summaryrefslogtreecommitdiffstats
path: root/crypto/x509/x509_vfy.c (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Long overdue cleanup of X509 policy tree verificationViktor Dukhovni2016-02-051-3/+7
* Compat self-signed trust with reject-only aux dataViktor Dukhovni2016-02-011-7/+19
* Check chain extensions also for trusted certificatesViktor Dukhovni2016-02-011-33/+85
* Remove /* foo.c */ commentsRich Salz2016-01-261-1/+0
* Check Suite-B constraints with EE DANE recordsViktor Dukhovni2016-01-211-24/+31
* Drop cached certificate signature validity flagViktor Dukhovni2016-01-181-5/+1
* Add lookup_certs for a trusted stack.Dr. Stephen Henson2016-01-151-0/+21
* Cosmetic polish for last-resort depth 0 checkViktor Dukhovni2016-01-141-5/+5
* Fix last-resort depth 0 check when the chain has multiple certificatesViktor Dukhovni2016-01-141-4/+9
* Always initialize X509_STORE_CTX get_crl pointerViktor Dukhovni2016-01-141-0/+2
* DANE support for X509_verify_cert()Viktor Dukhovni2016-01-071-9/+399
* DANE support structures, constructructors and accessorsViktor Dukhovni2016-01-061-0/+7
* Fix X509_STORE_CTX_cleanup()Viktor Dukhovni2016-01-041-17/+21
* X509_verify_cert() cleanupViktor Dukhovni2016-01-031-343/+396
* New function X509_get0_pubkeyDr. Stephen Henson2015-12-151-14/+5
* ex_data part 2: doc fixes and CRYPTO_free_ex_index.Rich Salz2015-12-011-13/+0
* Remove X509_VERIFY_PARAM_IDDr. Stephen Henson2015-11-261-11/+10
* Continue standardising malloc style for libcryptoMatt Caswell2015-11-091-2/+2
* embed CRL serial number and signature fieldsDr. Stephen Henson2015-10-151-1/+1
* In X509_STORE_CTX_init, cleanup on failuremrpre2015-09-051-27/+33
* RT3951: Add X509_V_FLAG_NO_CHECK_TIME to suppress time checkDavid Woodhouse2015-09-051-0/+4
* Revert "OPENSSL_NO_xxx cleanup: RFC3779"David Woodhouse2015-09-031-0/+2
* Add and use OPENSSL_zallocRich Salz2015-09-031-2/+1
* make X509_CRL opaqueDr. Stephen Henson2015-09-021-0/+1
* Better handling of verify param id peername fieldViktor Dukhovni2015-09-021-0/+4
* Add X509_up_ref function.Dr. Stephen Henson2015-09-011-4/+4
* Add X509_CRL_up_ref functionDr. Stephen Henson2015-09-011-2/+2
* GH354: Memory leak fixesAlessandro Ghedini2015-08-281-2/+2
* GH364: Free memory on an error pathIsmo Puustinen2015-08-131-1/+2
* RT3999: Remove sub-component version stringsRich Salz2015-08-101-1/+0
* Extend -show_chain option to verify to show more infoMatt Caswell2015-07-071-0/+5
* Reject calls to X509_verify_cert that have not been reinitialisedMatt Caswell2015-07-071-8/+14
* Fix alternate chains certificate forgery issueMatt Caswell2015-07-071-1/+1
* Fix length checks in X509_cmp_time to avoid out-of-bounds reads.Emilia Kasper2015-06-111-10/+47
* Identify and move common internal libcrypto header filesRichard Levitte2015-05-141-1/+1
* Initialize potentially uninitialized local variablesGunnar Kudrjavets2015-05-061-4/+4
* memset, memcpy, sizeof consistency fixesRich Salz2015-05-061-6/+4
* Use safer sizeof variant in mallocRich Salz2015-05-041-2/+1
* free NULL cleanup -- codaRich Salz2015-05-011-4/+2
* Remove goto inside an if(0) blockRich Salz2015-05-011-5/+5
* free NULL cleanup 5aRich Salz2015-04-301-18/+11
* remove malloc castsRich Salz2015-04-281-1/+2
* free NULL cleanupRich Salz2015-03-281-4/+2
* Fix verify algorithm.Dr. Stephen Henson2015-03-241-0/+8
* Add flag to inhibit checking for alternate certificate chains. Setting thisMatt Caswell2015-02-251-2/+4
* In certain situations the server provided certificate chain may no longer beMatt Caswell2015-02-251-70/+105
* Remove obsolete IMPLEMENT_ASN1_SET_OFDr. Stephen Henson2015-02-091-4/+0
* Final (for me, for now) dead code cleanupRich Salz2015-02-091-6/+0
* util/mkstack.pl now generates entire safestack.hRich Salz2015-02-061-6/+0
* OPENSSL_NO_xxx cleanup: RFC3779Rich Salz2015-01-271-2/+0