error = certificate_validate_chain(cert, args->crls);
if (error)
goto end2;
- error = certificate_validate_rfc6487(cert, EE);
+ error = certificate_validate_rfc6487(cert, CERTYPE_EE);
if (error)
goto end2;
error = certificate_validate_extensions_ee(cert, sid, &args->refs,
goto end2;
resources_set_policy(args->res, policy);
- error = certificate_get_resources(cert, args->res, EE);
+ error = certificate_get_resources(cert, args->res, CERTYPE_EE);
if (error)
goto end2;
if (!ok)
return val_crypto_err("X509_PUBKEY_get0_param() returned %d", ok);
- if (type == BGPSEC)
+ if (type == CERTYPE_BGPSEC)
return validate_certificate_public_key_algorithm_bgpsec(pa);
error = validate_certificate_public_key_algorithm(pa);
* getting the message.
*/
- if (type == TA) {
+ if (type == CERTYPE_TA) {
error = validate_spki(pubkey);
if (error)
return error;
return error;
/* rfc6487#section-4.4 */
- error = validate_issuer(cert, type == TA);
+ error = validate_issuer(cert, type == CERTYPE_TA);
if (error)
return error;
return __certificate_get_resources(cert, resources,
NID_sbgp_ipAddrBlock, NID_sbgp_autonomousSysNum,
nid_ipAddrBlocksv2(), nid_autonomousSysIdsv2(),
- "6484", "8360", type != BGPSEC);
+ "6484", "8360", type != CERTYPE_BGPSEC);
case RPKI_POLICY_RFC8360:
return __certificate_get_resources(cert, resources,
nid_ipAddrBlocksv2(), nid_autonomousSysIdsv2(),
NID_sbgp_ipAddrBlock, NID_sbgp_autonomousSysNum,
- "8360", "6484", type != BGPSEC);
+ "8360", "6484", type != CERTYPE_BGPSEC);
}
pr_crit("Unknown policy: %u", policy);
get_certificate_type(X509 *cert, bool is_ta, enum cert_type *result)
{
if (is_ta) {
- *result = TA;
+ *result = CERTYPE_TA;
return 0;
}
goto err;
if (X509_check_ca(cert) == 1) {
- *result = CA;
+ *result = CERTYPE_CA;
return 0;
}
if (has_bgpsec_router_eku(cert)) {
- *result = BGPSEC;
+ *result = CERTYPE_BGPSEC;
return 0;
}
err:
- *result = EE; /* Shuts up nonsense gcc 8.3 warning */
+ *result = CERTYPE_EE; /* Shuts up nonsense gcc 8.3 warning */
return pr_val_err("Certificate is not TA, CA nor BGPsec. Ignoring...");
}
/* Debug cert type */
switch (type) {
- case TA:
+ case CERTYPE_TA:
break;
- case CA:
+ case CERTYPE_CA:
pr_val_debug("Type: CA");
break;
- case BGPSEC:
+ case CERTYPE_BGPSEC:
pr_val_debug("Type: BGPsec EE. Ignoring...");
goto revert_cert;
- case EE:
+ case CERTYPE_EE:
pr_val_debug("Type: unexpected, validated as CA");
break;
}
memset(&refs, 0, sizeof(refs));
switch (type) {
- case TA:
+ case CERTYPE_TA:
error = certificate_validate_extensions_ta(cert, &sia_uris,
&policy);
break;
/* Certificate types in the RPKI */
enum cert_type {
- TA, /* Trust Anchor */
- CA, /* Certificate Authority */
- BGPSEC, /* BGPsec certificates */
- EE, /* End Entity certificates */
+ CERTYPE_TA, /* Trust Anchor */
+ CERTYPE_CA, /* Certificate Authority */
+ CERTYPE_BGPSEC, /* BGPsec certificates */
+ CERTYPE_EE, /* End Entity certificates */
};
/**