summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509 (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Convert size_t's used in conjuction with sk_X509_num back to int.beck2023-04-271-12/+12
* Remove braces around single lines statements using knfmt -stb2023-04-271-84/+49
* Rework simple allocation and free functions in x509_policy.ctb2023-04-271-32/+36
* Make x509_policy.c compile with gcc 4.tb2023-04-261-17/+26
* Turn C++ comments into C comments and minor KNF fixupstb2023-04-261-170/+264
* KNF according to knfmt(1)tb2023-04-261-515/+600
* Zap trailing whitespacetb2023-04-261-3/+1
* Add RCS tagtb2023-04-261-0/+1
* Take X509_POLICY_NODE_print() behind the barntb2023-04-262-97/+2
* Make the new policy code in x509_policy.c to be selectable at compile time.beck2023-04-2611-14/+101
* Add a shim to mimic the BoringSSL sk_delete_if function.beck2023-04-261-0/+23
* Adapt the sk_find calls from BoringSSL's api to ours.beck2023-04-261-6/+5
* Add the STACK_OF declarations we require.beck2023-04-261-2/+46
* Change OPENSSL_malloc|free|memset and friends to the normal versions.beck2023-04-261-6/+6
* Fix error code goopbeck2023-04-261-5/+8
* Use the correct headers to compile with libresslbeck2023-04-261-5/+4
* Import policy.c from BoringSSL as x509_policy.cbeck2023-04-261-0/+790
* Remove proxy cert remnantstb2023-04-253-489/+1
* Remove NETSCAPE_CERT_SEQUENCEtb2023-04-251-17/+1
* Move the policy STACK_OF stuff to pcy_int.h as welltb2023-04-251-2/+44
* Remove SXNETtb2023-04-252-438/+1
* Use X509_STORE_CTX_get1_{certs,crls}() instead of an aliastb2023-04-251-3/+3
* X509_STORE_get1_{certs,crls} become X509_STORE_CTX_*tb2023-04-252-25/+2
* Move the policy tree code to internal-onlytb2023-04-255-69/+40
* Use proper fix for the recent x400Address issuetb2023-04-252-6/+4
* Remove v3_sxnet from the standard extensionstb2023-04-251-3/+2
* Invalidate the DER cache earlier on in X509 setter functionsjob2023-04-251-1/+8
* Use X509_set_version() and X509_REQ_set_version() instead doing it by handjob2023-04-252-11/+4
* Future users of libcrypto will also have to do without strong extranettb2023-04-241-1/+5
* Mark NETSCAPE_CERT_SEQUENCE for removaltb2023-04-241-2/+6
* Sort X.509 error reasons, use next available error value, and alignjob2023-04-242-4/+4
* Replace X509v3_get_ext_count() with X509_get_ext_count()job2023-04-231-2/+2
* In the case of V1 certs, the extension count should be exactly 0job2023-04-231-2/+2
* If extensions are encountered on a X.509 V1 cert, mark as invalidjob2023-04-231-2/+5
* Add compliance checks for the X.509 version fieldjob2023-04-232-2/+4
* Drop some extra parenthesestb2023-04-231-2/+2
* Drop a superfluous isneg check.tb2023-04-231-2/+2
* Add missing NULL check for BN_new()tb2023-04-231-2/+5
* Initialize ishex and isneg at the top and drop some elsestb2023-04-231-6/+4
* Align hex_to_string with OpenSSL 1.1 behaviortb2023-04-231-3/+5
* x509_utl.c: Use correct spelling of NULLtb2023-04-231-4/+4
* Remove the now unused x509_enum.ctb2023-04-211-63/+0
* Move the CRL reason method into x509_bitst.ctb2023-04-212-33/+33
* Move i2s_ASN1_ENUMERATED_TABLE() next to i2s_ASN1_ENUMERATED()tb2023-04-212-17/+18
* Tweak whitespace gone wrongtb2023-04-211-5/+4
* Stop using ENUMERATED_NAMEStb2023-04-211-3/+5
* Flip the default of explicitText to UTF8Stringtb2023-04-201-2/+2
* remove duplicate includesjsg2023-04-191-2/+1
* Bring includes into canonical ordertb2023-04-181-19/+15
* Move some includes out of OPENSSL_NO_DEPRECATEDtb2023-04-181-3/+1