aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib/cert/x509/certstor.cpp
diff options
context:
space:
mode:
authorlloyd <[email protected]>2014-02-08 15:50:01 +0000
committerlloyd <[email protected]>2014-02-08 15:50:01 +0000
commit7def8d303e3cf0f1a27ee8ebcb8ae5137261a361 (patch)
tree144e644bda4c58b80a9f8b9422bc6e723701e4b1 /src/lib/cert/x509/certstor.cpp
parent1895c74f25debdf1a9d1ca9e539ec6cb598012a7 (diff)
Fix a bug introduced in 1.11.6 where we tried to check CRL signatures
against the wrong key, causing any check to fail. Clean up the NIST X.509 path validation tests and run them by default.
Diffstat (limited to 'src/lib/cert/x509/certstor.cpp')
-rw-r--r--src/lib/cert/x509/certstor.cpp4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/lib/cert/x509/certstor.cpp b/src/lib/cert/x509/certstor.cpp
index e8b3a0718..7d708edd9 100644
--- a/src/lib/cert/x509/certstor.cpp
+++ b/src/lib/cert/x509/certstor.cpp
@@ -10,7 +10,7 @@
namespace Botan {
-const X509_CRL* Certificate_Store::find_crl(const X509_Certificate&) const
+const X509_CRL* Certificate_Store::find_crl_for(const X509_Certificate&) const
{
return nullptr;
}
@@ -86,7 +86,7 @@ void Certificate_Store_In_Memory::add_crl(const X509_CRL& crl)
m_crls.push_back(crl);
}
-const X509_CRL* Certificate_Store_In_Memory::find_crl(const X509_Certificate& subject) const
+const X509_CRL* Certificate_Store_In_Memory::find_crl_for(const X509_Certificate& subject) const
{
const std::vector<byte>& key_id = subject.authority_key_id();