SCT); | ||
| 317 | 319 | ||
| 318 | STACK_OF(SCT) * | 320 | STACK_OF(SCT) * |
| 319 | o2i_SCT_LIST(STACK_OF(SCT) **out_scts, const unsigned char **pp, size_t len) | 321 | o2i_SCT_LIST(STACK_OF(SCT) **out_scts, const unsigned char **pp, size_t len) |
| @@ -366,6 +368,7 @@ o2i_SCT_LIST(STACK_OF(SCT) **out_scts, const unsigned char **pp, size_t len) | |||
| 366 | 368 | ||
| 367 | return NULL; | 369 | return NULL; |
| 368 | } | 370 | } |
| 371 | LCRYPTO_ALIAS(o2i_SCT_LIST); | ||
| 369 | 372 | ||
| 370 | int | 373 | int |
| 371 | i2o_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **pp) | 374 | i2o_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **pp) |
| @@ -422,6 +425,7 @@ i2o_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **pp) | |||
| 422 | } | 425 | } |
| 423 | return -1; | 426 | return -1; |
| 424 | } | 427 | } |
| 428 | LCRYPTO_ALIAS(i2o_SCT_LIST); | ||
| 425 | 429 | ||
| 426 | STACK_OF(SCT) * | 430 | STACK_OF(SCT) * |
| 427 | d2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, long len) | 431 | d2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, long len) |
| @@ -441,6 +445,7 @@ d2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, long len) | |||
| 441 | ASN1_OCTET_STRING_free(oct); | 445 | ASN1_OCTET_STRING_free(oct); |
| 442 | return sk; | 446 | return sk; |
| 443 | } | 447 | } |
| 448 | LCRYPTO_ALIAS(d2i_SCT_LIST); | ||
| 444 | 449 | ||
| 445 | int | 450 | int |
| 446 | i2d_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **out) | 451 | i2d_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **out) |
| @@ -456,3 +461,4 @@ i2d_SCT_LIST(const STACK_OF(SCT) *a, unsigned char **out) | |||
| 456 | free(oct.data); | 461 | free(oct.data); |
| 457 | return len; | 462 | return len; |
| 458 | } | 463 | } |
| 464 | LCRYPTO_ALIAS(i2d_SCT_LIST); | ||
diff --git a/src/lib/libcrypto/ct/ct_policy.c b/src/lib/libcrypto/ct/ct_policy.c index 2cb3e69333..eb2b312019 100644 --- a/src/lib/libcrypto/ct/ct_policy.c +++ b/src/lib/libcrypto/ct/ct_policy.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ct_policy.c,v 1.5 2021/12/18 16:34:52 tb Exp $ */ | 1 | /* $OpenBSD: ct_policy.c,v 1.6 2023/07/08 07:22:58 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Implementations of Certificate Transparency SCT policies. | 3 | * Implementations of Certificate Transparency SCT policies. |
| 4 | * Written by Rob Percival (robpercival@google.com) for the OpenSSL project. | 4 | * Written by Rob Percival (robpercival@google.com) for the OpenSSL project. |
| @@ -86,6 +86,7 @@ CT_POLICY_EVAL_CTX_new(void) | |||
| 86 | 86 | ||
| 87 | return ctx; | 87 | return ctx; |
| 88 | } | 88 | } |
| 89 | LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_new); | ||
| 89 | 90 | ||
| 90 | void | 91 | void |
| 91 | CT_POLICY_EVAL_CTX_free(CT_POLICY_EVAL_CTX *ctx) | 92 | CT_POLICY_EVAL_CTX_free(CT_POLICY_EVAL_CTX *ctx) |
| @@ -96,6 +97,7 @@ CT_POLICY_EVAL_CTX_free(CT_POLICY_EVAL_CTX *ctx) | |||
| 96 | X509_free(ctx->issuer); | 97 | X509_free(ctx->issuer); |
| 97 | free(ctx); | 98 | free(ctx); |
| 98 | } | 99 | } |
| 100 | LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_free); | ||
| 99 | 101 | ||
| 100 | int | 102 | int |
