diff options
Diffstat (limited to 'src/lib/libcrypto/ts/ts_asn1.c')
-rw-r--r-- | src/lib/libcrypto/ts/ts_asn1.c | 64 |
1 files changed, 63 insertions, 1 deletions
diff --git a/src/lib/libcrypto/ts/ts_asn1.c b/src/lib/libcrypto/ts/ts_asn1.c index 6537f1c85a..60ee0b81cb 100644 --- a/src/lib/libcrypto/ts/ts_asn1.c +++ b/src/lib/libcrypto/ts/ts_asn1.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ts_asn1.c,v 1.13 2022/07/24 08:16:47 tb Exp $ */ | 1 | /* $OpenBSD: ts_asn1.c,v 1.14 2023/07/07 07:25:21 beck Exp $ */ |
2 | /* Written by Nils Larsch for the OpenSSL project 2004. | 2 | /* Written by Nils Larsch for the OpenSSL project 2004. |
3 | */ | 3 | */ |
4 | /* ==================================================================== | 4 | /* ==================================================================== |
@@ -97,30 +97,35 @@ d2i_TS_MSG_IMPRINT(TS_MSG_IMPRINT **a, const unsigned char **in, long len) | |||
97 | return (TS_MSG_IMPRINT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 97 | return (TS_MSG_IMPRINT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
98 | &TS_MSG_IMPRINT_it); | 98 | &TS_MSG_IMPRINT_it); |
99 | } | 99 | } |
100 | LCRYPTO_ALIAS(d2i_TS_MSG_IMPRINT); | ||
100 | 101 | ||
101 | int | 102 | int |
102 | i2d_TS_MSG_IMPRINT(const TS_MSG_IMPRINT *a, unsigned char **out) | 103 | i2d_TS_MSG_IMPRINT(const TS_MSG_IMPRINT *a, unsigned char **out) |
103 | { | 104 | { |
104 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &TS_MSG_IMPRINT_it); | 105 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &TS_MSG_IMPRINT_it); |
105 | } | 106 | } |
107 | LCRYPTO_ALIAS(i2d_TS_MSG_IMPRINT); | ||
106 | 108 | ||
107 | TS_MSG_IMPRINT * | 109 | TS_MSG_IMPRINT * |
108 | TS_MSG_IMPRINT_new(void) | 110 | TS_MSG_IMPRINT_new(void) |
109 | { | 111 | { |
110 | return (TS_MSG_IMPRINT *)ASN1_item_new(&TS_MSG_IMPRINT_it); | 112 | return (TS_MSG_IMPRINT *)ASN1_item_new(&TS_MSG_IMPRINT_it); |
111 | } | 113 | } |
114 | LCRYPTO_ALIAS(TS_MSG_IMPRINT_new); | ||
112 | 115 | ||
113 | void | 116 | void |
114 | TS_MSG_IMPRINT_free(TS_MSG_IMPRINT *a) | 117 | TS_MSG_IMPRINT_free(TS_MSG_IMPRINT *a) |
115 | { | 118 | { |
116 | ASN1_item_free((ASN1_VALUE *)a, &TS_MSG_IMPRINT_it); | 119 | ASN1_item_free((ASN1_VALUE *)a, &TS_MSG_IMPRINT_it); |
117 | } | 120 | } |
121 | LCRYPTO_ALIAS(TS_MSG_IMPRINT_free); | ||
118 | 122 | ||
119 | TS_MSG_IMPRINT * | 123 | TS_MSG_IMPRINT * |
120 | TS_MSG_IMPRINT_dup(TS_MSG_IMPRINT *x) | 124 | TS_MSG_IMPRINT_dup(TS_MSG_IMPRINT *x) |
121 | { | 125 | { |
122 | return ASN1_item_dup(&TS_MSG_IMPRINT_it, x); | 126 | return ASN1_item_dup(&TS_MSG_IMPRINT_it, x); |
123 | } | 127 | } |
128 | LCRYPTO_ALIAS(TS_MSG_IMPRINT_dup); | ||
124 | 129 | ||
125 | #ifndef OPENSSL_NO_BIO | 130 | #ifndef OPENSSL_NO_BIO |
126 | TS_MSG_IMPRINT * | 131 | TS_MSG_IMPRINT * |
@@ -128,12 +133,14 @@ d2i_TS_MSG_IMPRINT_bio(BIO *bp, TS_MSG_IMPRINT **a) | |||
128 | { | 133 | { |
129 | return ASN1_item_d2i_bio(&TS_MSG_IMPRINT_it, bp, a); | 134 | return ASN1_item_d2i_bio(&TS_MSG_IMPRINT_it, bp, a); |
