Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Provide X509_chain_up_ref(). | jsing | 2018-02-22 | 2 | -2/+21 | |
| | | | | From BoringSSL. | |||||
* | Provide X509_STORE_get0_objects(), X509_STORE_get_ex_data() and | jsing | 2018-02-22 | 2 | -2/+23 | |
| | | | | X509_STORE_set_ex_data(). | |||||
* | Provide X509_OBJECT_get0_X509() and X509_OBJECT_get0_X509_CRL(). | jsing | 2018-02-22 | 2 | -3/+20 | |
| | ||||||
* | Provide X509_STORE_up_ref(). | jsing | 2018-02-22 | 2 | -4/+13 | |
| | ||||||
* | Provide X509_STORE_CTX_get0_chain() and X509_STORE_CTX_get0_store(). | jsing | 2018-02-22 | 2 | -4/+20 | |
| | ||||||
* | Provide X509_get0_tbs_sigalg(). | jsing | 2018-02-22 | 2 | -3/+10 | |
| | ||||||
* | Provide X509_set1_notBefore() and X509_set1_notAfter(). | jsing | 2018-02-22 | 2 | -2/+16 | |
| | ||||||
* | Provide X509_get0_pubkey(). | jsing | 2018-02-22 | 2 | -4/+11 | |
| | ||||||
* | Provide X509_CRL_set1_lastUpdate() and X509_CRL_set1_nextUpdate(). | jsing | 2018-02-22 | 2 | -2/+16 | |
| | ||||||
* | Provide X509_CRL_get0_extensions() and X509_CRL_get_signature_nid(). | jsing | 2018-02-22 | 1 | -1/+5 | |
| | ||||||
* | Provide X509_CRL_up_ref(). | jsing | 2018-02-22 | 2 | -2/+11 | |
| | ||||||
* | Provide X509_REQ_get_signature_nid(). | jsing | 2018-02-22 | 1 | -1/+3 | |
| | ||||||
* | Provide X509_REVOKED_get0_extensions(), X509_REVOKED_get0_revocationDate() | jsing | 2018-02-22 | 2 | -3/+24 | |
| | | | | and X509_REVOKED_get0_serialNumber(). | |||||
* | Provide X509_NAME_get0_der(). | jsing | 2018-02-20 | 1 | -1/+2 | |
| | | | | From OpenSSL. | |||||
* | Provide X509_REQ_get0_signature() | jsing | 2018-02-20 | 1 | -1/+4 | |
| | ||||||
* | Provide X509_CRL_get0_{last,next}Update() and X509_CRL_get0_signature(). | jsing | 2018-02-20 | 1 | -1/+6 | |
| | ||||||
* | Provide X509_get0_extensions() and X509_get0_signature() | jsing | 2018-02-17 | 2 | -3/+11 | |
| | ||||||
* | Provide X509_STORE_CTX_get0_{cert,untrusted}() and | jsing | 2018-02-14 | 2 | -3/+31 | |
| | | | | X509_STORE_CTX_set0_{trusted_stack,untrusted}(). | |||||
* | Provide X509_get{0,m}_not{Before,After}(). | jsing | 2018-02-14 | 2 | -5/+37 | |
| | ||||||
* | Provide X509_get_signature_nid(). | jsing | 2018-02-14 | 1 | -1/+3 | |
| | ||||||
* | Expose X509_VERIFY_PARAM_* functions that appeared in the OpenSSL 1.0.2 | jsing | 2018-02-10 | 1 | -1/+16 | |
| | | | | API and are now in use by various libraries and applications. | |||||
* | Please variable decl before code. | deraadt | 2017-12-09 | 1 | -2/+2 | |
| | ||||||
* | Make the symbol for ASN1_time_tm_clamp_notafter visible so libtls | beck | 2017-08-27 | 1 | -1/+3 | |
| | | | | | can get at it, so libtls can also deal with notafter's past the realm of 32 bit time in portable | |||||
* | Add ability to clamp a notafter to values representable in a 32 bit time_t | beck | 2017-08-13 | 1 | -5/+21 | |
| | | | | | | This will only be used in portable. As noted, necessary to make us conformant to RFC 5280 4.1.2.5. ok jsing@ bcook@ | |||||
* | Revert previous change that forced consistency between return value and | beck | 2017-04-28 | 1 | -10/+2 | |
| | | | | | | | error code, since this breaks the documented API. Under certain circumstances this will result in incorrect successful certiticate verification (where a user supplied callback always returns 1, and later code checks the error code to potentially abort post verification) | |||||
* | revert previous accidental commit | beck | 2017-04-28 | 1 | -2/+10 | |
| | ||||||
* | *** empty log message *** | beck | 2017-04-28 | 1 | -10/+2 | |
| | ||||||
* | Kill leak introduced with refactor | beck | 2017-02-05 | 1 | -3/+6 | |
| | | | | ok jsing@ | |||||
* | Send the function codes from the error functions to the bit bucket, | beck | 2017-01-29 | 15 | -178/+98 | |
| | | | | | | as was done earlier in libssl. Thanks inoguchi@ for noticing libssl had more reacharounds into this. ok jsing@ inoguchi@ | |||||
* | fix bogus comment | beck | 2017-01-21 | 1 | -2/+2 | |
| | | | | ok jsing@ | |||||
* | Make return value of X509_verify_cert be consistent with the error code, | beck | 2017-01-21 | 1 | -2/+10 | |
| | | | | | | with the caveat that we force V_OK when a user provided callback has us returning success. ok inoguchi@ jsing@ | |||||
* | Rework internal_verify, mostly from OpenSSL. so we can progress | beck | 2017-01-20 | 1 | -102/+102 | |
| | | | | | towards cleaning up the V_OK stuff. ok kinichiro@ | |||||
