diff options
Diffstat (limited to 'src/lib/libcrypto/x509')
-rw-r--r-- | src/lib/libcrypto/x509/pcy_tree.c | 4 | ||||
-rw-r--r-- | src/lib/libcrypto/x509/x509.h | 4 | ||||
-rw-r--r-- | src/lib/libcrypto/x509/x509_constraints.c | 14 | ||||
-rw-r--r-- | src/lib/libcrypto/x509/x509_issuer_cache.c | 4 | ||||
-rw-r--r-- | src/lib/libcrypto/x509/x509_ncons.c | 6 | ||||
-rw-r--r-- | src/lib/libcrypto/x509/x509_utl.c | 4 | ||||
-rw-r--r-- | src/lib/libcrypto/x509/x509_vfy.c | 4 | ||||
-rw-r--r-- | src/lib/libcrypto/x509/x509_vfy.h | 4 | ||||
-rw-r--r-- | src/lib/libcrypto/x509/x509name.c | 4 |
9 files changed, 24 insertions, 24 deletions
diff --git a/src/lib/libcrypto/x509/pcy_tree.c b/src/lib/libcrypto/x509/pcy_tree.c index be563d2677..050503bdf3 100644 --- a/src/lib/libcrypto/x509/pcy_tree.c +++ b/src/lib/libcrypto/x509/pcy_tree.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pcy_tree.c,v 1.4 2022/11/26 16:08:54 tb Exp $ */ | 1 | /* $OpenBSD: pcy_tree.c,v 1.5 2022/12/26 07:18:53 jmc Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2004. | 3 | * project 2004. |
4 | */ | 4 | */ |
@@ -131,7 +131,7 @@ tree_print(char *str, X509_POLICY_TREE *tree, X509_POLICY_LEVEL *curr) | |||
131 | #endif | 131 | #endif |
132 | 132 | ||
133 | /* Initialize policy tree. Return values: | 133 | /* Initialize policy tree. Return values: |
134 | * 0 Some internal error occured. | 134 | * 0 Some internal error occurred. |
135 | * -1 Inconsistent or invalid extensions in certificates. | 135 | * -1 Inconsistent or invalid extensions in certificates. |
136 | * 1 Tree initialized OK. | 136 | * 1 Tree initialized OK. |
137 | * 2 Policy tree is empty. | 137 | * 2 Policy tree is empty. |
diff --git a/src/lib/libcrypto/x509/x509.h b/src/lib/libcrypto/x509/x509.h index 7795181efc..0ff66587b9 100644 --- a/src/lib/libcrypto/x509/x509.h +++ b/src/lib/libcrypto/x509/x509.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509.h,v 1.90 2022/07/12 14:42:50 kn Exp $ */ | 1 | /* $OpenBSD: x509.h,v 1.91 2022/12/26 07:18:53 jmc Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -893,7 +893,7 @@ int X509_NAME_get_text_by_NID(X509_NAME *name, int nid, | |||
893 | int X509_NAME_get_text_by_OBJ(X509_NAME *name, | 893 | int X509_NAME_get_text_by_OBJ(X509_NAME *name, |
894 | const ASN1_OBJECT *obj, char *buf,int len); | 894 | const ASN1_OBJECT *obj, char *buf,int len); |
895 | 895 | ||
896 | /* NOTE: you should be passsing -1, not 0 as lastpos. The functions that use | 896 | /* NOTE: you should be passing -1, not 0 as lastpos. The functions that use |
897 | * lastpos, search after that position on. */ | 897 | * lastpos, search after that position on. */ |
898 | int X509_NAME_get_index_by_NID(const X509_NAME *name, int nid, | 898 | int X509_NAME_get_index_by_NID(const X509_NAME *name, int nid, |
899 | int lastpos); | 899 | int lastpos); |
diff --git a/src/lib/libcrypto/x509/x509_constraints.c b/src/lib/libcrypto/x509/x509_constraints.c index 1b79383de0..346cab0a40 100644 --- a/src/lib/libcrypto/x509/x509_constraints.c +++ b/src/lib/libcrypto/x509/x509_constraints.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_constraints.c,v 1.30 2022/11/28 07:22:15 tb Exp $ */ | 1 | /* $OpenBSD: x509_constraints.c,v 1.31 2022/12/26 07:18:53 jmc Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2020 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2020 Bob Beck <beck@openbsd.org> |
4 | * | 4 | * |
@@ -192,7 +192,7 @@ x509_constraints_names_dup(struct x509_constraints_names *names) | |||
