diff options
author | tb <> | 2022-01-05 17:43:04 +0000 |
---|---|---|
committer | tb <> | 2022-01-05 17:43:04 +0000 |
commit | f05deefcdfbc639504bc41d1d2e6d500f847ab5e (patch) | |
tree | 23437bb3e40d2a70bb0c7ab8c4c053f716555e05 | |
parent | a9a475a5b32b3cedcb67f102218951f52d6e928a (diff) | |
download | openbsd-f05deefcdfbc639504bc41d1d2e6d500f847ab5e.tar.gz openbsd-f05deefcdfbc639504bc41d1d2e6d500f847ab5e.tar.bz2 openbsd-f05deefcdfbc639504bc41d1d2e6d500f847ab5e.zip |
Call x a cert for readability.
-rw-r--r-- | src/lib/libcrypto/x509/x509_addr.c | 26 |
1 files changed, 13 insertions, 13 deletions
diff --git a/src/lib/libcrypto/x509/x509_addr.c b/src/lib/libcrypto/x509/x509_addr.c index 71f32f878c..acf1321c93 100644 --- a/src/lib/libcrypto/x509/x509_addr.c +++ b/src/lib/libcrypto/x509/x509_addr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_addr.c,v 1.66 2022/01/05 17:41:41 tb Exp $ */ | 1 | /* $OpenBSD: x509_addr.c,v 1.67 2022/01/05 17:43:04 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Contributed to the OpenSSL Project by the American Registry for | 3 | * Contributed to the OpenSSL Project by the American Registry for |
4 | * Internet Numbers ("ARIN"). | 4 | * Internet Numbers ("ARIN"). |
@@ -1747,7 +1747,7 @@ addr_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, | |||
1747 | IPAddrBlocks *child = NULL, *parent = NULL; | 1747 | IPAddrBlocks *child = NULL, *parent = NULL; |
1748 | IPAddressFamily *fc, *fp; | 1748 | IPAddressFamily *fc, *fp; |
1749 | IPAddressOrRanges *aorc, *aorp; | 1749 | IPAddressOrRanges *aorc, *aorp; |
1750 | X509 *x = NULL; | 1750 | X509 *cert = NULL; |
1751 | int depth = -1; | 1751 | int depth = -1; |
1752 | int i, k; | 1752 | int i, k; |
1753 | unsigned int length; | 1753 | unsigned int length; |
@@ -1770,13 +1770,13 @@ addr_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, | |||
1770 | */ | 1770 | */ |
1771 | if (ext == NULL) { | 1771 | if (ext == NULL) { |
1772 | depth = 0; | 1772 | depth = 0; |
1773 | x = sk_X509_value(chain, depth); | 1773 | cert = sk_X509_value(chain, depth); |
1774 | if ((ext = x->rfc3779_addr) == NULL) | 1774 | if ((ext = cert->rfc3779_addr) == NULL) |
1775 | goto done; | 1775 | goto done; |
1776 | } | 1776 | } |
1777 | 1777 | ||
1778 | if (!X509v3_addr_is_canonical(ext)) { | 1778 | if (!X509v3_addr_is_canonical(ext)) { |
1779 | if ((ret = verify_error(ctx, x, | 1779 | if ((ret = verify_error(ctx, cert, |
1780 | X509_V_ERR_INVALID_EXTENSION, depth)) == 0) | 1780 | X509_V_ERR_INVALID_EXTENSION, depth)) == 0) |
1781 | goto done; | 1781 | goto done; |
1782 | } | 1782 | } |
@@ -1795,16 +1795,16 @@ addr_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, | |||
1795 | * doesn't list. | 1795 | * doesn't list. |
1796 | */ | 1796 | */ |
1797 | for (depth++; depth < sk_X509_num(chain); depth++) { | 1797 | for (depth++; depth < sk_X509_num(chain); depth++) { |
1798 | x = sk_X509_value(chain, depth); | 1798 | cert = sk_X509_value(chain, depth); |
1799 | 1799 | ||
1800 | if ((parent = x->rfc3779_addr) == NULL) { | 1800 | if ((parent = cert->rfc3779_addr) == NULL) { |
