summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509 (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Hide struct internals under LIBRESSL_CRYPTO_INTERNAL so that othertb2021-10-312-17/+17
* Remove the unused X509_OBJECTS struct.tb2021-10-311-8/+1
* Remove the unused X509_CERT_PAIR struct and the assicated API.tb2021-10-311-12/+1
* Remove the unused X509_CERT_FILE_CTX struct.tb2021-10-311-9/+1
* Prepare to provide X509_STORE_CTX_get_obj_by_subject(), a wrappertb2021-10-312-2/+22
* Switch various X509 API to use the new X509_LOOKUP_TYPE to matchtb2021-10-312-29/+32
* Provide the X509_LOOKUP_TYPE enum.tb2021-10-311-6/+6
* Prepare definitions X509_STORE_set_verify{,_cb}_func() that work withtb2021-10-311-3/+8
* Prepare to make various structs in x509_vfy.h opaque.tb2021-10-311-26/+37
* Actually error in X509_check_purpose() if x509v3_cache_extensions()tb2021-10-291-2/+2
* Bring back r1.3, ok becktb2021-10-281-3/+47
* Revert version 1.3 - not allowing the creation of bogus certificatesbeck2021-10-271-47/+3
* Add RFC 3779 checks to both legacy and new verifierjob2021-10-262-2/+20
* Validate Subject Alternate Names when they are being added to certificates.beck2021-10-263-9/+61
* Add missing RCS markerstb2021-10-252-0/+2
* Zap two unused includesjca2021-10-252-4/+0
* Prepare to provide a number of X509_STORE_CTX_* setters.tb2021-10-242-2/+52
* Prepare to provide X509_STORE_CTX_get_num_untrusted()tb2021-10-242-2/+11
* Prepare to provide X509_OBJECT_{new,free}()tb2021-10-242-3/+25
* Declare STACK_OF(GENERAL_NAMES)tb2021-10-231-3/+4
* KNF a particularly ugly commenttb2021-10-231-17/+16
* Zap trailing whitespacetb2021-10-231-13/+13
* Prepare to make many of the structs in x509.h opaque.tb2021-10-231-76/+86
* Prepare to provide X509_re_X509*_tbs()tb2021-10-233-3/+27
* Prepare to provide X509_get_extension_flags()tb2021-10-232-2/+13
* Prepare to provide X509_SIG_get{0,m}.tb2021-10-231-1/+8
* Prepare to provide X509_get_{extended_,}key_usage()tb2021-10-222-2/+32
* Prepare to provide X509_REQ_pubkey_get0()tb2021-10-222-2/+13
* Simplify a return value check for X509_STORE_get_by_subject() nowtb2021-10-211-18/+7
* Set enc.modified if the X509_REQ is going to be modified.tb2021-10-211-1/+4
* Sync parts of X509_STORE_get_by_subject() with OpenSSLtb2021-10-211-13/+7
* Prepare to make X509 opaque.tb2021-10-211-4/+7
* Add XKU_ANYEKU #define and use it to cache the anyExtendedKeyUsagetb2021-10-212-3/+8
* Prepare to provide X509_get_X509_PUBKEY() as a function.tb2021-10-212-5/+15
* X509_STORE_CTX_init() allows the store to be NULL on init. Add checksclaudio2021-10-061-1/+11
* Enable X509_V_FLAG_TRUSTED_FIRST by default in the legacy verifier.jsing2021-09-301-1/+2
* Avoid a potential overread in x509_constraints_parse_mailbox()jsing2021-09-231-5/+9
* In X509_check_issued() do the same dance around x509v3_cache_extensions()claudio2021-09-131-3/+11
* When calling the legacy callback, ensure we catch the case where itbeck2021-09-091-2/+5
* Replace bare ; with continue;job2021-09-081-7/+7
* Fix indentation of comments and labelsjob2021-09-082-165/+167
* Replace (&(x)) pattern with &xjob2021-09-072-32/+32
* KNFjob2021-09-072-1478/+1548
* Call the callback on success in new verifier in a compatible waybeck2021-09-033-16/+55
* Unroll ASN1_ITEM_ref()job2021-09-021-1/+1
* Change OPENSSL_strdup() to strdup()job2021-09-021-1/+1
* Change OPENSSL_malloc to calloc()job2021-09-021-1/+2
* Repair unrolling of static ASN1_ITEM IPAddrBlocks_itjob2021-09-021-0/+11
* Make v3_addr and v3_asid extern constjob2021-09-021-2/+2
* Add err.h for X509error() and friendsjob2021-09-022-0/+2