summaryrefslogtreecommitdiff
path: root/usr.sbin/rpki-client/mft.c
diff options
context:
space:
mode:
authorClaudio Jeker <claudio@cvs.openbsd.org>2021-01-29 10:13:17 +0000
committerClaudio Jeker <claudio@cvs.openbsd.org>2021-01-29 10:13:17 +0000
commit0d428d22b560891e56e166ee261f26640d92f2e9 (patch)
treef1270e4df1335ef2775f0c074594e87e99c22a0b /usr.sbin/rpki-client/mft.c
parente04cd395dfa13aae149422b2d53e2acd81016f02 (diff)
A while ago rpki-client was changed to validate the sha256 hashes of
files referenced in MFT files during the validation of the MFT file. An MFT is only valid if all files are present and their hashes are valid. Because of this there is no longer the need to check the hash when these files are parsed later on. Remove these checks for CRT, ROA and CRL files. Use the presence of the pkey when parsing cert files to decide if it is a root cert or not. OK tb@
Diffstat (limited to 'usr.sbin/rpki-client/mft.c')
-rw-r--r--usr.sbin/rpki-client/mft.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/usr.sbin/rpki-client/mft.c b/usr.sbin/rpki-client/mft.c
index 767a84da490..1f41bfecd03 100644
--- a/usr.sbin/rpki-client/mft.c
+++ b/usr.sbin/rpki-client/mft.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: mft.c,v 1.23 2021/01/08 08:09:07 claudio Exp $ */
+/* $OpenBSD: mft.c,v 1.24 2021/01/29 10:13:16 claudio Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
@@ -384,7 +384,7 @@ mft_parse(X509 **x509, const char *fn)
p.fn = fn;
cms = cms_parse_validate(x509, fn, "1.2.840.113549.1.9.16.1.26",
- NULL, &cmsz);
+ &cmsz);
if (cms == NULL)
return NULL;
assert(*x509 != NULL);