aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib/x509
Commit message (Expand)AuthorAgeFilesLines
* Add path validation to FFIJack Lloyd2018-08-131-0/+1
* Expose BER_Decoder constructor taking BER_Object&&Jack Lloyd2018-06-081-2/+2
* DER improvementsJack Lloyd2018-05-225-69/+68
* Use BER_Decoder::get_next to cleanup X.509 cert decoding codeJack Lloyd2018-05-211-14/+13
* Remove debug assignment [ci skip]Jack Lloyd2018-04-161-1/+0
* Truncate new SKIDs to 192 bitsJack Lloyd2018-04-162-6/+9
* Extend Certificate_Store_In_Memory to load just a single cert from fileJack Lloyd2018-03-241-3/+9
* Bypass self-signed check in X509_Certificate if AKID and SKID are setJack Lloyd2018-03-241-12/+17
* Avoid creating a map from a DN when not requiredJack Lloyd2018-03-214-14/+18
* Store elements of a DN as a vectorJack Lloyd2018-03-212-59/+59
* Support Ed25519 certificate formatJack Lloyd2018-03-202-38/+73
* Support multiple DNS names through the command line interfaceJack Lloyd2018-03-192-0/+5
* Remove use of ;; to end linesJack Lloyd2018-03-191-1/+1
* Merge GH #1492 Support custom DN entriesJack Lloyd2018-03-142-67/+56
|\
| * Address review commentsJack Lloyd2018-03-141-2/+2
| * Support custom DN entriesJack Lloyd2018-03-142-67/+56
* | Allow the caller to specify the serial number of a generated certJack Lloyd2018-03-142-12/+96
|/
* Handle cert.subject_info("Email")Jack Lloyd2018-03-061-0/+3
* Include AKID in generated self signed certificatesJack Lloyd2018-03-062-4/+12
* Add X509_Certificate::subject_public_key_infoJack Lloyd2018-03-052-3/+16
* Merge GH #1470 Use soft fail for OCSPJack Lloyd2018-03-046-20/+63
|\
| * Document OCSP softfail/hardfail check behaviour.souch2018-03-021-0/+3
| * OCSP softfail revocation checkMathieu Souchaud2018-03-015-20/+60
* | Fix check_crl_online segfaults, need tests.Mathieu Souchaud2018-03-021-11/+10
* | Fix crash bug in check_crl_onlineJack Lloyd2018-03-011-1/+1
|/
* Add Path_Validation_Result::warnings_string() methodMathieu Souchaud2018-02-282-0/+19
* Fix Path_Validation_Result::no_warningsMathieu Souchaud2018-02-281-1/+4
* Load every certificates of files found.Mathieu Souchaud2018-02-011-2/+15
* Improve X.509 documentationJack Lloyd2018-01-291-1/+9
* Allow applications to easily override extensions in cert requestsJack Lloyd2018-01-238-121/+201
* Prepare for making BER_Object members privateJack Lloyd2018-01-189-99/+98
* Avoid including x509_ext.h in pkcs10.hJack Lloyd2018-01-031-1/+1
* use range-based for loop instead of std::for_eachPatrik Fiedler2018-01-031-4/+2
* add the detection for the ca issuers field(1.3.6.1.5.5.7.48.2) in x509 certif...Patrik Fiedler2018-01-034-3/+42
* Fix build on old ClangJack Lloyd2018-01-011-1/+2
* Reorder fields of X509_Certificate_Data to reduce sizeJack Lloyd2017-12-301-8/+8
* Change X509_Certificate to cache cert policies and name constraintsJack Lloyd2017-12-302-20/+20
* Deprecate X509_Certificate::policiesJack Lloyd2017-12-301-1/+1
* Add final annotation on Data_StoreJack Lloyd2017-12-281-1/+1
* Change X509_Certificate::subject_public_key_bitstring_sha1 to return const refJack Lloyd2017-12-272-2/+3
* Fix a couple Doxygen format errors [ci skip]Jack Lloyd2017-12-261-5/+7
* Move DN upper bound function to X509_DN static functionJack Lloyd2017-12-235-32/+17
* Initialize CRL_Code field in CRL_Entry dataJack Lloyd2017-12-231-1/+1
* Increase size of CRL code enum to 32-bitsJack Lloyd2017-12-231-1/+1
* Enable signing X509 structures with rsa-pssFabian Weissberg2017-12-225-14/+135
* Fix some shadow and unused parameter warningsJack Lloyd2017-12-202-6/+8
* Merge GH #1363 Fix various X509 path building and validation bugsJack Lloyd2017-12-2018-48/+683
|\
| * Fix various x509 path validation bugs + path building with ambiguous DNsFabian Weissberg2017-12-2018-48/+683
* | Don't encode AlgorithmIdentifier parameters for ECDSA in X.509 objectsRené Korthaus2017-12-201-2/+5
|/
* Merge GH #1364 Expose a function returning status when verifying X509 objectsJack Lloyd2017-12-196-59/+99
|\