diff options
| author | tb <> | 2021-10-31 08:27:15 +0000 |
|---|---|---|
| committer | tb <> | 2021-10-31 08:27:15 +0000 |
| commit | 320fb083ea665c486fc2d05b1fca197ea83912bd (patch) | |
| tree | ad1afad8b03b47bd677634cf695b1c5669120bf3 /src/regress/lib/libcrypto/x509/verify.c | |
| parent | 106fd89cc4d7b3a4808cd5a95210d459b389b0c1 (diff) | |
| download | openbsd-320fb083ea665c486fc2d05b1fca197ea83912bd.tar.gz openbsd-320fb083ea665c486fc2d05b1fca197ea83912bd.tar.bz2 openbsd-320fb083ea665c486fc2d05b1fca197ea83912bd.zip | |
Prepare regress for opaque structs in x509*.h
Diffstat (limited to 'src/regress/lib/libcrypto/x509/verify.c')
| -rw-r--r-- | src/regress/lib/libcrypto/x509/verify.c | 17 |
1 files changed, 6 insertions, 11 deletions
diff --git a/src/regress/lib/libcrypto/x509/verify.c b/src/regress/lib/libcrypto/x509/verify.c index 3a3c9b0197..3b85280359 100644 --- a/src/regress/lib/libcrypto/x509/verify.c +++ b/src/regress/lib/libcrypto/x509/verify.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: verify.c,v 1.8 2021/09/30 18:28:38 jsing Exp $ */ | 1 | /* $OpenBSD: verify.c,v 1.9 2021/10/31 08:27:15 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2020 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2020 Joel Sing <jsing@openbsd.org> |
| 4 | * Copyright (c) 2020-2021 Bob Beck <beck@openbsd.org> | 4 | * Copyright (c) 2020-2021 Bob Beck <beck@openbsd.org> |
| @@ -108,7 +108,6 @@ verify_cert(const char *roots_dir, const char *roots_file, | |||
| 108 | X509_STORE_CTX *xsc = NULL; | 108 | X509_STORE_CTX *xsc = NULL; |
| 109 | X509_STORE *store = NULL; | 109 | X509_STORE *store = NULL; |
| 110 | int verify_err, use_dir; | 110 | int verify_err, use_dir; |
| 111 | unsigned long flags; | ||
| 112 | X509 *leaf = NULL; | 111 | X509 *leaf = NULL; |
| 113 | 112 | ||
| 114 | *chains = 0; | 113 | *chains = 0; |
| @@ -134,15 +133,11 @@ verify_cert(const char *roots_dir, const char *roots_file, | |||
| 134 | if (!X509_STORE_load_locations(store, NULL, roots_dir)) | 133 | if (!X509_STORE_load_locations(store, NULL, roots_dir)) |
| 135 | errx(1, "failed to set by_dir directory of %s", roots_dir); | 134 | errx(1, "failed to set by_dir directory of %s", roots_dir); |
| 136 | } | 135 | } |
| 137 | if (mode == MODE_LEGACY_VFY) { | 136 | if (mode == MODE_LEGACY_VFY) |
| 138 | flags = X509_VERIFY_PARAM_get_flags(xsc->param); | 137 | X509_STORE_CTX_set_flags(xsc, X509_V_FLAG_LEGACY_VERIFY); |
| 139 | flags |= X509_V_FLAG_LEGACY_VERIFY; | 138 | else |
| 140 | X509_VERIFY_PARAM_set_flags(xsc->param, flags); | 139 | X509_VERIFY_PARAM_clear_flags(X509_STORE_CTX_get0_param(xsc), |
| 141 | } else { | 140 | X509_V_FLAG_LEGACY_VERIFY); |
| 142 | flags = X509_VERIFY_PARAM_get_flags(xsc->param); | ||
| 143 | flags &= ~X509_V_FLAG_LEGACY_VERIFY; | ||
| 144 | X509_VERIFY_PARAM_set_flags(xsc->param, flags); | ||
| 145 | } | ||
| 146 | 141 | ||
| 147 | if (verbose) | 142 | if (verbose) |
| 148 | X509_STORE_CTX_set_verify_cb(xsc, verify_cert_cb); | 143 | X509_STORE_CTX_set_verify_cb(xsc, verify_cert_cb); |
