index
:
openbsd
OPENBSD_2_0
OPENBSD_2_1
OPENBSD_2_2
OPENBSD_2_3
OPENBSD_2_4
OPENBSD_2_5
OPENBSD_2_6
OPENBSD_2_7
OPENBSD_2_8
OPENBSD_2_9
OPENBSD_3_0
OPENBSD_3_1
OPENBSD_3_2
OPENBSD_3_3
OPENBSD_3_4
OPENBSD_3_5
OPENBSD_3_6
OPENBSD_3_7
OPENBSD_3_8
OPENBSD_3_9
OPENBSD_4_0
OPENBSD_4_1
OPENBSD_4_2
OPENBSD_4_3
OPENBSD_4_4
OPENBSD_4_5
OPENBSD_4_6
OPENBSD_4_7
OPENBSD_4_8
OPENBSD_4_9
OPENBSD_5_0
OPENBSD_5_1
OPENBSD_5_2
OPENBSD_5_3
OPENBSD_5_4
OPENBSD_5_5
OPENBSD_5_6
OPENBSD_5_7
OPENBSD_5_8
OPENBSD_5_9
OPENBSD_6_0
OPENBSD_6_1
OPENBSD_6_2
OPENBSD_6_3
OPENBSD_6_4
OPENBSD_6_5
OPENBSD_6_6
OPENBSD_6_7
OPENBSD_6_8
OPENBSD_6_9
OPENBSD_7_0
OPENBSD_7_1
OPENBSD_7_2
OPENBSD_7_3
OPENBSD_7_4
OPENBSD_7_5
OPENBSD_7_6
OPENBSD_7_7
master
A mirror of https://github.com/libressl/openbsd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
src
/
lib
/
libcrypto
/
x509
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
Unifdef LIBRESSL_HAS_POLICY_DAG and remove it from the Makefile
tb
2023-04-28
3
-88
/
+3
*
Take the old policy code behind the barn
tb
2023-04-28
7
-1900
/
+0
*
Silence gcc-4 warnings about sk_sort()
tb
2023-04-28
1
-5
/
+6
*
Remove now no longer needed <assert.h>; sort headers
tb
2023-04-28
1
-4
/
+2
*
Deassert has_explicit_policy()
tb
2023-04-28
1
-3
/
+4
*
Deassert delete_if() callbacks
tb
2023-04-28
1
-5
/
+7
*
Deassert x509_policy_level_find()
tb
2023-04-28
1
-18
/
+27
*
Deassert X509_policy_check()
tb
2023-04-28
1
-2
/
+3
*
Deassert x509_policy_level_add_nodes()
tb
2023-04-28
1
-10
/
+1
*
Deassert x509_policy_new()
tb
2023-04-28
1
-3
/
+4
*
Cleanup pass over x509_check_policy.c
tb
2023-04-28
1
-73
/
+72
*
Convert size_t's used in conjuction with sk_X509_num back to int.
beck
2023-04-27
1
-12
/
+12
*
Remove braces around single lines statements using knfmt -s
tb
2023-04-27
1
-84
/
+49
*
Rework simple allocation and free functions in x509_policy.c
tb
2023-04-27
1
-32
/
+36
*
Make x509_policy.c compile with gcc 4.
tb
2023-04-26
1
-17
/
+26
*
Turn C++ comments into C comments and minor KNF fixups
tb
2023-04-26
1
-170
/
+264
*
KNF according to knfmt(1)
tb
2023-04-26
1
-515
/
+600
*
Zap trailing whitespace
tb
2023-04-26
1
-3
/
+1
*
Add RCS tag
tb
2023-04-26
1
-0
/
+1
*
Take X509_POLICY_NODE_print() behind the barn
tb
2023-04-26
2
-97
/
+2
*
Make the new policy code in x509_policy.c to be selectable at compile time.
beck
2023-04-26
11
-14
/
+101
*
Add a shim to mimic the BoringSSL sk_delete_if function.
beck
2023-04-26
1
-0
/
+23
*
Adapt the sk_find calls from BoringSSL's api to ours.
beck
2023-04-26
1
-6
/
+5
*
Add the STACK_OF declarations we require.
beck
2023-04-26
1
-2
/
+46
*
Change OPENSSL_malloc|free|memset and friends to the normal versions.
beck
2023-04-26
1
-6
/
+6
*
Fix error code goop
beck
2023-04-26
1
-5
/
+8
*
Use the correct headers to compile with libressl
beck
2023-04-26
1
-5
/
+4
*
Import policy.c from BoringSSL as x509_policy.c
beck
2023-04-26
1
-0
/
+790
*
Remove proxy cert remnants
tb
2023-04-25
3
-489
/
+1
*
Remove NETSCAPE_CERT_SEQUENCE
tb
2023-04-25
1
-17
/
+1
*
Move the policy STACK_OF stuff to pcy_int.h as well
tb
2023-04-25
1
-2
/
+44
*
Remove SXNET
tb
2023-04-25
2
-438
/
+1
*
Use X509_STORE_CTX_get1_{certs,crls}() instead of an alias
tb
2023-04-25
1
-3
/
+3
*
X509_STORE_get1_{certs,crls} become X509_STORE_CTX_*
tb
2023-04-25
2
-25
/
+2
*
Move the policy tree code to internal-only
tb
2023-04-25
5
-69
/
+40
*
Use proper fix for the recent x400Address issue
tb
2023-04-25
2
-6
/
+4
*
Remove v3_sxnet from the standard extensions
tb
2023-04-25
1
-3
/
+2
*
Invalidate the DER cache earlier on in X509 setter functions
job
2023-04-25
1
-1
/
+8
*
Use X509_set_version() and X509_REQ_set_version() instead doing it by hand
job
2023-04-25
2
-11
/
+4
*
Future users of libcrypto will also have to do without strong extranet
tb
2023-04-24
1
-1
/
+5
*
Mark NETSCAPE_CERT_SEQUENCE for removal
tb
2023-04-24
1
-2
/
+6
*
Sort X.509 error reasons, use next available error value, and align
job
2023-04-24
2
-4
/
+4
*
Replace X509v3_get_ext_count() with X509_get_ext_count()
job
2023-04-23
1
-2
/
+2
*
In the case of V1 certs, the extension count should be exactly 0
job
2023-04-23
1
-2
/
+2
*
If extensions are encountered on a X.509 V1 cert, mark as invalid
job
2023-04-23
1
-2
/
+5
*
Add compliance checks for the X.509 version field
job
2023-04-23
2
-2
/
+4
*
Drop some extra parentheses
tb
2023-04-23
1
-2
/
+2
*
Drop a superfluous isneg check.
tb
2023-04-23
1
-2
/
+2
*
Add missing NULL check for BN_new()
tb
2023-04-23
1
-2
/
+5
*
Initialize ishex and isneg at the top and drop some elses
tb
2023-04-23
1
-6
/
+4
[next]