diff options
| author | tb <> | 2019-04-16 19:25:36 +0000 |
|---|---|---|
| committer | tb <> | 2019-04-16 19:25:36 +0000 |
| commit | 54fef0b46b2d3ba4d21099de01f7fc7e1fa6b9a5 (patch) | |
| tree | 4f2499853525edacbabdd2051f89c71282907edf | |
| parent | 59ffb61915a18262d2dfa3ff8e3cff60f31fc054 (diff) | |
| download | openbsd-54fef0b46b2d3ba4d21099de01f7fc7e1fa6b9a5.tar.gz openbsd-54fef0b46b2d3ba4d21099de01f7fc7e1fa6b9a5.tar.bz2 openbsd-54fef0b46b2d3ba4d21099de01f7fc7e1fa6b9a5.zip | |
Move function types to their own lines; rewrap.
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libcrypto/x509v3/v3_utl.c | 70 |
1 files changed, 40 insertions, 30 deletions
diff --git a/src/lib/libcrypto/x509v3/v3_utl.c b/src/lib/libcrypto/x509v3/v3_utl.c index 6e967194b3..d9c06af823 100644 --- a/src/lib/libcrypto/x509v3/v3_utl.c +++ b/src/lib/libcrypto/x509v3/v3_utl.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: v3_utl.c,v 1.33 2019/04/14 07:35:18 tb Exp $ */ | 1 | /* $OpenBSD: v3_utl.c,v 1.34 2019/04/16 19:25:36 tb Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project. | 3 | * project. |
| 4 | */ | 4 | */ |
| @@ -538,7 +538,8 @@ sk_strcmp(const char * const *a, const char * const *b) | |||
| 538 | return strcmp(*a, *b); | 538 | return strcmp(*a, *b); |
| 539 | } | 539 | } |
| 540 | 540 | ||
| 541 | STACK_OF(OPENSSL_STRING) *X509_get1_email(X509 *x) | 541 | STACK_OF(OPENSSL_STRING) * |
| 542 | X509_get1_email(X509 *x) | ||
| 542 | { | 543 | { |
| 543 | GENERAL_NAMES *gens; | 544 | GENERAL_NAMES *gens; |
| 544 | STACK_OF(OPENSSL_STRING) *ret; | 545 | STACK_OF(OPENSSL_STRING) *ret; |
| @@ -549,7 +550,8 @@ STACK_OF(OPENSSL_STRING) *X509_get1_email(X509 *x) | |||
| 549 | return ret; | 550 | return ret; |
| 550 | } | 551 | } |
| 551 | 552 | ||
| 552 | STACK_OF(OPENSSL_STRING) *X509_get1_ocsp(X509 *x) | 553 | STACK_OF(OPENSSL_STRING) * |
| 554 | X509_get1_ocsp(X509 *x) | ||
| 553 | { | 555 | { |
| 554 | AUTHORITY_INFO_ACCESS *info; | 556 | AUTHORITY_INFO_ACCESS *info; |
| 555 | STACK_OF(OPENSSL_STRING) *ret = NULL; | 557 | STACK_OF(OPENSSL_STRING) *ret = NULL; |
| @@ -572,7 +574,8 @@ STACK_OF(OPENSSL_STRING) *X509_get1_ocsp(X509 *x) | |||
| 572 | return ret; | 574 | return ret; |
| 573 | } | 575 | } |
| 574 | 576 | ||
| 575 | STACK_OF(OPENSSL_STRING) *X509_REQ_get1_email(X509_REQ *x) | 577 | STACK_OF(OPENSSL_STRING) * |
| 578 | X509_REQ_get1_email(X509_REQ *x) | ||
| 576 | { | 579 | { |
| 577 | GENERAL_NAMES *gens; | 580 | GENERAL_NAMES *gens; |
| 578 | STACK_OF(X509_EXTENSION) *exts; | 581 | STACK_OF(X509_EXTENSION) *exts; |
| @@ -587,8 +590,8 @@ STACK_OF(OPENSSL_STRING) *X509_REQ_get1_email(X509_REQ *x) | |||
| 587 | } | 590 | } |
| 588 | 591 | ||
| 589 | 592 | ||
| 590 | static | 593 | static STACK_OF(OPENSSL_STRING) * |
| 591 | STACK_OF(OPENSSL_STRING) *get_email(X509_NAME *name, GENERAL_NAMES *gens) | 594 | get_email(X509_NAME *name, GENERAL_NAMES *gens) |
