diff options
Diffstat (limited to 'src/lib/libcrypto/x509/x509_local.h')
-rw-r--r-- | src/lib/libcrypto/x509/x509_local.h | 22 |
1 files changed, 9 insertions, 13 deletions
diff --git a/src/lib/libcrypto/x509/x509_local.h b/src/lib/libcrypto/x509/x509_local.h index 9ce1b58ed1..f00a55bac8 100644 --- a/src/lib/libcrypto/x509/x509_local.h +++ b/src/lib/libcrypto/x509/x509_local.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_local.h,v 1.8 2023/05/08 14:51:00 tb Exp $ */ | 1 | /* $OpenBSD: x509_local.h,v 1.9 2023/05/28 05:25:24 tb Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2013. | 3 | * project 2013. |
4 | */ | 4 | */ |
@@ -272,7 +272,14 @@ struct X509_VERIFY_PARAM_st { | |||
272 | int depth; /* Verify depth */ | 272 | int depth; /* Verify depth */ |
273 | int security_level; /* 'Security level', see SP800-57. */ | 273 | int security_level; /* 'Security level', see SP800-57. */ |
274 | STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ | 274 | STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ |
275 | X509_VERIFY_PARAM_ID *id; /* opaque ID data */ | 275 | STACK_OF(OPENSSL_STRING) *hosts; /* Set of acceptable names */ |
276 | unsigned int hostflags; /* Flags to control matching features */ | ||
277 | char *peername; /* Matching hostname in peer certificate */ | ||
278 | char *email; /* If not NULL email address to match */ | ||
279 | size_t emaillen; | ||
280 | unsigned char *ip; /* If not NULL IP address to match */ | ||
281 | size_t iplen; /* Length of IP address */ | ||
282 | int poisoned; | ||
276 | } /* X509_VERIFY_PARAM */; | 283 | } /* X509_VERIFY_PARAM */; |
277 | 284 | ||
278 | /* | 285 | /* |
@@ -368,17 +375,6 @@ struct x509_store_ctx_st { | |||
368 | CRYPTO_EX_DATA ex_data; | 375 | CRYPTO_EX_DATA ex_data; |
369 | } /* X509_STORE_CTX */; | 376 | } /* X509_STORE_CTX */; |
370 | 377 | ||
371 | struct X509_VERIFY_PARAM_ID_st { | ||
372 | STACK_OF(OPENSSL_STRING) *hosts; /* Set of acceptable names */ | ||
373 | unsigned int hostflags; /* Flags to control matching features */ | ||
374 | char *peername; /* Matching hostname in peer certificate */ | ||
375 | char *email; /* If not NULL email address to match */ | ||
376 | size_t emaillen; | ||
377 | unsigned char *ip; /* If not NULL IP address to match */ | ||
378 | size_t iplen; /* Length of IP address */ | ||
379 | int poisoned; | ||
380 | }; | ||
381 | |||
382 | int x509_check_cert_time(X509_STORE_CTX *ctx, X509 *x, int quiet); | 378 | int x509_check_cert_time(X509_STORE_CTX *ctx, X509 *x, int quiet); |
383 | 379 | ||
384 | int name_cmp(const char *name, const char *cmp); | 380 | int name_cmp(const char *name, const char *cmp); |