summaryrefslogtreecommitdiff
path: root/lib/x509/common.c
Commit message (Collapse)AuthorAgeFilesLines
* Introduced GNUTLS_E_ASN1_EMBEDDED_NULL_IN_STRINGnew-code-nullNikos Mavrogiannopoulos2016-02-111-1/+1
| | | | | This error code is returned when an embedded NULL is detected in a string.
* x509: moved virtual subject alternative name othername support to virt-san.cNikos Mavrogiannopoulos2016-01-101-21/+0
|
* Allow assigning 'virtual' SAN types via *_set_subject_alt_name()Nikos Mavrogiannopoulos2016-01-101-1/+11
|
* Removed the 'gnutls_' prefix from files to simplify file namingNikos Mavrogiannopoulos2015-08-231-7/+7
|
* made data2hex() safer, and eliminated mem leakNikos Mavrogiannopoulos2015-07-311-8/+12
|
* DN decoding: use gnutls_hex_encodeNikos Mavrogiannopoulos2015-07-211-8/+14
|
* x509: simplified data to hex conversion in unknown DN namesNikos Mavrogiannopoulos2015-07-201-47/+13
|
* Exported functions to convert from and to OIDsNikos Mavrogiannopoulos2015-06-181-3/+3
|
* When writing the Time ASN.1 structure follow the RFC5280 recommendationsNikos Mavrogiannopoulos2015-06-171-15/+22
|
* Set time in PKCS #7 structures properly (in UTCTime format).Nikos Mavrogiannopoulos2015-06-171-6/+49
|
* pkcs7: write the DER encoded timeNikos Mavrogiannopoulos2015-06-161-0/+28
|
* Added gnutls_pkcs7_sign()Nikos Mavrogiannopoulos2015-06-021-0/+1
|
* pkcs7 verification: parse the signing timeNikos Mavrogiannopoulos2015-06-021-6/+13
|
* x509: use libtasn1's strict DER decoding rules in network obtained structuresNikos Mavrogiannopoulos2015-03-091-2/+2
|
* depend on libtasn1 4.3Nikos Mavrogiannopoulos2015-03-091-4/+0
|
* use asn1_decode_simple_ber if availableNikos Mavrogiannopoulos2015-03-041-7/+18
|
* corrected typoNikos Mavrogiannopoulos2014-12-081-1/+1
|
* GNUTLS_E_CERTIFICATE_LIST_UNSORTED can be returned from ↵Nikos Mavrogiannopoulos2014-11-271-0/+33
| | | | | | gnutls_pcert_import_x509_list That is when it cannot sort the list and GNUTLS_X509_CRT_LIST_SORT is specified.
* Added flag GNUTLS_X509_CRT_LIST_SORT for gnutls_x509_crt_list_import*Nikos Mavrogiannopoulos2014-11-271-0/+70
| | | | | That also allows automatically sorting input chains to the gnutls_certificate_credentials_t structure.
* _gnutls_ucs2_to_utf8() can handle little endian strings.Nikos Mavrogiannopoulos2014-11-121-1/+1
|
* when calling gnutls_x509_crt_get_subject_key_id set the id_sizeNikos Mavrogiannopoulos2014-11-011-0/+1
|
* _gnutls_check_valid_key_id: corrected activation/expiration checkNikos Mavrogiannopoulos2014-10-091-1/+1
|
* pkcs11: simplified and optimized loopNikos Mavrogiannopoulos2014-10-091-13/+1
|
* pkcs11: always check for a valid subjectKeyIdentifier matchNikos Mavrogiannopoulos2014-10-071-2/+9
| | | | That way, expired certificates can co-exist with their replacements.
* pkcs11: when no CKA_ID can be relied on fallback on checking the ↵Nikos Mavrogiannopoulos2014-10-071-0/+32
| | | | | | SubjectKeyIdentifier Patch by David Woodhouse.
