aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/x509/x509_vfy.c
Commit message (Expand)AuthorAgeFilesLines
* Rename some lowercase API'sRich Salz2016-04-181-2/+2
* Add X509_STORE_CTX_set0_untrusted function.Dr. Stephen Henson2016-04-161-0/+5
* Make many X509_xxx types opaque.Rich Salz2016-04-151-9/+35
* Add SSL_DANE typedef for consistency.Rich Salz2016-04-081-9/+9
* Move peer chain security checks into x509_vfy.cViktor Dukhovni2016-04-031-26/+134
* Tidy up x509_vfy callback handlingViktor Dukhovni2016-04-031-286/+217
* Require intermediate CAs to have basicConstraints CA:true.Viktor Dukhovni2016-03-291-1/+2
* Add a comment on dane_verify() logicViktor Dukhovni2016-03-201-1/+13
* Convert CRYPTO_LOCK_X509_* to new multi-threading APIAlessandro Ghedini2016-03-081-1/+2
* Deprecate the -issuer_checks debugging optionViktor Dukhovni2016-02-101-10/+1
* Suppress DANE TLSA reflection when verification failsViktor Dukhovni2016-02-081-5/+3
* GH601: Various spelling fixes.FdaSilvaYY2016-02-051-2/+2
* Ensure correct chain depth for policy checks with DANE bare key TAViktor Dukhovni2016-02-051-0/+19
* Long overdue cleanup of X509 policy tree verificationViktor Dukhovni2016-02-051-3/+7
* Compat self-signed trust with reject-only aux dataViktor Dukhovni2016-01-311-7/+19
* Check chain extensions also for trusted certificatesViktor Dukhovni2016-01-311-33/+85
* Remove /* foo.c */ commentsRich Salz2016-01-261-1/+0
* Check Suite-B constraints with EE DANE recordsViktor Dukhovni2016-01-201-24/+31
* Drop cached certificate signature validity flagViktor Dukhovni2016-01-181-5/+1
* Add lookup_certs for a trusted stack.Dr. Stephen Henson2016-01-151-0/+21
* Cosmetic polish for last-resort depth 0 checkViktor Dukhovni2016-01-141-5/+5
* Fix last-resort depth 0 check when the chain has multiple certificatesViktor Dukhovni2016-01-141-4/+9
* Always initialize X509_STORE_CTX get_crl pointerViktor Dukhovni2016-01-141-0/+2
* DANE support for X509_verify_cert()Viktor Dukhovni2016-01-071-9/+399
* DANE support structures, constructructors and accessorsViktor Dukhovni2016-01-051-0/+7
* Fix X509_STORE_CTX_cleanup()Viktor Dukhovni2016-01-031-17/+21
* X509_verify_cert() cleanupViktor Dukhovni2016-01-031-343/+396
* New function X509_get0_pubkeyDr. Stephen Henson2015-12-141-14/+5
* ex_data part 2: doc fixes and CRYPTO_free_ex_index.Rich Salz2015-12-011-13/+0
* Remove X509_VERIFY_PARAM_IDDr. Stephen Henson2015-11-261-11/+10
* Continue standardising malloc style for libcryptoMatt Caswell2015-11-091-2/+2
* embed CRL serial number and signature fieldsDr. Stephen Henson2015-10-151-1/+1
* In X509_STORE_CTX_init, cleanup on failuremrpre2015-09-051-27/+33
* RT3951: Add X509_V_FLAG_NO_CHECK_TIME to suppress time checkDavid Woodhouse2015-09-051-0/+4
* Revert "OPENSSL_NO_xxx cleanup: RFC3779"David Woodhouse2015-09-031-0/+2
* Add and use OPENSSL_zallocRich Salz2015-09-021-2/+1
* make X509_CRL opaqueDr. Stephen Henson2015-09-021-0/+1
* Better handling of verify param id peername fieldViktor Dukhovni2015-09-021-0/+4
* Add X509_up_ref function.Dr. Stephen Henson2015-08-311-4/+4
* Add X509_CRL_up_ref functionDr. Stephen Henson2015-08-311-2/+2
* GH354: Memory leak fixesAlessandro Ghedini2015-08-281-2/+2
* GH364: Free memory on an error pathIsmo Puustinen2015-08-131-1/+2
* RT3999: Remove sub-component version stringsRich Salz2015-08-101-1/+0
* Extend -show_chain option to verify to show more infoMatt Caswell2015-07-071-0/+5
* Reject calls to X509_verify_cert that have not been reinitialisedMatt Caswell2015-07-071-8/+14
* Fix alternate chains certificate forgery issueMatt Caswell2015-07-071-1/+1
* Fix length checks in X509_cmp_time to avoid out-of-bounds reads.Emilia Kasper2015-06-111-10/+47
* Identify and move common internal libcrypto header filesRichard Levitte2015-05-141-1/+1
* Initialize potentially uninitialized local variablesGunnar Kudrjavets2015-05-061-4/+4
* memset, memcpy, sizeof consistency fixesRich Salz2015-05-051-6/+4