130 | } | 135 | } |
136 | LCRYPTO_ALIAS(d2i_TS_MSG_IMPRINT_bio); | ||
131 | 137 | ||
132 | int | 138 | int |
133 | i2d_TS_MSG_IMPRINT_bio(BIO *bp, TS_MSG_IMPRINT *a) | 139 | i2d_TS_MSG_IMPRINT_bio(BIO *bp, TS_MSG_IMPRINT *a) |
134 | { | 140 | { |
135 | return ASN1_item_i2d_bio(&TS_MSG_IMPRINT_it, bp, a); | 141 | return ASN1_item_i2d_bio(&TS_MSG_IMPRINT_it, bp, a); |
136 | } | 142 | } |
143 | LCRYPTO_ALIAS(i2d_TS_MSG_IMPRINT_bio); | ||
137 | #endif | 144 | #endif |
138 | 145 | ||
139 | TS_MSG_IMPRINT * | 146 | TS_MSG_IMPRINT * |
@@ -141,12 +148,14 @@ d2i_TS_MSG_IMPRINT_fp(FILE *fp, TS_MSG_IMPRINT **a) | |||
141 | { | 148 | { |
142 | return ASN1_item_d2i_fp(&TS_MSG_IMPRINT_it, fp, a); | 149 | return ASN1_item_d2i_fp(&TS_MSG_IMPRINT_it, fp, a); |
143 | } | 150 | } |
151 | LCRYPTO_ALIAS(d2i_TS_MSG_IMPRINT_fp); | ||
144 | 152 | ||
145 | int | 153 | int |
146 | i2d_TS_MSG_IMPRINT_fp(FILE *fp, TS_MSG_IMPRINT *a) | 154 | i2d_TS_MSG_IMPRINT_fp(FILE *fp, TS_MSG_IMPRINT *a) |
147 | { | 155 | { |
148 | return ASN1_item_i2d_fp(&TS_MSG_IMPRINT_it, fp, a); | 156 | return ASN1_item_i2d_fp(&TS_MSG_IMPRINT_it, fp, a); |
149 | } | 157 | } |
158 | LCRYPTO_ALIAS(i2d_TS_MSG_IMPRINT_fp); | ||
150 | 159 | ||
151 | static const ASN1_TEMPLATE TS_REQ_seq_tt[] = { | 160 | static const ASN1_TEMPLATE TS_REQ_seq_tt[] = { |
152 | { | 161 | { |
@@ -210,30 +219,35 @@ d2i_TS_REQ(TS_REQ **a, const unsigned char **in, long len) | |||
210 | return (TS_REQ *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 219 | return (TS_REQ *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
211 | &TS_REQ_it); | 220 | &TS_REQ_it); |
212 | } | 221 | } |
222 | LCRYPTO_ALIAS(d2i_TS_REQ); | ||
213 | 223 | ||
214 | int | 224 | int |
215 | i2d_TS_REQ(const TS_REQ *a, unsigned char **out) | 225 | i2d_TS_REQ(const TS_REQ *a, unsigned char **out) |
216 | { | 226 | { |
217 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &TS_REQ_it); | 227 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &TS_REQ_it); |
218 | } | 228 | } |
229 | LCRYPTO_ALIAS(i2d_TS_REQ); | ||
219 | 230 | ||
220 | TS_REQ * | 231 | TS_REQ * |
221 | TS_REQ_new(void) | 232 | TS_REQ_new(void) |
222 | { | 233 | { |
223 | return (TS_REQ *)ASN1_item_new(&TS_REQ_it); | 234 | return (TS_REQ *)ASN1_item_new(&TS_REQ_it); |
224 | } | 235 | } |
236 | LCRYPTO_ALIAS(TS_REQ_new); | ||
225 | 237 | ||
226 | void | 238 | void |
227 | TS_REQ_free(TS_REQ *a) | 239 | TS_REQ_free(TS_REQ *a) |
228 | { | 240 | { |
229 | ASN1_item_free((ASN1_VALUE *)a, &TS_REQ_it); | 241 | ASN1_item_free((ASN1_VALUE *)a, &TS_REQ_it); |
230 | } | 242 | } |
243 | LCRYPTO_ALIAS(TS_REQ_free); | ||
231 | 244 | ||
232 | TS_REQ * | 245 | TS_REQ * |
233 | TS_REQ_dup(TS_REQ *x) | 246 | TS_REQ_dup(TS_REQ *x) |
234 | { | 247 | { |
235 | return ASN1_item_dup(&TS_REQ_it, x); | 248 | return ASN1_item_dup(&TS_REQ_it, x); |
236 | } | 249 | } |
250 | LCRYPTO_ALIAS(TS_REQ_dup); | ||
237 | 251 | ||
238 | #ifndef OPENSSL_NO_BIO | 252 | #ifndef OPENSSL_NO_BIO |
239 | TS_REQ * | 253 | TS_REQ * |
@@ -241,12 +255,14 @@ d2i_TS_REQ_bio(BIO *bp, TS_REQ **a) | |||
241 | { | 255 | { |
242 | return ASN1_item_d2i_bio(&TS_REQ_it, bp, a); | 256 | return ASN1_item_d2i_bio(&TS_REQ_it, bp, a); |
243 | } | 257 | } |
258 | LCRYPTO_ALIAS(d2i_TS_REQ_bio); | ||
244 | 259 | ||
245 | int | 260 | int |
246 | i2d_TS_REQ_bio(BIO *bp, TS_REQ *a) | 261 | i2d_TS_REQ_bio(BIO *bp, TS_REQ *a) |
247 | { | 262 | { |
248 | return ASN1_item_i2d_bio(&TS_REQ_it, bp, a); | 263 | return ASN1_item_i2d_bio(&TS_REQ_it, bp, a); |
249 | } | 264 | } |
265 | LCRYPTO_ALIAS(i2d_TS_REQ_bio); | ||
250 | #endif | 266 | #endif |
251 | 267 | ||
252 | TS_REQ * | 268 | TS_REQ * |
@@ -254,12 +270,14 @@ d2i_TS_REQ_fp(FILE *fp, TS_REQ **a) | |||
254 | { | 270 | { |
255 | return ASN1_item_d2i_fp(&TS_REQ_it, fp, a); | 271 | return ASN1_item_d2i_fp(&TS_REQ_it, fp, a); |
256 | } | 272 | } |
273 | LCRYPTO_ALIAS(d2i_TS_REQ_fp); | ||
257 | 274 | ||
258 | int | 275 | int |
259 | i2d_TS_REQ_fp(FILE *fp, TS_REQ *a) | 276 | i2d_TS_REQ_fp(FILE *fp, TS_REQ *a) |
260 | { | 277 | { |
261 | return ASN1_item_i2d_fp(&TS_REQ_it, fp, a); | 278 | return ASN1_item_i2d_fp(&TS_REQ_it, fp, a); |
262 | } | 279 | } |
280 | LCRYPTO_ALIAS(i2d_TS_REQ_fp); | ||
263 | 281 | ||
264 | static const ASN1_TEMPLATE TS_ACCURACY_seq_tt[] = { | 282 | static const ASN1_TEMPLATE TS_ACCURACY_seq_tt[] = { |
265 | { | 283 | { |
@@ -302,30 +320,35 @@ d2i_TS_ACCURACY(TS_ACCURACY **a, const unsigned char **in, long len) | |||
302 | return (TS_ACCURACY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 320 | return (TS_ACCURACY *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
303 | &TS_ACCURACY_it); | 321 | &TS_ACCURACY_it); |
304 | } | 322 | } |
323 | LCRYPTO_ALIAS(d2i_TS_ACCURACY); | ||
305 | 324 | ||
306 | int | 325 | int |
307 | i2d_TS_ACCURACY(const TS_ACCURACY *a, unsigned char **out) | 326 | i2d_TS_ACCURACY(const TS_ACCURACY *a, unsigned char **out) |
308 | { | 327 | { |
309 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &TS_ACCURACY_it); | 328 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &TS_ACCURACY_it); |
310 | } | 329 | } |
330 | LCRYPTO_ALIAS(i2d_TS_ACCURACY); | ||
311 | 331 | ||
312 | TS_ACCURACY * | 332 | TS_ACCURACY * |
313 | TS_ACCURACY_new(void) | 333 | TS_ACCURACY_new(void) |
314 | { | 334 | { |
315 | return (TS_ACCURACY *)ASN1_item_new(&TS_ACCURACY_it); | 335 | return (TS_ACCURACY *)ASN1_item_new(&TS_ACCURACY_it); |
316 | } | 336 | } |
337 | LCRYPTO_ALIAS(TS_ACCURACY_new); | ||
317 | 338 | ||
318 | void | 339 | void |
319 | TS_ACCURACY_free(TS_ACCURACY *a) | 340 | TS_ACCURACY_free(TS_ACCURACY *a) |
320 | { | 341 | { |
321 | ASN1_item_free((ASN1_VALUE *)a, &TS_ACCURACY_it); | 342 | ASN1_item_free((ASN1_VALUE *)a, &TS_ACCURACY_it); |
322 | } | 343 | } |
344 | LCRYPTO_ALIAS(TS_ACCURACY_free); | ||
323 | 345 | ||
324 | TS_ACCURACY * | 346 | TS_ACCURACY * |
325 | TS_ACCURACY_dup(TS_ACCURACY *x) | 347 | TS_ACCURACY_dup(TS_ACCURACY *x) |
326 | { | 348 | { |
327 | return ASN1_item_dup(&TS_ACCURACY_it, x); | 349 | return ASN1_item_dup(&TS_ACCURACY_it, x); |
328 | } | 350 | } |
