Removes SCT_LIST_set_source and SCT_LIST_set0_logs
Both of these functions can easily be implemented by callers instead. Reviewed-by: Emilia Käsper <emilia@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
This commit is contained in:
parent
21b908a8f9
commit
14db9bbd71
@ -327,18 +327,6 @@ int SCT_set_source(SCT *sct, sct_source_t source)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
int SCT_LIST_set_source(const STACK_OF(SCT) *scts, sct_source_t source)
|
|
||||||
{
|
|
||||||
int i, ret = 0;
|
|
||||||
|
|
||||||
for (i = 0; i < sk_SCT_num(scts); ++i) {
|
|
||||||
if (SCT_set_source(sk_SCT_value(scts, i), source))
|
|
||||||
++ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
const CTLOG *SCT_get0_log(const SCT *sct)
|
const CTLOG *SCT_get0_log(const SCT *sct)
|
||||||
{
|
{
|
||||||
return sct->log;
|
return sct->log;
|
||||||
@ -351,23 +339,6 @@ int SCT_set0_log(SCT *sct, const CTLOG_STORE *ct_logs)
|
|||||||
return sct->log != NULL;
|
return sct->log != NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
int SCT_LIST_set0_logs(STACK_OF(SCT) *sct_list, const CTLOG_STORE *ct_logs)
|
|
||||||
{
|
|
||||||
int sct_logs_found = 0;
|
|
||||||
int i;
|
|
||||||
|
|
||||||
for (i = 0; i < sk_SCT_num(sct_list); ++i) {
|
|
||||||
SCT *sct = sk_SCT_value(sct_list, i);
|
|
||||||
|
|
||||||
if (sct->log == NULL)
|
|
||||||
SCT_set0_log(sct, ct_logs);
|
|
||||||
if (sct->log != NULL)
|
|
||||||
++sct_logs_found;
|
|
||||||
}
|
|
||||||
|
|
||||||
return sct_logs_found;
|
|
||||||
}
|
|
||||||
|
|
||||||
sct_validation_status_t SCT_get_validation_status(const SCT *sct)
|
sct_validation_status_t SCT_get_validation_status(const SCT *sct)
|
||||||
{
|
{
|
||||||
return sct->validation_status;
|
return sct->validation_status;
|
||||||
|
@ -306,12 +306,6 @@ sct_source_t SCT_get_source(const SCT *sct);
|
|||||||
*/
|
*/
|
||||||
__owur int SCT_set_source(SCT *sct, sct_source_t source);
|
__owur int SCT_set_source(SCT *sct, sct_source_t source);
|
||||||
|
|
||||||
/*
|
|
||||||
* Sets the source of all of the SCTs to the same value.
|
|
||||||
* Returns the number of SCTs whose source was set successfully.
|
|
||||||
*/
|
|
||||||
__owur int SCT_LIST_set_source(const STACK_OF(SCT) *scts, sct_source_t source);
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Gets information about the log the SCT came from, if set.
|
* Gets information about the log the SCT came from, if set.
|
||||||
*/
|
*/
|
||||||
@ -324,13 +318,6 @@ const CTLOG *SCT_get0_log(const SCT *sct);
|
|||||||
*/
|
*/
|
||||||
int SCT_set0_log(SCT *sct, const CTLOG_STORE* ct_logs);
|
int SCT_set0_log(SCT *sct, const CTLOG_STORE* ct_logs);
|
||||||
|
|
||||||
/*
|
|
||||||
* Looks up information about the logs the SCTs came from using a CT log store.
|
|
||||||
* Returns the number of SCTs that now have a log set.
|
|
||||||
* If any SCTs already have a log set, they will be skipped.
|
|
||||||
*/
|
|
||||||
int SCT_LIST_set0_logs(STACK_OF(SCT) *sct_list, const CTLOG_STORE *ct_logs);
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Pretty-prints an |sct| to |out|.
|
* Pretty-prints an |sct| to |out|.
|
||||||
* It will be indented by the number of spaces specified by |indent|.
|
* It will be indented by the number of spaces specified by |indent|.
|
||||||
|
@ -340,12 +340,18 @@ static int execute_cert_test(CT_TEST_FIXTURE fixture)
|
|||||||
|
|
||||||
if (fixture.test_validity) {
|
if (fixture.test_validity) {
|
||||||
int are_scts_validated = 0;
|
int are_scts_validated = 0;
|
||||||
|
int i;
|
||||||
|
|
||||||
scts = X509V3_EXT_d2i(sct_extension);
|
scts = X509V3_EXT_d2i(sct_extension);
|
||||||
if (SCT_LIST_set_source(scts, SCT_SOURCE_X509V3_EXTENSION) !=
|
for (i = 0; i < sk_SCT_num(scts); ++i) {
|
||||||
sk_SCT_num(scts)) {
|
SCT *sct_i = sk_SCT_value(scts, i);
|
||||||
|
|
||||||
|
if (!SCT_set_source(sct_i, SCT_SOURCE_X509V3_EXTENSION)) {
|
||||||
fprintf(stderr,
|
fprintf(stderr,
|
||||||
"Error setting SCT source to X509v3 extension\n");
|
"Error setting SCT source to X509v3 extension\n");
|
||||||
test_failed = 1;
|
test_failed = 1;
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
are_scts_validated = SCT_LIST_validate(scts, ct_policy_ctx);
|
are_scts_validated = SCT_LIST_validate(scts, ct_policy_ctx);
|
||||||
@ -355,7 +361,6 @@ static int execute_cert_test(CT_TEST_FIXTURE fixture)
|
|||||||
} else if (!are_scts_validated) {
|
} else if (!are_scts_validated) {
|
||||||
int invalid_sct_count = 0;
|
int invalid_sct_count = 0;
|
||||||
int valid_sct_count = 0;
|
int valid_sct_count = 0;
|
||||||
int i;
|
|
||||||
|
|
||||||
for (i = 0; i < sk_SCT_num(scts); ++i) {
|
for (i = 0; i < sk_SCT_num(scts); ++i) {
|
||||||
SCT *sct_i = sk_SCT_value(scts, i);
|
SCT *sct_i = sk_SCT_value(scts, i);
|
||||||
|
@ -1300,7 +1300,7 @@ i2d_X509_REVOKED 1260 1_1_0 EXIST::FUNCTION:
|
|||||||
CMS_sign 1261 1_1_0 EXIST::FUNCTION:CMS
|
CMS_sign 1261 1_1_0 EXIST::FUNCTION:CMS
|
||||||
X509_STORE_add_cert 1262 1_1_0 EXIST::FUNCTION:
|
X509_STORE_add_cert 1262 1_1_0 EXIST::FUNCTION:
|
||||||
EC_GROUP_precompute_mult 1263 1_1_0 EXIST::FUNCTION:EC
|
EC_GROUP_precompute_mult 1263 1_1_0 EXIST::FUNCTION:EC
|
||||||
SCT_LIST_set_source 1264 1_1_0 EXIST::FUNCTION:
|
SCT_LIST_set_source 1264 1_1_0 NOEXIST::FUNCTION:
|
||||||
d2i_DISPLAYTEXT 1265 1_1_0 EXIST::FUNCTION:
|
d2i_DISPLAYTEXT 1265 1_1_0 EXIST::FUNCTION:
|
||||||
HMAC_CTX_copy 1266 1_1_0 EXIST::FUNCTION:
|
HMAC_CTX_copy 1266 1_1_0 EXIST::FUNCTION:
|
||||||
CRYPTO_gcm128_init 1267 1_1_0 EXIST::FUNCTION:
|
CRYPTO_gcm128_init 1267 1_1_0 EXIST::FUNCTION:
|
||||||
@ -1628,7 +1628,7 @@ PEM_write_X509_REQ_NEW 1579 1_1_0 EXIST::FUNCTION:
|
|||||||
CONF_imodule_set_usr_data 1580 1_1_0 EXIST::FUNCTION:
|
CONF_imodule_set_usr_data 1580 1_1_0 EXIST::FUNCTION:
|
||||||
d2i_TS_RESP_fp 1581 1_1_0 EXIST::FUNCTION:STDIO
|
d2i_TS_RESP_fp 1581 1_1_0 EXIST::FUNCTION:STDIO
|
||||||
X509_policy_tree_get0_user_policies 1582 1_1_0 EXIST::FUNCTION:
|
X509_policy_tree_get0_user_policies 1582 1_1_0 EXIST::FUNCTION:
|
||||||
SCT_LIST_set0_logs 1583 1_1_0 EXIST::FUNCTION:
|
SCT_LIST_set0_logs 1583 1_1_0 NOEXIST::FUNCTION:
|
||||||
DSA_do_sign 1584 1_1_0 EXIST::FUNCTION:DSA
|
DSA_do_sign 1584 1_1_0 EXIST::FUNCTION:DSA
|
||||||
EVP_CIPHER_CTX_reset 1585 1_1_0 EXIST::FUNCTION:
|
EVP_CIPHER_CTX_reset 1585 1_1_0 EXIST::FUNCTION:
|
||||||
OCSP_REVOKEDINFO_new 1586 1_1_0 EXIST::FUNCTION:
|
OCSP_REVOKEDINFO_new 1586 1_1_0 EXIST::FUNCTION:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user