| 101 | CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert) | 103 | CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert) |
| @@ -105,6 +107,7 @@ CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert) | |||
| 105 | ctx->cert = cert; | 107 | ctx->cert = cert; |
| 106 | return 1; | 108 | return 1; |
| 107 | } | 109 | } |
| 110 | LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_set1_cert); | ||
| 108 | 111 | ||
| 109 | int | 112 | int |
| 110 | CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer) | 113 | CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer) |
| @@ -114,6 +117,7 @@ CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer) | |||
| 114 | ctx->issuer = issuer; | 117 | ctx->issuer = issuer; |
| 115 | return 1; | 118 | return 1; |
| 116 | } | 119 | } |
| 120 | LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_set1_issuer); | ||
| 117 | 121 | ||
| 118 | void | 122 | void |
| 119 | CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(CT_POLICY_EVAL_CTX *ctx, | 123 | CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(CT_POLICY_EVAL_CTX *ctx, |
| @@ -121,33 +125,39 @@ CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(CT_POLICY_EVAL_CTX *ctx, | |||
| 121 | { | 125 | { |
| 122 | ctx->log_store = log_store; | 126 | ctx->log_store = log_store; |
| 123 | } | 127 | } |
| 128 | LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE); | ||
| 124 | 129 | ||
| 125 | void | 130 | void |
| 126 | CT_POLICY_EVAL_CTX_set_time(CT_POLICY_EVAL_CTX *ctx, uint64_t time_in_ms) | 131 | CT_POLICY_EVAL_CTX_set_time(CT_POLICY_EVAL_CTX *ctx, uint64_t time_in_ms) |
| 127 | { | 132 | { |
| 128 | ctx->epoch_time_in_ms = time_in_ms; | 133 | ctx->epoch_time_in_ms = time_in_ms; |
| 129 | } | 134 | } |
| 135 | LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_set_time); | ||
| 130 | 136 | ||
| 131 | X509 * | 137 | X509 * |
| 132 | CT_POLICY_EVAL_CTX_get0_cert(const CT_POLICY_EVAL_CTX *ctx) | 138 | CT_POLICY_EVAL_CTX_get0_cert(const CT_POLICY_EVAL_CTX *ctx) |
| 133 | { | 139 | { |
| 134 | return ctx->cert; | 140 | return ctx->cert; |
| 135 | } | 141 | } |
| 142 | LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_get0_cert); | ||
| 136 | 143 | ||
| 137 | X509 * | 144 | X509 * |
| 138 | CT_POLICY_EVAL_CTX_get0_issuer(const CT_POLICY_EVAL_CTX *ctx) | 145 | CT_POLICY_EVAL_CTX_get0_issuer(const CT_POLICY_EVAL_CTX *ctx) |
| 139 | { | 146 | { |
| 140 | return ctx->issuer; | 147 | return ctx->issuer; |
| 141 | } | 148 | } |
| 149 | LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_get0_issuer); | ||
| 142 | 150 | ||
| 143 | const CTLOG_STORE * | 151 | const CTLOG_STORE * |
| 144 | CT_POLICY_EVAL_CTX_get0_log_store(const CT_POLICY_EVAL_CTX *ctx) | 152 | CT_POLICY_EVAL_CTX_get0_log_store(const CT_POLICY_EVAL_CTX *ctx) |
| 145 | { | 153 | { |
| 146 | return ctx->log_store; | 154 | return ctx->log_store; |
| 147 | } | 155 | } |
| 156 | LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_get0_log_store); | ||
| 148 | 157 | ||
| 149 | uint64_t | 158 | uint64_t |
| 150 | CT_POLICY_EVAL_CTX_get_time(const CT_POLICY_EVAL_CTX *ctx) | 159 | CT_POLICY_EVAL_CTX_get_time(const CT_POLICY_EVAL_CTX *ctx) |
