-/* $OpenBSD: cert.c,v 1.81 2022/05/12 10:49:22 tb Exp $ */
+/* $OpenBSD: cert.c,v 1.82 2022/05/15 15:00:53 deraadt Exp $ */
/*
* Copyright (c) 2021 Job Snijders <job@openbsd.org>
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
}
if (p.res->ipsz > 0) {
warnx("%s: unexpected IP resources in BGPsec cert",
- p.fn);
+ p.fn);
goto out;
}
if (sia_present) {
warnx("%s: unexpected SIA extension in BGPsec cert",
- p.fn);
+ p.fn);
goto out;
}
break;
warnx("%s: certificate not yet valid", fn);
goto badcert;
}
- if (X509_cmp_current_time(notAfter) != 1) {
+ if (X509_cmp_current_time(notAfter) != 1) {
warnx("%s: certificate has expired", fn);
goto badcert;
}
-/* $OpenBSD: cms.c,v 1.17 2022/05/11 16:13:05 tb Exp $ */
+/* $OpenBSD: cms.c,v 1.18 2022/05/15 15:00:53 deraadt Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
#include "extern.h"
-extern ASN1_OBJECT *cnt_type_oid;
-extern ASN1_OBJECT *msg_dgst_oid;
-extern ASN1_OBJECT *sign_time_oid;
-extern ASN1_OBJECT *bin_sign_time_oid;
+extern ASN1_OBJECT *cnt_type_oid;
+extern ASN1_OBJECT *msg_dgst_oid;
+extern ASN1_OBJECT *sign_time_oid;
+extern ASN1_OBJECT *bin_sign_time_oid;
/*
* Parse and validate a self-signed CMS message, where the signing X509
-/* $OpenBSD: encoding.c,v 1.12 2022/04/20 15:31:48 tb Exp $ */
+/* $OpenBSD: encoding.c,v 1.13 2022/05/15 15:00:53 deraadt Exp $ */
/*
* Copyright (c) 2020 Claudio Jeker <claudio@openbsd.org>
*
-/* $OpenBSD: http.c,v 1.58 2022/05/04 10:17:16 claudio Exp $ */
+/* $OpenBSD: http.c,v 1.59 2022/05/15 15:00:53 deraadt Exp $ */
/*
* Copyright (c) 2020 Nils Fisher <nils_fisher@hotmail.com>
* Copyright (c) 2020 Claudio Jeker <claudio@openbsd.org>
-/* $OpenBSD: ip.c,v 1.23 2022/05/13 06:18:21 tb Exp $ */
+/* $OpenBSD: ip.c,v 1.24 2022/05/15 15:00:53 deraadt Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
#include "extern.h"
-#define PREFIX_SIZE(x) (((x) + 7) / 8)
+#define PREFIX_SIZE(x) (((x) + 7) / 8)
/*
* Parse an IP address family.
-/* $OpenBSD: mft.c,v 1.64 2022/05/11 21:19:06 job Exp $ */
+/* $OpenBSD: mft.c,v 1.65 2022/05/15 15:00:53 deraadt Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
int found_crl;
};
-extern ASN1_OBJECT *mft_oid;
+extern ASN1_OBJECT *mft_oid;
/*
* Convert an ASN1_GENERALIZEDTIME to a struct tm.
-/* $OpenBSD: print.c,v 1.11 2022/05/09 17:02:34 job Exp $ */
+/* $OpenBSD: print.c,v 1.12 2022/05/15 15:00:53 deraadt Exp $ */
/*
* Copyright (c) 2021 Claudio Jeker <claudio@openbsd.org>
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
size_t i;
for (i = 0; i < sizeof(buf) && *hex != '\0'; i++) {
- if (i % 3 == 2)
+ if (i % 3 == 2)
buf[i] = ':';
else
buf[i] = *hex++;
-/* $OpenBSD: rrdp_notification.c,v 1.14 2022/02/14 14:46:16 job Exp $ */
+/* $OpenBSD: rrdp_notification.c,v 1.15 2022/05/15 15:00:53 deraadt Exp $ */
/*
* Copyright (c) 2020 Nils Fisher <nils_fisher@hotmail.com>
* Copyright (c) 2021 Claudio Jeker <claudio@openbsd.org>
nxml->current->serial = nxml->serial;
return nxml->snapshot_uri;
case DELTA:
- /* first bump serial, then use first delta */
+ /* first bump serial, then use first delta */
nxml->current->serial += 1;
d = TAILQ_FIRST(&nxml->delta_q);
assert(d->serial == nxml->current->serial);
-/* $OpenBSD: rsc.c,v 1.2 2022/05/10 07:41:37 tb Exp $ */
+/* $OpenBSD: rsc.c,v 1.3 2022/05/15 15:00:53 deraadt Exp $ */
/*
* Copyright (c) 2022 Job Snijders <job@fastly.com>
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
static int
rsc_parse_ipaddrfamitem(struct parse *p, const ASN1_OCTET_STRING *os)
{
- ASN1_OCTET_STRING *aos = NULL;
+ ASN1_OCTET_STRING *aos = NULL;
IPAddressOrRange *aor = NULL;
int tag;
- const unsigned char *cnt = os->data;
+ const unsigned char *cnt = os->data;
long cntsz;
- const unsigned char *d;
+ const unsigned char *d;
struct cert_ip ip;
int rc = 0;
-/* $OpenBSD: validate.c,v 1.35 2022/05/12 10:53:59 tb Exp $ */
+/* $OpenBSD: validate.c,v 1.36 2022/05/15 15:00:53 deraadt Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
switch (rsc->ips[i].type) {
case CERT_IP_RANGE:
ip_addr_print(&rsc->ips[i].range.min,
- rsc->ips[i].afi, buf1, sizeof(buf1));
+ rsc->ips[i].afi, buf1, sizeof(buf1));
ip_addr_print(&rsc->ips[i].range.max,
- rsc->ips[i].afi, buf2, sizeof(buf2));
+ rsc->ips[i].afi, buf2, sizeof(buf2));
warnx("%s: RSC ResourceBlock: uncovered IP Range: "
- "%s--%s", fn, buf1, buf2);
+ "%s--%s", fn, buf1, buf2);
break;
case CERT_IP_ADDR:
ip_addr_print(&rsc->ips[i].ip,
- rsc->ips[i].afi, buf1, sizeof(buf1));
+ rsc->ips[i].afi, buf1, sizeof(buf1));
warnx("%s: RSC ResourceBlock: uncovered IP: "
- "%s", fn, buf1);
+ "%s", fn, buf1);
break;
default:
break;