351 | LCRYPTO_ALIAS(TS_ACCURACY_dup); | ||
329 | 352 | ||
330 | static const ASN1_TEMPLATE TS_TST_INFO_seq_tt[] = { | 353 | static const ASN1_TEMPLATE TS_TST_INFO_seq_tt[] = { |
331 | { | 354 | { |
@@ -417,30 +440,35 @@ d2i_TS_TST_INFO(TS_TST_INFO **a, const unsigned char **in, long len) | |||
417 | return (TS_TST_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 440 | return (TS_TST_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
418 | &TS_TST_INFO_it); | 441 | &TS_TST_INFO_it); |
419 | } | 442 | } |
443 | LCRYPTO_ALIAS(d2i_TS_TST_INFO); | ||
420 | 444 | ||
421 | int | 445 | int |
422 | i2d_TS_TST_INFO(const TS_TST_INFO *a, unsigned char **out) | 446 | i2d_TS_TST_INFO(const TS_TST_INFO *a, unsigned char **out) |
423 | { | 447 | { |
424 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &TS_TST_INFO_it); | 448 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &TS_TST_INFO_it); |
425 | } | 449 | } |
450 | LCRYPTO_ALIAS(i2d_TS_TST_INFO); | ||
426 | 451 | ||
427 | TS_TST_INFO * | 452 | TS_TST_INFO * |
428 | TS_TST_INFO_new(void) | 453 | TS_TST_INFO_new(void) |
429 | { | 454 | { |
430 | return (TS_TST_INFO *)ASN1_item_new(&TS_TST_INFO_it); | 455 | return (TS_TST_INFO *)ASN1_item_new(&TS_TST_INFO_it); |
431 | } | 456 | } |
457 | LCRYPTO_ALIAS(TS_TST_INFO_new); | ||
432 | 458 | ||
433 | void | 459 | void |
434 | TS_TST_INFO_free(TS_TST_INFO *a) | 460 | TS_TST_INFO_free(TS_TST_INFO *a) |
435 | { | 461 | { |
436 | ASN1_item_free((ASN1_VALUE *)a, &TS_TST_INFO_it); | 462 | ASN1_item_free((ASN1_VALUE *)a, &TS_TST_INFO_it); |
437 | } | 463 | } |
464 | LCRYPTO_ALIAS(TS_TST_INFO_free); | ||
438 | 465 | ||
439 | TS_TST_INFO * | 466 | TS_TST_INFO * |
440 | TS_TST_INFO_dup(TS_TST_INFO *x) | 467 | TS_TST_INFO_dup(TS_TST_INFO *x) |
441 | { | 468 | { |
442 | return ASN1_item_dup(&TS_TST_INFO_it, x); | 469 | return ASN1_item_dup(&TS_TST_INFO_it, x); |
443 | } | 470 | } |
471 | LCRYPTO_ALIAS(TS_TST_INFO_dup); | ||
444 | 472 | ||
445 | #ifndef OPENSSL_NO_BIO | 473 | #ifndef OPENSSL_NO_BIO |
446 | TS_TST_INFO * | 474 | TS_TST_INFO * |
@@ -448,12 +476,14 @@ d2i_TS_TST_INFO_bio(BIO *bp, TS_TST_INFO **a) | |||
448 | { | 476 | { |
449 | return ASN1_item_d2i_bio(&TS_TST_INFO_it, bp, a); | 477 | return ASN1_item_d2i_bio(&TS_TST_INFO_it, bp, a); |
450 | } | 478 | } |
479 | LCRYPTO_ALIAS(d2i_TS_TST_INFO_bio); | ||
451 | 480 | ||
452 | int | 481 | int |
453 | i2d_TS_TST_INFO_bio(BIO *bp, TS_TST_INFO *a) | 482 | i2d_TS_TST_INFO_bio(BIO *bp, TS_TST_INFO *a) |
454 | { | 483 | { |
455 | return ASN1_item_i2d_bio(&TS_TST_INFO_it, bp, a); | 484 | return ASN1_item_i2d_bio(&TS_TST_INFO_it, bp, a); |
456 | } | 485 | } |
486 | LCRYPTO_ALIAS(i2d_TS_TST_INFO_bio); | ||
457 | #endif | 487 | #endif |
458 | 488 | ||
459 | TS_TST_INFO * | 489 | TS_TST_INFO * |
@@ -461,12 +491,14 @@ d2i_TS_TST_INFO_fp(FILE *fp, TS_TST_INFO **a) | |||
461 | { | 491 | { |
462 | return ASN1_item_d2i_fp(&TS_TST_INFO_it, fp, a); | 492 | return ASN1_item_d2i_fp(&TS_TST_INFO_it, fp, a); |
463 | } | 493 | } |
494 | LCRYPTO_ALIAS(d2i_TS_TST_INFO_fp); | ||
