summaryrefslogtreecommitdiffstats
path: root/include
diff options
context:
space:
mode:
authorDr. Stephen Henson <steve@openssl.org>2016-07-03 21:41:57 +0100
committerDr. Stephen Henson <steve@openssl.org>2016-07-11 23:30:04 +0100
commit5bd5dcd49605ca2aa7931599894302a3ac4b0b04 (patch)
tree6a0b8a29f6688a2e97b098ee29f690f7b10ed041 /include
parent1d03b7b893223b1b049cb992e5c57c9a10f5846c (diff)
Add nameConstraints commonName checking.
New hostname checking function asn1_valid_host() Check commonName entries against nameConstraints: any CN components in EE certificate which look like hostnames are checked against nameConstraints. Note that RFC5280 et al only require checking subject alt name against DNS name constraints. Reviewed-by: Richard Levitte <levitte@openssl.org>
Diffstat (limited to 'include')
-rw-r--r--include/openssl/x509v3.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/include/openssl/x509v3.h b/include/openssl/x509v3.h
index 14e25d7680..e6053c57fe 100644
--- a/include/openssl/x509v3.h
+++ b/include/openssl/x509v3.h
@@ -524,6 +524,7 @@ DECLARE_ASN1_FUNCTIONS(ISSUING_DIST_POINT)
int DIST_POINT_set_dpname(DIST_POINT_NAME *dpn, X509_NAME *iname);
int NAME_CONSTRAINTS_check(X509 *x, NAME_CONSTRAINTS *nc);
+int NAME_CONSTRAINTS_check_CN(X509 *x, NAME_CONSTRAINTS *nc);
DECLARE_ASN1_FUNCTIONS(ACCESS_DESCRIPTION)
DECLARE_ASN1_FUNCTIONS(AUTHORITY_INFO_ACCESS)