diff options
author | Ingo Schwarze <schwarze@cvs.openbsd.org> | 2021-10-29 14:29:25 +0000 |
---|---|---|
committer | Ingo Schwarze <schwarze@cvs.openbsd.org> | 2021-10-29 14:29:25 +0000 |
commit | 0bad372724b73d127418757789ca8e0e857354e5 (patch) | |
tree | 4c614f659da460cd0127a20476cd68d829311720 | |
parent | 138d1e1f3090197110ca0f50e165f746ef1a8639 (diff) |
In x509/x509_purp.c rev. 1.11, tb@ fixed X509_check_purpose(3)
to fail if parsing of a certificate extension failed.
Adjust the documentation accordingly.
OK tb@
-rw-r--r-- | lib/libcrypto/man/X509_check_purpose.3 | 26 |
1 files changed, 18 insertions, 8 deletions
diff --git a/lib/libcrypto/man/X509_check_purpose.3 b/lib/libcrypto/man/X509_check_purpose.3 index fdb58d5b215..e0737251eb3 100644 --- a/lib/libcrypto/man/X509_check_purpose.3 +++ b/lib/libcrypto/man/X509_check_purpose.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: X509_check_purpose.3,v 1.6 2021/07/27 13:27:46 schwarze Exp $ +.\" $OpenBSD: X509_check_purpose.3,v 1.7 2021/10/29 14:29:24 schwarze Exp $ .\" .\" Copyright (c) 2019, 2021 Ingo Schwarze <schwarze@openbsd.org> .\" @@ -14,7 +14,7 @@ .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" -.Dd $Mdocdate: July 27 2021 $ +.Dd $Mdocdate: October 29 2021 $ .Dt X509_CHECK_PURPOSE 3 .Os .Sh NAME @@ -40,6 +40,8 @@ is intended to be used for the given which can be one of the following integer constants. The check succeeds if none of the conditions given in the list below are violated. +It always fails if parsing fails for any extension contained in the +.Fa certificate . .Bl -tag -width 1n .It Dv X509_PURPOSE_SSL_CLIENT .Bl -dash -width 1n -compact @@ -173,10 +175,12 @@ contains a Key Usage extension, the bit is set. .El .It Dv X509_PURPOSE_ANY -The check always succeeds. +Nothing is required except that, if any extensions are present, +parsing them needs to succeed. .It Dv X509_PURPOSE_OCSP_HELPER .\" ocsp_helper, "OCSP helper" -The check always succeeds. +Nothing is required except that, if any extensions are present, +parsing them needs to succeed. The application program is expected to do the actual checking by other means. .It Dv X509_PURPOSE_TIMESTAMP_SIGN @@ -216,6 +220,10 @@ conditions are violated: .It If the .Fa certificate +contains any extensions, parsing them succeeds. +.It +If the +.Fa certificate contains a Key Usage extension, the .Dv keyCertSign bit is set. @@ -320,13 +328,15 @@ or bits set. .El .It Dv X509_PURPOSE_ANY -The check always succeeds, even if the three common conditions +Nothing is required except that, if any extensions are present, +parsing them needs to succeed. +The check even succeeds if the three other common conditions cited above this list are violated. .El .Pp -If the +If parsing of any extensions that are present succeeds and the .Fa purpose -is -1, +argument is \-1, .Fn X509_check_purpose always succeeds, no matter whether or not the .Fa ca @@ -345,7 +355,7 @@ identifiers not listed above. .Fn X509_check_purpose returns the following values: .Bl -column -1 Failure -compact -.It -1 Ta Error Ta The +.It \-1 Ta Error Ta Parsing of certificate extensions failed or the .Fa purpose is invalid. .It 0 Ta Failure Ta The |