mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-02-01 12:32:43 +00:00
Allow read-only access to lists of certificates, CRL, CRL entries
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
This commit is contained in:
parent
2e9d65f928
commit
ca939959e4
@ -63,7 +63,10 @@ typedef struct mbedtls_x509_crl_entry
|
|||||||
* `entry_ext.p == NULL`. */
|
* `entry_ext.p == NULL`. */
|
||||||
mbedtls_x509_buf entry_ext;
|
mbedtls_x509_buf entry_ext;
|
||||||
|
|
||||||
struct mbedtls_x509_crl_entry *MBEDTLS_PRIVATE(next);
|
/** Next element in the linked list of entries.
|
||||||
|
* \p NULL indicates the end of the list.
|
||||||
|
* Do not modify this field directly. */
|
||||||
|
struct mbedtls_x509_crl_entry *next;
|
||||||
}
|
}
|
||||||
mbedtls_x509_crl_entry;
|
mbedtls_x509_crl_entry;
|
||||||
|
|
||||||
@ -96,7 +99,10 @@ typedef struct mbedtls_x509_crl
|
|||||||
mbedtls_pk_type_t MBEDTLS_PRIVATE(sig_pk); /**< Internal representation of the Public Key algorithm of the signature algorithm, e.g. MBEDTLS_PK_RSA */
|
mbedtls_pk_type_t MBEDTLS_PRIVATE(sig_pk); /**< Internal representation of the Public Key algorithm of the signature algorithm, e.g. MBEDTLS_PK_RSA */
|
||||||
void *MBEDTLS_PRIVATE(sig_opts); /**< Signature options to be passed to mbedtls_pk_verify_ext(), e.g. for RSASSA-PSS */
|
void *MBEDTLS_PRIVATE(sig_opts); /**< Signature options to be passed to mbedtls_pk_verify_ext(), e.g. for RSASSA-PSS */
|
||||||
|
|
||||||
struct mbedtls_x509_crl *MBEDTLS_PRIVATE(next);
|
/** Next element in the linked list of CRL.
|
||||||
|
* \p NULL indicates the end of the list.
|
||||||
|
* Do not modify this field directly. */
|
||||||
|
struct mbedtls_x509_crl *next;
|
||||||
}
|
}
|
||||||
mbedtls_x509_crl;
|
mbedtls_x509_crl;
|
||||||
|
|
||||||
|
@ -95,7 +95,10 @@ typedef struct mbedtls_x509_crt
|
|||||||
mbedtls_pk_type_t MBEDTLS_PRIVATE(sig_pk); /**< Internal representation of the Public Key algorithm of the signature algorithm, e.g. MBEDTLS_PK_RSA */
|
mbedtls_pk_type_t MBEDTLS_PRIVATE(sig_pk); /**< Internal representation of the Public Key algorithm of the signature algorithm, e.g. MBEDTLS_PK_RSA */
|
||||||
void *MBEDTLS_PRIVATE(sig_opts); /**< Signature options to be passed to mbedtls_pk_verify_ext(), e.g. for RSASSA-PSS */
|
void *MBEDTLS_PRIVATE(sig_opts); /**< Signature options to be passed to mbedtls_pk_verify_ext(), e.g. for RSASSA-PSS */
|
||||||
|
|
||||||
struct mbedtls_x509_crt *MBEDTLS_PRIVATE(next); /**< Next certificate in the CA-chain. */
|
/** Next certificate in the linked list that constitutes the CA chain.
|
||||||
|
* \p NULL indicates the end of the list.
|
||||||
|
* Do not modify this field directly. */
|
||||||
|
struct mbedtls_x509_crt *next;
|
||||||
}
|
}
|
||||||
mbedtls_x509_crt;
|
mbedtls_x509_crt;
|
||||||
|
|
||||||
|
@ -226,7 +226,7 @@ int main( void )
|
|||||||
mbedtls_ssl_cache_set );
|
mbedtls_ssl_cache_set );
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
mbedtls_ssl_conf_ca_chain( &conf, srvcert.MBEDTLS_PRIVATE(next), NULL );
|
mbedtls_ssl_conf_ca_chain( &conf, srvcert.next, NULL );
|
||||||
if( ( ret = mbedtls_ssl_conf_own_cert( &conf, &srvcert, &pkey ) ) != 0 )
|
if( ( ret = mbedtls_ssl_conf_own_cert( &conf, &srvcert, &pkey ) ) != 0 )
|
||||||
{
|
{
|
||||||
printf( " failed\n ! mbedtls_ssl_conf_own_cert returned %d\n\n", ret );
|
printf( " failed\n ! mbedtls_ssl_conf_own_cert returned %d\n\n", ret );
|
||||||
|
@ -190,7 +190,7 @@ int main( void )
|
|||||||
mbedtls_ssl_conf_rng( &conf, mbedtls_ctr_drbg_random, &ctr_drbg );
|
mbedtls_ssl_conf_rng( &conf, mbedtls_ctr_drbg_random, &ctr_drbg );
|
||||||
mbedtls_ssl_conf_dbg( &conf, my_debug, stdout );
|
mbedtls_ssl_conf_dbg( &conf, my_debug, stdout );
|
||||||
|
|
||||||
mbedtls_ssl_conf_ca_chain( &conf, srvcert.MBEDTLS_PRIVATE(next), NULL );
|
mbedtls_ssl_conf_ca_chain( &conf, srvcert.next, NULL );
|
||||||
if( ( ret = mbedtls_ssl_conf_own_cert( &conf, &srvcert, &pkey ) ) != 0 )
|
if( ( ret = mbedtls_ssl_conf_own_cert( &conf, &srvcert, &pkey ) ) != 0 )
|
||||||
{
|
{
|
||||||
mbedtls_printf( " failed! mbedtls_ssl_conf_own_cert returned %d\n\n", ret );
|
mbedtls_printf( " failed! mbedtls_ssl_conf_own_cert returned %d\n\n", ret );
|
||||||
|
@ -212,7 +212,7 @@ int main( void )
|
|||||||
mbedtls_ssl_cache_set );
|
mbedtls_ssl_cache_set );
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
mbedtls_ssl_conf_ca_chain( &conf, srvcert.MBEDTLS_PRIVATE(next), NULL );
|
mbedtls_ssl_conf_ca_chain( &conf, srvcert.next, NULL );
|
||||||
if( ( ret = mbedtls_ssl_conf_own_cert( &conf, &srvcert, &pkey ) ) != 0 )
|
if( ( ret = mbedtls_ssl_conf_own_cert( &conf, &srvcert, &pkey ) ) != 0 )
|
||||||
{
|
{
|
||||||
mbedtls_printf( " failed\n ! mbedtls_ssl_conf_own_cert returned %d\n\n", ret );
|
mbedtls_printf( " failed\n ! mbedtls_ssl_conf_own_cert returned %d\n\n", ret );
|
||||||
|
@ -331,7 +331,7 @@ int main( int argc, char *argv[] )
|
|||||||
|
|
||||||
mbedtls_printf( "%s\n", buf );
|
mbedtls_printf( "%s\n", buf );
|
||||||
|
|
||||||
cur = cur->MBEDTLS_PRIVATE(next);
|
cur = cur->next;
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
Loading…
x
Reference in New Issue
Block a user