192 | * 5890 compliant A-labels (see RFC 6066 section 3). This is more | 192 | * 5890 compliant A-labels (see RFC 6066 section 3). This is more |
193 | * permissive to allow for a leading '.' for a subdomain based | 193 | * permissive to allow for a leading '.' for a subdomain based |
194 | * constraint, as well as allowing for '_' which is commonly accepted | 194 | * constraint, as well as allowing for '_' which is commonly accepted |
195 | * by nonconformant DNS implementaitons. | 195 | * by nonconformant DNS implementations. |
196 | * | 196 | * |
197 | * if "wildcards" is set it allows '*' to occur in the string at the end of a | 197 | * if "wildcards" is set it allows '*' to occur in the string at the end of a |
198 | * component. | 198 | * component. |
@@ -587,7 +587,7 @@ x509_constraints_sandns(char *sandns, size_t dlen, char *constraint, size_t len) | |||
587 | * returns 1 if the domain and constraint match. | 587 | * returns 1 if the domain and constraint match. |
588 | * returns 0 otherwise. | 588 | * returns 0 otherwise. |
589 | * | 589 | * |
590 | * an empty constraint matches everyting. | 590 | * an empty constraint matches everything. |
591 | * constraint will be matched against the domain as a suffix if it | 591 | * constraint will be matched against the domain as a suffix if it |
592 | * starts with a '.'. | 592 | * starts with a '.'. |
593 | * domain will be matched against the constraint as a suffix if it | 593 | * domain will be matched against the constraint as a suffix if it |
@@ -651,10 +651,10 @@ x509_constraints_uri(uint8_t *uri, size_t ulen, uint8_t *constraint, | |||
651 | } | 651 | } |
652 | 652 | ||
653 | /* | 653 | /* |
654 | * Verify a validated address of size alen with a validated contraint | 654 | * Verify a validated address of size alen with a validated constraint |
655 | * of size constraint_len. returns 1 if matching, 0 if not. | 655 | * of size constraint_len. returns 1 if matching, 0 if not. |
656 | * Addresses are assumed to be pre-validated for a length of 4 and 8 | 656 | * Addresses are assumed to be pre-validated for a length of 4 and 8 |
657 | * respectively for ipv4 addreses and constraints, and a length of | 657 | * respectively for ipv4 addresses and constraints, and a length of |
658 | * 16 and 32 respectively for ipv6 address constraints by the caller. | 658 | * 16 and 32 respectively for ipv6 address constraints by the caller. |
659 | */ | 659 | */ |
660 | int | 660 | int |
@@ -909,7 +909,7 @@ x509_constraints_extract_names(struct x509_constraints_names *names, | |||
909 | vname = NULL; | 909 | vname = NULL; |
910 | } | 910 | } |
911 | /* | 911 | /* |
912 | * Include the CN as a hostname to be checked againt | 912 | * Include the CN as a hostname to be checked against |
913 | * name constraints if it looks like a hostname. | 913 | * name constraints if it looks like a hostname. |
914 | */ | 914 | */ |
915 | while (include_cn && | 915 | while (include_cn && |
@@ -1210,7 +1210,7 @@ x509_constraints_check(struct x509_constraints_names *names, | |||
1210 | /* | 1210 | /* |
1211 | * Walk a validated chain of X509 certs, starting at the leaf, and | 1211 | * Walk a validated chain of X509 certs, starting at the leaf, and |
1212 | * validate the name constraints in the chain. Intended for use with | 1212 | * validate the name constraints in the chain. Intended for use with |
1213 | * the legacy X509 validtion code in x509_vfy.c | 1213 | * the legacy X509 validation code in x509_vfy.c |
1214 | * | 1214 | * |
1215 | * returns 1 if the constraints are ok, 0 otherwise, setting error and | 1215 | * returns 1 if the constraints are ok, 0 otherwise, setting error and |
