summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509 (follow)
Commit message (Expand)AuthorAgeFilesLines
* X509_verify_cert(): Garbage collect the unused roots variabletb2023-05-081-4/+1
* Avoid trailing whitespace in extension printingtb2023-05-081-2/+2
* Remove a misplaced empty linetb2023-05-071-2/+1
* Revert utf-8 fix for X509_NAME_get_index_by_NID to avoid libtlsbeck2023-05-031-27/+10
* Bring back length check tb ok'ed and I managed to remove whilebeck2023-05-031-2/+2
* Change X509_NAME_get_index_by[NID|OBJ] to be safer.beck2023-05-021-10/+27
* Send x509_subject_cmp() to the attictb2023-04-301-9/+1
* Zap extra blank linetb2023-04-301-2/+1
* Enable policy checking by default now that we are DAG implementation based.beck2023-04-284-12/+11
* Unifdef LIBRESSL_HAS_POLICY_DAG and remove it from the Makefiletb2023-04-283-88/+3
* Take the old policy code behind the barntb2023-04-287-1900/+0
* Silence gcc-4 warnings about sk_sort()tb2023-04-281-5/+6
* Remove now no longer needed <assert.h>; sort headerstb2023-04-281-4/+2
* Deassert has_explicit_policy()tb2023-04-281-3/+4
* Deassert delete_if() callbackstb2023-04-281-5/+7
* Deassert x509_policy_level_find()tb2023-04-281-18/+27
* Deassert X509_policy_check()tb2023-04-281-2/+3
* Deassert x509_policy_level_add_nodes()tb2023-04-281-10/+1
* Deassert x509_policy_new()tb2023-04-281-3/+4
* Cleanup pass over x509_check_policy.ctb2023-04-281-73/+72
* Convert size_t's used in conjuction with sk_X509_num back to int.beck2023-04-271-12/+12
* Remove braces around single lines statements using knfmt -stb2023-04-271-84/+49
* Rework simple allocation and free functions in x509_policy.ctb2023-04-271-32/+36
* Make x509_policy.c compile with gcc 4.tb2023-04-261-17/+26
* Turn C++ comments into C comments and minor KNF fixupstb2023-04-261-170/+264
* KNF according to knfmt(1)tb2023-04-261-515/+600
* Zap trailing whitespacetb2023-04-261-3/+1
* Add RCS tagtb2023-04-261-0/+1
* Take X509_POLICY_NODE_print() behind the barntb2023-04-262-97/+2
* Make the new policy code in x509_policy.c to be selectable at compile time.beck2023-04-2611-14/+101
* Add a shim to mimic the BoringSSL sk_delete_if function.beck2023-04-261-0/+23
* Adapt the sk_find calls from BoringSSL's api to ours.beck2023-04-261-6/+5
* Add the STACK_OF declarations we require.beck2023-04-261-2/+46
* Change OPENSSL_malloc|free|memset and friends to the normal versions.beck2023-04-261-6/+6
* Fix error code goopbeck2023-04-261-5/+8
* Use the correct headers to compile with libresslbeck2023-04-261-5/+4
* Import policy.c from BoringSSL as x509_policy.cbeck2023-04-261-0/+790
* Remove proxy cert remnantstb2023-04-253-489/+1
* Remove NETSCAPE_CERT_SEQUENCEtb2023-04-251-17/+1
* Move the policy STACK_OF stuff to pcy_int.h as welltb2023-04-251-2/+44
* Remove SXNETtb2023-04-252-438/+1
* Use X509_STORE_CTX_get1_{certs,crls}() instead of an aliastb2023-04-251-3/+3
* X509_STORE_get1_{certs,crls} become X509_STORE_CTX_*tb2023-04-252-25/+2
* Move the policy tree code to internal-onlytb2023-04-255-69/+40
* Use proper fix for the recent x400Address issuetb2023-04-252-6/+4
* Remove v3_sxnet from the standard extensionstb2023-04-251-3/+2
* Invalidate the DER cache earlier on in X509 setter functionsjob2023-04-251-1/+8
* Use X509_set_version() and X509_REQ_set_version() instead doing it by handjob2023-04-252-11/+4
* Future users of libcrypto will also have to do without strong extranettb2023-04-241-1/+5
* Mark NETSCAPE_CERT_SEQUENCE for removaltb2023-04-241-2/+6