Age | Commit message (Collapse) | Author |
|
svn path=/openssl/trunk/Configure; revision=269
|
|
svn path=/openssl/trunk/apps/ca.c; revision=262
|
|
svn path=/openssl/README; revision=237
|
|
svn path=/openssl/README; revision=234
|
|
svn path=/openssl/README; revision=233
|
|
requests will almost certainly require this.
svn path=/openssl/trunk/crypto/x509v3/v3_addr.c; revision=232
|
|
svn path=/openssl/README; revision=231
|
|
svn path=/openssl/trunk/crypto/x509v3/v3_addr.c; revision=228
|
|
svn path=/openssl/README; revision=227
|
|
svn path=/openssl/trunk/crypto/x509v3/x509v3.h; revision=226
|
|
svn path=/openssl/trunk/crypto/x509v3/v3err.c; revision=225
|
|
svn path=/openssl/trunk/crypto/x509v3/v3_addr.c; revision=224
|
|
svn path=/openssl/README; revision=223
|
|
svn path=/openssl/README; revision=174
|
|
svn path=/openssl/README; revision=173
|
|
Defer RFC 3779 path validation until after the CRL checks.
svn path=/openssl/trunk/apps/verify.c; revision=172
|
|
callback will allow, so verify will report if a certificate with bad
RFC 3779 resources is also revoked.
svn path=/openssl/trunk/apps/verify.c; revision=171
|
|
svn path=/openssl/README; revision=170
|
|
svn path=/openssl/trunk/crypto/x509v3/v3_asid.c; revision=169
|
|
svn path=/openssl/trunk/crypto/x509v3/v3_addr.c; revision=168
|
|
svn path=/openssl/README; revision=167
|
|
svn path=/openssl/trunk/crypto/x509v3/v3_addr.c; revision=166
|
|
svn path=/openssl/README; revision=165
|
|
svn path=/openssl/trunk/crypto/x509v3/v3_asid.c; revision=164
|
|
during path validation and via an assertion for extensions we
generate.
svn path=/openssl/trunk/crypto/x509v3/v3_addr.c; revision=163
|
|
assertion on extensions we construct.
svn path=/openssl/trunk/crypto/x509v3/v3_asid.c; revision=162
|
|
svn path=/openssl/trunk/crypto/x509v3/v3_asid.c; revision=161
|
|
svn path=/openssl/trunk/crypto/x509v3/v3_addr.c; revision=160
|
|
cached extensions.
svn path=/openssl/trunk/crypto/x509v3/v3_addr.c; revision=159
|
|
svn path=/openssl/trunk/crypto/x509v3/v3_addr.c; revision=158
|
|
svn path=/openssl/trunk/crypto/x509v3/v3_asid.c; revision=157
|
|
svn path=/openssl/trunk/Configure; revision=156
|
|
svn path=/openssl/trunk/crypto/x509v3/v3_asid.c; revision=155
|
|
them every time we check a certificate chain. Rewrite ASID path
validation to use cached extensions, to allow null inheritance, and to
start with the target certificate.
Still need to rewrite address path validation.
svn path=/openssl/README; revision=154
|
|
svn path=/openssl/README; revision=153
|
|
svn path=/openssl/trunk/crypto/x509v3/pcy_tree.c; revision=152
|
|
svn path=/openssl/README; revision=151
|
|
that our certificates will stop throwing critical exception errors.
This should be ok since "openssl verify" at least claims to be
checking policies if given the (undocumented) -policy etc
switches. (needs further testing).
svn path=/openssl/trunk/crypto/x509v3/v3_purp.c; revision=149
|
|
svn path=/openssl/README; revision=148
|
|
svn path=/openssl/README; revision=147
|
|
svn path=/openssl/README; revision=146
|
|
check_chain_extensions(), just to be tidy.
svn path=/openssl/trunk/crypto/x509/x509_vfy.c; revision=145
|
|
svn path=/openssl/README; revision=144
|
|
svn path=/openssl/README; revision=143
|
|
svn path=/openssl/trunk/crypto/x509v3/v3_addr.c; revision=142
|
|
svn path=/openssl/trunk/crypto/x509v3/v3_addr.c; revision=141
|
|
svn path=/openssl/trunk/crypto/x509v3/v3err.c; revision=140
|
|
svn path=/openssl/README; revision=139
|
|
svn path=/openssl/README; revision=138
|
|
svn path=/openssl/README; revision=137
|