| 151 | { | 160 | { |
| 152 | return ctx->epoch_time_in_ms; | 161 | return ctx->epoch_time_in_ms; |
| 153 | } | 162 | } |
| 163 | LCRYPTO_ALIAS(CT_POLICY_EVAL_CTX_get_time); | ||
diff --git a/src/lib/libcrypto/ct/ct_prn.c b/src/lib/libcrypto/ct/ct_prn.c index ea4f3b2474..e6931eeb09 100644 --- a/src/lib/libcrypto/ct/ct_prn.c +++ b/src/lib/libcrypto/ct/ct_prn.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ct_prn.c,v 1.6 2021/12/18 16:34:52 tb Exp $ */ | 1 | /* $OpenBSD: ct_prn.c,v 1.7 2023/07/08 07:22:58 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Written by Rob Stradling (rob@comodo.com) and Stephen Henson | 3 | * Written by Rob Stradling (rob@comodo.com) and Stephen Henson |
| 4 | * (steve@openssl.org) for the OpenSSL project 2014. | 4 | * (steve@openssl.org) for the OpenSSL project 2014. |
| @@ -146,6 +146,7 @@ SCT_validation_status_string(const SCT *sct) | |||
| 146 | } | 146 | } |
| 147 | return "unknown status"; | 147 | return "unknown status"; |
| 148 | } | 148 | } |
| 149 | LCRYPTO_ALIAS(SCT_validation_status_string); | ||
| 149 | 150 | ||
| 150 | void | 151 | void |
| 151 | SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *log_store) | 152 | SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *log_store) |
| @@ -190,6 +191,7 @@ SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *log_store) | |||
| 190 | BIO_printf(out, "\n%*s ", indent + 4, ""); | 191 | BIO_printf(out, "\n%*s ", indent + 4, ""); |
| 191 | BIO_hex_string(out, indent + 16, 16, sct->sig, sct->sig_len); | 192 | BIO_hex_string(out, indent + 16, 16, sct->sig, sct->sig_len); |
| 192 | } | 193 | } |
| 194 | LCRYPTO_ALIAS(SCT_print); | ||
| 193 | 195 | ||
| 194 | void | 196 | void |
| 195 | SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent, | 197 | SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent, |
| @@ -206,3 +208,4 @@ SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent, | |||
| 206 | BIO_printf(out, "%s", separator); | 208 | BIO_printf(out, "%s", separator); |
| 207 | } | 209 | } |
| 208 | } | 210 | } |
| 211 | LCRYPTO_ALIAS(SCT_LIST_print); | ||
diff --git a/src/lib/libcrypto/ct/ct_sct.c b/src/lib/libcrypto/ct/ct_sct.c index a05b0f92a2..16ee8d5576 100644 --- a/src/lib/libcrypto/ct/ct_sct.c +++ b/src/lib/libcrypto/ct/ct_sct.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ct_sct.c,v 1.8 2022/01/22 00:29:59 inoguchi Exp $ */ | 1 | /* $OpenBSD: ct_sct.c,v 1.9 2023/07/08 07:22:58 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Written by Rob Stradling (rob@comodo.com), Stephen Henson (steve@openssl.org) | 3 | * Written by Rob Stradling (rob@comodo.com), Stephen Henson (steve@openssl.org) |
| 4 | * and Adam Eijdenberg (adam.eijdenberg@gmail.com) for the OpenSSL project 2016. | 4 | * and Adam Eijdenberg (adam.eijdenberg@gmail.com) for the OpenSSL project 2016. |
| @@ -85,6 +85,7 @@ SCT_new(void) | |||
| 85 | sct->version = SCT_VERSION_NOT_SET; | 85 | sct->version = SCT_VERSION_NOT_SET; |
| 86 | return sct; | 86 | return sct; |
| 87 | } | 87 | } |
| 88 | LCRYPTO_ALIAS(SCT_new); | ||
| 88 | 89 | ||
| 89 | void | 90 | void |
| 90 | SCT_free(SCT *sct) | 91 | SCT_free(SCT *sct) |
