mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2026-01-31 00:09:16 +01:00
add ASN_ prefixes to ISSUER, SUBJECT, BEFORE, and AFTER enum constants defined in wolfssl/wolfcrypt/asn.h.
This commit is contained in:
@@ -426,7 +426,7 @@ static int CheckCertCRLList(WOLFSSL_CRL* crl, byte* issuerHash, byte* serial,
|
||||
#endif
|
||||
{
|
||||
#if !defined(NO_ASN_TIME) && !defined(WOLFSSL_NO_CRL_DATE_CHECK)
|
||||
if (!XVALIDATE_DATE(crle->nextDate,crle->nextDateFormat, AFTER)) {
|
||||
if (!XVALIDATE_DATE(crle->nextDate,crle->nextDateFormat, ASN_AFTER)) {
|
||||
WOLFSSL_MSG("CRL next date is no longer valid");
|
||||
nextDateValid = 0;
|
||||
}
|
||||
|
||||
@@ -12636,7 +12636,7 @@ void CopyDecodedName(WOLFSSL_X509_NAME* name, DecodedCert* dCert, int nameType)
|
||||
name->dynamicName = 0;
|
||||
}
|
||||
|
||||
if (nameType == SUBJECT) {
|
||||
if (nameType == ASN_SUBJECT) {
|
||||
XSTRNCPY(name->name, dCert->subject, ASN_NAME_MAX);
|
||||
name->name[ASN_NAME_MAX - 1] = '\0';
|
||||
name->sz = (int)XSTRLEN(name->name) + 1;
|
||||
@@ -12821,7 +12821,7 @@ int CopyDecodedToX509(WOLFSSL_X509* x509, DecodedCert* dCert)
|
||||
|
||||
x509->version = dCert->version + 1;
|
||||
|
||||
CopyDecodedName(&x509->issuer, dCert, ISSUER);
|
||||
CopyDecodedName(&x509->issuer, dCert, ASN_ISSUER);
|
||||
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
|
||||
if (dCert->issuerName != NULL) {
|
||||
wolfSSL_X509_set_issuer_name(x509,
|
||||
@@ -12829,7 +12829,7 @@ int CopyDecodedToX509(WOLFSSL_X509* x509, DecodedCert* dCert)
|
||||
x509->issuer.x509 = x509;
|
||||
}
|
||||
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
|
||||
CopyDecodedName(&x509->subject, dCert, SUBJECT);
|
||||
CopyDecodedName(&x509->subject, dCert, ASN_SUBJECT);
|
||||
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
|
||||
if (dCert->subjectName != NULL) {
|
||||
wolfSSL_X509_set_subject_name(x509,
|
||||
@@ -30286,7 +30286,7 @@ static int HashSkeData(WOLFSSL* ssl, enum wc_HashType hashType,
|
||||
|
||||
InitDecodedCert(cert, input + *inOutIdx, dnSz, ssl->heap);
|
||||
|
||||
ret = GetName(cert, SUBJECT, dnSz);
|
||||
ret = GetName(cert, ASN_SUBJECT, dnSz);
|
||||
|
||||
if (ret == 0) {
|
||||
if ((name = wolfSSL_X509_NAME_new_ex(cert->heap)) == NULL)
|
||||
@@ -30294,7 +30294,7 @@ static int HashSkeData(WOLFSSL* ssl, enum wc_HashType hashType,
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
CopyDecodedName(name, cert, SUBJECT);
|
||||
CopyDecodedName(name, cert, ASN_SUBJECT);
|
||||
}
|
||||
|
||||
if (ret == 0) {
|
||||
|
||||
@@ -251,10 +251,10 @@ static int GetOcspStatus(WOLFSSL_OCSP* ocsp, OcspRequest* request,
|
||||
else if (*status) {
|
||||
#ifndef NO_ASN_TIME
|
||||
if (XVALIDATE_DATE((*status)->thisDate,
|
||||
(*status)->thisDateFormat, BEFORE)
|
||||
(*status)->thisDateFormat, ASN_BEFORE)
|
||||
&& ((*status)->nextDate[0] != 0)
|
||||
&& XVALIDATE_DATE((*status)->nextDate,
|
||||
(*status)->nextDateFormat, AFTER))
|
||||
(*status)->nextDateFormat, ASN_AFTER))
|
||||
#endif
|
||||
{
|
||||
ret = xstat2err((*status)->status);
|
||||
|
||||
@@ -6907,14 +6907,14 @@ static int TLSX_CA_Names_Parse(WOLFSSL *ssl, const byte* input,
|
||||
InitDecodedCert(cert, input + idx, extLen, ssl->heap);
|
||||
didInit = TRUE;
|
||||
idx += extLen;
|
||||
ret = GetName(cert, SUBJECT, extLen);
|
||||
ret = GetName(cert, ASN_SUBJECT, extLen);
|
||||
}
|
||||
|
||||
if (ret == 0 && (name = wolfSSL_X509_NAME_new()) == NULL)
|
||||
ret = MEMORY_ERROR;
|
||||
|
||||
if (ret == 0) {
|
||||
CopyDecodedName(name, cert, SUBJECT);
|
||||
CopyDecodedName(name, cert, ASN_SUBJECT);
|
||||
if (wolfSSL_sk_X509_NAME_push(ssl->client_ca_names, name)
|
||||
== WOLFSSL_FAILURE)
|
||||
ret = MEMORY_ERROR;
|
||||
|
||||
@@ -11113,7 +11113,7 @@ int wolfSSL_i2d_X509_NAME(WOLFSSL_X509_NAME* name, unsigned char** out)
|
||||
InitDecodedCert(cert, *in, (word32)length, NULL);
|
||||
|
||||
/* Parse the X509 subject name */
|
||||
if (GetName(cert, SUBJECT, (int)length) != 0) {
|
||||
if (GetName(cert, ASN_SUBJECT, (int)length) != 0) {
|
||||
WOLFSSL_MSG("WOLFSSL_X509_NAME parse error");
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
@@ -281,11 +281,11 @@ int wolfSSL_X509_verify_cert(WOLFSSL_X509_STORE_CTX* ctx)
|
||||
byte *beforeDate = ctx->current_cert->notBefore.data;
|
||||
|
||||
if (XVALIDATE_DATE(afterDate,
|
||||
(byte)ctx->current_cert->notAfter.type, AFTER) < 1) {
|
||||
(byte)ctx->current_cert->notAfter.type, ASN_AFTER) < 1) {
|
||||
ret = ASN_AFTER_DATE_E;
|
||||
}
|
||||
else if (XVALIDATE_DATE(beforeDate,
|
||||
(byte)ctx->current_cert->notBefore.type, BEFORE) < 1) {
|
||||
(byte)ctx->current_cert->notBefore.type, ASN_BEFORE) < 1) {
|
||||
ret = ASN_BEFORE_DATE_E;
|
||||
}
|
||||
SetupStoreCtxError(ctx, ret);
|
||||
|
||||
Reference in New Issue
Block a user