Age | Commit message (Collapse) | Author |
|
/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
|
|
|
|
Currently, when building a certificate chain we look up an issuer and if
it is the only issuer certificate available we still use it even if it has
expired. When X509_V_FLAG_TRUSTED_FIRST is not in use, untrusted
certificates are processed first and if one of these happens to be expired
it will be used to build the chain, even if there is another non-expired
option in the trusted store.
Rework this code so that we first look for a non-expired untrusted
certificate. If one does not exist then we take a look in the trusted
store to see if we would be able to build the chain and only if there is
not, do we then look for an expired untrusted certificate.
This makes certificate validation possible for various sites that are
serving expired AddTrust certificates.
Issue reported by Christian Heimes via GitHub.
ok beck@ tb@
|
|
tweak and OK tb@
|
|
No comment when shown around among LibreSSL devs
except "very very strange function" from beck@
and "cannot say much about it" from tb@.
If needed, this can be further polished in the tree,
review is still welcome.
|
|
Suggested by bluhm@, OK beck@ tb@.
|
|
OK beck@ tb@
|
|
conflict against a potential define min() from some other scope.
|
|
OK beck@, who was amused by the "darkly comic value of reading" it
|
|
|
|
version to 3.2.0
|
|
ok bcook inoguchi deraadt
|
|
It is possible to do this by abusing the EVP_CTRL_INIT API.
Pointed out by jsing.
ok inoguchi jsing (as part of a larger diff)
|
|
EVP_AEAD_CTX_{open,seal}, as this leaks the authentication key.
Issue reported and fix tested by Guido Vranken.
ok beck, jsing
This commit adds a constant to a public header despite library lock,
as discussed with deraadt and sthen.
|
|
|
|
bytes in case ASN1_INTEGER_get() failed. This happens more often since
asn1/a_int.c -r1.34. Matches OpenSSL behavior.
Issue in openssl x509 -text output reported by sthen
ok jsing sthen
|
|
Patch from Martin Vahlensieck <academicsolutions dot ch>.
|
|
Useless text reported by Martin Vahlensieck (academicsolutions.ch) on tech@.
|
|
Check and print out boolean type properly.
Based on OpenSSL commit ad72d9fdf7709ddb97a58d7d45d755e6e0504b96.
Reduced unneeded parentheses from if condition.
Check return value from i2s_ASN1_INTEGER.
Based on OpenSSL commit 5e3553c2de9a365479324b8ba8b998f0cce3e527.
Added if condition expression and return 0 if NULL is returned.
ok tb@
|
|
Referred to this OpenSSL commit and adopted to the codebase.
b785504a10310cb2872270eb409b70971be5e76e
suggest and ok tb@
|
|
Fix the problem that long unbroken line of base64 text is not decoded.
Referred to this OpenSSL commit and adapted to the codebase.
3cdd1e94b1d71f2ce3002738f9506da91fe2af45
Reported by john.a.passaro <at> gmail.com to the LibreSSL ML.
ok tb@
|
|
ok and suggestion jmc@
|
|
There was no limitation for the length of openssl conf value.
This brings possibility of out-of-memory problem as oss-fuzz had detected.
This diff restricts the length of conf value up to 64k.
ok jsing@
|
|
ok tb@
|
|
|
|
|
|
Discussed with jsing
|
|
behavior.
ok jsing
|
|
The new IV is 128 bit long and is actually the 64 bit counter followed
by 64 the bit initialization vector. This is needed by an upcoming
change in OpenSSH and is a breaking change for all current callers.
There are language bindings for Node.js, Rust and Erlang, but none of
our ports use them.
Note that EVP_chacha20() was first introduced in LibreSSL on May 1, 2014
while the entirely incompatible version in OpenSSL was committed on
Dec 9, 2015.
Initial diff from djm and myself, further refinements by djm.
Ports grepping by sthen
ok jsing
|
|
ok beck
|
|
been installed prior to building.
Requested by and ok tb@
|
|
ok beck@
|
|
ok bcook@
|
|
ok bcook@
ok and "move it down two lines" jsing@
|
|
|
|
ok jsing@ tb@
|
|
ok tb@
|
|
ok jsing@ tb@
|
|
arguments were changed from int to size_t with the import of OpenSSL 0.9.8h
in 2008.
|
|
verification param flags of a context. While this function is marked as
likely to be deprecated in OpenSSL it seems that this may not happen.
This is why we decided to still document it.
OK and input from ingo@ tb@
|
|
OK tb@ tedu@
|
|
OK tb@ tedu@
|
|
This fixes openssl(1) rsa -text output format
ok tb@
|
|
Issue spotted by bcook@
ok bcook@ inoguchi@
|
|
ok jsing@
|
|
|
|
|
|
|
|
PEM_write_bio_CMS(3) which jsing@ just enabled in Symbols.list rev. 1.91
|
|
Install the new manual pages documenting the majority of them.
|