| @@ -98,12 +99,14 @@ SCT_free(SCT *sct) | |||
| 98 | free(sct->sct); | 99 | free(sct->sct); |
| 99 | free(sct); | 100 | free(sct); |
| 100 | } | 101 | } |
| 102 | LCRYPTO_ALIAS(SCT_free); | ||
| 101 | 103 | ||
| 102 | void | 104 | void |
| 103 | SCT_LIST_free(STACK_OF(SCT) *scts) | 105 | SCT_LIST_free(STACK_OF(SCT) *scts) |
| 104 | { | 106 | { |
| 105 | sk_SCT_pop_free(scts, SCT_free); | 107 | sk_SCT_pop_free(scts, SCT_free); |
| 106 | } | 108 | } |
| 109 | LCRYPTO_ALIAS(SCT_LIST_free); | ||
| 107 | 110 | ||
| 108 | int | 111 | int |
| 109 | SCT_set_version(SCT *sct, sct_version_t version) | 112 | SCT_set_version(SCT *sct, sct_version_t version) |
| @@ -116,6 +119,7 @@ SCT_set_version(SCT *sct, sct_version_t version) | |||
| 116 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 119 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
| 117 | return 1; | 120 | return 1; |
| 118 | } | 121 | } |
| 122 | LCRYPTO_ALIAS(SCT_set_version); | ||
| 119 | 123 | ||
| 120 | int | 124 | int |
| 121 | SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type) | 125 | SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type) |
| @@ -133,6 +137,7 @@ SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type) | |||
| 133 | CTerror(CT_R_UNSUPPORTED_ENTRY_TYPE); | 137 | CTerror(CT_R_UNSUPPORTED_ENTRY_TYPE); |
| 134 | return 0; | 138 | return 0; |
| 135 | } | 139 | } |
| 140 | LCRYPTO_ALIAS(SCT_set_log_entry_type); | ||
| 136 | 141 | ||
| 137 | int | 142 | int |
| 138 | SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len) | 143 | SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len) |
| @@ -148,6 +153,7 @@ SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len) | |||
| 148 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 153 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
| 149 | return 1; | 154 | return 1; |
| 150 | } | 155 | } |
| 156 | LCRYPTO_ALIAS(SCT_set0_log_id); | ||
| 151 | 157 | ||
| 152 | int | 158 | int |
| 153 | SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len) | 159 | SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len) |
| @@ -173,6 +179,7 @@ SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len) | |||
| 173 | } | 179 | } |
| 174 | return 1; | 180 | return 1; |
| 175 | } | 181 | } |
| 182 | LCRYPTO_ALIAS(SCT_set1_log_id); | ||
| 176 | 183 | ||
| 177 | 184 | ||
| 178 | void | 185 | void |
| @@ -181,6 +188,7 @@ SCT_set_timestamp(SCT *sct, uint64_t timestamp) | |||
| 181 | sct->timestamp = timestamp; | 188 | sct->timestamp = timestamp; |
| 182 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 189 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
| 183 | } | 190 | } |
| 191 | LCRYPTO_ALIAS(SCT_set_timestamp); | ||
| 184 | 192 | ||
| 185 | int | 193 | int |
| 186 | SCT_set_signature_nid(SCT *sct, int nid) | 194 | SCT_set_signature_nid(SCT *sct, int nid) |
| @@ -201,6 +209,7 @@ SCT_set_signature_nid(SCT *sct, int nid) | |||
| 201 | return 0; | 209 | return 0; |
| 202 | } | 210 | } |
| 203 | } | 211 | } |
| 212 | LCRYPTO_ALIAS(SCT_set_signature_nid); | ||
| 204 | 213 | ||
| 205 | void | 214 | void |
