aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib/x509
Commit message (Expand)AuthorAgeFilesLines
* Merge GH #1492 Support custom DN entriesJack Lloyd2018-03-142-67/+56
|\
| * Address review commentsJack Lloyd2018-03-141-2/+2
| * Support custom DN entriesJack Lloyd2018-03-142-67/+56
* | Allow the caller to specify the serial number of a generated certJack Lloyd2018-03-142-12/+96
|/
* Handle cert.subject_info("Email")Jack Lloyd2018-03-061-0/+3
* Include AKID in generated self signed certificatesJack Lloyd2018-03-062-4/+12
* Add X509_Certificate::subject_public_key_infoJack Lloyd2018-03-052-3/+16
* Merge GH #1470 Use soft fail for OCSPJack Lloyd2018-03-046-20/+63
|\
| * Document OCSP softfail/hardfail check behaviour.souch2018-03-021-0/+3
| * OCSP softfail revocation checkMathieu Souchaud2018-03-015-20/+60
* | Fix check_crl_online segfaults, need tests.Mathieu Souchaud2018-03-021-11/+10
* | Fix crash bug in check_crl_onlineJack Lloyd2018-03-011-1/+1
|/
* Add Path_Validation_Result::warnings_string() methodMathieu Souchaud2018-02-282-0/+19
* Fix Path_Validation_Result::no_warningsMathieu Souchaud2018-02-281-1/+4
* Load every certificates of files found.Mathieu Souchaud2018-02-011-2/+15
* Improve X.509 documentationJack Lloyd2018-01-291-1/+9
* Allow applications to easily override extensions in cert requestsJack Lloyd2018-01-238-121/+201
* Prepare for making BER_Object members privateJack Lloyd2018-01-189-99/+98
* Avoid including x509_ext.h in pkcs10.hJack Lloyd2018-01-031-1/+1
* use range-based for loop instead of std::for_eachPatrik Fiedler2018-01-031-4/+2
* add the detection for the ca issuers field(1.3.6.1.5.5.7.48.2) in x509 certif...Patrik Fiedler2018-01-034-3/+42
* Fix build on old ClangJack Lloyd2018-01-011-1/+2
* Reorder fields of X509_Certificate_Data to reduce sizeJack Lloyd2017-12-301-8/+8
* Change X509_Certificate to cache cert policies and name constraintsJack Lloyd2017-12-302-20/+20
* Deprecate X509_Certificate::policiesJack Lloyd2017-12-301-1/+1
* Add final annotation on Data_StoreJack Lloyd2017-12-281-1/+1
* Change X509_Certificate::subject_public_key_bitstring_sha1 to return const refJack Lloyd2017-12-272-2/+3
* Fix a couple Doxygen format errors [ci skip]Jack Lloyd2017-12-261-5/+7
* Move DN upper bound function to X509_DN static functionJack Lloyd2017-12-235-32/+17
* Initialize CRL_Code field in CRL_Entry dataJack Lloyd2017-12-231-1/+1
* Increase size of CRL code enum to 32-bitsJack Lloyd2017-12-231-1/+1
* Enable signing X509 structures with rsa-pssFabian Weissberg2017-12-225-14/+135
* Fix some shadow and unused parameter warningsJack Lloyd2017-12-202-6/+8
* Merge GH #1363 Fix various X509 path building and validation bugsJack Lloyd2017-12-2018-48/+683
|\
| * Fix various x509 path validation bugs + path building with ambiguous DNsFabian Weissberg2017-12-2018-48/+683
* | Don't encode AlgorithmIdentifier parameters for ECDSA in X.509 objectsRené Korthaus2017-12-201-2/+5
|/
* Merge GH #1364 Expose a function returning status when verifying X509 objectsJack Lloyd2017-12-196-59/+99
|\
| * Expose a function returning a status code for verifing X509 objectsJack Lloyd2017-12-196-59/+99
* | Add accessors to ASN1_Attribute and AlgorithmIdentifierJack Lloyd2017-12-196-21/+23
|/
* Avoid tying encoding of CRLs to the current system clockJack Lloyd2017-12-182-19/+66
* Expose timeouts on the freestanding OCSP request utilsJack Lloyd2017-12-172-6/+24
* Use HTTP level timeouts instead of polling on the std::futureJack Lloyd2017-12-172-25/+8
* Add ability to fingerprint public keysJack Lloyd2017-12-142-19/+4
* Need binary IO for WindowsJack Lloyd2017-12-044-14/+4
* Support uninitialized certificate objectsJack Lloyd2017-12-0410-136/+140
* CRL_Data is a struct not a classJack Lloyd2017-11-291-1/+2
* Allow parsing and printing certificates with unknown public key algosJack Lloyd2017-11-182-6/+31
* Fix encoding of subject key identifierJack Lloyd2017-11-165-23/+27
* Fix a memory leak in the case where certificate extension decoding fails.Jack Lloyd2017-11-162-30/+33
* Remove debug abort [ci skip]Jack Lloyd2017-11-141-1/+0