| 592 | { | 595 | { |
| 593 | STACK_OF(OPENSSL_STRING) *ret = NULL; | 596 | STACK_OF(OPENSSL_STRING) *ret = NULL; |
| 594 | X509_NAME_ENTRY *ne; | 597 | X509_NAME_ENTRY *ne; |
| @@ -655,12 +658,13 @@ X509_email_free(STACK_OF(OPENSSL_STRING) *sk) | |||
| 655 | sk_OPENSSL_STRING_pop_free(sk, str_free); | 658 | sk_OPENSSL_STRING_pop_free(sk, str_free); |
| 656 | } | 659 | } |
| 657 | 660 | ||
| 658 | typedef int (*equal_fn) (const unsigned char *pattern, size_t pattern_len, | 661 | typedef int (*equal_fn)(const unsigned char *pattern, size_t pattern_len, |
| 659 | const unsigned char *subject, size_t subject_len, unsigned int flags); | 662 | const unsigned char *subject, size_t subject_len, unsigned int flags); |
| 660 | 663 | ||
| 661 | /* Skip pattern prefix to match "wildcard" subject */ | 664 | /* Skip pattern prefix to match "wildcard" subject */ |
| 662 | static void skip_prefix(const unsigned char **p, size_t *plen, | 665 | static void |
| 663 | const unsigned char *subject, size_t subject_len, unsigned int flags) | 666 | skip_prefix(const unsigned char **p, size_t *plen, const unsigned char *subject, |
| 667 | size_t subject_len, unsigned int flags) | ||
| 664 | { | 668 | { |
| 665 | const unsigned char *pattern = *p; | 669 | const unsigned char *pattern = *p; |
| 666 | size_t pattern_len = *plen; | 670 | size_t pattern_len = *plen; |
| @@ -698,9 +702,9 @@ static void skip_prefix(const unsigned char **p, size_t *plen, | |||
| 698 | */ | 702 | */ |
| 699 | 703 | ||
| 700 | /* Compare using strncasecmp */ | 704 | /* Compare using strncasecmp */ |
| 701 | static int equal_nocase(const unsigned char *pattern, size_t pattern_len, | 705 | static int |
| 702 | const unsigned char *subject, size_t subject_len, | 706 | equal_nocase(const unsigned char *pattern, size_t pattern_len, |
| 703 | unsigned int flags) | 707 | const unsigned char *subject, size_t subject_len, unsigned int flags) |
| 704 | { | 708 | { |
| 705 | if (memchr(pattern, '\0', pattern_len) != NULL) | 709 | if (memchr(pattern, '\0', pattern_len) != NULL) |
| 706 | return 0; | 710 | return 0; |
| @@ -713,9 +717,9 @@ static int equal_nocase(const unsigned char *pattern, size_t pattern_len, | |||
| 713 | } | 717 | } |
| 714 | 718 | ||
| 715 | /* Compare using strncmp. */ | 719 | /* Compare using strncmp. */ |
| 716 | static int equal_case(const unsigned char *pattern, size_t pattern_len, | 720 | static int |
| 717 | const unsigned char *subject, size_t subject_len, | 721 | equal_case(const unsigned char *pattern, size_t pattern_len, |
| 718 | unsigned int flags) | 722 | const unsigned char *subject, size_t subject_len, unsigned int flags) |
| 719 | { | 723 | { |
| 720 | if (memchr(pattern, 0, pattern_len) != NULL) | 724 | if (memchr(pattern, 0, pattern_len) != NULL) |
| 721 | return 0; | 725 | return 0; |
| @@ -731,9 +735,9 @@ static int equal_case(const unsigned char *pattern, size_t pattern_len, | |||