* | Add and remove some blank lines, in order to make X509_verify_cert() | jsing | 2017-01-07 | 1 | -6/+4 | |
| | | | | (slightly) more readable. | |||||
* | Revert part of r1.54 as there are at least two situations where we are still | jsing | 2017-01-07 | 1 | -4/+2 | |
| | | | | | | | returning ok == 1, with ctx->error not being X509_V_OK. Hopefully we can restore this behaviour once these are ironed out. Discussed with beck@ | |||||
* | Add a small bit of belt and suspenders around ERR_V_OK with X509_STORE_ctx | beck | 2017-01-03 | 1 | -2/+20 | |
| | | | | | | | and X509_verify_cert - We at least make it so an an init'ed ctx is not "valid" until X509_verify_cert has actually been called, And we make it impossible to return success without having the error set to ERR_V_OK. ok jsing@ | |||||
* | bring in boring's internal check_trust function to fix a bug introduced | beck | 2017-01-03 | 1 | -24/+79 | |
| | | | | | | when we went to alternate cert chains. this correctly does not clobber the ctx->error when using an alt chain. ok jsing@ | |||||
* | Expand ASN1_ITEM_rptr macros - no change in generated assembly. | jsing | 2016-12-30 | 2 | -55/+55 | |
| | ||||||
* | Remove all DECLARE_ASN1_SET_OF macro usage - since 2000 these have been | jsing | 2016-12-27 | 1 | -8/+1 | |
| | | | | | nothing but markers for utils/mkstack.pl... and we removed the code that generated more macros from these markers in 2014. | |||||
* | Explicitly export a list of symbols from libcrypto. | jsing | 2016-12-21 | 2 | -1/+9 | |
| | | | | | | | | | | | | | | | | Move the "internal" BN functions from bn.h to bn_lcl.h and stop exporting the bn_* symbols. These are documented as only being intended for internal use, so why they were placed in a public header is beyond me... This hides 363 previously exported symbols, most of which exist in headers that are not installed and were never intended to be public. This also removes a few crusty old things that should have died long ago (like _ossl_old_des_read_pw). But don't worry... there are still 3451 symbols exported from the library. With input and testing from inoguchi@. ok beck@ inoguchi@ | |||||
* | Remove prototypes from the public header for X509_VERIFY_PARAM functions | jsing | 2016-12-21 | 2 | -6/+7 | |
| | | | | | | that were recently added but not intended to be made public at this stage. Discussed with beck@ | |||||
* | Fix previous change to X509_STORE_add_{cert,crl} to not free the input | miod | 2016-11-13 | 1 | -3/+7 | |
| | | | | object in the error path - we don't own it. | |||||
* | Check for stack push failure, and correctly destroy the object we failed | miod | 2016-11-08 | 1 | -20/+47 | |
| | | | | | | | to push in that case. While there replace an inline version of X509_OBJECT_free_contents() by a call to said function. ok beck@ | |||||
* | Rework X509_verify_cert to support alt chains on certificate verification, | beck | 2016-11-06 | 1 | -117/+265 | |
| | | | | | via boringssl. ok jsing@ miod@ | |||||
* | The upcoming x509 alt chains diff tightens the trust requirements | beck | 2016-11-06 | 1 | -1/+17 | |
| | | | | | | | for certificates. This (from OpenSSL) ensures that the current "default" behaviour remains the same. We should revisit this later ok jsing@ | |||||
* | Commit a reminder that the default is not the default. This needs to | beck | 2016-11-06 | 1 | -1/+2 | |
| | | | | | be revisited. ok jsing@ | |||||
* | use the correct function for free | bcook | 2016-11-06 | 1 | -2/+2 | |
| | | | | ok beck@ | |||||
* | Part one of the alt chains changes, bring in newer modifications to | beck | 2016-11-05 | 3 | -73/+411 | |
| | | | | | VERIFY_PARAMS - based on boringssl. ok jsing@ miod@ | |||||
* | make public ASN1_time_parse and ASN1_time_tm_cmp to replace former hidden | beck | 2016-11-04 | 3 | -5/+3 | |
| | | | | | | functions.. document with a man page. bump majors on libtls, libssl, libcrypto ok jsing@ guenther@ | |||||
* | Add X509_up_ref, from boring | beck | 2016-11-04 | 2 | -2/+11 | |
| | | | | ok jsing@ | |||||
* | In X509_cmp_time(), pass asn1_time_parse() the tag of the field being | guenther | 2016-10-02 | 1 | -2/+3 | |
| | | | | | | | | | parsed so that a malformed GeneralizedTime field is recognized as an error instead of potentially being interpreted as if it was a valid UTCTime. Reported by Theofilos Petsios (theofilos (at) cs.columbia.edu) ok beck@ tedu@ jsing@ |