1216 | * depth | 1216 | * depth |
diff --git a/src/lib/libcrypto/x509/x509_issuer_cache.c b/src/lib/libcrypto/x509/x509_issuer_cache.c index 4f78e1e69b..f7fbd54ca7 100644 --- a/src/lib/libcrypto/x509/x509_issuer_cache.c +++ b/src/lib/libcrypto/x509/x509_issuer_cache.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_issuer_cache.c,v 1.3 2022/06/27 14:23:40 beck Exp $ */ | 1 | /* $OpenBSD: x509_issuer_cache.c,v 1.4 2022/12/26 07:18:53 jmc Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2020 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2020 Bob Beck <beck@openbsd.org> |
4 | * | 4 | * |
@@ -75,7 +75,7 @@ x509_issuer_cache_set_max(size_t max) | |||
75 | 75 | ||
76 | /* | 76 | /* |
77 | * Free the oldest entry in the issuer cache. Returns 1 | 77 | * Free the oldest entry in the issuer cache. Returns 1 |
78 | * if an entry was successfuly freed, 0 otherwise. Must | 78 | * if an entry was successfully freed, 0 otherwise. Must |
79 | * be called with x509_issuer_tree_mutex held. | 79 | * be called with x509_issuer_tree_mutex held. |
80 | */ | 80 | */ |
81 | void | 81 | void |
diff --git a/src/lib/libcrypto/x509/x509_ncons.c b/src/lib/libcrypto/x509/x509_ncons.c index cc7f59cd0a..c7e4e6ed9f 100644 --- a/src/lib/libcrypto/x509/x509_ncons.c +++ b/src/lib/libcrypto/x509/x509_ncons.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_ncons.c,v 1.7 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509_ncons.c,v 1.8 2022/12/26 07:18:53 jmc Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -482,7 +482,7 @@ nc_email(ASN1_IA5STRING *eml, ASN1_IA5STRING *base) | |||
482 | 482 | ||
483 | if (!emlat) | 483 | if (!emlat) |
484 | return X509_V_ERR_UNSUPPORTED_NAME_SYNTAX; | 484 | return X509_V_ERR_UNSUPPORTED_NAME_SYNTAX; |
485 | /* Special case: inital '.' is RHS match */ | 485 | /* Special case: initial '.' is RHS match */ |
486 | if (!baseat && (*baseptr == '.')) { | 486 | if (!baseat && (*baseptr == '.')) { |
487 | if (eml->length > base->length) { | 487 | if (eml->length > base->length) { |
488 | emlptr += eml->length - base->length; | 488 | emlptr += eml->length - base->length; |
@@ -543,7 +543,7 @@ nc_uri(ASN1_IA5STRING *uri, ASN1_IA5STRING *base) | |||
543 | if (hostlen == 0) | 543 | if (hostlen == 0) |
544 | return X509_V_ERR_UNSUPPORTED_NAME_SYNTAX; | 544 | return X509_V_ERR_UNSUPPORTED_NAME_SYNTAX; |
545 | 545 | ||
546 | /* Special case: inital '.' is RHS match */ | 546 | /* Special case: initial '.' is RHS match */ |
547 | if (*baseptr == '.') { | 547 | if (*baseptr == '.') { |
548 | if (hostlen > base->length) { | 548 | if (hostlen > base->length) { |
549 | p = hostptr + hostlen - base->length; | 549 | p = hostptr + hostlen - base->length; |
diff --git a/src/lib/libcrypto/x509/x509_utl.c b/src/lib/libcrypto/x509/x509_utl.c index 525939d4ca..aa18efe2c5 100644 --- a/src/lib/libcrypto/x509/x509_utl.c +++ b/src/lib/libcrypto/x509/x509_utl.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_utl.c,v 1.4 2022/11/14 17:48:50 beck Exp $ */ | 1 | /* $OpenBSD: x509_utl.c,v 1.5 2022/12/26 07:18:53 jmc Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project. | 3 | * project. |
4 | */ | 4 | */ |
@@ -723,7 +723,7 @@ skip_prefix(const unsigned char **p, size_t *plen, const unsigned char *subject, | |||
723 | * "equal_nocase" function is a hand-rolled strncasecmp that does not | 723 | * "equal_nocase" function is a hand-rolled strncasecmp that does not |
724 | * allow \0 in the pattern. Since an embedded \0 is likely a sign of | 724 | * allow \0 in the pattern. Since an embedded \0 is likely a sign of |
