summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Fix ASN1_TIME_diff() with NULL timestb2021-11-031-3/+18
| | | | | | | | | | | The ASN1_TIME_diff() API accepts NULL ASN1_TIMEs and interprets them as "now". This is used in sysutils/monit, as found by semarie with a crash after update. Implement this behavior by porting a version of ASN1_TIME_to_tm() to LibreSSL and using it in ASN1_TIME_diff(). Tested by semarie ok beck jsing semarie
* Some cleanup in X509_REQ_get_extensions(3), no functional change.schwarze2021-11-031-10/+6
| | | | | | | | | | | | | | In this function, merge everything that is worth merging from the OpenSSL 1.1.1 branch, which is still under a free license, mostly the relevant part of commit 9b0a4531 Mar 14 23:48:47 2015 +0000 to use X509_ATTRIBUTE_get0_type(3) rather than re-implementing it. While here, * use d2i_X509_EXTENSIONS(3) rather than ASN1_item_d2i(3); * test pointers explicitly against NULL, not with '!', as suggested by tb@; * drop some useless parentheses as suggested by tb@. OK tb@
* Fix two bugs in X509_REQ_add_extensions_nid(3)schwarze2021-11-031-32/+13
| | | | | | | | | | | | | | | | | | that i noticed while documneting the function: * missing return value check for ASN1_item_i2d(3) and * missing return value check for OBJ_nid2obj(3). In the function X509_REQ_add_extensions_nid(3), merge everything that is worth merging from the OpenSSL 1.1.1 branch, which is still under a free license; that's mostly parts of the commit 9b0a4531 Mar 14 23:48:47 2015 +0000 (containing the bugfix, even though the OpenSSL commit message did not mention the bugs) and some minor stylistic changes from 0f113f3e and 26a7d938. While here, use i2d_X509_EXTENSIONS(3) instead of the layer-violating call to ASN1_item_i2d(3), and include a few stylistic tweaks from tb@. OK tb@, and jsing@ agreed on the general direction.
* Move the now internal X.509-related structs into x509_lcl.h.tb2021-11-0172-451/+521
| | | | | | | | Garbage collect the now unused LIBRESSL_CRYPTO_INTERNAL and LIBRESSL_OPAQUE_X509. Include "x509_lcl.h" where needed and fix a couple of unnecessary reacharounds. ok jsing
* In X509_STORE_CTX_get_obj_from_subject() rename X509_OBJECT fromtb2021-11-011-6/+6
| | | | | | the generic 'ret' to obj' in X509. Requested by jsing
* Unifdef LIBRESSL_NEW_API. Now that the library is bumped, this istb2021-11-0110-55/+9
| | | | | | no longer needed. ok jsing
* Enable RFC 3779 code.tb2021-10-311-1/+1
| | | | From job. Discussed at length with beck, claudio, job during h2k21
* Hide struct internals under LIBRESSL_CRYPTO_INTERNAL so that othertb2021-10-313-19/+19
| | | | | | parts of LibreSSL can no longer reach into them. discussed with beck, jsing
* Bump majors after struct visibility changes, symbol removal and symboltb2021-10-311-1/+1
| | | | addition.
* Update Symbols.list for new API and API removal/renamingtb2021-10-311-10/+33
|
* Expose new API in headers and make X509 structs opaque.tb2021-10-311-0/+3
|
* Remove the unused X509_OBJECTS struct.tb2021-10-311-8/+1
| | | | ok beck jsing
* Remove the unused X509_CERT_PAIR struct and the assicated API.tb2021-10-314-99/+4
| | | | ok beck jsing
* Remove the unused X509_CERT_FILE_CTX struct.tb2021-10-311-9/+1
| | | | ok beck jsing
* Prepare to provide X509_STORE_CTX_get_obj_by_subject(), a wrappertb2021-10-312-2/+22
| | | | | | | around X509_STORE_get_by_subject() that eliminates the need of allocating an object on the heap by hand. ok beck inoguchi jsing
* Switch various X509 API to use the new X509_LOOKUP_TYPE to matchtb2021-10-312-29/+32
| | | | | | OpenSSL's signatures. ok beck inoguchi jsing
* Provide the X509_LOOKUP_TYPE enum.tb2021-10-311-6/+6
| | | | | | Remove the now unused X509_LU_{RETRY,FAIL,PKEY}. ok beck inoguchi jsing
* Prepare definitions X509_STORE_set_verify{,_cb}_func() that work withtb2021-10-311-3/+8
| | | | | | opaque structs. ok beck inoguchi jsing
* Prepare to make various structs in x509_vfy.h opaque.tb2021-10-311-26/+37
| | | | ok beck inoguchi jsing
* new manual page X509_CRL_METHOD_new(3)schwarze2021-10-306-14/+245
| | | | documenting five functions to customize CRL handling
