diff options
author | tb <> | 2023-01-28 19:08:09 +0000 |
---|---|---|
committer | tb <> | 2023-01-28 19:08:09 +0000 |
commit | 5c1c0f42353a74450c3661fb2e5409baf64c174b (patch) | |
tree | af283cacc86008bd539af0a242eac434d18f4280 /src | |
parent | 8ba5c1cbef1f1f6ee717c97b32e39035eb12877e (diff) | |
download | openbsd-5c1c0f42353a74450c3661fb2e5409baf64c174b.tar.gz openbsd-5c1c0f42353a74450c3661fb2e5409baf64c174b.tar.bz2 openbsd-5c1c0f42353a74450c3661fb2e5409baf64c174b.zip |
Stop relying on x509_verify.h being public
Use x509_verify.h from the libcrypto sources instead of the public copy.
The x509_verify.h header was installed as a public header since early on
we had ideas of using a public API in libtls, but we eventually decided
against that. It makes no sense to install a public header that hides
everything behind LIBRESSL_INTERNAL. The public API will not be exposed
anytime soon if at all.
ok jsing
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libcrypto/x509/x509_internal.h | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/src/lib/libcrypto/x509/x509_internal.h b/src/lib/libcrypto/x509/x509_internal.h index cb80005075..c4222bcfe5 100644 --- a/src/lib/libcrypto/x509/x509_internal.h +++ b/src/lib/libcrypto/x509/x509_internal.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_internal.h,v 1.24 2023/01/20 22:00:47 job Exp $ */ | 1 | /* $OpenBSD: x509_internal.h,v 1.25 2023/01/28 19:08:09 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2020 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2020 Bob Beck <beck@openbsd.org> |
4 | * | 4 | * |
@@ -20,10 +20,9 @@ | |||
20 | /* Internal use only, not public API */ | 20 | /* Internal use only, not public API */ |
21 | #include <netinet/in.h> | 21 | #include <netinet/in.h> |
22 | 22 | ||
23 | #include <openssl/x509_verify.h> | ||
24 | |||
25 | #include "bytestring.h" | 23 | #include "bytestring.h" |
26 | #include "x509_local.h" | 24 | #include "x509_local.h" |
25 | #include "x509_verify.h" | ||
27 | 26 | ||
28 | /* Hard limits on structure size and number of signature checks. */ | 27 | /* Hard limits on structure size and number of signature checks. */ |
29 | #define X509_VERIFY_MAX_CHAINS 8 /* Max validated chains */ | 28 | #define X509_VERIFY_MAX_CHAINS 8 /* Max validated chains */ |