b6dec7822d
All certificates are now parsed with a special, extremely lax parser that extracts only the DNS names. Only if the DNS names match the domains we're interested in will we attempt to parse the cert with the real X509 parser. This ensures that we won't miss a very badly encoded certificate that has been issued for a monitored domain. As of the time of commit, the lax parser is able to process every logged certificate in the known logs. |
||
---|---|---|
.. | ||
ctwatch | ||
sha1watch | ||
.gitignore | ||
common.go |