index
:
src
cvs/HEAD
kms/intel
kms/radeon
master
OpenBSD base system
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
lib
/
libcrypto
Age
Commit message (
Expand
)
Author
2020-10-12
make fixed-sized fixed-value mib[] arrays be const
Theo de Raadt
2020-10-09
Fix leak or double free with OCSP_request_add0_id()
Theo Buehler
2020-09-26
Ensure leaf is set up on X509_STORE_CTX before verification.
Joel Sing
2020-09-26
jumping into the x509 fray with a bunch of whitespace repair
Theo de Raadt
2020-09-25
bump to LibreSSL 3.2.2 ahead of lock
Brent Cook
2020-09-25
KNF for a few comments and indent a label
Theo Buehler
2020-09-25
Remove some dangling elses for consistency with the rest of the file
Theo Buehler
2020-09-25
Simplify UI_new_method()
Theo Buehler
2020-09-25
Move variable declaration to the top of UI_set_result and ditch
Theo Buehler
2020-09-25
The default branch of a switch somehow got moved inside of a pointless
Theo Buehler
2020-09-25
Simplify call to ERR_print_errors_cb()
Theo Buehler
2020-09-24
Error out if ok_chars and cancel_chars overlap
Theo Buehler
2020-09-24
Fix a number of leaks in the UI_dup_* functions
Theo Buehler
2020-09-24
Push ERR_R_MALLOC_FAILURE onto the error stack
Theo Buehler
2020-09-24
Make free_strings() NULL safe
Theo Buehler
2020-09-24
KNF and grammar tweaks for comments; wrap a few overlong prototypes.
Theo Buehler
2020-09-23
Ensure chain is set on the X509_STORE_CTX before triggering callback.
Joel Sing
2020-09-21
Fix some line wrapping and other whitespace issues.
Theo Buehler
2020-09-21
Move freeing and zeroing up to right after the while loop.
Theo Buehler
2020-09-20
Avoid memleak caused by shadowing
Theo Buehler
2020-09-20
KNF/whitespace nits
Theo Buehler
2020-09-20
Correct a 1 byte read overflow in x509_contraints_uri and add
Bob Beck
2020-09-20
Fix a memory leak in x509_constraints_extract_names
Theo Buehler
2020-09-19
remove superfluous NULL check
Bob Beck
2020-09-18
Fix potential overflow in CN subject line parsing, thanks to
Bob Beck
2020-09-17
Add a comment saying that the public function NAME_CONSTRAINTS_check(3)
Ingo Schwarze
2020-09-17
Install the new page SSL_set1_host(3), link to it from relevant places,
Ingo Schwarze
2020-09-16
revert my putting this on a diet. sadly the NAME_CONSTRAINTS_check
Bob Beck
2020-09-16
noop NAME_CONSTRAINTS_check stub
Kinichiro Inoguchi
2020-09-16
Make check in x509_verify_ctx_set_max_signatures() consistent with others.
Joel Sing
2020-09-16
Dedup code in x509_verify_ctx_new_from_xsc().
Joel Sing
2020-09-15
set error_depth and current_cert to make more legacy callbacks that don't check
Bob Beck
2020-09-15
Deduplicate the time validation code between the legacy and new
Bob Beck
2020-09-15
ifdef out code that is no longer used in here. once we are certain
Bob Beck
2020-09-14
simplify RETURN VALUES for x509_verify(3) after beck@ made the rules
Ingo Schwarze
2020-09-14
Add initial man page for new x509_verify chain validator
Bob Beck
2020-09-14
Set error if we are given an NULL ctx in x509_verify, and set error
Bob Beck
2020-09-14
nuke a stray space
Theo Buehler
2020-09-14
Fix potential leak when tmpext fails to be added to
Bob Beck
2020-09-14
remove unneeded variable "type".
Bob Beck
2020-09-14
Don't leak names on success
Bob Beck
2020-09-14
remove unneded variable "time1"
Bob Beck
2020-09-14
remove unneded variable "time"
Bob Beck
2020-09-14
fix bug introduced on review where refactor made it possible to
Bob Beck
2020-09-14
re-enable new x509 chain verifier as the default
Bob Beck
2020-09-14
Correctly fix double free introduced on review.
Bob Beck
2020-09-14
Fix double free - review moved the pop_free of roots to x509_verify_ctx_free
Bob Beck
2020-09-14
revert previous, need to fix a problem
Bob Beck
2020-09-14
Enable the use of the new x509 chain validator by default.
Bob Beck
2020-09-13
Add new x509 certificate chain validator in x509_verify.c
Bob Beck
[next]