aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/asn1/x_x509a.c
Commit message (Collapse)AuthorAgeFilesLines
* Move certificate request and CRL routines to x509 dir.Dr. Stephen Henson2015-09-221-200/+0
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* make X509_CERT_AUX opaqueDr. Stephen Henson2015-08-311-0/+1
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* GH354: Memory leak fixesAlessandro Ghedini2015-08-281-2/+5
| | | | | | | | | | | | Fix more potential leaks in X509_verify_cert() Fix memory leak in ClientHello test Fix memory leak in gost2814789 test Fix potential memory leak in PKCS7_verify() Fix potential memory leaks in X509_add1_reject_object() Refactor to use "goto err" in cleanup. Signed-off-by: Rich Salz <rsalz@akamai.com> Reviewed-by: Emilia Käsper <emilia@openssl.org>
* Identify and move common internal libcrypto header filesRichard Levitte2015-05-141-1/+1
| | | | | | | | | | | | | There are header files in crypto/ that are used by a number of crypto/ submodules. Move those to crypto/include/internal and adapt the affected source code and Makefiles. The header files that got moved are: crypto/cryptolib.h crypto/md32_common.h Reviewed-by: Rich Salz <rsalz@openssl.org>
* Use p==NULL not !p (in if statements, mainly)Rich Salz2015-05-111-11/+14
| | | | Reviewed-by: Tim Hudson <tjh@openssl.org>
* free NULL cleanup 8Rich Salz2015-04-301-2/+2
| | | | | | | | | | Do not check for NULL before calling a free routine. This addresses: ASN1_BIT_STRING_free ASN1_GENERALIZEDTIME_free ASN1_INTEGER_free ASN1_OBJECT_free ASN1_OCTET_STRING_free ASN1_PCTX_free ASN1_SCTX_free ASN1_STRING_clear_free ASN1_STRING_free ASN1_TYPE_free ASN1_UTCTIME_free M_ASN1_free_of Reviewed-by: Richard Levitte <levitte@openssl.org>
* free NULL cleanupRich Salz2015-03-241-2/+1
| | | | | | | | Start ensuring all OpenSSL "free" routines allow NULL, and remove any if check before calling them. This gets ASN1_OBJECT_free and ASN1_STRING_free. Reviewed-by: Matt Caswell <matt@openssl.org>
* Remove X509_PAIRRich Salz2015-02-061-7/+0
| | | | | | Unused type; a pair X509 certificates. Intended for LDAP support. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Run util/openssl-format-source -v -c .Matt Caswell2015-01-221-83/+93
| | | | Reviewed-by: Tim Hudson <tjh@openssl.org>
* Support setting of "no purpose" for trust.Dr. Stephen Henson2013-11-111-8/+19
| | | | | | If the oid parameter is set to NULL in X509_add1_trust_object create an empty list of trusted purposes corresponding to "no purpose" if trust is checked.
* Update obsolete email address...Dr. Stephen Henson2008-11-051-1/+1
|
* Extra ; removed.Richard Levitte2002-11-271-1/+1
|
* Add the ASN.1 structures and functions for CertificatePair, which isRichard Levitte2002-11-181-0/+6
| | | | | | | | | | | | | | | | | | | defined as follows (according to X.509_4thEditionDraftV6.pdf): CertificatePair ::= SEQUENCE { forward [0] Certificate OPTIONAL, reverse [1] Certificate OPTIONAL, -- at least one of the pair shall be present -- } The only thing I'm not sure about is if it's implicit or explicit tags that I should count on. For now, I'm thinking explicit, but will gladly stand corrected. Also implement the PEM functions to read and write certificate pairs, and defined the PEM tag as "CERTIFICATE PAIR". This needed to be defined, mostly for the sake of the LDAP attribute crossCertificatePair, but may prove useful elsewhere as well.
* Various enhancements to PKCS#12 code, newDr. Stephen Henson2002-10-031-0/+23
| | | | | | medium level API, improved PKCS12_create and additional functionality in pkcs12 utility.
* Get rid of ASN1_ITEM_FUNCTIONS dummy functionDr. Stephen Henson2001-02-231-1/+1
| | | | | | prototype hack. This unfortunately means that every ASN1_*_END construct cannot have a trailing ;
* Merge from the ASN1 branch of new ASN1 codeDr. Stephen Henson2000-12-081-66/+9
| | | | | | to main trunk. Lets see if the makes it to openssl-cvs :-)
* Two new PKCS#12 demo programs.Dr. Stephen Henson2000-09-071-0/+8
| | | | | | Update PKCS12_parse(). Make the keyid in certificate aux info more usable.
* There have been a number of complaints from a number of sources that namesRichard Levitte2000-06-011-1/+1
| | | | | | | | | like Malloc, Realloc and especially Free conflict with already existing names on some operating systems or other packages. That is reason enough to change the names of the OpenSSL memory allocation macros to something that has a better chance of being unique, like prepending them with OPENSSL_. This change includes all the name changes needed throughout all C files.
* More get0 et al. changes. Also provide fgrep targets in CHANGESBodo Möller2000-02-261-2/+2
| | | | where the new functions are mentioned.
* Rename functions for new convention.Dr. Stephen Henson2000-02-261-2/+2
|
* Change the 'other' structure in certificate aux info.Dr. Stephen Henson2000-02-201-4/+5
|
* Seek out and destroy another evil cast.Ulf Möller2000-01-301-1/+1
|
* More X509_ATTRIBUTE changes.Dr. Stephen Henson2000-01-071-2/+2
|
* Simplify the trust structure: basically zap the bit strings andDr. Stephen Henson1999-12-291-56/+36
| | | | represent everything by OIDs.
* Initial trust code: allow setting of trust checking functionsDr. Stephen Henson1999-11-271-20/+20
| | | | | | | | | | | | | in a table. Doesn't do too much yet. Make the -<digestname> options in 'x509' affect all relevant options. Change the name of the 'notrust' options to 'reject' as this causes less confusion and is a better description of the effect. A few constification changes.
* Fix to the -revoke option in ca. It was leaking memory, crashing and justDr. Stephen Henson1999-11-081-0/+1
| | | | | | | | | plain not working :-( Also fix some memory leaks in the new X509_NAME code. Fix so new app_rand code doesn't crash 'x509' and move #include so it compiles under Win32.
* Allow additional information to be attached to aDr. Stephen Henson1999-11-041-0/+218
certificate: currently this includes trust settings and a "friendly name".