-/* $OpenBSD: cert.c,v 1.127 2024/02/16 14:48:47 tb Exp $ */
+/* $OpenBSD: cert.c,v 1.128 2024/03/19 05:04:13 tb Exp $ */
/*
* Copyright (c) 2022 Theo Buehler <tb@openbsd.org>
* Copyright (c) 2021 Job Snijders <job@openbsd.org>
}
struct auth *
-auth_insert(struct auth_tree *auths, struct cert *cert, struct auth *parent)
+auth_insert(struct auth_tree *auths, struct cert *cert, struct auth *issuer)
{
struct auth *na;
if (na == NULL)
err(1, NULL);
- na->parent = parent;
+ na->issuer = issuer;
na->cert = cert;
na->any_inherits = x509_any_inherits(cert->x509);
-/* $OpenBSD: extern.h,v 1.211 2024/03/17 01:44:59 tb Exp $ */
+/* $OpenBSD: extern.h,v 1.212 2024/03/19 05:04:13 tb Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
enum cert_as_type {
CERT_AS_ID, /* single identifier */
- CERT_AS_INHERIT, /* inherit from parent */
+ CERT_AS_INHERIT, /* inherit from issuer */
CERT_AS_RANGE, /* range of identifiers */
};
* A single ASPA record
*/
struct aspa {
- int valid; /* contained in parent auth */
+ int valid; /* contained in issuer auth */
int talid; /* TAL the ASPA is chained up to */
char *aia; /* AIA */
char *aki; /* AKI */
struct auth {
RB_ENTRY(auth) entry;
struct cert *cert; /* owner information */
- struct auth *parent; /* pointer to parent or NULL for TA cert */
+ struct auth *issuer; /* pointer to issuer or NULL for TA cert */
int any_inherits;
};
/*
-/* $OpenBSD: filemode.c,v 1.38 2024/02/22 12:49:42 job Exp $ */
+/* $OpenBSD: filemode.c,v 1.39 2024/03/19 05:04:13 tb Exp $ */
/*
* Copyright (c) 2019 Claudio Jeker <claudio@openbsd.org>
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
if (aia != NULL)
printf(" %s\n", aia);
- for (; a != NULL; a = a->parent) {
+ for (; a != NULL; a = a->issuer) {
if (a->cert->crl != NULL)
printf(" %s\n", a->cert->crl);
- if (a->parent != NULL && a->parent->cert != NULL &&
- a->parent->cert->mft != NULL)
+ if (a->issuer != NULL && a->issuer->cert != NULL &&
+ a->issuer->cert->mft != NULL)
printf(" %s\n",
- a->parent->cert->mft);
+ a->issuer->cert->mft);
if (a->cert->aia != NULL)
printf(" %s\n", a->cert->aia);
}
-/* $OpenBSD: ip.c,v 1.32 2023/12/27 07:15:55 tb Exp $ */
+/* $OpenBSD: ip.c,v 1.33 2024/03/19 05:04:13 tb Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
* specified in the "ips" array.
* This means that the IP prefix must be strictly within the ranges or
* singletons given in the array.
- * Return 0 if we're inheriting from the parent, >0 if we're covered,
+ * Return 0 if we're inheriting from the issuer, >0 if we're covered,
* or <0 if we're not covered.
*/
int
-/* $OpenBSD: parser.c,v 1.130 2024/03/01 08:10:09 tb Exp $ */
+/* $OpenBSD: parser.c,v 1.131 2024/03/19 05:04:13 tb Exp $ */
/*
* Copyright (c) 2019 Claudio Jeker <claudio@openbsd.org>
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
}
/* TAK EE must be signed by self-signed CA */
- if (a->parent != NULL)
+ if (a->issuer != NULL)
goto out;
tak->talid = a->cert->talid;
-/* $OpenBSD: validate.c,v 1.72 2024/02/22 12:49:42 job Exp $ */
+/* $OpenBSD: validate.c,v 1.73 2024/03/19 05:04:13 tb Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
return 0;
/* If it inherits, walk up the chain. */
- return valid_as(a->parent, min, max);
+ return valid_as(a->issuer, min, max);
}
/*
return 0;
/* If it inherits, walk up the chain. */
- return valid_ip(a->parent, afi, min, max);
+ return valid_ip(a->issuer, afi, min, max);
}
/*
* Make sure the AKI is the same as the AKI listed on the Manifest,
* and that the SKI doesn't already exist.
- * Return the parent by its AKI, or NULL on failure.
+ * Return the issuer by its AKI, or NULL on failure.
*/
struct auth *
valid_ski_aki(const char *fn, struct auth_tree *auths,
err(1, "sk_X509_new_null");
if ((*root = sk_X509_new_null()) == NULL)
err(1, "sk_X509_new_null");
- for (; a != NULL; a = a->parent) {
+ for (; a != NULL; a = a->issuer) {
assert(a->cert->x509 != NULL);
if (!a->any_inherits) {
if (!sk_X509_push(*root, a->cert->x509))
-/* $OpenBSD: x509.c,v 1.81 2024/02/22 12:49:42 job Exp $ */
+/* $OpenBSD: x509.c,v 1.82 2024/03/19 05:04:13 tb Exp $ */
/*
* Copyright (c) 2022 Theo Buehler <tb@openbsd.org>
* Copyright (c) 2021 Claudio Jeker <claudio@openbsd.org>
expires = notafter;
- for (; a != NULL; a = a->parent) {
+ for (; a != NULL; a = a->issuer) {
if (expires > a->cert->notafter)
expires = a->cert->notafter;
crl = crl_get(crlt, a);