summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509/x509_verify.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Cache CRLs in issuer cachetb2025-02-081-1/+2
* x509_verify_parent_signature(): no need to bump pkey's refcounttb2025-02-081-4/+2
* x509_verify: missing verify error on cached signature mismatchtb2025-02-081-2/+5
* Fix non-xsc path in x509_verify_potential_parent()tb2024-06-071-2/+2
* Remove notBefore and notAfter cacheing.beck2024-04-081-35/+11
* Fix the verifier to use the trust storebeck2024-02-011-1/+13
* Eliminate the timegm(3) dependency in libcryptotb2023-11-131-11/+27
* Remove a misplaced empty linetb2023-05-071-2/+1
* Enable policy checking by default now that we are DAG implementation based.beck2023-04-281-3/+2
* Remove some dead code from the new verifiertb2023-04-161-7/+1
* Refactor x509v3_cache_extensionsjob2023-01-201-10/+2
* Don't do policy checking unless we were asked to do so.beck2023-01-171-2/+3
* Store errors that result from leaf certificate verification.jsing2022-10-171-8/+12
* Remove overly aggressive trust check in legacy verifier that breaksbeck2022-08-051-15/+4
* Take away bogus error assignment before callback call.beck2022-06-281-2/+1
* Fix the legacy verifier callback behaviour for untrusted certs.beck2022-06-281-17/+44
* Allow security_level to mestastasize into the verifiertb2022-06-271-1/+4
* Move leaf certificate checks to the last thing after chain validation.beck2022-06-251-19/+32
* KNF for a brace and zap trailing blank linetb2022-04-121-3/+3
* In some situations, the verifier would discard the error on an unvalidatedbeck2021-11-241-46/+83
* Put curly brace on the correct line.jsing2021-11-141-2/+3
* In X509_STORE_CTX rename the misnamed last_untrusted to num_untrustedtb2021-11-071-3/+3
* Cache sha512 hash and parsed not_before and not_after with X509 cert.beck2021-11-041-94/+78
* Add RFC 3779 checks to both legacy and new verifierjob2021-10-261-1/+9
* When calling the legacy callback, ensure we catch the case where itbeck2021-09-091-2/+5
* Call the callback on success in new verifier in a compatible waybeck2021-09-031-10/+36
* Revert previous change that changed our default return for unable tobeck2021-08-301-11/+5
* Fix Jan's regress in openssl/x509 to do what it says it does,beck2021-08-301-5/+11
* Don't call the verify callback twice on success.beck2021-08-291-2/+1
* Get rid of historical code to extract the roots in the legacy case.beck2021-08-281-26/+29
* Remove the "dump_chain" flag and code. This was a workaround for a problem wherebeck2021-08-281-14/+3
* Pull roots out of the trust store in the legacy xsc when building chainsbeck2021-08-191-6/+14
* Add a check_trust call to the legacy chain validation on chain add, rememberingbeck2021-08-181-2/+10
* Refactor the legacy chain validation from the chain adding code into itsbeck2021-08-181-52/+70
* Use the x509_verify_cert_cache_extensions fuction instead of manuallybeck2021-07-121-9/+4
* Add a bunch of workarond in the verifier to support partial chains andbeck2021-07-101-15/+131
* Revert "Handle X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE in newtb2021-04-281-4/+1
* Use EXFLAG_INVALID to handle out of memory and parse errors intobhe2021-03-131-1/+5
* Fix checks of memory caps of constraints namestb2021-03-121-4/+7
* Set is_trusted in x509_verify_ctx_add_chain()tb2021-02-261-2/+2
* Rename depth to num_untrusted so it identifies what it actually represents.jsing2021-02-251-6/+6
* Avoid passing last and depth to x509_verify_cert_error() on ENOMEM.jsing2021-02-251-3/+2
* Make the new validator check for EXFLAG_CRITICALtb2021-02-241-8/+15
* Set chain on xsc on chain build failure.jsing2021-01-091-1/+3
* Bail out early after finding an single chain if we are have been called frombeck2021-01-091-1/+9
* search the intermediates only after searching the root certs, clarifybeck2021-01-081-11/+15
* Handle X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE in new verifier.jsing2021-01-051-1/+4
* Gracefully handle root certificates being both trusted and untrusted.jsing2021-01-051-3/+14
* Remove two reduntat memset calls.tb2020-12-161-3/+1
* Plug leak in x509_verify_chain_dup()tb2020-11-181-2/+2