Rename the option to disable the new issuer sign check to ‘WOLFSSL_NO_OCSP_ISSUER_CHECK`.

This commit is contained in:
David Garske
2017-06-22 09:56:43 -07:00
parent a3578c6643
commit 3a4edf75bd

View File

@@ -40,9 +40,8 @@ ASN Options:
chain is not loaded. This only matches on subject and public key and chain is not loaded. This only matches on subject and public key and
does not perform a PKI validation, so it is not a secure solution. does not perform a PKI validation, so it is not a secure solution.
Only enabled for OCSP. Only enabled for OCSP.
* WOLFSSL_NO_OCSP_EXTKEYUSE_OCSP_SIGN: Can be defined for backwards * WOLFSSL_NO_OCSP_ISSUER_CHECK: Can be defined for backwards compatibility to
compatibility to disable matching of OCSP signing authority for the disable checking of OCSP subject hash with issuer hash.
certificate in question.
*/ */
#ifndef NO_ASN #ifndef NO_ASN
@@ -10770,7 +10769,7 @@ static int DecodeBasicOcspResponse(byte* source, word32* ioIndex,
return ret; return ret;
} }
#ifndef WOLFSSL_NO_OCSP_EXTKEYUSE_OCSP_SIGN #ifndef WOLFSSL_NO_OCSP_ISSUER_CHECK
if ((cert.extExtKeyUsage & EXTKEYUSE_OCSP_SIGN) == 0) { if ((cert.extExtKeyUsage & EXTKEYUSE_OCSP_SIGN) == 0) {
if (XMEMCMP(cert.subjectHash, if (XMEMCMP(cert.subjectHash,
resp->issuerHash, KEYID_SIZE) == 0) { resp->issuerHash, KEYID_SIZE) == 0) {