Merge branch 'development' into iotssl-1381-x509-verify-refactor-restricted
* development: (557 commits) Add attribution for #1351 report Adapt version_features.c Note incompatibility of truncated HMAC extension in ChangeLog Add LinkLibraryDependencies to VS2010 app template Add ChangeLog entry for PR #1382 MD: Make deprecated functions not inline Add ChangeLog entry for PR #1384 Have Visual Studio handle linking to mbedTLS.lib internally Mention in ChangeLog that this fixes #1351 Add issue number to ChangeLog Note in the changelog that this fixes an interoperability issue. Style fix in ChangeLog Add ChangeLog entries for PR #1168 and #1362 Add ChangeLog entry for PR #1165 ctr_drbg: Typo fix in the file description comment. dhm: Fix typo in RFC 5114 constants tests_suite_pkparse: new PKCS8-v2 keys with PRF != SHA1 data_files/pkcs8-v2: add keys generated with PRF != SHA1 tests/pkcs5/pbkdf2_hmac: extend array to accommodate longer results tests/pkcs5/pbkdf2_hmac: add unit tests for additional SHA algorithms ...
This commit is contained in:
commit
05e464dff7
388 changed files with 17537 additions and 5196 deletions
|
@ -2,7 +2,8 @@
|
|||
* \file x509_crt.h
|
||||
*
|
||||
* \brief X.509 certificate parsing and writing
|
||||
*
|
||||
*/
|
||||
/*
|
||||
* Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
|
||||
* SPDX-License-Identifier: Apache-2.0
|
||||
*
|
||||
|
@ -380,21 +381,22 @@ int mbedtls_x509_crt_check_key_usage( const mbedtls_x509_crt *crt,
|
|||
|
||||
#if defined(MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE)
|
||||
/**
|
||||
* \brief Check usage of certificate against extentedJeyUsage.
|
||||
* \brief Check usage of certificate against extendedKeyUsage.
|
||||
*
|
||||
* \param crt Leaf certificate used.
|
||||
* \param usage_oid Intended usage (eg MBEDTLS_OID_SERVER_AUTH or MBEDTLS_OID_CLIENT_AUTH).
|
||||
* \param crt Leaf certificate used.
|
||||
* \param usage_oid Intended usage (eg MBEDTLS_OID_SERVER_AUTH or
|
||||
* MBEDTLS_OID_CLIENT_AUTH).
|
||||
* \param usage_len Length of usage_oid (eg given by MBEDTLS_OID_SIZE()).
|
||||
*
|
||||
* \return 0 if this use of the certificate is allowed,
|
||||
* MBEDTLS_ERR_X509_BAD_INPUT_DATA if not.
|
||||
* \return 0 if this use of the certificate is allowed,
|
||||
* MBEDTLS_ERR_X509_BAD_INPUT_DATA if not.
|
||||
*
|
||||
* \note Usually only makes sense on leaf certificates.
|
||||
* \note Usually only makes sense on leaf certificates.
|
||||
*/
|
||||
int mbedtls_x509_crt_check_extended_key_usage( const mbedtls_x509_crt *crt,
|
||||
const char *usage_oid,
|
||||
size_t usage_len );
|
||||
#endif /* MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE) */
|
||||
const char *usage_oid,
|
||||
size_t usage_len );
|
||||
#endif /* MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE */
|
||||
|
||||
#if defined(MBEDTLS_X509_CRL_PARSE_C)
|
||||
/**
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue