summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509 (follow)
Commit message (Expand)AuthorAgeFilesLines
* minor KNF improvement, changing only whitespace, no code change:schwarze2021-11-191-4/+4
* As long as X509_OBJECT_free_contents(3) is a public API function,schwarze2021-11-191-1/+3
* Put curly brace on the correct line.jsing2021-11-141-2/+3
* Fix a bug in check_crl_time() that could result in incompleteschwarze2021-11-131-8/+8
* Merge a few additional X509error(ERR_R_MALLOC_FAILURE) callsschwarze2021-11-101-39/+28
* If X509_load_cert_crl_file(3) does not find any certificatesschwarze2021-11-103-3/+7
* Sync some code style improvements from the OpenSSL 1.1.1 branch,schwarze2021-11-101-10/+9
* Merge two bug fixes from the OpenSSL 1.1.1 branch, which is stillschwarze2021-11-101-8/+4
* In X509_STORE_CTX, rename the X509_STORE store rather than ctx.tb2021-11-073-15/+15
* In X509_STORE_CTX rename the misnamed last_untrusted to num_untrustedtb2021-11-073-17/+17
* Start cleaning up X509_STORE_get1_issuer()tb2021-11-061-15/+37
* In X509_STORE_get1_issuer() do not call the verify callback fromtb2021-11-061-3/+3
* Refactor X509_STORE_get1_certs()tb2021-11-061-27/+30
* First pass of streamlining X509_STORE_get1_{certs,crls}()tb2021-11-051-66/+77
* Trade an abort() neutered by a comment for a blank line elsewhere.tb2021-11-051-2/+2
* Clean up X509_STORE_add_{cert,crl}().tb2021-11-051-69/+41
* Unify variable names in X509_STORE_{free,up_ref,add_lookup}().tb2021-11-051-29/+26
* Rename the ret variable in X509_OBJECT_new() to obj..tb2021-11-051-5/+5
* Garbage collect the unused skip member of X509_LOOKUP andtb2021-11-052-5/+1
* Use calloc() to remove the need of silly zeroing of most members.tb2021-11-051-28/+18
* Streamline and shorten x509_object_cmp() a bit.tb2021-11-051-11/+6
* Drop a bunch of unnecesary parentheses and unify the order in whichtb2021-11-051-17/+13
* Cleanup X509_LOOKUP_new()tb2021-11-051-12/+11
* Garbage collect xobj->data.{ptr,pkey}tb2021-11-052-8/+6
* Cache sha512 hash and parsed not_before and not_after with X509 cert.beck2021-11-047-128/+135
* Fix five bugs in X509_REQ_to_X509(3):schwarze2021-11-031-11/+12
* Some cleanup in X509_REQ_get_extensions(3), no functional change.schwarze2021-11-031-10/+6
* Fix two bugs in X509_REQ_add_extensions_nid(3)schwarze2021-11-031-32/+13
* Move the now internal X.509-related structs into x509_lcl.h.tb2021-11-0135-404/+417
* In X509_STORE_CTX_get_obj_from_subject() rename X509_OBJECT fromtb2021-11-011-6/+6
* Unifdef LIBRESSL_NEW_API. Now that the library is bumped, this istb2021-11-014-37/+4
* Hide struct internals under LIBRESSL_CRYPTO_INTERNAL so that othertb2021-10-312-17/+17
* Remove the unused X509_OBJECTS struct.tb2021-10-311-8/+1
* Remove the unused X509_CERT_PAIR struct and the assicated API.tb2021-10-311-12/+1
* Remove the unused X509_CERT_FILE_CTX struct.tb2021-10-311-9/+1
* Prepare to provide X509_STORE_CTX_get_obj_by_subject(), a wrappertb2021-10-312-2/+22
* Switch various X509 API to use the new X509_LOOKUP_TYPE to matchtb2021-10-312-29/+32
* Provide the X509_LOOKUP_TYPE enum.tb2021-10-311-6/+6
* Prepare definitions X509_STORE_set_verify{,_cb}_func() that work withtb2021-10-311-3/+8
* Prepare to make various structs in x509_vfy.h opaque.tb2021-10-311-26/+37
* Actually error in X509_check_purpose() if x509v3_cache_extensions()tb2021-10-291-2/+2
* Bring back r1.3, ok becktb2021-10-281-3/+47
* Revert version 1.3 - not allowing the creation of bogus certificatesbeck2021-10-271-47/+3
* Add RFC 3779 checks to both legacy and new verifierjob2021-10-262-2/+20
* Validate Subject Alternate Names when they are being added to certificates.beck2021-10-263-9/+61
* Add missing RCS markerstb2021-10-252-0/+2
* Zap two unused includesjca2021-10-252-4/+0
* Prepare to provide a number of X509_STORE_CTX_* setters.tb2021-10-242-2/+52
* Prepare to provide X509_STORE_CTX_get_num_untrusted()tb2021-10-242-2/+11
* Prepare to provide X509_OBJECT_{new,free}()tb2021-10-242-3/+25