summaryrefslogtreecommitdiffstats
path: root/crypto/x509/x509_vfy.c
AgeCommit message (Collapse)Author
2006-11-27Add RFC 3779 support.Ben Laurie
2006-09-21Tidy up CRL handling by checking for critical extensions when it isDr. Stephen Henson
loaded. Add new function X509_CRL_get0_by_serial() to lookup a revoked entry to avoid the need to access the structure directly. Add new X509_CRL_METHOD to allow common CRL operations (verify, lookup) to be redirected.
2006-09-17Overhaul of by_dir code to handle dynamic loading of CRLs.Dr. Stephen Henson
2006-09-14Support for AKID in CRLs and partial support for IDP. Overhaul of CRLDr. Stephen Henson
handling to support this.
2006-09-11Fixes for new CRL/cert callbacks. Update CRL processing code to use newDr. Stephen Henson
callbacks.
2006-09-10Add verify callback functions to lookup a STACK of matching certs or CRLsDr. Stephen Henson
based on subject name. New thread safe functions to retrieve matching STACK from X509_STORE. Cache some IDP components.
2006-07-25Support for multiple CRLs with same issuer name in X509_STORE. ModifyDr. Stephen Henson
verify logic to try to use an unexpired CRL if possible.
2005-06-05Old typo...Richard Levitte
PR: 1097
2005-05-27Assing check_{cert,crl}_time to 'ok' variable so it returns errors onDr. Stephen Henson
expiry.
2005-05-11Fix more error codes.Bodo Möller
(Also improve util/ck_errf.pl script, and occasionally fix source code formatting.)
2005-04-20Rename typed version of M_ASN1_get M_ASN1_get_x to avoid conflicts.Dr. Stephen Henson
Remove more bogus shadow warnings.
2005-04-19Various Win32 and other fixes for warnings and compilation errors.Dr. Stephen Henson
Fix Win32 build system to use 'Makefile' instead of 'Makefile.ssl'.
2005-04-10Move allow_proxy_certs declaration to start of function.Dr. Stephen Henson
2005-04-09Added restrictions on the use of proxy certificates, as they may poseRichard Levitte
a security threat on unexpecting applications. Document and test.
2005-03-31Give everything prototypes (well, everything that's actually used).Ben Laurie
2005-01-17Changes concering RFC 3820 (proxy certificates) integration:Richard Levitte
- Enforce that there should be no policy settings when the language is one of id-ppl-independent or id-ppl-inheritAll. - Add functionality to ssltest.c so that it can process proxy rights and check that they are set correctly. Rights consist of ASCII letters, and the condition is a boolean expression that includes letters, parenthesis, &, | and ^. - Change the proxy certificate configurations so they get proxy rights that are understood by ssltest.c. - Add a script that tests proxy certificates with SSL operations. Other changes: - Change the copyright end year in mkerr.pl. - make update.
2004-12-28Add functionality needed to process proxy certificates.Richard Levitte
2004-12-05Add lots of checks for memory allocation failure, error codes to indicateDr. Stephen Henson
failure and freeing up memory if a failure occurs. PR:620
2004-11-29Make an explicit check during certificate validation to see that theRichard Levitte
CA setting in each certificate on the chain is correct. As a side- effect always do the following basic checks on extensions, not just when there's an associated purpose to the check: - if there is an unhandled critical extension (unless the user has chosen to ignore this fault) - if the path length has been exceeded (if one is set at all) - that certain extensions fit the associated purpose (if one has been given)
2004-10-04Fix race condition when CRL checking is enabled.Dr. Stephen Henson
2004-10-01Don't use C++ reserved work "explicit".Dr. Stephen Henson
2004-09-06New X509_VERIFY_PARAM structure and associated functionality.Dr. Stephen Henson
This tidies up verify parameters and adds support for integrated policy checking. Add support for policy related command line options. Currently only in smime application. WARNING: experimental code subject to change.
2004-03-27Allow CRLs to be passed into X509_STORE_CTX. This is useful when theDr. Stephen Henson
verified structure can contain its own CRLs (such as PKCS#7 signedData). Tidy up some of the verify code.
2004-03-05Various X509 fixes. Disable broken certificate workaroundsDr. Stephen Henson
when X509_V_FLAG_X509_STRICT is set. Check for CRLSign in CRL issuer certificates. Reject CRLs with unhandled (any) critical extensions.
2003-09-30ASN1 parse fix and release file changes.Dr. Stephen Henson
2003-06-04Really get X509_CRL_CHECK_ALL right this time...Dr. Stephen Henson
2002-12-10A memset() too many got converted into a OPENSSL_cleanse().Richard Levitte
PR: 393
2002-11-28Cleanse memory using the new OPENSSL_cleanse() function.Richard Levitte
I've covered all the memset()s I felt safe modifying, but may have missed some.