* In x509/x509_purp.c rev. 1.11, tb@ fixed X509_check_purpose(3)schwarze2021-10-291-8/+18
| | | | | | to fail if parsing of a certificate extension failed. Adjust the documentation accordingly. OK tb@
* Actually error in X509_check_purpose() if x509v3_cache_extensions()tb2021-10-291-2/+2
| | | | | | | | | indicates failure. The previous "error return" X509_V_ERR_UNSPECIFIED translates to 1, i.e., success. This changes to the intended behavior of x509_purp.c r1.3 and matches OpenSSL. This will need various adjustments in the documentation. ok jsing
* document the horrifying function X509_TRUST_set_default(3)schwarze2021-10-291-3/+43
|
* document X509_EXTENSION_dup(3);schwarze2021-10-291-8/+20
| | | | | | while here, add the missing const qualifier to the obj argument of X509_EXTENSION_create_by_OBJ(3) and correct a typo in the argument name of X509_EXTENSION_get_data(3)
* new manual page X509_REQ_print_ex(3),schwarze2021-10-294-6/+184
| | | | also documenting X509_REQ_print(3) and X509_REQ_print_fp(3)
* document X509_REQ_to_X509(3)schwarze2021-10-281-7/+38
|
* unwrap a linetb2021-10-281-3/+2
|
* document X509_to_X509_REQ(3)schwarze2021-10-281-4/+26
|
* sorttb2021-10-281-2/+2
|
* Mechanical KNF in preparation for changingbeck2021-10-2812-1583/+1653
|
* Add headers normally contained in include/openssl, verbatim from 1.1.1beck2021-10-282-0/+554
|
* Import Certificate Transparency verbatim from OpenSSL 1.1.1beck2021-10-2813-0/+2321
| | | | | | | This is not yet hooked up and will not compile. Follow on commits will KNF and then make it build. ok jsing@ tb@
* Bring back r1.3, ok becktb2021-10-281-3/+47
| | | | | | | | | | | Original commit message from beck: Validate Subject Alternate Names when they are being added to certificates. With this change we will reject adding SAN DNS, EMAIL, and IP addresses that are malformed at certificate creation time. ok jsing@ tb@
* new manual page X509_REQ_add_extensions(3)schwarze2021-10-274-4/+148
| | | | documenting six functions for extensions in certification requests
* add some .Xrs involving recently added pagesschwarze2021-10-277-15/+22
|
* minor tweaks to wording and punctuation,schwarze2021-10-271-10/+19
| | | | and add .Xrs to relevant objects
* Minor tweaks:schwarze2021-10-271-9/+12
| | | | | | | | | * Say "number of bytes" instead of "length of bytes". * Remove mention of a BUGS section that exists neither here nor in OpenSSL. * List all authors who contributed Copyright-worthy amounts of text. * Remove years from the Copyright line that saw no non-trivial changes. * Add the year 2014: that's when Emilia wrote the i2d_re_X509_tbs() text. * Improve merge comments.
* Revert version 1.3 - not allowing the creation of bogus certificatesbeck2021-10-271-47/+3
| | | | | | | | | breaks the ruby regression tests that expect to make bogus certificates and see that they are rejected :( I am reverting this for now to make the regress tests pass, and will bring it back if we decide to patch the regress tests to remove the problem cases
* Fix to correctly parse the 'to' time into the to_tmbeck2021-10-271-2/+2
|
* Add ASN1_TIME_diff from OpenSSL.beck2021-10-274-5/+106
| | | | | | The symbol is not yet exposed and will show up with tb@'s forthcoming bump ok tb@ jsing@
* Merge documentation for i2d_re_X509*_tbs(3) from OpenSSL 1.1tb2021-10-261-4/+67
|
* spelling fixes;jmc2021-10-262-4/+4
|
* install X509_get_extension_flags.3 and X509_SIG_get0.3tb2021-10-261-1/+3
|
* Remove a line documenting that X509_get_X509_PUBKEY(3) is missingtb2021-10-261-2/+1
| | | | discussed with schwarze
* Document X509_get0_pubkey.3tb2021-10-261-3/+14
|
* Document new signature of X509_get_X509_PUBKEY() and remove claimtb2021-10-261-5/+3
| | | | | that the API is implemented as a macro. This will change in an upcoming bump.
* Add tlsfeature NIDjob2021-10-262-0/+2
| | | | OK beck@ tb@
* Add RFC 3779 checks to both legacy and new verifierjob2021-10-262-2/+20
| | | | OK beck@
* new manual page X509_REQ_add1_attr(3) documenting nine functionsschwarze2021-10-266-8/+199
| | | | for X.501 Attributes in PKCS#10 certification requests
* correct a wrong function name below RETURN VALUESschwarze2021-10-261-3/+3
|