1801 | for (i = 0; i < sk_IPAddressFamily_num(child); i++) { | 1801 | for (i = 0; i < sk_IPAddressFamily_num(child); i++) { |
1802 | fc = sk_IPAddressFamily_value(child, i); | 1802 | fc = sk_IPAddressFamily_value(child, i); |
1803 | 1803 | ||
1804 | if (IPAddressFamily_inheritance(fc) != NULL) | 1804 | if (IPAddressFamily_inheritance(fc) != NULL) |
1805 | continue; | 1805 | continue; |
1806 | 1806 | ||
1807 | if ((ret = verify_error(ctx, x, | 1807 | if ((ret = verify_error(ctx, cert, |
1808 | X509_V_ERR_UNNESTED_RESOURCE, depth)) == 0) | 1808 | X509_V_ERR_UNNESTED_RESOURCE, depth)) == 0) |
1809 | goto done; | 1809 | goto done; |
1810 | break; | 1810 | break; |
@@ -1813,7 +1813,7 @@ addr_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, | |||
1813 | } | 1813 | } |
1814 | 1814 | ||
1815 | if (!X509v3_addr_is_canonical(parent)) { | 1815 | if (!X509v3_addr_is_canonical(parent)) { |
1816 | if ((ret = verify_error(ctx, x, | 1816 | if ((ret = verify_error(ctx, cert, |
1817 | X509_V_ERR_INVALID_EXTENSION, depth)) == 0) | 1817 | X509_V_ERR_INVALID_EXTENSION, depth)) == 0) |
1818 | goto done; | 1818 | goto done; |
1819 | } | 1819 | } |
@@ -1841,7 +1841,7 @@ addr_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, | |||
1841 | continue; | 1841 | continue; |
1842 | 1842 | ||
1843 | /* Otherwise the child isn't covered. */ | 1843 | /* Otherwise the child isn't covered. */ |
1844 | if ((ret = verify_error(ctx, x, | 1844 | if ((ret = verify_error(ctx, cert, |
1845 | X509_V_ERR_UNNESTED_RESOURCE, depth)) == 0) | 1845 | X509_V_ERR_UNNESTED_RESOURCE, depth)) == 0) |
1846 | goto done; | 1846 | goto done; |
1847 | break; | 1847 | break; |
@@ -1877,7 +1877,7 @@ addr_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, | |||
1877 | continue; | 1877 | continue; |
1878 | } | 1878 | } |
1879 | 1879 | ||
1880 | if ((ret = verify_error(ctx, x, | 1880 | if ((ret = verify_error(ctx, cert, |
1881 | X509_V_ERR_UNNESTED_RESOURCE, depth)) == 0) | 1881 | X509_V_ERR_UNNESTED_RESOURCE, depth)) == 0) |
1882 | goto done; | 1882 | goto done; |
1883 | } | 1883 | } |
@@ -1886,7 +1886,7 @@ addr_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, | |||
1886 | /* | 1886 | /* |
1887 | * Trust anchor can't inherit. | 1887 | * Trust anchor can't inherit. |
1888 | */ | 1888 | */ |
1889 | if ((parent = x->rfc3779_addr) != NULL) { | 1889 | if ((parent = cert->rfc3779_addr) != NULL) { |
1890 | for (i = 0; i < sk_IPAddressFamily_num(parent); i++) { | 1890 | for (i = 0; i < sk_IPAddressFamily_num(parent); i++) { |
1891 | fp = sk_IPAddressFamily_value(parent, i); | 1891 | fp = sk_IPAddressFamily_value(parent, i); |
1892 | 1892 | ||
@@ -1896,7 +1896,7 @@ addr_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, | |||
1896 | if (sk_IPAddressFamily_find(child, fp) < 0) | 1896 | if (sk_IPAddressFamily_find(child, fp) < 0) |
1897 | continue; | 1897 | continue; |
1898 | 1898 | ||
1899 | if ((ret = verify_error(ctx, x, | 1899 | if ((ret = verify_error(ctx, cert, |
1900 | X509_V_ERR_UNNESTED_RESOURCE, depth)) == 0) | 1900 | X509_V_ERR_UNNESTED_RESOURCE, depth)) == 0) |
1901 | goto done; | 1901 | goto done; |
1902 | } | 1902 | } |