aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/x509v3.c
Commit message (Collapse)AuthorAgeFilesLines
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-111-8/+2
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>
* TLS: Add support for tls_disable_time_checks=1 in client modeJouni Malinen2011-07-051-6/+7
| | | | | | This phase1 parameter for TLS-based EAP methods was already supported with GnuTLS and this commit extends that support for OpenSSL and the internal TLS implementation.
* Internal TLS: Fix X.509 name handling to use sequency of attributesJouni Malinen2010-05-251-88/+92
| | | | | | There may be more than one attribute of same type (e.g., multiple DC attributes), so the code needs to be able to handle that. Replace the fixed structure with an array of attributes.
* Internal TLS: Add domainComponent parser for X.509 namesJouni Malinen2010-05-251-0/+18
|
* Remove unneeded CONFIG_INTERNAL_X509 and NEED_SHA256 definesJouni Malinen2009-12-061-11/+0
|
* Remove src/crypto from default include pathJouni Malinen2009-11-291-1/+1
| | | | | | In addition, start ordering header file includes to be in more consistent order: system header files, src/utils, src/*, same directory as the *.c file.
* Reject X.509 certificate strings with embedded NUL charactersJouni Malinen2009-08-231-0/+31
| | | | | | | | | | | | | These could, at least in theory, be used to generate unexpected common name or subject alternative name matches should a CA sign strings with NUL (C string termination) in them. For now, just reject the certificate if an embedded NUL is detected. In theory, all the comparison routines could be made to compare these strings as binary blobs (with additional X.509 rules to handle some exceptions) and display NUL characters somehow. Anyway, just rejecting the certificate will get rid of potential problems with the C string getting terminated and it should not really be used in certificates, so this should not break valid use cases.
* X.509: Add parsing of alternative name to internal TLS implementationJouni Malinen2009-06-111-1/+220
| | | | | The alternative name extensions are now parsed, but the actual values are not yet used for alt. subject name matching.
* Internal X.509/TLSv1: Support SHA-256 in X.509 certificate digestJouni Malinen2008-08-161-2/+42
|
* Re-initialize hostapd/wpa_supplicant git repository based on 0.6.3 releaseJouni Malinen2008-02-271-0/+1684