2002-11-18A variable of type time_t is supposed to be a time measurement starting atRichard Levitte
Epoch. offset isn't such a measurement, so let's stop pretend it is.
2002-02-23Updates from stable branch.Dr. Stephen Henson
2001-10-21Reject certificates with unhandled critical extensions.Dr. Stephen Henson
2001-09-01Make the necessary changes to work with the recent "ex_data" overhaul.Geoff Thorpe
See the commit log message for that for more information. NB: X509_STORE_CTX's use of "ex_data" support was actually misimplemented (initialisation by "memset" won't/can't/doesn't work). This fixes that but requires that X509_STORE_CTX_init() be able to handle errors - so its prototype has been changed to return 'int' rather than 'void'. All uses of that function throughout the source code have been tracked down and adjusted.
2001-08-12The indexes returned by ***_get_ex_new_index() functions are used whenGeoff Thorpe
setting stack (actually, array) values in ex_data. So only increment the global counters if the underlying CRYPTO_get_ex_new_index() call succeeds. This change doesn't make "ex_data" right (see the comment at the head of ex_data.c to know why), but at least makes the source code marginally less frustrating.
2001-07-30Don't miss files...Lutz Jänicke
2001-05-09Allow various X509_STORE_CTX properties to beDr. Stephen Henson
inherited from X509_STORE. Add CRL checking options to other applications.
2001-05-07Initial CRL based revocation checking.Dr. Stephen Henson
2001-02-19Make all configuration macros available for application by makingRichard Levitte
sure they are available in opensslconf.h, by giving them names starting with "OPENSSL_" to avoid conflicts with other packages and by making sure e_os2.h will cover all platform-specific cases together with opensslconf.h. I've checked fairly well that nothing breaks with this (apart from external software that will adapt if they have used something like NO_KRB5), but I can't guarantee it completely, so a review of this change would be a good thing.
2001-01-28Comment and indentationBodo Möller
2001-01-20Fix to stop X509_time_adj() using GeneralizedTime.Dr. Stephen Henson
2000-12-15Locking issues.Bodo Möller
2000-09-22Only use the new informational verify codes if weDr. Stephen Henson
specifically ask for them. Fix typo in docs.
2000-09-06Another round of indentation changes: Position braces consistently,Bodo Möller
add some whitespace for 'if ()', 'for ()', 'while ()' to distinguish keywords from function names, and finally remove parens around return values (why be stingy with whitespace but fill the source code with an abundance of parentheses that are not needed to structure expressions for readability?).
2000-09-06More indentation consistency: for (), while (), if (), return ()Bodo Möller
usually get a space between keyword and opening paranthesis so that they don't look like function calls, where no space is used.
2000-09-06Fix X509_STORE_CTX_init. Make indentation more consistent. Dump core less ↵Bodo Möller
often.
2000-09-05Fix typo in rsautl.Dr. Stephen Henson
Add support for settable verify time in X509_verify_cert(). Document rsautl utility.
2000-09-05*BIG* verify code reorganisation.Dr. Stephen Henson
The old code was painfully primitive and couldn't handle distinct certificates using the same subject name. The new code performs several tests on a candidate issuer certificate based on certificate extensions. It also adds several callbacks to X509_VERIFY_CTX so its behaviour can be customised. Unfortunately some hackery was needed to persuade X509_STORE to tolerate this. This should go away when X509_STORE is replaced, sometime... This must have broken something though :-(
2000-08-21Various fixes...Dr. Stephen Henson
initialize ex_pathlen to -1 so it isn't checked if pathlen is not present. set ucert to NULL in apps/pkcs12.c otherwise it gets freed twice. remove extraneous '\r' in MIME encoder. Allow a NULL to be passed to X509_gmtime_adj() Make PKCS#7 code use definite length encoding rather then the indefinite stuff it used previously.
2000-07-26Make NEG_PUBKEY_BUG on by default.Dr. Stephen Henson
ASN1_TIME fixes. New function c2i_ASN1_OBJECT().
2000-06-01There have been a number of complaints from a number of sources that namesRichard Levitte
like Malloc, Realloc and especially Free conflict with already existing names on some operating systems or other packages. That is reason enough to change the names of the OpenSSL memory allocation macros to something that has a better chance of being unique, like prepending them with OPENSSL_. This change includes all the name changes needed throughout all C files.
2000-03-07New compatability trust and purpose settings.Dr. Stephen Henson