summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509 (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Remove the "dump_chain" flag and code. This was a workaround for a problem wherebeck2021-08-282-16/+4
* Fix various read buffer overflow when printing ASN.1 strings (which aretb2021-08-243-12/+17
* Pull roots out of the trust store in the legacy xsc when building chainsbeck2021-08-193-8/+26
* Add a check_trust call to the legacy chain validation on chain add, rememberingbeck2021-08-181-2/+10
* Refactor the legacy chain validation from the chain adding code into itsbeck2021-08-181-52/+70
* Similar to x509/x509_purp.c rev. 1.5:schwarze2021-07-231-5/+1
* Delete some code from X509_PURPOSE_cleanup(3) that had no effect:schwarze2021-07-231-5/+1
* Use the x509_verify_cert_cache_extensions fuction instead of manuallybeck2021-07-121-9/+4
* Add a bunch of workarond in the verifier to support partial chains andbeck2021-07-102-16/+135
* Revert "Handle X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE in newtb2021-04-281-4/+1
* Relax SAN DNSname validation and constraints to permit non leading *beck2021-04-271-19/+21
* Enable the new verifier again so hopefully the remaining kinks get ironedtb2021-04-241-2/+2
* Switch back to the legacy verifier for the release.tb2021-04-151-2/+2
* Don't leak param->name in x509_verify_param_zero()tb2021-04-051-1/+2
* Provide missing prototype for d2i_DSAPrivateKey_fp(3)tb2021-03-311-1/+2
* Fix copy-paste error in previoustb2021-03-191-2/+2
* Use EXFLAG_INVALID to handle out of memory and parse errors intobhe2021-03-132-11/+45
* Zap a useless variable.tb2021-03-121-4/+2
* Missing void in function definitiontb2021-03-121-2/+2
* Fix checks of memory caps of constraints namestb2021-03-123-20/+32
* Set is_trusted in x509_verify_ctx_add_chain()tb2021-02-261-2/+2
* Fix two bugs in the legacy verifiertb2021-02-251-6/+10
* Rename depth to num_untrusted so it identifies what it actually represents.jsing2021-02-251-6/+6
* Avoid passing last and depth to x509_verify_cert_error() on ENOMEM.jsing2021-02-251-3/+2
* Fix comment explaining last_untrusted. This should really be calledtb2021-02-241-2/+2
* Make the new validator check for EXFLAG_CRITICALtb2021-02-241-8/+15
* KNFtb2021-02-111-4/+7
* Set chain on xsc on chain build failure.jsing2021-01-091-1/+3
* Bail out early after finding an single chain if we are have been called frombeck2021-01-091-1/+9
* search the intermediates only after searching the root certs, clarifybeck2021-01-081-11/+15
* Handle X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE in new verifier.jsing2021-01-051-1/+4
* Gracefully handle root certificates being both trusted and untrusted.jsing2021-01-052-4/+16
* Remove two reduntat memset calls.tb2020-12-161-3/+1
* Fix some KNF issuestb2020-12-161-7/+8
* Fix a NULL dereference in GENERAL_NAME_cmp()tb2020-12-081-6/+46
* Avoid undefined behavior due to memcpy(NULL, NULL, 0)tb2020-11-251-4/+6
* Plug leak in x509_verify_chain_dup()tb2020-11-181-2/+2
* Plug a big memory leak in the new validatortb2020-11-181-1/+6
* zap ugly empty line before closing bracetb2020-11-181-2/+1
* Move freeing of the verify context to its natural place instead oftb2020-11-181-2/+2
* KNF (whitespace)tb2020-11-184-13/+13
* Use X509_V_OK instead of 0.jsing2020-11-161-4/+3
* Add back an X509_STORE_CTX error code assignment.jsing2020-11-161-2/+3
* Return the specific failure for a "self signed certificate" in the chainbeck2020-11-151-1/+14
* Handle additional certificate error cases in new X.509 verifier.jsing2020-11-112-12/+79
* Fix bad indent.jsing2020-11-031-7/+6
* Hook X509_STORE_CTX get_issuer() callback from new X509 verifier.jsing2020-11-031-3/+17
* Add a safety net to ensure that we set an error on the store context.tb2020-10-261-1/+3
* If x509_verify() fails, ensure that the error is also set on the storetb2020-10-261-10/+15
* Make sure that x509_vfy_check_id() failure also sets ctx->error, not onlytb2020-10-261-3/+8