| 206 | SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len) | 215 | SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len) |
| @@ -210,6 +219,7 @@ SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len) | |||
| 210 | sct->ext_len = ext_len; | 219 | sct->ext_len = ext_len; |
| 211 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 220 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
| 212 | } | 221 | } |
| 222 | LCRYPTO_ALIAS(SCT_set0_extensions); | ||
| 213 | 223 | ||
| 214 | int | 224 | int |
| 215 | SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len) | 225 | SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len) |
| @@ -230,6 +240,7 @@ SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len) | |||
| 230 | } | 240 | } |
| 231 | return 1; | 241 | return 1; |
| 232 | } | 242 | } |
| 243 | LCRYPTO_ALIAS(SCT_set1_extensions); | ||
| 233 | 244 | ||
| 234 | void | 245 | void |
| 235 | SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) | 246 | SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) |
| @@ -239,6 +250,7 @@ SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len) | |||
| 239 | sct->sig_len = sig_len; | 250 | sct->sig_len = sig_len; |
| 240 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; | 251 | sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET; |
| 241 | } | 252 | } |
| 253 | LCRYPTO_ALIAS(SCT_set0_signature); | ||
| 242 | 254 | ||
| 243 | int | 255 | int |
| 244 | SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) | 256 | SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) |
| @@ -259,18 +271,21 @@ SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len) | |||
| 259 | } | 271 | } |
| 260 | return 1; | 272 | return 1; |
| 261 | } | 273 | } |
| 274 | LCRYPTO_ALIAS(SCT_set1_signature); | ||
| 262 | 275 | ||
| 263 | sct_version_t | 276 | sct_version_t |
| 264 | SCT_get_version(const SCT *sct) | 277 | SCT_get_version(const SCT *sct) |
| 265 | { | 278 | { |
| 266 | return sct->version; | 279 | return sct->version; |
| 267 | } | 280 | } |
| 281 | LCRYPTO_ALIAS(SCT_get_version); | ||
| 268 | 282 | ||
| 269 | ct_log_entry_type_t | 283 | ct_log_entry_type_t |
| 270 | SCT_get_log_entry_type(const SCT *sct) | 284 | SCT_get_log_entry_type(const SCT *sct) |
| 271 | { | 285 | { |
| 272 | return sct->entry_type; | 286 | return sct->entry_type; |
| 273 | } | 287 | } |
| 288 | LCRYPTO_ALIAS(SCT_get_log_entry_type); | ||
| 274 | 289 | ||
| 275 | size_t | 290 | size_t |
| 276 | SCT_get0_log_id(const SCT *sct, unsigned char **log_id) | 291 | SCT_get0_log_id(const SCT *sct, unsigned char **log_id) |
| @@ -278,12 +293,14 @@ SCT_get0_log_id(const SCT *sct, unsigned char **log_id) | |||
| 278 | *log_id = sct->log_id; | 293 | *log_id = sct->log_id; |
| 279 | return sct->log_id_len; | 294 | return sct->log_id_len; |
| 280 | } | 295 | } |
| 296 | LCRYPTO_ALIAS(SCT_get0_log_id); | ||
| 281 | 297 | ||
| 282 | uint64_t | 298 | uint64_t |
| 283 | SCT_get_timestamp(const SCT *sct) | 299 | SCT_get_timestamp(const SCT *sct) |
| 284 | { | 300 | { |
| 285 | return sct->timestamp; | 301 | return sct->timestamp; |
| 286 | } | 302 | } |
| 303 | LCRYPTO_ALIAS(SCT_get_timestamp); | ||
| 287 | 304 | ||
| 288 | int | 305 | int |
