summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509 (follow)
Commit message (Expand)AuthorAgeFilesLines
* This commit was manufactured by cvs2git to create tag 'OPENBSD_7_0_BASE'.OPENBSD_7_0_BASEcvs2svn2021-09-301-5/+9
* In X509_check_issued() do the same dance around x509v3_cache_extensions()claudio2021-09-131-3/+11
* When calling the legacy callback, ensure we catch the case where itbeck2021-09-091-2/+5
* Replace bare ; with continue;job2021-09-081-7/+7
* Fix indentation of comments and labelsjob2021-09-082-165/+167
* Replace (&(x)) pattern with &xjob2021-09-072-32/+32
* KNFjob2021-09-072-1478/+1548
* Call the callback on success in new verifier in a compatible waybeck2021-09-033-16/+55
* Unroll ASN1_ITEM_ref()job2021-09-021-1/+1
* Change OPENSSL_strdup() to strdup()job2021-09-021-1/+1
* Change OPENSSL_malloc to calloc()job2021-09-021-1/+2
* Repair unrolling of static ASN1_ITEM IPAddrBlocks_itjob2021-09-021-0/+11
* Make v3_addr and v3_asid extern constjob2021-09-021-2/+2
* Add err.h for X509error() and friendsjob2021-09-022-0/+2
* Fix OPENSSL_assert() and assert()job2021-09-022-35/+17
* Unroll ASN1_EX_TEMPLATE_TYPE IPAddrBlocksjob2021-09-021-4/+7
* Change the OPENSSL_strdup() to strdup()job2021-09-021-3/+4
* Fix header file includesjob2021-09-022-8/+9
* Move the error put functions from X509V3err() to X509V3error()job2021-09-022-52/+32
* Unroll ASN1_SEQUENCE() ASN1_CHOICE() ASN1_ITEM_TEMPLATE()job2021-09-022-46/+218
* OPENSSL_assert() is not appropriate in this contextjob2021-09-021-2/+3
* Replace ossl_assert()/assert() with OPENSSL_assert()job2021-09-022-14/+14
* Replace OPENSSL_free() with free()job2021-09-022-7/+7
* Unroll IMPLEMENT_ASN1_FUNCTIONS()job2021-09-022-8/+197
* Unroll DECLARE_ASN1_FUNCTIONS()job2021-09-021-9/+56
* Rename DEFINE_STACK_OF() to DECLARE_STACK_OF()job2021-09-021-4/+4
* Lay groundwork to support X.509 v3 extensions for IP Addresses and AS Identif...job2021-09-026-4/+2377
* Revert previous change that changed our default return for unable tobeck2021-08-301-11/+5
* Fix Jan's regress in openssl/x509 to do what it says it does,beck2021-08-301-5/+11
* Don't call the verify callback twice on success.beck2021-08-291-2/+1
* Get rid of historical code to extract the roots in the legacy case.beck2021-08-283-78/+33
* Remove the "dump_chain" flag and code. This was a workaround for a problem wherebeck2021-08-282-16/+4
* Fix various read buffer overflow when printing ASN.1 strings (which aretb2021-08-243-12/+17
* Pull roots out of the trust store in the legacy xsc when building chainsbeck2021-08-193-8/+26
* Add a check_trust call to the legacy chain validation on chain add, rememberingbeck2021-08-181-2/+10
* Refactor the legacy chain validation from the chain adding code into itsbeck2021-08-181-52/+70
* Similar to x509/x509_purp.c rev. 1.5:schwarze2021-07-231-5/+1
* Delete some code from X509_PURPOSE_cleanup(3) that had no effect:schwarze2021-07-231-5/+1
* Use the x509_verify_cert_cache_extensions fuction instead of manuallybeck2021-07-121-9/+4
* Add a bunch of workarond in the verifier to support partial chains andbeck2021-07-102-16/+135
* Revert "Handle X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE in newtb2021-04-281-4/+1
* Relax SAN DNSname validation and constraints to permit non leading *beck2021-04-271-19/+21
* Enable the new verifier again so hopefully the remaining kinks get ironedtb2021-04-241-2/+2
* Switch back to the legacy verifier for the release.tb2021-04-151-2/+2
* Don't leak param->name in x509_verify_param_zero()tb2021-04-051-1/+2
* Provide missing prototype for d2i_DSAPrivateKey_fp(3)tb2021-03-311-1/+2
* Fix copy-paste error in previoustb2021-03-191-2/+2
* Use EXFLAG_INVALID to handle out of memory and parse errors intobhe2021-03-132-11/+45
* Zap a useless variable.tb2021-03-121-4/+2
* Missing void in function definitiontb2021-03-121-2/+2