aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib/cert/x509
Commit message (Collapse)AuthorAgeFilesLines
* Revert PK_Verifier change (don't require RNG there).Jack Lloyd2016-10-072-4/+2
| | | | | | | Verification is deterministic and public, so really no RNG is ever needed. Change provider handling - accepts "base", "openssl", or empty, otherwise throws a Provider_Not_Found exception.
* Remove Algo_Registry usage from public key code.Jack Lloyd2016-10-075-8/+27
| | | | | | | | Instead the key types exposes operations like `create_encryption_op` which will return the relevant operation if the algorithm supports it. Changes pubkey.h interface, now RNG is passed at init time. Blinder previous created its own RNG, now it takes it from app.
* 2nd review roundseu2016-10-021-50/+36
|
* remove superfluous includesKai Michaelis2016-10-022-9/+0
|
* 1st review roundKai Michaelis2016-10-023-15/+8
|
* Certificate store using SQLiteKai Michaelis2016-10-0215-82/+575
|
* Fix validation of self-issued certificates in chainsRené Korthaus2016-09-232-2/+5
| | | | | | | | | | | | | | | | | | Self-issued certificates are certificates where subject_dn == issuer_dn, but the signature is from a different key (ca key). Chains with such a certificate could not be verified, because self-issued certificates (1) would be taken for a self-signed certificate and (2) find_issuing_cert() would find the same self-issued certificate that we want to verify, generating a signature error during signature verification. To fix, we now first identify a certificate as self-signed only if subject_dn == issuer_dn AND if we can verify the cert signature with it's own key. Verification will bring some extra costs, but we only do it once, in X509_Certificate's constructor. Second, we make sure find_issuing_cert() does not return the very same certificate we want to verify. This should be no problem, since path validation currently does not seem to support validating a self-signed certificate.
* Make copy constructor and assignment defaultRené Korthaus2016-09-052-29/+2
|
* Call base class assignment operator in X509_CertificateRené Korthaus2016-09-041-0/+1
|
* Remove deprecated Nyberg-Rueppel and Rabin-Williams signaturesJack Lloyd2016-09-021-2/+1
|
* Merge GH #567/GH #457 TLS refactoring and Callbacks interfaceJack Lloyd2016-08-311-1/+0
|\
| * Reverted proposed constructor changes to X509_CA.Matthias Gierlings2016-06-193-41/+17
| | | | | | | | | | - Removed Certificate_Properties class used to wrap X509_CA parameters. - Whitespace cleanup.
| * Reduction of code complexity in MP & ECC classes.Matthias Gierlings2016-06-193-0/+3
| | | | | | | | | | | | - reduced number of parameters in various methods - introduced structures and renamed variables to improve code readability.
| * Reduction of code complexity in TLS classes.Matthias Gierlings2016-06-193-17/+37
| | | | | | | | | | | | | | -reduced number of parameters in various methods -reduced cyclomatic complexity (McCabe-Metric) -removed "TLSEXT_HEARTBEAT_SUPPORT" from tls_extensions.h (leftover from heartbeat extension removal?)
* | Change allowed_usage key usage checks to match RFC 5280Jack Lloyd2016-08-301-2/+4
| | | | | | | | GH #611
* | Fix TLS server cert validation problem GH #611Jack Lloyd2016-08-291-3/+3
| | | | | | | | Fallout from #591
* | Rename find_constraints() and let it throw instead of returning a combinationRené Korthaus2016-08-194-32/+59
| |
* | Fix allowed_usage() and add tests for key usageRené Korthaus2016-08-172-2/+2
| |
* | Fix GH #425 and run x509 tests with different signature algorithmsRené Korthaus2016-08-175-48/+24
| |
* | Merge GH #570 X509_Certificate APIsJack Lloyd2016-08-103-9/+58
| |
* | Merge GH #507 Add PKCS #11 supportJack Lloyd2016-07-041-1/+1
|\ \ | |/ |/|
| * add PKCS#11 supportDaniel Neus2016-06-171-1/+1
| |
* | Merge GH #487 Remove CVC certificates and EMSA1_BSI signature encodingJack Lloyd2016-06-171-3/+1
|\ \ | |/ |/|
| * remove all uses of EMSA1_BSIDaniel Neus2016-05-021-3/+1
| |
* | Add Not_Implemented exceptionJack Lloyd2016-06-073-7/+7
| |
* | Remove DN field requirements on generating certs and PKCS #10Jack Lloyd2016-05-233-22/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | I have no idea why this is requiring the country code be set, but for many applications a country is not even meaningful. This change also allows CN to be empty/unset on the request or cert, since there is no actual requirement for any specific DN entry type and RFC 5280 specifically allows even an completely empty DN, with name information only in the subjectAltName extension. This change also allows generating a self-signed cert or cert request that expires before it starts. That could only happen with an explicit decision by the application to set it that way, and there is no harm in returning these non-secret bits. They will probably notice their problem as soon as the cert is rejected by any receiving system.
