mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2025-01-03 23:35:39 +00:00
x509:
-
This commit is contained in:
parent
5a793b74a0
commit
db1ae1ea01
|
@ -83,6 +83,8 @@ mbedtls_x509write_csr;
|
||||||
/**
|
/**
|
||||||
* \brief Load a Certificate Signing Request (CSR) in DER format
|
* \brief Load a Certificate Signing Request (CSR) in DER format
|
||||||
*
|
*
|
||||||
|
* \note CSR attributes (if any) are currently silently ignored.
|
||||||
|
*
|
||||||
* \param csr CSR context to fill
|
* \param csr CSR context to fill
|
||||||
* \param buf buffer holding the CRL data
|
* \param buf buffer holding the CRL data
|
||||||
* \param buflen size of the buffer
|
* \param buflen size of the buffer
|
||||||
|
@ -95,6 +97,8 @@ int mbedtls_x509_csr_parse_der( mbedtls_x509_csr *csr,
|
||||||
/**
|
/**
|
||||||
* \brief Load a Certificate Signing Request (CSR), DER or PEM format
|
* \brief Load a Certificate Signing Request (CSR), DER or PEM format
|
||||||
*
|
*
|
||||||
|
* \note See notes for \c mbedtls_x509_csr_parse_der()
|
||||||
|
*
|
||||||
* \param csr CSR context to fill
|
* \param csr CSR context to fill
|
||||||
* \param buf buffer holding the CRL data
|
* \param buf buffer holding the CRL data
|
||||||
* \param buflen size of the buffer
|
* \param buflen size of the buffer
|
||||||
|
@ -108,6 +112,8 @@ int mbedtls_x509_csr_parse( mbedtls_x509_csr *csr, const unsigned char *buf, siz
|
||||||
/**
|
/**
|
||||||
* \brief Load a Certificate Signing Request (CSR)
|
* \brief Load a Certificate Signing Request (CSR)
|
||||||
*
|
*
|
||||||
|
* \note See notes for \c mbedtls_x509_csr_parse()
|
||||||
|
*
|
||||||
* \param csr CSR context to fill
|
* \param csr CSR context to fill
|
||||||
* \param path filename to read the CSR from
|
* \param path filename to read the CSR from
|
||||||
*
|
*
|
||||||
|
|
|
@ -207,6 +207,13 @@ int mbedtls_x509_csr_parse_der( mbedtls_x509_csr *csr,
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* attributes [0] Attributes
|
* attributes [0] Attributes
|
||||||
|
*
|
||||||
|
* The list of possible attributes is open-ended, though RFC 2985
|
||||||
|
* (PKCS#9) defines a few in section 5.4. We currently don't support any,
|
||||||
|
* so we just ignore them. This is a safe thing to do as the worst thing
|
||||||
|
* that could happen is that we issue a certificate that does not match
|
||||||
|
* the requester's expectations - this cannot cause a violation of our
|
||||||
|
* signature policies.
|
||||||
*/
|
*/
|
||||||
if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
|
if( ( ret = mbedtls_asn1_get_tag( &p, end, &len,
|
||||||
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_CONTEXT_SPECIFIC ) ) != 0 )
|
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_CONTEXT_SPECIFIC ) ) != 0 )
|
||||||
|
@ -214,7 +221,6 @@ int mbedtls_x509_csr_parse_der( mbedtls_x509_csr *csr,
|
||||||
mbedtls_x509_csr_free( csr );
|
mbedtls_x509_csr_free( csr );
|
||||||
return( MBEDTLS_ERR_X509_INVALID_FORMAT + ret );
|
return( MBEDTLS_ERR_X509_INVALID_FORMAT + ret );
|
||||||
}
|
}
|
||||||
// TODO Parse Attributes / extension requests
|
|
||||||
|
|
||||||
p += len;
|
p += len;
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue