aboutsummaryrefslogtreecommitdiff
path: root/crypto/x509/x_x509.c
AgeCommit message (Collapse)AuthorFilesLines
2017-08-21More updates following review feedbackMatt Caswell1-3/+0
Reviewed-by: Andy Polyakov <appro@openssl.org> (Merged from https://github.com/openssl/openssl/pull/3740)
2017-08-21Remove OPENSSL_assert() from crypto/x509Matt Caswell1-1/+2
Reviewed-by: Andy Polyakov <appro@openssl.org> (Merged from https://github.com/openssl/openssl/pull/3740)
2016-08-17Constify X509_get0_signature()Dr. Stephen Henson1-1/+2
Reviewed-by: Richard Levitte <levitte@openssl.org>
2016-07-23Properly initialise the internal proxy certificate path length cacheRichard Levitte1-0/+1
Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-05-17Copyright consolidation 09/10Rich Salz1-54/+6
Reviewed-by: Richard Levitte <levitte@openssl.org>
2016-05-11Fix i2d_X509_AUX, update docs and add testsViktor Dukhovni1-2/+52
When *pp is NULL, don't write garbage, return an unexpected pointer or leak memory on error. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
2016-05-02Fix i2d_X509_AUX: pp can be NULL.Dr. Stephen Henson1-2/+3
Reported by David Benjamin Reviewed-by: Emilia Käsper <emilia@openssl.org>
2016-04-28Add checks on CRYPTO_new_ex_data return valueFdaSilvaYY1-1/+2
Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/996)
2016-04-26Ensure we check i2d_X509 return valMatt Caswell1-3/+12
The i2d_X509() function can return a negative value on error. Therefore we should make sure we check it. Issue reported by Yuan Jochen Kang. Reviewed-by: Emilia Käsper <emilia@openssl.org>
2016-03-08Convert CRYPTO_LOCK_X509_* to new multi-threading APIAlessandro Ghedini1-1/+1
Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-03-01remove old unused oneline name fieldDr. Stephen Henson1-7/+0
Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-01-26Remove /* foo.c */ commentsRich Salz1-1/+0
This was done by the following find . -name '*.[ch]' | /tmp/pl where /tmp/pl is the following three-line script: print unless $. == 1 && m@/\* .*\.[ch] \*/@; close ARGV if eof; # Close file to reset $. And then some hand-editing of other files. Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
2016-01-18Drop cached certificate signature validity flagViktor Dukhovni1-1/+0
It seems risky in the context of cross-signed certificates when the same certificate might have multiple potential issuers. Also rarely used, since chains in OpenSSL typically only employ self-signed trust-anchors, whose self-signatures are not checked, while untrusted certificates are generally ephemeral. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
2015-12-01ex_data part 2: doc fixes and CRYPTO_free_ex_index.Rich Salz1-7/+0
Add CRYPTO_free_ex_index (for shared libraries) Unify and complete the documentation for all "ex_data" API's and objects. Replace xxx_get_ex_new_index functions with a macro. Added an exdata test. Renamed the ex_data internal datatypes. Reviewed-by: Matt Caswell <matt@openssl.org>
2015-11-23Fix a few missed "if (!ptr)" cleanupsRich Salz1-3/+2
And a scalar !x --> x==0 test Reviewed-by: Kurt Roeckx <kurt@openssl.org>
2015-10-15embed certificate serial number and signature fieldsDr. Stephen Henson1-3/+3
Reviewed-by: Rich Salz <rsalz@openssl.org>
2015-10-03Fix more d2i cases to properly update the input pointerKurt Roeckx1-3/+1
Thanks to David Benjamin <davidben@google.com> for pointing them out. Reviewed-by: Steve Henson <steve@openssl.org> MR #1198
2015-09-22header includesDr. Stephen Henson1-0/+1
Reviewed-by: Rich Salz <rsalz@openssl.org>
2015-09-22Fix path in commentsDr. Stephen Henson1-1/+1
Reviewed-by: Rich Salz <rsalz@openssl.org>
2015-09-22Move certificate request and CRL routines to x509 dir.Dr. Stephen Henson1-0/+227
Reviewed-by: Rich Salz <rsalz@openssl.org>