diff options
author | tb <> | 2022-11-29 12:31:43 +0000 |
---|---|---|
committer | tb <> | 2022-11-29 12:31:43 +0000 |
commit | f2b3922970f48a5e4c4ac3f823c2ee4620fa4dff (patch) | |
tree | e85b61d7b2cd74b7bedf6b78594e21f52b781a8b /src | |
parent | f4bb67b0ab23ccbf7b7b7a8441c0a48c386550ba (diff) | |
download | openbsd-f2b3922970f48a5e4c4ac3f823c2ee4620fa4dff.tar.gz openbsd-f2b3922970f48a5e4c4ac3f823c2ee4620fa4dff.tar.bz2 openbsd-f2b3922970f48a5e4c4ac3f823c2ee4620fa4dff.zip |
First pass at updating verifier error docs
X509_verify_cert_error_string() is now thread safe as it no longer returns
a static buffer. Document X509_V_ERR_UNSPECIFIED. Stop asserting that the
X509_V_ERR_CERT_CHAIN_TOO_LONG code is unused, the new verifier can set it.
Add commented versions of various missing error codes in the proper spots
and move X509_V_ERR_UNNESTED_RESOURCE where it belongs.
prompted by claudio
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 | 54 |
1 files changed, 41 insertions, 13 deletions
diff --git a/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 b/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 index dda35ac4e5..be63bacf12 100644 --- a/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 +++ b/src/lib/libcrypto/man/X509_STORE_CTX_get_error.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: X509_STORE_CTX_get_error.3,v 1.23 2022/05/19 07:04:41 tb Exp $ | 1 | .\" $OpenBSD: X509_STORE_CTX_get_error.3,v 1.24 2022/11/29 12:31:43 tb Exp $ |
2 | .\" full merge up to: | 2 | .\" full merge up to: |
3 | .\" OpenSSL man3/X509_STORE_CTX_get_error 24a535ea Sep 22 13:14:20 2020 +0100 | 3 | .\" OpenSSL man3/X509_STORE_CTX_get_error 24a535ea Sep 22 13:14:20 2020 +0100 |
4 | .\" OpenSSL man3/X509_STORE_CTX_new 24a535ea Sep 22 13:14:20 2020 +0100 | 4 | .\" OpenSSL man3/X509_STORE_CTX_new 24a535ea Sep 22 13:14:20 2020 +0100 |
@@ -68,7 +68,7 @@ | |||
68 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 68 | .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
69 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. | 69 | .\" OF THE POSSIBILITY OF SUCH DAMAGE. |
70 | .\" | 70 | .\" |
71 | .Dd $Mdocdate: May 19 2022 $ | 71 | .Dd $Mdocdate: November 29 2022 $ |
72 | .Dt X509_STORE_CTX_GET_ERROR 3 | 72 | .Dt X509_STORE_CTX_GET_ERROR 3 |
73 | .Os | 73 | .Os |
74 | .Sh NAME | 74 | .Sh NAME |
@@ -296,9 +296,9 @@ debugging information relating to the current certificate. | |||
296 | .Pp | 296 | .Pp |
297 | If an unrecognised error code is passed to | 297 | If an unrecognised error code is passed to |
298 | .Fn X509_verify_cert_error_string , | 298 | .Fn X509_verify_cert_error_string , |
299 | the numerical value of the unknown code is returned in a static buffer. | 299 | "Unknown certificate verification error" |
300 | This is not thread safe but will never happen unless an invalid code is | 300 | is returned. |
301 | passed. | 301 | This should never happen unless an invalid code is passed. |
302 | .Sh RETURN VALUES | 302 | .Sh RETURN VALUES |
303 | .Fn X509_STORE_CTX_get_error | 303 | .Fn X509_STORE_CTX_get_error |
304 | returns | 304 | returns |
@@ -365,6 +365,10 @@ these are described as "unused". | |||
365 | .Bl -tag -width Ds | 365 | .Bl -tag -width Ds |
366 | .It Dv X509_V_OK : No ok | 366 | .It Dv X509_V_OK : No ok |
367 | The operation was successful. | 367 | The operation was successful. |
368 | .It Dv X509_V_ERR_UNSPECIFIED : \ | ||
369 | No Unspecified certificate verification error | ||
370 | An error was encountered during certificate verification and | ||
371 | the internal routines failed to set a more specific error. | ||
368 | .It Dv X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT : \ | 372 | .It Dv X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT : \ |
