aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/asn1/t_x509.c
Commit message (Collapse)AuthorAgeFilesLines
* Retain compatibility of EVP_DigestInit() and EVP_DigestFinal()Dr. Stephen Henson2001-10-161-2/+2
| | | | | | with existing code. Modify library to use digest *_ex() functions.
* Another empty X509_NAME fix.Dr. Stephen Henson2001-06-261-0/+2
|
* Handle empty X509_NAME in printing routines.Dr. Stephen Henson2001-06-261-2/+2
|
* Change all calls to low level digest routines in the library andDr. Stephen Henson2001-06-191-8/+3
| | | | | | | | | | applications to use EVP. Add missing calls to HMAC_cleanup() and don't assume HMAC_CTX can be copied using memcpy(). Note: this is almost identical to the patch submitted to openssl-dev by Verdon Walker <VWalker@novell.com> except some redundant EVP_add_digest_()/EVP_cleanup() calls were removed and some changes made to avoid compiler warnings.
* Overhaul the display of certificate details inDr. Stephen Henson2001-03-151-1/+1
| | | | | | | | | | | the 'ca' utility. This can now be extensively customised in the configuration file and handles multibyte strings and extensions properly. This is required when extensions copying from certificate requests is supported: the user must be able to view the extensions before allowing a certificate to be issued.
* Document the -certopt option to the x509 utility.Dr. Stephen Henson2001-03-151-2/+4
| | | | | | | Add no_issuer option. Fix X509_print_ex() so it prints out newlines when certain fields are omitted.
* Print out OID of unknown signature or public keyDr. Stephen Henson2001-02-241-6/+11
| | | | algorithms.
* Make all configuration macros available for application by makingRichard Levitte2001-02-191-5/+5
| | | | | | | | | | | | sure they are available in opensslconf.h, by giving them names starting with "OPENSSL_" to avoid conflicts with other packages and by making sure e_os2.h will cover all platform-specific cases together with opensslconf.h. I've checked fairly well that nothing breaks with this (apart from external software that will adapt if they have used something like NO_KRB5), but I can't guarantee it completely, so a review of this change would be a good thing.
* New function X509V3_extensions_print() this removes extension duplicationDr. Stephen Henson2000-12-141-27/+4
| | | | | | | | | from the print routines. Reorganisation of OCSP code: initial print routines in ocsp_prn.c. Doesn't work fully because OCSP extensions aren't reimplemented yet. Implement some ASN1 functions needed to compile OCSP code.
* New function X509_signature_print() to remove some duplicateDr. Stephen Henson2000-12-141-15/+22
| | | | code from certificate, CRL and request printing routines.
* The majority of the OCSP code from CertCo.Richard Levitte2000-10-271-0/+50
|
* More code for X509_print_ex() support.Dr. Stephen Henson2000-10-061-4/+10
|
* Global DirectoryString mask fix.Dr. Stephen Henson2000-10-041-78/+127
| | | | | | Add support for X509_NAME_print_ex() in req. Initial code for cutomizable X509 print routines.
* There have been a number of complaints from a number of sources that namesRichard Levitte2000-06-011-1/+1
| | | | | | | | | like Malloc, Realloc and especially Free conflict with already existing names on some operating systems or other packages. That is reason enough to change the names of the OpenSSL memory allocation macros to something that has a better chance of being unique, like prepending them with OPENSSL_. This change includes all the name changes needed throughout all C files.
* Seek out and destroy another evil cast.Ulf Möller2000-01-301-1/+1
|
* Allow additional information to be attached to aDr. Stephen Henson1999-11-041-0/+1
| | | | | certificate: currently this includes trust settings and a "friendly name".
* Replace the macros in asn1.h with function equivalents. Also make UTF8StringsDr. Stephen Henson1999-10-201-1/+1
| | | | tolerated in certificates.
* Support for parsing of certificate extensions in PKCS#10 requests: these areDr. Stephen Henson1999-08-091-4/+0
| | | | | used by things like Xenroll. Also include documentation for extendedKeyUsage extension.
* More diagnostics.Ben Laurie1999-08-031-0/+1
|
* Support the EBCDIC character set and BS2000/OSD-POSIX (work in progress).Ulf Möller1999-06-041-0/+10
| | | | Submitted by: Martin Kraemer <Martin.Kraemer@MchP.Siemens.De>
* Change #include filenames from <foo.h> to <openssl.h>.Bodo Möller1999-04-231-7/+7
| | | | | | Submitted by: Reviewed by: PR:
* Change functions to ANSI C.Ulf Möller1999-04-191-22/+7
|
* Massive constification.Ben Laurie1999-04-171-7/+6
|
* Add initial support for Thawte strong extranet certificate extensions andDr. Stephen Henson1999-03-271-34/+3
| | | | include an 'indent' option to V3 stuff.
* Continuing adding X509 V3 support. This starts to integrate the code withDr. Stephen Henson1999-01-241-2/+6
| | | | | | the main library, but only with printing at present. To see this try: openssl x509 -in cert.pem -text on a certificate with some extensions in it.
* Continued patches so certificates and CRLs now can support and useDr. Stephen Henson1999-01-201-2/+2
| | | | GeneralizedTime.
* Time to blow up the source tree :-) This is the beginning of support forDr. Stephen Henson1999-01-171-0/+51
| | | | | | | | | | | | | | | | | | | | | GeneralizedTime. At several points PKIX specifies that GeneralizedTime can be used but OpenSSL doesn't currently support it. This patch adds several files and a bunch of functions. Of interest is the ASN1_TIME structure and its related functions. At several points certificates, CRLs et al specify that a time can be expressed as a choice of UTCTime and GeneralizedTime. Currently OpenSSL interprets this (wrongly) as UTCTime because GeneralizedTime isn't supported. The ASN1_TIME stuff provides this functionality. Still todo is to trace which cert and CRL points need an ASN1_TIME and modify the utilities appropriately and of course fix all the bugs. Note new OpenSSL copyright in the new file a_time.c. I didn't put it in a_gentm.c because it is a minimally modified form a_utctm.c . Since this adds new files and error codes you will need to do a 'make errors' at the top level to add the new codes.
* Make sure applications free up pkey structures and add netscape extensionDr. Stephen Henson1999-01-031-0/+2
| | | | handling to x509.c
* Import of old SSLeay release: SSLeay 0.9.1b (unreleased)Ralf S. Engelschall1998-12-211-1/+6
|
* Import of old SSLeay release: SSLeay 0.9.0bRalf S. Engelschall1998-12-211-3/+3
|
* Import of old SSLeay release: SSLeay 0.8.1bRalf S. Engelschall1998-12-211-0/+386