summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509 (follow)
Commit message (Expand)AuthorAgeFilesLines
* Unifdef LIBRESSL_HAS_POLICY_DAG and remove it from the Makefiletb2023-04-283-88/+3
* Take the old policy code behind the barntb2023-04-287-1900/+0
* Silence gcc-4 warnings about sk_sort()tb2023-04-281-5/+6
* Remove now no longer needed <assert.h>; sort headerstb2023-04-281-4/+2
* Deassert has_explicit_policy()tb2023-04-281-3/+4
* Deassert delete_if() callbackstb2023-04-281-5/+7
* Deassert x509_policy_level_find()tb2023-04-281-18/+27
* Deassert X509_policy_check()tb2023-04-281-2/+3
* Deassert x509_policy_level_add_nodes()tb2023-04-281-10/+1
* Deassert x509_policy_new()tb2023-04-281-3/+4
* Cleanup pass over x509_check_policy.ctb2023-04-281-73/+72
* Convert size_t's used in conjuction with sk_X509_num back to int.beck2023-04-271-12/+12
* Remove braces around single lines statements using knfmt -stb2023-04-271-84/+49
* Rework simple allocation and free functions in x509_policy.ctb2023-04-271-32/+36
* Make x509_policy.c compile with gcc 4.tb2023-04-261-17/+26
* Turn C++ comments into C comments and minor KNF fixupstb2023-04-261-170/+264
* KNF according to knfmt(1)tb2023-04-261-515/+600
* Zap trailing whitespacetb2023-04-261-3/+1
* Add RCS tagtb2023-04-261-0/+1
* Take X509_POLICY_NODE_print() behind the barntb2023-04-262-97/+2
* Make the new policy code in x509_policy.c to be selectable at compile time.beck2023-04-2611-14/+101
* Add a shim to mimic the BoringSSL sk_delete_if function.beck2023-04-261-0/+23
* Adapt the sk_find calls from BoringSSL's api to ours.beck2023-04-261-6/+5
* Add the STACK_OF declarations we require.beck2023-04-261-2/+46
* Change OPENSSL_malloc|free|memset and friends to the normal versions.beck2023-04-261-6/+6
* Fix error code goopbeck2023-04-261-5/+8
* Use the correct headers to compile with libresslbeck2023-04-261-5/+4
* Import policy.c from BoringSSL as x509_policy.cbeck2023-04-261-0/+790
* Remove proxy cert remnantstb2023-04-253-489/+1
* Remove NETSCAPE_CERT_SEQUENCEtb2023-04-251-17/+1
* Move the policy STACK_OF stuff to pcy_int.h as welltb2023-04-251-2/+44
* Remove SXNETtb2023-04-252-438/+1
* Use X509_STORE_CTX_get1_{certs,crls}() instead of an aliastb2023-04-251-3/+3
* X509_STORE_get1_{certs,crls} become X509_STORE_CTX_*tb2023-04-252-25/+2
* Move the policy tree code to internal-onlytb2023-04-255-69/+40
* Use proper fix for the recent x400Address issuetb2023-04-252-6/+4
* Remove v3_sxnet from the standard extensionstb2023-04-251-3/+2
* Invalidate the DER cache earlier on in X509 setter functionsjob2023-04-251-1/+8
* Use X509_set_version() and X509_REQ_set_version() instead doing it by handjob2023-04-252-11/+4
* Future users of libcrypto will also have to do without strong extranettb2023-04-241-1/+5
* Mark NETSCAPE_CERT_SEQUENCE for removaltb2023-04-241-2/+6
* Sort X.509 error reasons, use next available error value, and alignjob2023-04-242-4/+4
* Replace X509v3_get_ext_count() with X509_get_ext_count()job2023-04-231-2/+2
* In the case of V1 certs, the extension count should be exactly 0job2023-04-231-2/+2
* If extensions are encountered on a X.509 V1 cert, mark as invalidjob2023-04-231-2/+5
* Add compliance checks for the X.509 version fieldjob2023-04-232-2/+4
* Drop some extra parenthesestb2023-04-231-2/+2
* Drop a superfluous isneg check.tb2023-04-231-2/+2
* Add missing NULL check for BN_new()tb2023-04-231-2/+5
* Initialize ishex and isneg at the top and drop some elsestb2023-04-231-6/+4