diff options
author | beck <> | 2020-09-16 18:12:06 +0000 |
---|---|---|
committer | beck <> | 2020-09-16 18:12:06 +0000 |
commit | 615363fd933cf5613a0c1380020975122fa025a8 (patch) | |
tree | 6cc185470f17b9a78d818c92618c4bf6d41149cd | |
parent | f1c776fd7c85f9ca438c7d0985924f571c4272ce (diff) | |
download | openbsd-615363fd933cf5613a0c1380020975122fa025a8.tar.gz openbsd-615363fd933cf5613a0c1380020975122fa025a8.tar.bz2 openbsd-615363fd933cf5613a0c1380020975122fa025a8.zip |
revert my putting this on a diet. sadly the NAME_CONSTRAINTS_check
symbol is exposed api and we probably need to deprecate it thoughtfully.
-rw-r--r-- | src/lib/libcrypto/x509/x509_ncons.c | 8 |
1 files changed, 1 insertions, 7 deletions
diff --git a/src/lib/libcrypto/x509/x509_ncons.c b/src/lib/libcrypto/x509/x509_ncons.c index 4f12542492..1621f98617 100644 --- a/src/lib/libcrypto/x509/x509_ncons.c +++ b/src/lib/libcrypto/x509/x509_ncons.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_ncons.c,v 1.3 2020/09/16 12:51:15 inoguchi Exp $ */ | 1 | /* $OpenBSD: x509_ncons.c,v 1.4 2020/09/16 18:12:06 beck Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -72,14 +72,12 @@ static int do_i2r_name_constraints(const X509V3_EXT_METHOD *method, | |||
72 | STACK_OF(GENERAL_SUBTREE) *trees, BIO *bp, int ind, char *name); | 72 | STACK_OF(GENERAL_SUBTREE) *trees, BIO *bp, int ind, char *name); |
73 | static int print_nc_ipadd(BIO *bp, ASN1_OCTET_STRING *ip); | 73 | static int print_nc_ipadd(BIO *bp, ASN1_OCTET_STRING *ip); |
74 | 74 | ||
75 | #if 0 | ||
76 | static int nc_match(GENERAL_NAME *gen, NAME_CONSTRAINTS *nc); | 75 | static int nc_match(GENERAL_NAME *gen, NAME_CONSTRAINTS *nc); |
77 | static int nc_match_single(GENERAL_NAME *sub, GENERAL_NAME *gen); | 76 | static int nc_match_single(GENERAL_NAME *sub, GENERAL_NAME *gen); |
78 | static int nc_dn(X509_NAME *sub, X509_NAME *nm); | 77 | static int nc_dn(X509_NAME *sub, X509_NAME *nm); |
79 | static int nc_dns(ASN1_IA5STRING *sub, ASN1_IA5STRING *dns); | 78 | static int nc_dns(ASN1_IA5STRING *sub, ASN1_IA5STRING *dns); |
80 | static int nc_email(ASN1_IA5STRING *sub, ASN1_IA5STRING *eml); | 79 | static int nc_email(ASN1_IA5STRING *sub, ASN1_IA5STRING *eml); |
81 | static int nc_uri(ASN1_IA5STRING *uri, ASN1_IA5STRING *base); | 80 | static int nc_uri(ASN1_IA5STRING *uri, ASN1_IA5STRING *base); |
82 | #endif | ||
83 | 81 | ||
84 | const X509V3_EXT_METHOD v3_name_constraints = { | 82 | const X509V3_EXT_METHOD v3_name_constraints = { |
85 | .ext_nid = NID_name_constraints, | 83 | .ext_nid = NID_name_constraints, |
@@ -303,7 +301,6 @@ print_nc_ipadd(BIO *bp, ASN1_OCTET_STRING *ip) | |||
303 | int | 301 | int |
304 | NAME_CONSTRAINTS_check(X509 *x, NAME_CONSTRAINTS *nc) | 302 | NAME_CONSTRAINTS_check(X509 *x, NAME_CONSTRAINTS *nc) |
305 | { | 303 | { |
306 | #if 0 | ||
307 | int r, i; | 304 | int r, i; |
308 | X509_NAME *nm; | 305 | X509_NAME *nm; |
309 | 306 | ||
@@ -348,10 +345,8 @@ NAME_CONSTRAINTS_check(X509 *x, NAME_CONSTRAINTS *nc) | |||
348 | if (r != X509_V_OK) | 345 | if (r != X509_V_OK) |
349 | return r; | 346 | return r; |
350 | } | 347 | } |
351 | #endif | ||
352 | return X509_V_OK; | 348 | return X509_V_OK; |
353 | } | 349 | } |
354 | #if 0 | ||
355 | static int | 350 | static int |
356 | nc_match(GENERAL_NAME *gen, NAME_CONSTRAINTS *nc) | 351 | nc_match(GENERAL_NAME *gen, NAME_CONSTRAINTS *nc) |
357 | { | 352 | { |
@@ -557,4 +552,3 @@ nc_uri(ASN1_IA5STRING *uri, ASN1_IA5STRING *base) | |||
557 | 552 | ||
558 | return X509_V_OK; | 553 | return X509_V_OK; |
559 | } | 554 | } |
560 | #endif | ||