| 289 | SCT_get_signature_nid(const SCT *sct) | 306 | SCT_get_signature_nid(const SCT *sct) |
| @@ -303,6 +320,7 @@ SCT_get_signature_nid(const SCT *sct) | |||
| 303 | } | 320 | } |
| 304 | return NID_undef; | 321 | return NID_undef; |
| 305 | } | 322 | } |
| 323 | LCRYPTO_ALIAS(SCT_get_signature_nid); | ||
| 306 | 324 | ||
| 307 | size_t | 325 | size_t |
| 308 | SCT_get0_extensions(const SCT *sct, unsigned char **ext) | 326 | SCT_get0_extensions(const SCT *sct, unsigned char **ext) |
| @@ -310,6 +328,7 @@ SCT_get0_extensions(const SCT *sct, unsigned char **ext) | |||
| 310 | *ext = sct->ext; | 328 | *ext = sct->ext; |
| 311 | return sct->ext_len; | 329 | return sct->ext_len; |
| 312 | } | 330 | } |
| 331 | LCRYPTO_ALIAS(SCT_get0_extensions); | ||
| 313 | 332 | ||
| 314 | size_t | 333 | size_t |
| 315 | SCT_get0_signature(const SCT *sct, unsigned char **sig) | 334 | SCT_get0_signature(const SCT *sct, unsigned char **sig) |
| @@ -317,6 +336,7 @@ SCT_get0_signature(const SCT *sct, unsigned char **sig) | |||
| 317 | *sig = sct->sig; | 336 | *sig = sct->sig; |
| 318 | return sct->sig_len; | 337 | return sct->sig_len; |
| 319 | } | 338 | } |
| 339 | LCRYPTO_ALIAS(SCT_get0_signature); | ||
| 320 | 340 | ||
| 321 | int | 341 | int |
| 322 | SCT_is_complete(const SCT *sct) | 342 | SCT_is_complete(const SCT *sct) |
| @@ -343,6 +363,7 @@ SCT_get_source(const SCT *sct) | |||
| 343 | { | 363 | { |
| 344 | return sct->source; | 364 | return sct->source; |
| 345 | } | 365 | } |
| 366 | LCRYPTO_ALIAS(SCT_get_source); | ||
| 346 | 367 | ||
| 347 | int | 368 | int |
| 348 | SCT_set_source(SCT *sct, sct_source_t source) | 369 | SCT_set_source(SCT *sct, sct_source_t source) |
| @@ -361,12 +382,14 @@ SCT_set_source(SCT *sct, sct_source_t source) | |||
| 361 | /* if we aren't sure, leave the log entry type alone */ | 382 | /* if we aren't sure, leave the log entry type alone */ |
| 362 | return 1; | 383 | return 1; |
| 363 | } | 384 | } |
| 385 | LCRYPTO_ALIAS(SCT_set_source); | ||
| 364 | 386 | ||
| 365 | sct_validation_status_t | 387 | sct_validation_status_t |
| 366 | SCT_get_validation_status(const SCT *sct) | 388 | SCT_get_validation_status(const SCT *sct) |
| 367 | { | 389 | { |
| 368 | return sct->validation_status; | 390 | return sct->validation_status; |
| 369 | } | 391 | } |
| 392 | LCRYPTO_ALIAS(SCT_get_validation_status); | ||
| 370 | 393 | ||
| 371 | int | 394 | int |
| 372 | SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx) | 395 | SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx) |
| @@ -455,6 +478,7 @@ SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx) | |||
| 455 | 478 | ||
| 456 | return is_sct_valid; | 479 | return is_sct_valid; |
| 457 | } | 480 | } |
| 481 | LCRYPTO_ALIAS(SCT_validate); | ||
| 458 | 482 | ||
| 459 | int | 483 | int |
| 460 | SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) | 484 | SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) |
| @@ -478,3 +502,4 @@ SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx) | |||
| 478 | 502 | ||
| 479 | return are_scts_valid; | 503 | return are_scts_valid; |
| 480 | } | 504 | } |
| 505 | LCRYPTO_ALIAS(SCT_LIST_validate); | ||
