diff options
author | markus <> | 2003-11-11 21:21:30 +0000 |
---|---|---|
committer | markus <> | 2003-11-11 21:21:30 +0000 |
commit | 9c1aa44a1eacea897c0432e796b205b8484ff4d2 (patch) | |
tree | 5dcca7a2baa0fb63d6886729918ea26b68578561 /src/lib/libcrypto/x509 | |
parent | 1c98a87f0daac81245653c227eb2f2508a22a965 (diff) | |
download | openbsd-9c1aa44a1eacea897c0432e796b205b8484ff4d2.tar.gz openbsd-9c1aa44a1eacea897c0432e796b205b8484ff4d2.tar.bz2 openbsd-9c1aa44a1eacea897c0432e796b205b8484ff4d2.zip |
import 0.9.7c
Diffstat (limited to 'src/lib/libcrypto/x509')
-rw-r--r-- | src/lib/libcrypto/x509/x509_trs.c | 1 | ||||
-rw-r--r-- | src/lib/libcrypto/x509/x509_vfy.c | 6 | ||||
-rw-r--r-- | src/lib/libcrypto/x509/x509type.c | 5 |
3 files changed, 7 insertions, 5 deletions
diff --git a/src/lib/libcrypto/x509/x509_trs.c b/src/lib/libcrypto/x509/x509_trs.c index 17d69ac005..881252608d 100644 --- a/src/lib/libcrypto/x509/x509_trs.c +++ b/src/lib/libcrypto/x509/x509_trs.c | |||
@@ -82,6 +82,7 @@ static X509_TRUST trstandard[] = { | |||
82 | {X509_TRUST_SSL_CLIENT, 0, trust_1oidany, "SSL Client", NID_client_auth, NULL}, | 82 | {X509_TRUST_SSL_CLIENT, 0, trust_1oidany, "SSL Client", NID_client_auth, NULL}, |
83 | {X509_TRUST_SSL_SERVER, 0, trust_1oidany, "SSL Server", NID_server_auth, NULL}, | 83 | {X509_TRUST_SSL_SERVER, 0, trust_1oidany, "SSL Server", NID_server_auth, NULL}, |
84 | {X509_TRUST_EMAIL, 0, trust_1oidany, "S/MIME email", NID_email_protect, NULL}, | 84 | {X509_TRUST_EMAIL, 0, trust_1oidany, "S/MIME email", NID_email_protect, NULL}, |
85 | {X509_TRUST_OBJECT_SIGN, 0, trust_1oidany, "Object Signer", NID_code_sign, NULL}, | ||
85 | {X509_TRUST_OCSP_SIGN, 0, trust_1oid, "OCSP responder", NID_OCSP_sign, NULL}, | 86 | {X509_TRUST_OCSP_SIGN, 0, trust_1oid, "OCSP responder", NID_OCSP_sign, NULL}, |
86 | {X509_TRUST_OCSP_REQUEST, 0, trust_1oid, "OCSP request", NID_ad_OCSP, NULL} | 87 | {X509_TRUST_OCSP_REQUEST, 0, trust_1oid, "OCSP request", NID_ad_OCSP, NULL} |
87 | }; | 88 | }; |
diff --git a/src/lib/libcrypto/x509/x509_vfy.c b/src/lib/libcrypto/x509/x509_vfy.c index 552d1e7251..2bb21b443e 100644 --- a/src/lib/libcrypto/x509/x509_vfy.c +++ b/src/lib/libcrypto/x509/x509_vfy.c | |||
@@ -453,9 +453,9 @@ static int check_revocation(X509_STORE_CTX *ctx) | |||
453 | if (!(ctx->flags & X509_V_FLAG_CRL_CHECK)) | 453 | if (!(ctx->flags & X509_V_FLAG_CRL_CHECK)) |
454 | return 1; | 454 | return 1; |
455 | if (ctx->flags & X509_V_FLAG_CRL_CHECK_ALL) | 455 | if (ctx->flags & X509_V_FLAG_CRL_CHECK_ALL) |
456 | last = 0; | ||
457 | else | ||
458 | last = sk_X509_num(ctx->chain) - 1; | 456 | last = sk_X509_num(ctx->chain) - 1; |
457 | else | ||
458 | last = 0; | ||
459 | for(i = 0; i <= last; i++) | 459 | for(i = 0; i <= last; i++) |
460 | { | 460 | { |
461 | ctx->error_depth = i; | 461 | ctx->error_depth = i; |
@@ -674,7 +674,7 @@ static int internal_verify(X509_STORE_CTX *ctx) | |||
674 | ok=(*cb)(0,ctx); | 674 | ok=(*cb)(0,ctx); |
675 | if (!ok) goto end; | 675 | if (!ok) goto end; |
676 | } | 676 | } |
677 | if (X509_verify(xs,pkey) <= 0) | 677 | else if (X509_verify(xs,pkey) <= 0) |
678 | /* XXX For the final trusted self-signed cert, | 678 | /* XXX For the final trusted self-signed cert, |
679 | * this is a waste of time. That check should | 679 | * this is a waste of time. That check should |
680 | * optional so that e.g. 'openssl x509' can be | 680 | * optional so that e.g. 'openssl x509' can be |
diff --git a/src/lib/libcrypto/x509/x509type.c b/src/lib/libcrypto/x509/x509type.c index 8e78b34458..f78c2a6b43 100644 --- a/src/lib/libcrypto/x509/x509type.c +++ b/src/lib/libcrypto/x509/x509type.c | |||
@@ -99,14 +99,15 @@ int X509_certificate_type(X509 *x, EVP_PKEY *pkey) | |||
99 | case EVP_PKEY_RSA: | 99 | case EVP_PKEY_RSA: |
100 | ret|=EVP_PKS_RSA; | 100 | ret|=EVP_PKS_RSA; |
101 | break; | 101 | break; |
102 | case EVP_PKS_DSA: | 102 | case EVP_PKEY_DSA: |
103 | ret|=EVP_PKS_DSA; | 103 | ret|=EVP_PKS_DSA; |
104 | break; | 104 | break; |
105 | default: | 105 | default: |
106 | break; | 106 | break; |
107 | } | 107 | } |
108 | 108 | ||
109 | if (EVP_PKEY_size(pk) <= 512) | 109 | if (EVP_PKEY_size(pk) <= 512/8) /* /8 because it's 512 bits we look |
110 | for, not bytes */ | ||
110 | ret|=EVP_PKT_EXP; | 111 | ret|=EVP_PKT_EXP; |
111 | if(pkey==NULL) EVP_PKEY_free(pk); | 112 | if(pkey==NULL) EVP_PKEY_free(pk); |
112 | return(ret); | 113 | return(ret); |