In message <[EMAIL PROTECTED]> on Fri, 19 Nov 2004 00:45:01 +0100, "Dr. Stephen 
Henson" <[EMAIL PROTECTED]> said:

steve> The only case remaining is an application that defines a custom
steve> purpose which includes its own broken CA tolerator. I've never
steve> heard of such a thing being used so I'd say this is unlikely to
steve> affect anything. If anyone knows otherwise please speak up!

So?  If it was broken before, it won't be more or less broken now.
I don't see that as a reason not to do a proper CA check first, as
that has nothing to do with the purpose per se.  Note that the changes
I've made to the code in v3_purp.c was mostly to get a more complete
CA checker, and that the standard purpose checkers haven't really
changed in functionality.

There's one thing I'm a little dubious about.
check_chain_extensions() still give X509_check_purpose() i as 3rd
argument.  I think the argument should really be derived from
must_be_ca instead, but I'm not sure what to do when the value is -1.
Maybe the expression 'must_be_ca > 0' should be used, considering how
the standard purpose checkers work?  Yeah, that seems to be the most
sensible manouver...

Cheers,
Richard

-----
Please consider sponsoring my work on free software.
See http://www.free.lp.se/sponsoring.html for details.

-- 
Richard Levitte                         [EMAIL PROTECTED]
                                        http://richard.levitte.org/

"When I became a man I put away childish things, including
 the fear of childishness and the desire to be very grown up."
                                                -- C.S. Lewis
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to