369 | No unable to get issuer certificate | 373 | No unable to get issuer certificate |
370 | The issuer certificate of a locally looked up certificate could not be found. | 374 | The issuer certificate of a locally looked up certificate could not be found. |
@@ -434,7 +438,6 @@ No signatures could be verified because the chain contains only one | |||
434 | certificate and it is not self signed. | 438 | certificate and it is not self signed. |
435 | .It Dv X509_V_ERR_CERT_CHAIN_TOO_LONG : No certificate chain too long | 439 | .It Dv X509_V_ERR_CERT_CHAIN_TOO_LONG : No certificate chain too long |
436 | The certificate chain length is greater than the supplied maximum depth. | 440 | The certificate chain length is greater than the supplied maximum depth. |
437 | Unused. | ||
438 | .It Dv X509_V_ERR_CERT_REVOKED : No certificate revoked | 441 | .It Dv X509_V_ERR_CERT_REVOKED : No certificate revoked |
439 | The certificate has been revoked. | 442 | The certificate has been revoked. |
440 | .It Dv X509_V_ERR_INVALID_CA : No invalid CA certificate | 443 | .It Dv X509_V_ERR_INVALID_CA : No invalid CA certificate |
@@ -482,6 +485,20 @@ This is only set if issuer check debugging is enabled it is used for | |||
482 | status notification and is | 485 | status notification and is |
483 | .Sy not | 486 | .Sy not |
484 | in itself an error. | 487 | in itself an error. |
488 | .\" X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER : \ | ||
489 | .\" No unable to get CRL issuer certificate | ||
490 | .\" X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION : No unhandled critical extension | ||
491 | .\" X509_V_ERR_KEYUSAGE_NO_CRL_SIGN : No key usage does not include CRL signing | ||
492 | .\" X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION : \ | ||
493 | .\" No unhandled critical CRL extension | ||
494 | .\" X509_V_ERR_INVALID_NON_CA : \ | ||
495 | .\" No invalid non-CA certificate (has CA markings) | ||
496 | .\" X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED : \ | ||
497 | .\" No proxy path length constraint exceeded | ||
498 | .\" X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE : \ | ||
499 | .\" No key usage does not include digital signature | ||
500 | .\" X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED : \ | ||
501 | .\" No proxy certificates not allowed, please set the appropriate flag | ||
485 | .It Dv X509_V_ERR_INVALID_EXTENSION : \ | 502 | .It Dv X509_V_ERR_INVALID_EXTENSION : \ |
486 | No invalid or inconsistent certificate extension | 503 | No invalid or inconsistent certificate extension |
487 | A certificate extension had an invalid value (for example an incorrect | 504 | A certificate extension had an invalid value (for example an incorrect |
@@ -501,6 +518,13 @@ certificate. | |||
501 | No unsupported extension feature | 518 | No unsupported extension feature |
502 | Some feature of a certificate extension is not supported. | 519 | Some feature of a certificate extension is not supported. |
503 | Unused. | 520 | Unused. |
521 | .It Dv X509_V_ERR_UNNESTED_RESOURCE : \ | ||
522 | RFC 3779 resource not subset of parent's resources | ||
523 | When walking up a certificate chain, all resources specified in | ||
524 | RFC 3779 extensions must be contained in the resources delegated in | ||
525 | the issuer's RFC 3779 extensions. | ||
526 | The error indicates that this is not the case or that the trust anchor | ||
527 | has inheritance. | ||
504 | .It Dv X509_V_ERR_PERMITTED_VIOLATION : No permitted subtree violation | 528 | .It Dv X509_V_ERR_PERMITTED_VIOLATION : No permitted subtree violation |
