mirror of
https://github.com/openssl/openssl.git
synced 2024-12-14 04:24:23 +08:00
CHANGES.md: Mention (strict) checks recently added to X509_verify_cert()
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/13312)
This commit is contained in:
parent
bbc8343478
commit
0e071fbce4
24
CHANGES.md
24
CHANGES.md
@ -831,6 +831,30 @@ OpenSSL 3.0
|
||||
|
||||
*Richard Levitte*
|
||||
|
||||
* Added several checks to X509_verify_cert() according to requirements in
|
||||
RFC 5280 in case `X509_V_FLAG_X509_STRICT` is set
|
||||
(which may be done by using the CLI option `-x509_strict`):
|
||||
* The basicConstraints of CA certificates must be marked critical.
|
||||
* CA certificates must explicitly include the keyUsage extension.
|
||||
* If a pathlenConstraint is given the key usage keyCertSign must be allowed.
|
||||
* The issuer name of any certificate must not be empty.
|
||||
* The subject name of CA certs, certs with keyUsage crlSign,
|
||||
and certs without subjectAlternativeName must not be empty.
|
||||
* If a subjectAlternativeName extension is given it must not be empty.
|
||||
* The signatureAlgorithm field and the cert signature must be consistent.
|
||||
* Any given authorityKeyIdentifier and any given subjectKeyIdentifier
|
||||
must not be marked critical.
|
||||
* The authorityKeyIdentifier must be given for X.509v3 certs
|
||||
unless they are self-signed.
|
||||
* The subjectKeyIdentifier must be given for all X.509v3 CA certs.
|
||||
|
||||
*David von Oheimb*
|
||||
|
||||
* Certificate verification using X509_verify_cert() meanwhile rejects EC keys
|
||||
with explicit curve parameters (specifiedCurve) as required by RFC 5480.
|
||||
|
||||
*Tomas Mraz*
|
||||
|
||||
* For built-in EC curves, ensure an EC_GROUP built from the curve name is
|
||||
used even when parsing explicit parameters, when loading a encoded key
|
||||
or calling `EC_GROUP_new_from_ecpkparameters()`/
|
||||
|
Loading…
Reference in New Issue
Block a user