464 | 495 | ||
465 | int | 496 | int |
466 | i2d_TS_TST_INFO_fp(FILE *fp, TS_TST_INFO *a) | 497 | i2d_TS_TST_INFO_fp(FILE *fp, TS_TST_INFO *a) |
467 | { | 498 | { |
468 | return ASN1_item_i2d_fp(&TS_TST_INFO_it, fp, a); | 499 | return ASN1_item_i2d_fp(&TS_TST_INFO_it, fp, a); |
469 | } | 500 | } |
501 | LCRYPTO_ALIAS(i2d_TS_TST_INFO_fp); | ||
470 | 502 | ||
471 | static const ASN1_TEMPLATE TS_STATUS_INFO_seq_tt[] = { | 503 | static const ASN1_TEMPLATE TS_STATUS_INFO_seq_tt[] = { |
472 | { | 504 | { |
@@ -509,30 +541,35 @@ d2i_TS_STATUS_INFO(TS_STATUS_INFO **a, const unsigned char **in, long len) | |||
509 | return (TS_STATUS_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 541 | return (TS_STATUS_INFO *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
510 | &TS_STATUS_INFO_it); | 542 | &TS_STATUS_INFO_it); |
511 | } | 543 | } |
544 | LCRYPTO_ALIAS(d2i_TS_STATUS_INFO); | ||
512 | 545 | ||
513 | int | 546 | int |
514 | i2d_TS_STATUS_INFO(const TS_STATUS_INFO *a, unsigned char **out) | 547 | i2d_TS_STATUS_INFO(const TS_STATUS_INFO *a, unsigned char **out) |
515 | { | 548 | { |
516 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &TS_STATUS_INFO_it); | 549 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &TS_STATUS_INFO_it); |
517 | } | 550 | } |
551 | LCRYPTO_ALIAS(i2d_TS_STATUS_INFO); | ||
518 | 552 | ||
519 | TS_STATUS_INFO * | 553 | TS_STATUS_INFO * |
520 | TS_STATUS_INFO_new(void) | 554 | TS_STATUS_INFO_new(void) |
521 | { | 555 | { |
522 | return (TS_STATUS_INFO *)ASN1_item_new(&TS_STATUS_INFO_it); | 556 | return (TS_STATUS_INFO *)ASN1_item_new(&TS_STATUS_INFO_it); |
523 | } | 557 | } |
558 | LCRYPTO_ALIAS(TS_STATUS_INFO_new); | ||
524 | 559 | ||
525 | void | 560 | void |
526 | TS_STATUS_INFO_free(TS_STATUS_INFO *a) | 561 | TS_STATUS_INFO_free(TS_STATUS_INFO *a) |
527 | { | 562 | { |
528 | ASN1_item_free((ASN1_VALUE *)a, &TS_STATUS_INFO_it); | 563 | ASN1_item_free((ASN1_VALUE *)a, &TS_STATUS_INFO_it); |
529 | } | 564 | } |
565 | LCRYPTO_ALIAS(TS_STATUS_INFO_free); | ||
530 | 566 | ||
531 | TS_STATUS_INFO * | 567 | TS_STATUS_INFO * |
532 | TS_STATUS_INFO_dup(TS_STATUS_INFO *x) | 568 | TS_STATUS_INFO_dup(TS_STATUS_INFO *x) |
533 | { | 569 | { |
534 | return ASN1_item_dup(&TS_STATUS_INFO_it, x); | 570 | return ASN1_item_dup(&TS_STATUS_INFO_it, x); |
535 | } | 571 | } |
572 | LCRYPTO_ALIAS(TS_STATUS_INFO_dup); | ||
536 | 573 | ||
537 | static int | 574 | static int |
538 | ts_resp_set_tst_info(TS_RESP *a) | 575 | ts_resp_set_tst_info(TS_RESP *a) |
@@ -620,30 +657,35 @@ d2i_TS_RESP(TS_RESP **a, const unsigned char **in, long len) | |||
620 | return (TS_RESP *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 657 | return (TS_RESP *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
621 | &TS_RESP_it); | 658 | &TS_RESP_it); |
622 | } | 659 | } |
660 | LCRYPTO_ALIAS(d2i_TS_RESP); | ||
623 | 661 | ||
624 | int | 662 | int |
625 | i2d_TS_RESP(const TS_RESP *a, unsigned char **out) | 663 | i2d_TS_RESP(const TS_RESP *a, unsigned char **out) |
