summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509 (follow)
Commit message (Expand)AuthorAgeFilesLines
* Switch loop bounds from size_t to int in check_hosts()tb2022-08-311-2/+2
* Allow empty attribute sets in CSRstb2022-08-181-2/+4
* Add missing RCS tag and zap a trailing spacetb2022-08-151-2/+2
* Remove overly aggressive trust check in legacy verifier that breaksbeck2022-08-051-15/+4
* Untangle two logic chains in x509_asid.c into something more readable.tb2022-07-301-9/+22
* Plug leak in X509V3_add1_i2d()tb2022-07-241-2/+3
* Remove mkerr.pl remnants from LibreSSLkn2022-07-123-17/+3
* Expose new API in headers.tb2022-07-071-5/+1
* Add missing X509_V_ERR_ strings using the ones from OpenSSL.tb2022-07-051-1/+17
* Prepare to provide X509_VERIFY_PARAM_get_time()tb2022-07-042-2/+9
* Take away bogus error assignment before callback call.beck2022-06-281-2/+1
* Fix the legacy verifier callback behaviour for untrusted certs.beck2022-06-281-17/+44
* Correct misleading comment for URI parsingbeck2022-06-271-4/+10
* Add function to free all of the issuer cache.beck2022-06-271-13/+39
* Allow security_level to mestastasize into the verifiertb2022-06-274-4/+156
* Prepare to provide X509_VERIFY_PARAM_set_auth_level()tb2022-06-273-2/+12
* Fix URI name constraints, allow for URI's with no host part.beck2022-06-261-3/+12
* whitespacetb2022-06-261-2/+2
* Move leaf certificate checks to the last thing after chain validation.beck2022-06-251-19/+32
* Remove an unnecessary XXX comment. The suggested check is part oftb2022-05-251-5/+1
* Don't pass uninitialized pointer to ASN1_STRING_to_UTF8()tb2022-05-201-2/+2
* Rewrite make_addressRange() using CBStb2022-05-171-37/+104
* Simplify make_addressPrefix()tb2022-05-171-21/+23
* Small readability tweak suggested by jsingtb2022-05-121-1/+3
* Rewrite and fix X509v3_asid_subset()tb2022-05-121-12/+30
* X509_check_ca() has 5 return values but still can't failtb2022-05-101-3/+1
* Simplify X509_ATTRIBUTE ASN.1 encoding.jsing2022-05-092-23/+11
* Clarify comments at the start of {asid,addr}_validate_path_internal()tb2022-04-212-7/+7
* Avoid expensive RFC 3779 checks during cert verificationtb2022-04-213-16/+22
* Fix X509_get_extension_flags()tb2022-04-211-2/+2
* KNF for a brace and zap trailing blank linetb2022-04-121-3/+3
* name constraints: be more careful with NULstb2022-03-262-12/+25
* Make gcc 4 happier about x509_addr.ctb2022-03-161-6/+8
* Allow constraints of the form @domain.comtb2022-03-141-10/+17
* Rework ownership handling in x509_constraints_validate()tb2022-03-143-39/+49
* Relax the check of x509_constraints_dirname()libressl-v3.5.1tb2022-03-131-2/+6
* Add x509_constraints_validate() to x509_internal.htb2022-03-131-1/+3
* Check name constraints using the proper APItb2022-03-131-4/+21
* style tweaktb2022-03-131-2/+2
* Add missing error check after strdup()tb2022-03-131-2/+5
* Pull a len == 0 check up before malloc(len) to avoid implementationtb2022-03-031-5/+5
* Unwrap a linetb2022-03-021-3/+2
* Get rid of SHA1 for comparing CRL's - use SHA512 just like we do for certs.beck2022-02-242-5/+5
* Fix length check of IP addresses for name constraintstb2022-02-111-2/+3
* Add missing error check for a2i_GENERAL_NAME()tb2022-02-111-1/+3
* Fix a double free in v2i_NAME_CONSTRAINTS()tb2022-02-111-2/+3
* Remove a strange inheritance check from addr_validate_path_internal()tb2022-02-041-4/+1
* X509_GET_PUBKEY(3) return value check in libcryptoinoguchi2022-01-221-2/+3
* X509_GET_PUBKEY(3) return value check in libcryptoinoguchi2022-01-221-3/+4
* Remove header guard around RFC 3779 declarationstb2022-01-141-3/+1