505 | A name constraint violation occurred in the permitted subtrees. | 529 | A name constraint violation occurred in the permitted subtrees. |
506 | .It Dv X509_V_ERR_EXCLUDED_VIOLATION : No excluded subtree violation | 530 | .It Dv X509_V_ERR_EXCLUDED_VIOLATION : No excluded subtree violation |
@@ -509,13 +533,6 @@ A name constraint violation occurred in the excluded subtrees. | |||
509 | No name constraints minimum and maximum not supported | 533 | No name constraints minimum and maximum not supported |
510 | A certificate name constraints extension included a minimum or maximum | 534 | A certificate name constraints extension included a minimum or maximum |
511 | field: this is not supported. | 535 | field: this is not supported. |
512 | .It Dv X509_V_ERR_UNNESTED_RESOURCE : \ | ||
513 | RFC 3779 resource not subset of parent's resources | ||
514 | When walking up a certificate chain, all resources specified in | ||
515 | RFC 3779 extensions must be contained in the resources delegated in | ||
516 | the issuer's RFC 3779 extensions. | ||
517 | The error indicates that this is not the case or that the trust anchor | ||
518 | has inheritance. | ||
519 | .It Dv X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE : \ | 536 | .It Dv X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE : \ |
520 | No unsupported name constraint type | 537 | No unsupported name constraint type |
521 | An unsupported name constraint type was encountered. | 538 | An unsupported name constraint type was encountered. |
@@ -527,6 +544,7 @@ The format of the name constraint is not recognised: for example an | |||
527 | email address format of a form not mentioned in RFC 3280. | 544 | email address format of a form not mentioned in RFC 3280. |
528 | This could be caused by a garbage extension or some new feature not | 545 | This could be caused by a garbage extension or some new feature not |
529 | currently supported. | 546 | currently supported. |
547 | .\" X509_V_ERR_UNSUPPORTED_NAME_SYNTAX : No unsupported or invalid name syntax | ||
530 | .It Dv X509_V_ERR_CRL_PATH_VALIDATION_ERROR : No CRL path validation error | 548 | .It Dv X509_V_ERR_CRL_PATH_VALIDATION_ERROR : No CRL path validation error |
531 | An error occurred when attempting to verify the CRL path. | 549 | An error occurred when attempting to verify the CRL path. |
532 | This error can only happen if extended CRL checking is enabled. | 550 | This error can only happen if extended CRL checking is enabled. |
@@ -534,6 +552,16 @@ This error can only happen if extended CRL checking is enabled. | |||
534 | No application verification failure | 552 | No application verification failure |
535 | An application specific error. | 553 | An application specific error. |
536 | This will never be returned unless explicitly set by an application. | 554 | This will never be returned unless explicitly set by an application. |
555 | .\" .It Dv X509_V_ERR_HOSTNAME_MISMATCH : No Hostname mismatch | ||
556 | .\" .It Dv X509_V_ERR_EMAIL_MISMATCH : No Email address mismatch | ||
557 | .\" .It Dv X509_V_ERR_IP_ADDRESS_MISMATCH : No IP address mismatch | ||
558 | .\" .It Dv X509_V_ERR_INVALID_CALL : \ | ||
559 | .\" No Invalid certificate verification context | ||
560 | .\" .It Dv X509_V_ERR_STORE_LOOKUP : No Issuer certificate lookup error | ||
561 | .\" .It Dv X509_V_ERR_EE_KEY_TOO_SMALL : No EE certificate key too weak | ||
562 | .\" .It Dv X509_V_ERR_CA_KEY_TOO_SMALL : No CA certificate key too weak | ||
563 | .\" .It Dv X509_V_ERR_CA_MD_TOO_WEAK : \ | ||
564 | .\" No CA signature digest algorithm too weak | ||
537 | .El | 565 | .El |
538 | .Sh SEE ALSO | 566 | .Sh SEE ALSO |
539 | .Xr X509_policy_check 3 , | 567 | .Xr X509_policy_check 3 , |