725 | * problems, we simply don't allow it in either case, and then we use | 725 | * problems, we simply don't allow it in either case, and then we use |
726 | * standard libc funcitons. | 726 | * standard libc functions. |
727 | */ | 727 | */ |
728 | 728 | ||
729 | /* Compare using strncasecmp */ | 729 | /* Compare using strncasecmp */ |
diff --git a/src/lib/libcrypto/x509/x509_vfy.c b/src/lib/libcrypto/x509/x509_vfy.c index 9392b1f41e..f6c7c21f5f 100644 --- a/src/lib/libcrypto/x509/x509_vfy.c +++ b/src/lib/libcrypto/x509/x509_vfy.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_vfy.c,v 1.109 2022/12/01 05:20:30 tb Exp $ */ | 1 | /* $OpenBSD: x509_vfy.c,v 1.110 2022/12/26 07:18:53 jmc Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -312,7 +312,7 @@ X509_verify_cert_legacy_build_chain(X509_STORE_CTX *ctx, int *bad, int *out_ok) | |||
312 | if (ctx->untrusted != NULL) { | 312 | if (ctx->untrusted != NULL) { |
313 | /* | 313 | /* |
314 | * If we do not find a non-expired untrusted cert, peek | 314 | * If we do not find a non-expired untrusted cert, peek |
315 | * ahead and see if we can satisify this from the trusted | 315 | * ahead and see if we can satisfy this from the trusted |
316 | * store. If not, see if we have an expired untrusted cert. | 316 | * store. If not, see if we have an expired untrusted cert. |
317 | */ | 317 | */ |
318 | xtmp = find_issuer(ctx, sktmp, x, 0); | 318 | xtmp = find_issuer(ctx, sktmp, x, 0); |
diff --git a/src/lib/libcrypto/x509/x509_vfy.h b/src/lib/libcrypto/x509/x509_vfy.h index 9a9d6c0a1c..27ed484291 100644 --- a/src/lib/libcrypto/x509/x509_vfy.h +++ b/src/lib/libcrypto/x509/x509_vfy.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_vfy.h,v 1.56 2022/12/01 05:27:04 tb Exp $ */ | 1 | /* $OpenBSD: x509_vfy.h,v 1.57 2022/12/26 07:18:53 jmc Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -255,7 +255,7 @@ void X509_STORE_CTX_set_depth(X509_STORE_CTX *ctx, int depth); | |||
255 | /* Do not check certificate or CRL validity against current time. */ | 255 | /* Do not check certificate or CRL validity against current time. */ |
256 | #define X509_V_FLAG_NO_CHECK_TIME 0x200000 | 256 | #define X509_V_FLAG_NO_CHECK_TIME 0x200000 |
257 | 257 | ||
258 | /* Force the use of the legacy certificate verifcation */ | 258 | /* Force the use of the legacy certificate verification */ |
259 | #define X509_V_FLAG_LEGACY_VERIFY 0x400000 | 259 | #define X509_V_FLAG_LEGACY_VERIFY 0x400000 |
260 | 260 | ||
261 | #define X509_VP_FLAG_DEFAULT 0x1 | 261 | #define X509_VP_FLAG_DEFAULT 0x1 |
diff --git a/src/lib/libcrypto/x509/x509name.c b/src/lib/libcrypto/x509/x509name.c index 14e2deb84f..19a253da4d 100644 --- a/src/lib/libcrypto/x509/x509name.c +++ b/src/lib/libcrypto/x509/x509name.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509name.c,v 1.29 2022/11/26 16:08:55 tb Exp $ */ | 1 | /* $OpenBSD: x509name.c,v 1.30 2022/12/26 07:18:53 jmc Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -123,7 +123,7 @@ X509_NAME_get_index_by_NID(const X509_NAME *name, int nid, int lastpos) | |||
123 | } | 123 | } |
124 | LCRYPTO_ALIAS(X509_NAME_get_index_by_NID) | 124 | LCRYPTO_ALIAS(X509_NAME_get_index_by_NID) |
125 | 125 | ||
126 | /* NOTE: you should be passsing -1, not 0 as lastpos */ | 126 | /* NOTE: you should be passing -1, not 0 as lastpos */ |
127 | int | 127 | int |
128 | X509_NAME_get_index_by_OBJ(const X509_NAME *name, const ASN1_OBJECT *obj, | 128 | X509_NAME_get_index_by_OBJ(const X509_NAME *name, const ASN1_OBJECT *obj, |
129 | int lastpos) | 129 | int lastpos) |