| 731 | * RFC 5280, section 7.5, requires that only the domain is compared in a | 735 | * RFC 5280, section 7.5, requires that only the domain is compared in a |
| 732 | * case-insensitive manner. | 736 | * case-insensitive manner. |
| 733 | */ | 737 | */ |
| 734 | static int equal_email(const unsigned char *a, size_t a_len, | 738 | static int |
| 735 | const unsigned char *b, size_t b_len, | 739 | equal_email(const unsigned char *a, size_t a_len, const unsigned char *b, |
| 736 | unsigned int unused_flags) | 740 | size_t b_len, unsigned int unused_flags) |
| 737 | { | 741 | { |
| 738 | size_t pos = a_len; | 742 | size_t pos = a_len; |
| 739 | if (a_len != b_len) | 743 | if (a_len != b_len) |
| @@ -760,7 +764,8 @@ static int equal_email(const unsigned char *a, size_t a_len, | |||
| 760 | * Compare the prefix and suffix with the subject, and check that the | 764 | * Compare the prefix and suffix with the subject, and check that the |
| 761 | * characters in-between are valid. | 765 | * characters in-between are valid. |
| 762 | */ | 766 | */ |
| 763 | static int wildcard_match(const unsigned char *prefix, size_t prefix_len, | 767 | static int |
| 768 | wildcard_match(const unsigned char *prefix, size_t prefix_len, | ||
| 764 | const unsigned char *suffix, size_t suffix_len, | 769 | const unsigned char *suffix, size_t suffix_len, |
| 765 | const unsigned char *subject, size_t subject_len, unsigned int flags) | 770 | const unsigned char *subject, size_t subject_len, unsigned int flags) |
| 766 | { | 771 | { |
| @@ -815,8 +820,8 @@ static int wildcard_match(const unsigned char *prefix, size_t prefix_len, | |||
| 815 | #define LABEL_HYPHEN (1 << 2) | 820 | #define LABEL_HYPHEN (1 << 2) |
| 816 | #define LABEL_IDNA (1 << 3) | 821 | #define LABEL_IDNA (1 << 3) |
| 817 | 822 | ||
| 818 | static const unsigned char *valid_star(const unsigned char *p, size_t len, | 823 | static const unsigned char * |
| 819 | unsigned int flags) | 824 | valid_star(const unsigned char *p, size_t len, unsigned int flags) |
| 820 | { | 825 | { |
| 821 | const unsigned char *star = 0; | 826 | const unsigned char *star = 0; |
| 822 | size_t i; | 827 | size_t i; |
| @@ -894,7 +899,8 @@ static const unsigned char *valid_star(const unsigned char *p, size_t len, | |||
| 894 | } | 899 | } |
| 895 | 900 | ||
| 896 | /* Compare using wildcards. */ | 901 | /* Compare using wildcards. */ |
| 897 | static int equal_wildcard(const unsigned char *pattern, size_t pattern_len, | 902 | static int |
| 903 | equal_wildcard(const unsigned char *pattern, size_t pattern_len, | ||
| 898 | const unsigned char *subject, size_t subject_len, unsigned int flags) | 904 | const unsigned char *subject, size_t subject_len, unsigned int flags) |
| 899 | { | 905 | { |
| 900 | const unsigned char *star = NULL; | 906 | const unsigned char *star = NULL; |
| @@ -953,8 +959,9 @@ do_check_string(ASN1_STRING *a, int cmp_type, equal_fn equal, | |||