* added gnutls_pkcs11_copy_attached_extension()Nikos Mavrogiannopoulos2014-09-121-0/+55
|
* simplified _gnutls_x509_get_signed_data()Nikos Mavrogiannopoulos2014-09-041-18/+5
|
* The get_raw_dn() functions were modified to work even if the certificate is ↵Nikos Mavrogiannopoulos2014-09-041-3/+4
| | | | generated (not imported)
* when comparing a CA certificate with the trusted list compare the name and keyNikos Mavrogiannopoulos2014-09-021-1/+1
| | | | | | That is to handle cases where a CA certificate was superceded by a different one with the same name and the same key. That can happen when an intermediate CA certificate is replaced by a self-signed one.
* avoid new allocations and keep a pointer to the DER data for DNNikos Mavrogiannopoulos2014-08-291-6/+3
|
* when importing a certificate, keep the DER dataNikos Mavrogiannopoulos2014-08-291-7/+14
|
* When decoding of a DN string fails, treat it as unknown string and print its ↵Nikos Mavrogiannopoulos2014-06-061-4/+9
| | | | hex value.
* avoid cleanup when there are no allocations in _gnutls_x509_der_encode().Nikos Mavrogiannopoulos2014-05-291-5/+3
|
* Do not allow null strings to be read from ASN.1 structures.Nikos Mavrogiannopoulos2014-05-221-3/+2
| | | | | | This corrects a null pointer dereference when parsing some specially crafted certificates. Issue discovered using the Codenomicon TLS test suite.
* removed redundant null terminationNikos Mavrogiannopoulos2014-05-221-1/+1
|
* use a signed value for bits.Nikos Mavrogiannopoulos2014-05-201-2/+2
|
* more sanity checks on signature sizeNikos Mavrogiannopoulos2014-05-171-1/+1
|
* Corrected decoding of XMPP SAN othername.Nikos Mavrogiannopoulos2014-04-191-1/+13
| | | | | This also corrects the semantics of the get_*_othername_oid() functions, such as gnutls_x509_crt_get_subject_alt_othername_oid().
* copy_string() and copy_data() are more resilient on null inputNikos Mavrogiannopoulos2014-04-181-2/+4
|
* Added new API to handle X.509 extensions.Nikos Mavrogiannopoulos2014-03-191-0/+37
| | | | | | | | | | | | This API handles the X.509 extensions in separate, allowing to parse similarly formatted extensions stored in other structures. In addition functions that simplify the extraction of extensions from known structures were added: - gnutls_x509_crq_get_extension_data2() - gnutls_x509_crl_get_extension_data2() - gnutls_x509_crt_get_extension_data2() The old functions were rewritten to use the new API.
* silence some warningsNikos Mavrogiannopoulos2014-03-081-2/+2
|
* _gnutls_x509_read_value() can now read empty values.Nikos Mavrogiannopoulos2014-02-191-0/+6
|
* ensure that _gnutls_x509_read_value works as documented.Nikos Mavrogiannopoulos2014-02-131-5/+3
|
* optimized string search in _oid2str table.Nikos Mavrogiannopoulos2014-01-261-60/+73
|
* fixed null pointer derefence when printing a name and an LDAP description ↵Nikos Mavrogiannopoulos2014-01-261-2/+2
| | | | isn't present for the OID
* Added userPrincipalNameNikos Mavrogiannopoulos2013-12-231-0/+2
|
* Dates and time that would overflow the GeneralTime are also truncated. We ↵Nikos Mavrogiannopoulos2013-11-161-2/+5
| | | | may need to revise that around 9999 CE.
* An expiration time of (time_t)-1 will set to the no well-defined expiration ↵Nikos Mavrogiannopoulos2013-11-161-0/+5
| | | | date value.
* simplified functions.Nikos Mavrogiannopoulos2013-11-101-2/+2
|
* reindented codeNikos Mavrogiannopoulos2013-11-081-1482/+1409
|