mirror of https://github.com/openssl/openssl.git
				
				
				
			CHANGES.md: Mention (strict) checks recently added to X509_verify_cert()
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13312)
This commit is contained in:
		
							parent
							
								
									bbc8343478
								
							
						
					
					
						commit
						0e071fbce4
					
				
							
								
								
									
										24
									
								
								CHANGES.md
								
								
								
								
							
							
						
						
									
										24
									
								
								CHANGES.md
								
								
								
								
							|  | @ -831,6 +831,30 @@ OpenSSL 3.0 | ||||||
| 
 | 
 | ||||||
|    *Richard Levitte* |    *Richard Levitte* | ||||||
| 
 | 
 | ||||||
|  |  * Added several checks to X509_verify_cert() according to requirements in | ||||||
|  |    RFC 5280 in case `X509_V_FLAG_X509_STRICT` is set | ||||||
|  |    (which may be done by using the CLI option `-x509_strict`): | ||||||
|  |    * The basicConstraints of CA certificates must be marked critical. | ||||||
|  |    * CA certificates must explicitly include the keyUsage extension. | ||||||
|  |    * If a pathlenConstraint is given the key usage keyCertSign must be allowed. | ||||||
|  |    * The issuer name of any certificate must not be empty. | ||||||
|  |    * The subject name of CA certs, certs with keyUsage crlSign, | ||||||
|  |      and certs without subjectAlternativeName must not be empty. | ||||||
|  |    * If a subjectAlternativeName extension is given it must not be empty. | ||||||
|  |    * The signatureAlgorithm field and the cert signature must be consistent. | ||||||
|  |    * Any given authorityKeyIdentifier and any given subjectKeyIdentifier | ||||||
|  |      must not be marked critical. | ||||||
|  |    * The authorityKeyIdentifier must be given for X.509v3 certs | ||||||
|  |      unless they are self-signed. | ||||||
|  |    * The subjectKeyIdentifier must be given for all X.509v3 CA certs. | ||||||
|  | 
 | ||||||
|  |    *David von Oheimb* | ||||||
|  | 
 | ||||||
|  |  * Certificate verification using X509_verify_cert() meanwhile rejects EC keys | ||||||
|  |    with explicit curve parameters (specifiedCurve) as required by RFC 5480. | ||||||
|  | 
 | ||||||
|  |    *Tomas Mraz* | ||||||
|  | 
 | ||||||
|  * For built-in EC curves, ensure an EC_GROUP built from the curve name is |  * For built-in EC curves, ensure an EC_GROUP built from the curve name is | ||||||
|    used even when parsing explicit parameters, when loading a encoded key |    used even when parsing explicit parameters, when loading a encoded key | ||||||
|    or calling `EC_GROUP_new_from_ecpkparameters()`/ |    or calling `EC_GROUP_new_from_ecpkparameters()`/ | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue