Lines Matching refs:extensions
102 in keyUsage or extKeyUsage extensions, then the return value of
241 parsing unsupported certificate extensions via user provided callback.
384 * Fix parsing of CSRs with critical extensions.
468 * Fix a failure to validate input when writing x509 extensions lengths which
554 * When parsing X.509 certificates, support the extensions
693 way to detect the crypto extensions required. A warning is still issued.
825 * Add parsing of V3 extensions (key usage, Netscape cert-type,
955 extensions. Fixes #5758.
2525 parsing unsupported certificate extensions via user provided callback.
2610 fit into the record buffer. Previously, such extensions were silently
3091 extensions in CSRs and CRTs that caused these bitstrings to not be encoded
3262 * Add support for Arm CPU DSP extensions to accelerate asymmetric key
3263 operations. On CPUs where the extensions are available, they can accelerate
3365 during certificate extensions parsing. In case of receiving malformed
3366 input (extensions length field equal to 0), an illegal read of one byte
3395 * Add ecc extensions only if an ecc based ciphersuite is used.
3731 extensions. Found by Falko Strenzke and Evangelos Karatsiolis.
3929 * Don't print X.509 version tag for v1 CRT's, and omit extensions for
3972 identifier, subject identifier and basic constraints extensions.
4514 * Fix bug when parsing a ServerHello without extensions (found by David
4896 * Forbid repeated extensions in X.509 certificates.
5047 ServerHello when no extensions are present (found by Matthew Page)
5069 * x509_crt_info() now prints information about parsed extensions as well
5241 * Server does not send out extensions not advertised by client
5293 * Certificate Request (CSR) generation with extensions (key_usage,
5295 * X509 Certificate writing with extensions (basic_constraints,
5321 * Support faulty X509 v1 certificates with extensions
5392 * Forbid repeated extensions in X.509 certificates.
5477 when no extensions are present (found by Matthew Page)