1. 22 1月, 2015 2 次提交
  2. 15 1月, 2015 1 次提交
    • R
      Cleanup OPENSSL_NO_xxx, part 1 · 4b618848
      Rich Salz 提交于
      OPENSSL_NO_RIPEMD160, OPENSSL_NO_RIPEMD merged into OPENSSL_NO_RMD160
      OPENSSL_NO_FP_API merged into OPENSSL_NO_STDIO
      Two typo's on #endif comments fixed:
      	OPENSSL_NO_ECB fixed to OPENSSL_NO_OCB
      	OPENSSL_NO_HW_SureWare fixed to OPENSSL_NO_HW_SUREWARE
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      4b618848
  3. 13 1月, 2015 1 次提交
  4. 07 1月, 2015 1 次提交
  5. 06 1月, 2015 1 次提交
  6. 31 12月, 2014 1 次提交
  7. 11 12月, 2014 1 次提交
  8. 08 12月, 2014 1 次提交
  9. 29 11月, 2014 1 次提交
  10. 08 9月, 2014 2 次提交
  11. 18 8月, 2014 3 次提交
  12. 15 8月, 2014 2 次提交
  13. 07 7月, 2014 1 次提交
  14. 05 7月, 2014 1 次提交
  15. 30 6月, 2014 1 次提交
  16. 23 6月, 2014 2 次提交
  17. 15 6月, 2014 1 次提交
  18. 13 6月, 2014 1 次提交
    • V
      Client-side namecheck wildcards. · a09e4d24
      Viktor Dukhovni 提交于
      A client reference identity of ".example.com" matches a server
      certificate presented identity that is any sub-domain of "example.com"
      (e.g. "www.sub.example.com).
      
      With the X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS flag, it matches
      only direct child sub-domains (e.g. "www.sub.example.com").
      a09e4d24
  19. 11 6月, 2014 1 次提交
  20. 24 5月, 2014 1 次提交
    • L
      OpenSSL is able to generate a certificate with name constraints with any possible · dd36fce0
      Luiz Angelo Daros de Luca 提交于
      subjectAltName field. The Name Contraint example in x509v3_config(5) even use IP
      as an example:
      
      	nameConstraints=permitted;IP:192.168.0.0/255.255.0.0
      
      However, until now, the verify code for IP name contraints did not exist. Any
      check with a IP Address Name Constraint results in a "unsupported name constraint
      type" error.
      
      This patch implements support for IP Address Name Constraint (v4 and v6). This code
      validaded correcly certificates with multiple IPv4/IPv6 address checking against
      a CA certificate with these constraints:
      
      	permitted;IP.1=10.9.0.0/255.255.0.0
      	permitted;IP.2=10.48.0.0/255.255.0.0
      	permitted;IP.3=10.148.0.0/255.255.0.0
      	permitted;IP.4=fdc8:123f:e31f::/ffff:ffff:ffff::
      Signed-off-by: NLuiz Angelo Daros de Luca <luizluca@gmail.com>
      dd36fce0
  21. 21 5月, 2014 1 次提交
    • V
      Fixes to host checking. · 397a8e74
      Viktor Dukhovni 提交于
      Fixes to host checking wild card support and add support for
      setting host checking flags when verifying a certificate
      chain.
      397a8e74
  22. 26 4月, 2014 1 次提交
  23. 16 4月, 2014 1 次提交
  24. 25 2月, 2014 3 次提交
  25. 21 2月, 2014 2 次提交
  26. 19 2月, 2014 1 次提交
  27. 15 2月, 2014 1 次提交
  28. 06 9月, 2013 1 次提交
  29. 27 12月, 2012 1 次提交
  30. 15 12月, 2012 1 次提交
  31. 08 12月, 2012 1 次提交