| 953 | return rv; | 959 | return rv; |
| 954 | } | 960 | } |
| 955 | 961 | ||
| 956 | static int do_x509_check(X509 *x, const char *chk, size_t chklen, | 962 | static int |
| 957 | unsigned int flags, int check_type, char **peername) | 963 | do_x509_check(X509 *x, const char *chk, size_t chklen, unsigned int flags, |
| 964 | int check_type, char **peername) | ||
| 958 | { | 965 | { |
| 959 | GENERAL_NAMES *gens = NULL; | 966 | GENERAL_NAMES *gens = NULL; |
| 960 | X509_NAME *name = NULL; | 967 | X509_NAME *name = NULL; |
| @@ -1037,8 +1044,9 @@ static int do_x509_check(X509 *x, const char *chk, size_t chklen, | |||
| 1037 | return 0; | 1044 | return 0; |
| 1038 | } | 1045 | } |
| 1039 | 1046 | ||
| 1040 | int X509_check_host(X509 *x, const char *chk, size_t chklen, | 1047 | int |
| 1041 | unsigned int flags, char **peername) | 1048 | X509_check_host(X509 *x, const char *chk, size_t chklen, unsigned int flags, |
| 1049 | char **peername) | ||
| 1042 | { | 1050 | { |
| 1043 | if (chk == NULL) | 1051 | if (chk == NULL) |
| 1044 | return -2; | 1052 | return -2; |
| @@ -1049,8 +1057,8 @@ int X509_check_host(X509 *x, const char *chk, size_t chklen, | |||
| 1049 | return do_x509_check(x, chk, chklen, flags, GEN_DNS, peername); | 1057 | return do_x509_check(x, chk, chklen, flags, GEN_DNS, peername); |
| 1050 | } | 1058 | } |
| 1051 | 1059 | ||
| 1052 | int X509_check_email(X509 *x, const char *chk, size_t chklen, | 1060 | int |
| 1053 | unsigned int flags) | 1061 | X509_check_email(X509 *x, const char *chk, size_t chklen, unsigned int flags) |
| 1054 | { | 1062 | { |
| 1055 | if (chk == NULL) | 1063 | if (chk == NULL) |
| 1056 | return -2; | 1064 | return -2; |
| @@ -1061,7 +1069,8 @@ int X509_check_email(X509 *x, const char *chk, size_t chklen, | |||
| 1061 | return do_x509_check(x, chk, chklen, flags, GEN_EMAIL, NULL); | 1069 | return do_x509_check(x, chk, chklen, flags, GEN_EMAIL, NULL); |
| 1062 | } | 1070 | } |
| 1063 | 1071 | ||
| 1064 | int X509_check_ip(X509 *x, const unsigned char *chk, size_t chklen, | 1072 | int |
| 1073 | X509_check_ip(X509 *x, const unsigned char *chk, size_t chklen, | ||
| 1065 | unsigned int flags) | 1074 | unsigned int flags) |
| 1066 | { | 1075 | { |
| 1067 | if (chk == NULL) | 1076 | if (chk == NULL) |
| @@ -1069,7 +1078,8 @@ int X509_check_ip(X509 *x, const unsigned char *chk, size_t chklen, | |||
| 1069 | return do_x509_check(x, (char *)chk, chklen, flags, GEN_IPADD, NULL); | 1078 | return do_x509_check(x, (char *)chk, chklen, flags, GEN_IPADD, NULL); |
| 1070 | } | 1079 | } |
| 1071 | 1080 | ||
| 1072 | int X509_check_ip_asc(X509 *x, const char *ipasc, unsigned int flags) | 1081 | int |
| 1082 | X509_check_ip_asc(X509 *x, const char *ipasc, unsigned int flags) | ||
| 1073 | { | 1083 | { |
| 1074 | unsigned char ipout[16]; | 1084 | unsigned char ipout[16]; |
| 1075 | size_t iplen; | 1085 | size_t iplen; |
