summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509 (follow)
Commit message (Expand)AuthorAgeFilesLines
* Make the symbol for ASN1_time_tm_clamp_notafter visible so libtlsbeck2017-08-271-1/+3
* Add ability to clamp a notafter to values representable in a 32 bit time_tbeck2017-08-131-5/+21
* Revert previous change that forced consistency between return value andbeck2017-04-281-10/+2
* revert previous accidental commitbeck2017-04-281-2/+10
* *** empty log message ***beck2017-04-281-10/+2
* Kill leak introduced with refactorbeck2017-02-051-3/+6
* Send the function codes from the error functions to the bit bucket,beck2017-01-2915-178/+98
* fix bogus commentbeck2017-01-211-2/+2
* Make return value of X509_verify_cert be consistent with the error code,beck2017-01-211-2/+10
* Rework internal_verify, mostly from OpenSSL. so we can progressbeck2017-01-201-102/+102
* Add and remove some blank lines, in order to make X509_verify_cert()jsing2017-01-071-6/+4
* Revert part of r1.54 as there are at least two situations where we are stilljsing2017-01-071-4/+2
* Add a small bit of belt and suspenders around ERR_V_OK with X509_STORE_ctxbeck2017-01-031-2/+20
* bring in boring's internal check_trust function to fix a bug introducedbeck2017-01-031-24/+79
* Expand ASN1_ITEM_rptr macros - no change in generated assembly.jsing2016-12-302-55/+55
* Remove all DECLARE_ASN1_SET_OF macro usage - since 2000 these have beenjsing2016-12-271-8/+1
* Explicitly export a list of symbols from libcrypto.jsing2016-12-212-1/+9
* Remove prototypes from the public header for X509_VERIFY_PARAM functionsjsing2016-12-212-6/+7
* Fix previous change to X509_STORE_add_{cert,crl} to not free the inputmiod2016-11-131-3/+7
* Check for stack push failure, and correctly destroy the object we failedmiod2016-11-081-20/+47
* Rework X509_verify_cert to support alt chains on certificate verification,beck2016-11-061-117/+265
* The upcoming x509 alt chains diff tightens the trust requirementsbeck2016-11-061-1/+17
* Commit a reminder that the default is not the default. This needs tobeck2016-11-061-1/+2
* use the correct function for freebcook2016-11-061-2/+2
* Part one of the alt chains changes, bring in newer modifications tobeck2016-11-053-73/+411
* make public ASN1_time_parse and ASN1_time_tm_cmp to replace former hiddenbeck2016-11-043-5/+3
* Add X509_up_ref, from boringbeck2016-11-042-2/+11
* In X509_cmp_time(), pass asn1_time_parse() the tag of the field beingguenther2016-10-021-2/+3
* Expand DECLARE_ASN1_.*FUNCTIONS macros.jsing2016-09-041-33/+133
* Return zero from two functions on allocation failure instead of alwaysmmcc2016-03-212-4/+4
* X509_free(3) is NULL-safe, so remove NULL checks before its calls.mmcc2016-03-112-6/+4
* initialize ok to 0beck2015-12-141-2/+2
* Stop supporing "legcay" time formats that OpenSSL supports. Rewrite thebeck2015-10-192-22/+24
* Convert a number of the old ASN1_{d2i,i2d}_{bio,fp}_of() macros tojsing2015-10-131-19/+19
* Flense the greasy black guts of unreadble string parsing code out of three areasbeck2015-10-022-92/+37
* s/M_ASN1_TIME_free/ASN1_TIME_free/jsing2015-09-302-7/+7
* Replace M_ASN1_INTEGER_(new|free) with ASN1_INTEGER_(new|free) - this isjsing2015-09-304-12/+12
* Add support for disabling certificate and CRL validity checking.jsing2015-09-142-11/+15
* Reorder functions for readability/consistency.jsing2015-09-131-235/+228
* Expand obsolete M_ASN1.*(cmp|dup|print|set) macros - no change in generatedjsing2015-07-294-13/+13
* Now that it is safe to invoke X509_STORE_CTX_cleanup() if X509_STORE_CTX_init()miod2015-07-191-3/+5
* Simplify X509_STORE_CTX_init and make it safe with stack variables.doug2015-07-191-58/+55
* Fix bad indenting in LibreSSL.doug2015-06-131-4/+4
* Avoid a potential out-of-bounds read in X509_cmp_time(), due to missingjsing2015-06-111-4/+27
* Don't ignore the reference count in X509_STORE_free.doug2015-04-251-1/+5
* Remove d2i_X509_PKEY and i2d_X509_PKEY from the SSLeay days.doug2015-04-121-3/+1
* Remove all getenv() calls, especially those wrapped by issetugid().deraadt2015-04-113-28/+8
* Avoid a NULL pointer deref when X509_get_pubkey() returns NULL.doug2015-03-151-2/+4
* If you do not support POSIX I/O then you're not tall enough to ride...jsing2015-02-121-5/+1
* More unifdef OPENSSL_NO_RFC3779 that got missed last time around.jsing2015-02-112-16/+2