aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/x509/x509_trs.c
Commit message (Collapse)AuthorAgeFilesLines
* Run util/openssl-format-source -v -c .Matt Caswell2015-01-221-160/+181
| | | | Reviewed-by: Tim Hudson <tjh@openssl.org>
* Experimental support for partial chain verification: if an intermediateDr. Stephen Henson2010-02-251-0/+9
| | | | | certificate is explicitly trusted (using -addtrust option to x509 utility for example) the verification is sucessful even if the chain is not complete.
* Update obsolete email address...Dr. Stephen Henson2008-11-051-1/+1
|
* RFC 3161 compliant time stamp request creation, response generationUlf Möller2006-02-121-1/+2
| | | | | | | and response verification. Submitted by: Zoltan Glozik <zglozik@opentsa.org> Reviewed by: Ulf Moeller
* A general spring-cleaning (in autumn) to fix up signed/unsigned warnings.Geoff Thorpe2003-10-291-2/+2
| | | | | | | | | | I have tried to convert 'len' type variable declarations to unsigned as a means to address these warnings when appropriate, but when in doubt I have used casts in the comparisons instead. The better solution (that would get us all lynched by API users) would be to go through and convert all the function prototypes and structure definitions to use unsigned variables except when signed is necessary. The proliferation of (signed) "int" for strictly non-negative uses is unfortunate.
* Add an entry for X509_TRUST_OBJECT_SIGN in trstandard[].Richard Levitte2003-06-111-0/+1
| | | | PR: 617
* Typo.Dr. Stephen Henson2001-10-201-1/+1
|
* Add missing variable length cipher flag for Blowfish.Dr. Stephen Henson2001-05-241-1/+2
| | | | | | Only use trust settings if either trust or reject settings are present, otherwise use compatibility mode. This stops root CAs being rejected if they have alias of keyid set.
* Purpose and trust setting functions for X509_STORE.Dr. Stephen Henson2001-05-101-0/+10
| | | | Tidy existing code.
* Enhance OCSP_request_verify() so it finds the signers certificateDr. Stephen Henson2001-02-261-1/+2
| | | | properly and supports several flags.
* Comment and indentationBodo Möller2001-01-281-4/+4
|
* Initial OCSP certificate verify. Not complete,Dr. Stephen Henson2001-01-171-0/+8
| | | | it just supports a "trusted OCSP global root CA".
* There have been a number of complaints from a number of sources that namesRichard Levitte2000-06-011-5/+5
| | | | | | | | | like Malloc, Realloc and especially Free conflict with already existing names on some operating systems or other packages. That is reason enough to change the names of the OpenSSL memory allocation macros to something that has a better chance of being unique, like prepending them with OPENSSL_. This change includes all the name changes needed throughout all C files.
* The previous commit to crypto/stack/*.[ch] pulled the type-safety stringsGeoff Thorpe2000-06-011-2/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | yet tighter, and also put some heat on the rest of the library by insisting (correctly) that compare callbacks used in stacks are prototyped with "const" parameters. This has led to a depth-first explosion of compiler warnings in the code where 1 constification has led to 3 or 4 more. Fortunately these have all been resolved to completion and the code seems cleaner as a result - in particular many of the _cmp() functions should have been prototyped with "const"s, and now are. There was one little problem however; X509_cmp() should by rights compare "const X509 *" pointers, and it is now declared as such. However, it's internal workings can involve recalculating hash values and extensions if they have not already been setup. Someone with a more intricate understanding of the flow control of X509 might be able to tighten this up, but for now - this seemed the obvious place to stop the "depth-first" constification of the code by using an evil cast (they have migrated all the way here from safestack.h). Fortunately, this is the only place in the code where this was required to complete these type-safety changes, and it's reasonably clear and commented, and seemed the least unacceptable of the options. Trying to take the constification further ends up exploding out considerably, and indeed leads directly into generalised ASN functions which are not likely to cooperate well with this.
* New compatability trust and purpose settings.Dr. Stephen Henson2000-03-071-8/+9
|
* More get0 et al. changes. Also provide fgrep targets in CHANGESBodo Möller2000-02-261-3/+3
| | | | where the new functions are mentioned.
* Rename functions for new convention.Dr. Stephen Henson2000-02-261-1/+1
|
* ispell (and minor modifications)Ulf Möller2000-02-031-1/+1
|
* Simplify the trust structure: basically zap the bit strings andDr. Stephen Henson1999-12-291-19/+42
| | | | represent everything by OIDs.
* Change the trust and purpose code so it doesn't need initDr. Stephen Henson1999-12-021-38/+71
| | | | either and has a static and dynamic mix.
* Oops! Commit died on me :-(Dr. Stephen Henson1999-11-271-0/+207