626 | { | 664 | { |
627 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &TS_RESP_it); | 665 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &TS_RESP_it); |
628 | } | 666 | } |
667 | LCRYPTO_ALIAS(i2d_TS_RESP); | ||
629 | 668 | ||
630 | TS_RESP * | 669 | TS_RESP * |
631 | TS_RESP_new(void) | 670 | TS_RESP_new(void) |
632 | { | 671 | { |
633 | return (TS_RESP *)ASN1_item_new(&TS_RESP_it); | 672 | return (TS_RESP *)ASN1_item_new(&TS_RESP_it); |
634 | } | 673 | } |
674 | LCRYPTO_ALIAS(TS_RESP_new); | ||
635 | 675 | ||
636 | void | 676 | void |
637 | TS_RESP_free(TS_RESP *a) | 677 | TS_RESP_free(TS_RESP *a) |
638 | { | 678 | { |
639 | ASN1_item_free((ASN1_VALUE *)a, &TS_RESP_it); | 679 | ASN1_item_free((ASN1_VALUE *)a, &TS_RESP_it); |
640 | } | 680 | } |
681 | LCRYPTO_ALIAS(TS_RESP_free); | ||
641 | 682 | ||
642 | TS_RESP * | 683 | TS_RESP * |
643 | TS_RESP_dup(TS_RESP *x) | 684 | TS_RESP_dup(TS_RESP *x) |
644 | { | 685 | { |
645 | return ASN1_item_dup(&TS_RESP_it, x); | 686 | return ASN1_item_dup(&TS_RESP_it, x); |
646 | } | 687 | } |
688 | LCRYPTO_ALIAS(TS_RESP_dup); | ||
647 | 689 | ||
648 | #ifndef OPENSSL_NO_BIO | 690 | #ifndef OPENSSL_NO_BIO |
649 | TS_RESP * | 691 | TS_RESP * |
@@ -651,12 +693,14 @@ d2i_TS_RESP_bio(BIO *bp, TS_RESP **a) | |||
651 | { | 693 | { |
652 | return ASN1_item_d2i_bio(&TS_RESP_it, bp, a); | 694 | return ASN1_item_d2i_bio(&TS_RESP_it, bp, a); |
653 | } | 695 | } |
696 | LCRYPTO_ALIAS(d2i_TS_RESP_bio); | ||
654 | 697 | ||
655 | int | 698 | int |
656 | i2d_TS_RESP_bio(BIO *bp, TS_RESP *a) | 699 | i2d_TS_RESP_bio(BIO *bp, TS_RESP *a) |
657 | { | 700 | { |
658 | return ASN1_item_i2d_bio(&TS_RESP_it, bp, a); | 701 | return ASN1_item_i2d_bio(&TS_RESP_it, bp, a); |
659 | } | 702 | } |
703 | LCRYPTO_ALIAS(i2d_TS_RESP_bio); | ||
660 | #endif | 704 | #endif |
661 | 705 | ||
662 | TS_RESP * | 706 | TS_RESP * |
@@ -664,12 +708,14 @@ d2i_TS_RESP_fp(FILE *fp, TS_RESP **a) | |||
664 | { | 708 | { |
665 | return ASN1_item_d2i_fp(&TS_RESP_it, fp, a); | 709 | return ASN1_item_d2i_fp(&TS_RESP_it, fp, a); |
666 | } | 710 | } |
711 | LCRYPTO_ALIAS(d2i_TS_RESP_fp); | ||
667 | 712 | ||
668 | int | 713 | int |
669 | i2d_TS_RESP_fp(FILE *fp, TS_RESP *a) | 714 | i2d_TS_RESP_fp(FILE *fp, TS_RESP *a) |
670 | { | 715 | { |
671 | return ASN1_item_i2d_fp(&TS_RESP_it, fp, a); | 716 | return ASN1_item_i2d_fp(&TS_RESP_it, fp, a); |
672 | } | 717 | } |
718 | LCRYPTO_ALIAS(i2d_TS_RESP_fp); | ||
673 | 719 | ||
674 | static const ASN1_TEMPLATE ESS_ISSUER_SERIAL_seq_tt[] = { | 720 | static const ASN1_TEMPLATE ESS_ISSUER_SERIAL_seq_tt[] = { |
675 | { | 721 | { |
@@ -705,30 +751,35 @@ d2i_ESS_ISSUER_SERIAL(ESS_ISSUER_SERIAL **a, const unsigned char **in, long len) | |||
705 | return (ESS_ISSUER_SERIAL *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 751 | return (ESS_ISSUER_SERIAL *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
706 | &ESS_ISSUER_SERIAL_it); | 752 | &ESS_ISSUER_SERIAL_it); |
707 | } | 753 | } |
754 | LCRYPTO_ALIAS(d2i_ESS_ISSUER_SERIAL); | ||
708 | 755 | ||
