summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
* Fix potential overflow in CN subject line parsing, thanks tobeck2020-09-181-4/+5
* Add a comment saying that the public function NAME_CONSTRAINTS_check(3)schwarze2020-09-171-2/+5
* Install the new page SSL_set1_host(3), link to it from relevant places,schwarze2020-09-172-10/+14
* revert my putting this on a diet. sadly the NAME_CONSTRAINTS_checkbeck2020-09-161-7/+1
* noop NAME_CONSTRAINTS_check stubinoguchi2020-09-161-4/+5
* Make check in x509_verify_ctx_set_max_signatures() consistent with others.jsing2020-09-161-4/+2
* Dedup code in x509_verify_ctx_new_from_xsc().jsing2020-09-161-14/+7
* set error_depth and current_cert to make more legacy callbacks that don't checkbeck2020-09-151-1/+3
* Deduplicate the time validation code between the legacy and newbeck2020-09-153-27/+8
* ifdef out code that is no longer used in here. once we are certainbeck2020-09-151-2/+5
* simplify RETURN VALUES for x509_verify(3) after beck@ made the rulesschwarze2020-09-141-7/+3
* Add initial man page for new x509_verify chain validatorbeck2020-09-141-0/+225
* Set error if we are given an NULL ctx in x509_verify, and set errorbeck2020-09-141-5/+3
* nuke a stray spacetb2020-09-141-2/+2
* Fix potential leak when tmpext fails to be added tobeck2020-09-141-2/+6
* remove unneeded variable "type".beck2020-09-141-6/+5
* Don't leak names on successbeck2020-09-141-1/+2
* remove unneded variable "time1"beck2020-09-141-6/+6
* remove unneded variable "time"beck2020-09-141-3/+2
* fix bug introduced on review where refactor made it possible tobeck2020-09-141-2/+2
* re-enable new x509 chain verifier as the defaultbeck2020-09-141-3/+1
* Correctly fix double free introduced on review.beck2020-09-142-3/+3
* Fix double free - review moved the pop_free of roots to x509_verify_ctx_freebeck2020-09-141-2/+1
* revert previous, need to fix a problembeck2020-09-141-1/+3
* Enable the use of the new x509 chain validator by default.beck2020-09-141-3/+1
* Add new x509 certificate chain validator in x509_verify.cbeck2020-09-1310-59/+1191
* Unindent a bit of code that performs a few too many checks totb2020-09-121-10/+8
* Avoid an out-of-bounds access in BN_rand()tb2020-09-121-3/+8
* Change over to use the new x509 name constraints verification.beck2020-09-121-28/+7
* Include machine/endian.h in gost2814789.cinoguchi2020-09-121-1/+3
* Add x509_constraints.c - a new implementation of x509 name constraints, withbeck2020-09-113-2/+1272
* Add issuer cache, to be used by upcoming changes to validation code.beck2020-09-113-1/+216
* Import latest OPENSSL_NO_* flags from OpenSSL 1.1.1ginoguchi2020-09-091-0/+8
* Mention that EC_KEY_get0_public_key returns a public key.tb2020-09-081-3/+5
* Clean up asn1/x_info.ctb2020-09-031-22/+9
* Remove unnecessary zeroing after recallocarray(3)tb2020-09-031-3/+1
* define OPENSSL_NO_SSL_TRACE in opensslfeatures.hinoguchi2020-08-291-1/+1
* delete another word to improve the wording; suggested by jmc@schwarze2020-08-061-2/+2
* Explain the purpose of CMAC_resume(3) in more detail.schwarze2020-08-061-3/+9
* remove half a dozen "goto" statements and a labelschwarze2020-07-251-14/+1
* tweak previous;jmc2020-07-241-4/+4
* document PEM_X509_INFO_read(3) and PEM_X509_INFO_read_bio(3)schwarze2020-07-237-14/+207
* Fix a bug in PEM_X509_INFO_read_bio(3) that is very likely to causeschwarze2020-07-231-21/+17
* Disable assembly code for powerpc64; more work is needed to make it work.kettenis2020-06-291-8/+9
* Switch back to bn_mul_mont_int since the bn_mul_mont_fpu64 code isn'tkettenis2020-06-281-3/+3
* Accidentally doubled these files on first commit. Correcting.drahn2020-06-262-194/+1
* Intial attempt at powerpc64 libcrypto pieces.drahn2020-06-252-0/+386
* Properly document the return values of EVP_PKEY_base_id(3)schwarze2020-06-244-70/+152
* use n-bit <noun> consistently; ok schwarze for the principal of the idea,jmc2020-06-246-28/+28
* new manual page ChaCha(3);schwarze2020-06-243-2/+257