* | Merge GH #484 use explicit casts to avoids MSVC warning C4267Jack Lloyd2016-05-092-4/+4
|\ \ | |/ |/|
| * Add explicit static_cast operations to eliminate implicit cast compiler ↵Dan Brown2016-04-272-4/+4
| | | | | | | | warnings.
* | Add missing overrideJack Lloyd2016-04-281-1/+1
|/
* Move name constraints validation code to extension classRené Korthaus2016-04-173-101/+111
|
* Add Unknown_Critical_Extension typeRené Korthaus2016-04-103-16/+43
|
* Generate error on unknown critical extension during path validationRené Korthaus2016-04-069-19/+145
| | | | | | | | | | | | Previously unknown critical extensions were rejected during X509_Certificate constructor, which inhibited inspecting other parts of such a certificate. Refactored the certificate extensions code so that the path validation routine performs this check only. Additionally, added an interface for extensions to inspect the path during path validation. TODOs were added in places where existing path validation code can use the new interface. Fixes GH #449.
* Merge GH #454 X.509 name constraintsJack Lloyd2016-03-168-7/+630
|\
| * Changes from GH #454 reviewJack Lloyd2016-03-162-68/+72
| |
| * X.509 Name ConstraintsKai Michaelis2016-03-108-7/+626
| |
* | Trivial warning fixesJack Lloyd2016-03-091-8/+12
| |
* | Merge GH #437 add X509_Certificate::v3_extensionsJack Lloyd2016-03-064-20/+35
|\ \ | | | | | | | | | | | | Makes it possible for an application to interpret some extension not supported by the library.
| * | +added fields for custom x509 extensionsChristopher Bläsius2016-02-294-20/+33
| |/ | | | | | | +Extensions now uses std::unique_ptr
* | Remaining cppcheck fixes that are not covered by GH #444Daniel Neus2016-03-051-11/+5
| |
* | cppcheck fixes: Class 'X' has a constructor with 1 argument that is not ↵Daniel Neus2016-03-058-25/+25
|/ | | | explicit.
* Fix remaining Wshadow warnings and enable on gcc and clangRené Korthaus2016-02-181-1/+1
|
* Merge GH #408 Add final attribute on many classesJack Lloyd2016-01-126-17/+17
|\
| * Add final attribute to many classesJack Lloyd2016-01-106-17/+17
| | | | | | | | | | | | | | In some cases this can offer better optimization, via devirtualization. And it lets the user know the class is not intended for derivation. Some discussion in GH #402
* | Prefix more member vars with m_ prefixRené Korthaus2016-01-112-85/+85
|/
* Mass-prefix member vars with m_René Korthaus2016-01-0814-190/+191
|
* String comparision fixesDaniel Neus2016-01-048-11/+11
| | | | fix PVS-Studio perfomance warnings
* some trivial compiler/PVS-Studio warning fixesDaniel Neus2015-12-222-2/+2
|
* Reroot the exception hierarchy into a toplevel Exception classJack Lloyd2015-12-115-16/+16
| | | | | | | | As the alternatives are unfortunate for applications trying to catch all library errors, and it seems deriving from std::runtime_error causes problems with MSVC DLLs (GH #340) Effectively reverts 2837e915d82e43
* Add check for path validation result in Credentials_Manager. GH #324Jack Lloyd2015-11-042-1/+4
|
* Merge pull request #313 from randombit/path-validation-fixesJack Lloyd2015-10-267-96/+148
|\ | | | | Fix cert validation bugs found by x509test.