Skip to content

Commit

Permalink
[ocsp] Centralise test for whether or not an OCSP check is required
Browse files Browse the repository at this point in the history
Signed-off-by: Michael Brown <mcb30@ipxe.org>
  • Loading branch information
mcb30 committed Mar 18, 2018
1 parent ae93064 commit a0021a3
Show file tree
Hide file tree
Showing 3 changed files with 18 additions and 4 deletions.
4 changes: 2 additions & 2 deletions src/crypto/x509.c
Expand Up @@ -40,6 +40,7 @@ FILE_LICENCE ( GPL2_OR_LATER_OR_UBDL );
#include <ipxe/socket.h>
#include <ipxe/in.h>
#include <ipxe/image.h>
#include <ipxe/ocsp.h>
#include <ipxe/x509.h>
#include <config/crypto.h>

Expand Down Expand Up @@ -1362,8 +1363,7 @@ int x509_validate ( struct x509_certificate *cert,
}

/* Fail if OCSP is required */
if ( cert->extensions.auth_info.ocsp.uri.len &&
( ! cert->extensions.auth_info.ocsp.good ) ) {
if ( ocsp_required ( cert ) ) {
DBGC ( cert, "X509 %p \"%s\" requires an OCSP check\n",
cert, x509_name ( cert ) );
return -EACCES_OCSP_REQUIRED;
Expand Down
15 changes: 15 additions & 0 deletions src/include/ipxe/ocsp.h
Expand Up @@ -111,6 +111,21 @@ ocsp_put ( struct ocsp_check *ocsp ) {
ref_put ( &ocsp->refcnt );
}

/**
* Check if X.509 certificate requires an OCSP check
*
* @v cert X.509 certificate
* @ret ocsp_required An OCSP check is required
*/
static inline int ocsp_required ( struct x509_certificate *cert ) {

/* An OCSP check is required if an OCSP URI exists but the
* OCSP status is not (yet) good.
*/
return ( cert->extensions.auth_info.ocsp.uri.len &&
( ! cert->extensions.auth_info.ocsp.good ) );
}

extern int ocsp_check ( struct x509_certificate *cert,
struct x509_certificate *issuer,
struct ocsp_check **ocsp );
Expand Down
3 changes: 1 addition & 2 deletions src/net/validator.c
Expand Up @@ -488,8 +488,7 @@ static void validator_step ( struct validator *validator ) {
/* The issuer is valid, but this certificate is not
* yet valid. If OCSP is applicable, start it.
*/
if ( cert->extensions.auth_info.ocsp.uri.len &&
( ! cert->extensions.auth_info.ocsp.good ) ) {
if ( ocsp_required ( cert ) ) {
/* Start OCSP */
if ( ( rc = validator_start_ocsp ( validator, cert,
issuer ) ) != 0 ) {
Expand Down

0 comments on commit a0021a3

Please sign in to comment.