mirror of
https://github.com/openssl/openssl.git
synced 2024-12-09 05:51:54 +08:00
cdb2a60347
SCT_verify is impossible to call through the public API (SCT_CTX_new() is not part of the public API), so rename it to SCT_CTX_verify and move it out of the public API. SCT_verify_v1 is redundant, since SCT_validate does the same verification (by calling SCT_verify) and more. The API is less confusing with a single verification function (SCT_validate). Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
87 lines
3.6 KiB
C
87 lines
3.6 KiB
C
/*
|
|
* Generated by util/mkerr.pl DO NOT EDIT
|
|
* Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/ct.h>
|
|
|
|
/* BEGIN ERROR CODES */
|
|
#ifndef OPENSSL_NO_ERR
|
|
|
|
# define ERR_FUNC(func) ERR_PACK(ERR_LIB_CT,func,0)
|
|
# define ERR_REASON(reason) ERR_PACK(ERR_LIB_CT,0,reason)
|
|
|
|
static ERR_STRING_DATA CT_str_functs[] = {
|
|
{ERR_FUNC(CT_F_CTLOG_NEW), "CTLOG_new"},
|
|
{ERR_FUNC(CT_F_CTLOG_NEW_FROM_BASE64), "CTLOG_new_from_base64"},
|
|
{ERR_FUNC(CT_F_CTLOG_NEW_FROM_CONF), "ctlog_new_from_conf"},
|
|
{ERR_FUNC(CT_F_CTLOG_STORE_LOAD_CTX_NEW), "ctlog_store_load_ctx_new"},
|
|
{ERR_FUNC(CT_F_CTLOG_STORE_LOAD_FILE), "CTLOG_STORE_load_file"},
|
|
{ERR_FUNC(CT_F_CTLOG_STORE_LOAD_LOG), "ctlog_store_load_log"},
|
|
{ERR_FUNC(CT_F_CTLOG_STORE_NEW), "CTLOG_STORE_new"},
|
|
{ERR_FUNC(CT_F_CT_BASE64_DECODE), "ct_base64_decode"},
|
|
{ERR_FUNC(CT_F_CT_POLICY_EVAL_CTX_NEW), "CT_POLICY_EVAL_CTX_new"},
|
|
{ERR_FUNC(CT_F_CT_V1_LOG_ID_FROM_PKEY), "ct_v1_log_id_from_pkey"},
|
|
{ERR_FUNC(CT_F_I2O_SCT), "i2o_SCT"},
|
|
{ERR_FUNC(CT_F_I2O_SCT_LIST), "i2o_SCT_LIST"},
|
|
{ERR_FUNC(CT_F_I2O_SCT_SIGNATURE), "i2o_SCT_signature"},
|
|
{ERR_FUNC(CT_F_O2I_SCT), "o2i_SCT"},
|
|
{ERR_FUNC(CT_F_O2I_SCT_LIST), "o2i_SCT_LIST"},
|
|
{ERR_FUNC(CT_F_O2I_SCT_SIGNATURE), "o2i_SCT_signature"},
|
|
{ERR_FUNC(CT_F_SCT_CTX_NEW), "SCT_CTX_new"},
|
|
{ERR_FUNC(CT_F_SCT_NEW), "SCT_new"},
|
|
{ERR_FUNC(CT_F_SCT_NEW_FROM_BASE64), "SCT_new_from_base64"},
|
|
{ERR_FUNC(CT_F_SCT_SET0_LOG_ID), "SCT_set0_log_id"},
|
|
{ERR_FUNC(CT_F_SCT_SET1_EXTENSIONS), "SCT_set1_extensions"},
|
|
{ERR_FUNC(CT_F_SCT_SET1_LOG_ID), "SCT_set1_log_id"},
|
|
{ERR_FUNC(CT_F_SCT_SET1_SIGNATURE), "SCT_set1_signature"},
|
|
{ERR_FUNC(CT_F_SCT_SET_LOG_ENTRY_TYPE), "SCT_set_log_entry_type"},
|
|
{ERR_FUNC(CT_F_SCT_SET_SIGNATURE_NID), "SCT_set_signature_nid"},
|
|
{ERR_FUNC(CT_F_SCT_SET_VERSION), "SCT_set_version"},
|
|
{ERR_FUNC(CT_F_SCT_CTX_VERIFY), "SCT_CTX_verify"},
|
|
{0, NULL}
|
|
};
|
|
|
|
static ERR_STRING_DATA CT_str_reasons[] = {
|
|
{ERR_REASON(CT_R_BASE64_DECODE_ERROR), "base64 decode error"},
|
|
{ERR_REASON(CT_R_INVALID_LOG_ID_LENGTH), "invalid log id length"},
|
|
{ERR_REASON(CT_R_LOG_CONF_INVALID), "log conf invalid"},
|
|
{ERR_REASON(CT_R_LOG_CONF_INVALID_KEY), "log conf invalid key"},
|
|
{ERR_REASON(CT_R_LOG_CONF_MISSING_DESCRIPTION),
|
|
"log conf missing description"},
|
|
{ERR_REASON(CT_R_LOG_CONF_MISSING_KEY), "log conf missing key"},
|
|
{ERR_REASON(CT_R_LOG_KEY_INVALID), "log key invalid"},
|
|
{ERR_REASON(CT_R_SCT_INVALID), "sct invalid"},
|
|
{ERR_REASON(CT_R_SCT_INVALID_SIGNATURE), "sct invalid signature"},
|
|
{ERR_REASON(CT_R_SCT_LIST_INVALID), "sct list invalid"},
|
|
{ERR_REASON(CT_R_SCT_LOG_ID_MISMATCH), "sct log id mismatch"},
|
|
{ERR_REASON(CT_R_SCT_NOT_SET), "sct not set"},
|
|
{ERR_REASON(CT_R_SCT_UNSUPPORTED_VERSION), "sct unsupported version"},
|
|
{ERR_REASON(CT_R_UNRECOGNIZED_SIGNATURE_NID),
|
|
"unrecognized signature nid"},
|
|
{ERR_REASON(CT_R_UNSUPPORTED_ENTRY_TYPE), "unsupported entry type"},
|
|
{ERR_REASON(CT_R_UNSUPPORTED_VERSION), "unsupported version"},
|
|
{0, NULL}
|
|
};
|
|
|
|
#endif
|
|
|
|
int ERR_load_CT_strings(void)
|
|
{
|
|
#ifndef OPENSSL_NO_ERR
|
|
|
|
if (ERR_func_error_string(CT_str_functs[0].error) == NULL) {
|
|
ERR_load_strings(0, CT_str_functs);
|
|
ERR_load_strings(0, CT_str_reasons);
|
|
}
|
|
#endif
|
|
return 1;
|
|
}
|