709 | int | 756 | int |
710 | i2d_ESS_ISSUER_SERIAL(const ESS_ISSUER_SERIAL *a, unsigned char **out) | 757 | i2d_ESS_ISSUER_SERIAL(const ESS_ISSUER_SERIAL *a, unsigned char **out) |
711 | { | 758 | { |
712 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ESS_ISSUER_SERIAL_it); | 759 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ESS_ISSUER_SERIAL_it); |
713 | } | 760 | } |
761 | LCRYPTO_ALIAS(i2d_ESS_ISSUER_SERIAL); | ||
714 | 762 | ||
715 | ESS_ISSUER_SERIAL * | 763 | ESS_ISSUER_SERIAL * |
716 | ESS_ISSUER_SERIAL_new(void) | 764 | ESS_ISSUER_SERIAL_new(void) |
717 | { | 765 | { |
718 | return (ESS_ISSUER_SERIAL *)ASN1_item_new(&ESS_ISSUER_SERIAL_it); | 766 | return (ESS_ISSUER_SERIAL *)ASN1_item_new(&ESS_ISSUER_SERIAL_it); |
719 | } | 767 | } |
768 | LCRYPTO_ALIAS(ESS_ISSUER_SERIAL_new); | ||
720 | 769 | ||
721 | void | 770 | void |
722 | ESS_ISSUER_SERIAL_free(ESS_ISSUER_SERIAL *a) | 771 | ESS_ISSUER_SERIAL_free(ESS_ISSUER_SERIAL *a) |
723 | { | 772 | { |
724 | ASN1_item_free((ASN1_VALUE *)a, &ESS_ISSUER_SERIAL_it); | 773 | ASN1_item_free((ASN1_VALUE *)a, &ESS_ISSUER_SERIAL_it); |
725 | } | 774 | } |
775 | LCRYPTO_ALIAS(ESS_ISSUER_SERIAL_free); | ||
726 | 776 | ||
727 | ESS_ISSUER_SERIAL * | 777 | ESS_ISSUER_SERIAL * |
728 | ESS_ISSUER_SERIAL_dup(ESS_ISSUER_SERIAL *x) | 778 | ESS_ISSUER_SERIAL_dup(ESS_ISSUER_SERIAL *x) |
729 | { | 779 | { |
730 | return ASN1_item_dup(&ESS_ISSUER_SERIAL_it, x); | 780 | return ASN1_item_dup(&ESS_ISSUER_SERIAL_it, x); |
731 | } | 781 | } |
782 | LCRYPTO_ALIAS(ESS_ISSUER_SERIAL_dup); | ||
732 | 783 | ||
733 | static const ASN1_TEMPLATE ESS_CERT_ID_seq_tt[] = { | 784 | static const ASN1_TEMPLATE ESS_CERT_ID_seq_tt[] = { |
734 | { | 785 | { |
@@ -764,30 +815,35 @@ d2i_ESS_CERT_ID(ESS_CERT_ID **a, const unsigned char **in, long len) | |||
764 | return (ESS_CERT_ID *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 815 | return (ESS_CERT_ID *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
765 | &ESS_CERT_ID_it); | 816 | &ESS_CERT_ID_it); |
766 | } | 817 | } |
818 | LCRYPTO_ALIAS(d2i_ESS_CERT_ID); | ||
767 | 819 | ||
768 | int | 820 | int |
769 | i2d_ESS_CERT_ID(const ESS_CERT_ID *a, unsigned char **out) | 821 | i2d_ESS_CERT_ID(const ESS_CERT_ID *a, unsigned char **out) |
770 | { | 822 | { |
771 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ESS_CERT_ID_it); | 823 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ESS_CERT_ID_it); |
772 | } | 824 | } |
825 | LCRYPTO_ALIAS(i2d_ESS_CERT_ID); | ||
773 | 826 | ||
774 | ESS_CERT_ID * | 827 | ESS_CERT_ID * |
775 | ESS_CERT_ID_new(void) | 828 | ESS_CERT_ID_new(void) |
776 | { | 829 | { |
777 | return (ESS_CERT_ID *)ASN1_item_new(&ESS_CERT_ID_it); | 830 | return (ESS_CERT_ID *)ASN1_item_new(&ESS_CERT_ID_it); |
778 | } | 831 | } |
832 | LCRYPTO_ALIAS(ESS_CERT_ID_new); | ||
779 | 833 | ||
780 | void | 834 | void |
781 | ESS_CERT_ID_free(ESS_CERT_ID *a) | 835 | ESS_CERT_ID_free(ESS_CERT_ID *a) |
782 | { | 836 | { |
783 | ASN1_item_free((ASN1_VALUE *)a, &ESS_CERT_ID_it); | 837 | ASN1_item_free((ASN1_VALUE *)a, &ESS_CERT_ID_it); |
784 | } | 838 | } |
839 | LCRYPTO_ALIAS(ESS_CERT_ID_free); | ||
785 | 840 | ||
786 | ESS_CERT_ID * | 841 | ESS_CERT_ID * |
787 | ESS_CERT_ID_dup(ESS_CERT_ID *x) | 842 | ESS_CERT_ID_dup(ESS_CERT_ID *x) |
788 | { | 843 | { |
789 | return ASN1_item_dup(&ESS_CERT_ID_it, x); | 844 | return ASN1_item_dup(&ESS_CERT_ID_it, x); |
790 | } | 845 | } |
846 | LCRYPTO_ALIAS(ESS_CERT_ID_dup); | ||
791 | 847 | ||
792 | static const ASN1_TEMPLATE ESS_SIGNING_CERT_seq_tt[] = { | 848 | static const ASN1_TEMPLATE ESS_SIGNING_CERT_seq_tt[] = { |
793 | { | 849 | { |
@@ -823,30 +879,35 @@ d2i_ESS_SIGNING_CERT(ESS_SIGNING_CERT **a, const unsigned char **in, long len) | |||
823 | return (ESS_SIGNING_CERT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | 879 | return (ESS_SIGNING_CERT *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, |
824 | &ESS_SIGNING_CERT_it); | 880 | &ESS_SIGNING_CERT_it); |
825 | } | 881 | } |
882 | LCRYPTO_ALIAS(d2i_ESS_SIGNING_CERT); | ||
826 | 883 | ||
827 | int | 884 | int |
828 | i2d_ESS_SIGNING_CERT(const ESS_SIGNING_CERT *a, unsigned char **out) | 885 | i2d_ESS_SIGNING_CERT(const ESS_SIGNING_CERT *a, unsigned char **out) |
829 | { | 886 | { |
830 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ESS_SIGNING_CERT_it); | 887 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &ESS_SIGNING_CERT_it); |
831 | } | 888 | } |
889 | LCRYPTO_ALIAS(i2d_ESS_SIGNING_CERT); | ||
832 | 890 | ||
833 | ESS_SIGNING_CERT * | 891 | ESS_SIGNING_CERT * |
834 | ESS_SIGNING_CERT_new(void) | 892 | ESS_SIGNING_CERT_new(void) |
835 | { | 893 | { |
836 | return (ESS_SIGNING_CERT *)ASN1_item_new(&ESS_SIGNING_CERT_it); | 894 | return (ESS_SIGNING_CERT *)ASN1_item_new(&ESS_SIGNING_CERT_it); |
837 | } | 895 | } |
896 | LCRYPTO_ALIAS(ESS_SIGNING_CERT_new); | ||
838 | 897 | ||
839 | void | 898 | void |
840 | ESS_SIGNING_CERT_free(ESS_SIGNING_CERT *a) | 899 | ESS_SIGNING_CERT_free(ESS_SIGNING_CERT *a) |
841 | { | 900 | { |
842 | ASN1_item_free((ASN1_VALUE *)a, &ESS_SIGNING_CERT_it); | 901 | ASN1_item_free((ASN1_VALUE *)a, &ESS_SIGNING_CERT_it); |
843 | } | 902 | } |
903 | LCRYPTO_ALIAS(ESS_SIGNING_CERT_free); | ||
844 | 904 | ||
845 | ESS_SIGNING_CERT * | 905 | ESS_SIGNING_CERT * |
846 | ESS_SIGNING_CERT_dup(ESS_SIGNING_CERT *x) | 906 | ESS_SIGNING_CERT_dup(ESS_SIGNING_CERT *x) |
847 | { | 907 | { |
848 | return ASN1_item_dup(&ESS_SIGNING_CERT_it, x); | 908 | return ASN1_item_dup(&ESS_SIGNING_CERT_it, x); |
849 | } | 909 | } |
910 | LCRYPTO_ALIAS(ESS_SIGNING_CERT_dup); | ||
850 | 911 | ||
851 | static const ASN1_TEMPLATE ESS_CERT_ID_V2_seq_tt[] = { | 912 | static const ASN1_TEMPLATE ESS_CERT_ID_V2_seq_tt[] = { |
852 | { | 913 | { |
@@ -1013,3 +1074,4 @@ PKCS7_to_TS_TST_INFO(PKCS7 *token) | |||
1013 | p = tst_info_der->data; | 1074 | p = tst_info_der->data; |
1014 | return d2i_TS_TST_INFO(NULL, &p, tst_info_der->length); | 1075 | return d2i_TS_TST_INFO(NULL, &p, tst_info_der->length); |
1015 | } | 1076 | } |
1077 | LCRYPTO_ALIAS(PKCS7_to_TS_TST_INFO); | ||