summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/asn1 (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Add const to functions in asn1/asn1.h as they did in OpenSSL.tb2018-04-2516-85/+89
* Make the NULL check a separate if statement for readability andtb2018-04-231-2/+4
* Make X509_CRL_METHOD_free() NULL-safe.tb2018-04-231-2/+2
* make ENGINE_finish() succeed on NULL and simplify callers as intb2018-04-141-5/+3
* Revert revision 1.12 commit. Although *pval looks like a C pointer,bluhm2018-04-061-2/+5
* Avoid leaking str if EVP_Digest() fails.tb2018-04-061-3/+6
* Limit ASN.1 constructed types recursive definition depthinoguchi2018-03-293-22/+45
* Provide X509_PUBKEY_get0() by splitting X509_PUBKEY_get() and turning itjsing2018-03-171-6/+16
* Provide X509_REVOKED_dup().jsing2018-03-171-1/+7
* Provide X509_CRL_get0_extensions() and X509_CRL_get_signature_nid().jsing2018-02-221-1/+13
* Provide X509_REQ_get_signature_nid().jsing2018-02-221-1/+7
* Provide X509_NAME_get0_der().jsing2018-02-201-1/+14
* Provide X509_REQ_get0_signature()jsing2018-02-201-1/+11
* Provide X509_CRL_get0_{last,next}Update() and X509_CRL_get0_signature().jsing2018-02-201-1/+23
* Provide X509_get0_extensions() and X509_get0_signature()jsing2018-02-171-1/+11
* Provide ASN1_STRING_get0_data().jsing2018-02-142-3/+10
* Provide X509_get_signature_nid().jsing2018-02-141-1/+7
* Rewrite ASN1_TYPE_{get,set}_octetstring() using templated ASN.1.jsing2017-11-281-81/+78
* Put the opening curly brace in the right place.jsing2017-08-281-2/+3
* Make the symbol for ASN1_time_tm_clamp_notafter visible so libtlsbeck2017-08-271-3/+1
* Add ability to clamp a notafter to values representable in a 32 bit time_tbeck2017-08-132-2/+20
* Add ASN1_TIME_set_tm to set an asn1 from a struct tm *beck2017-05-062-2/+13
* use freezero() instead of memset/explicit_bzero + free. Substantiallyderaadt2017-05-024-31/+14
* Fix silly code that printfs NULL when there are no fractional secondsbeck2017-04-031-2/+2
* Send the function codes from the error functions to the bit bucket,beck2017-01-2946-550/+324
* Expand DECLARE_OBJ_BSEARCH_CMP_FN and IMPLEMENT_OBJ_BSEARCH_CMP_FN macros.jsing2017-01-212-8/+38
* Place ASN_ITEM_{ptr,rptr,ref} and DECLARE_ASN1_ITEM under #ifndefjsing2016-12-301-2/+4
* Expand ASN1_ITEM_rptr and ASN1_ITEM_ptr macros - no change in generatedjsing2016-12-309-33/+33
* Place the DECLARE_ASN1_* macros under #ifndef LIBRESSL_INTERNAL.jsing2016-12-271-4/+10
* Use correct version of previous macro expansion.jsing2016-12-271-5/+5
* Expand DECLARE_ASN1_FUNCTIONS_{fname,name} macros - no change tojsing2016-12-271-6/+22
* Remove all DECLARE_ASN1_SET_OF macro usage - since 2000 these have beenjsing2016-12-271-4/+1
* Expand DECLARE_ASN1_ITEM macros - no change in preprocessor output.jsing2016-12-272-12/+12
* Expand DECLARE_ASN1_* macros. No change in preprocessor output, excludingjsing2016-12-271-20/+92
* Explicitly export a list of symbols from libcrypto.jsing2016-12-212-2/+10
* don't dereference a if NULLbcook2016-11-061-2/+2
* simplify error handling in c2i_ASN1_OBJECTbcook2016-11-061-10/+12
* make public ASN1_time_parse and ASN1_time_tm_cmp to replace former hiddenbeck2016-11-042-13/+16
* Fix a short-read bug in the previous version of asn1_d2i_read_biobcook2016-05-201-26/+28
* internal only negative types should not be handled here.tedu2016-05-043-9/+3
* be careful about consuming excessive memory by reading in chunks.tedu2016-05-041-14/+37
* revert the big change from yesterday to prepare for smaller commits.tedu2016-05-044-40/+23
* patch from openssl for multiple issues:tedu2016-05-034-23/+40
* explicit_bzero for asn1 objects on free. Too often these contain sensitive in...beck2016-03-171-24/+27
* X509_free(3) is NULL-safe, so remove NULL checks before its calls.mmcc2016-03-111-3/+2
* explict_bzero for some asn1 free's - ok miod@beck2016-03-062-3/+9
* remove NULL-checks before free()mmcc2015-12-231-5/+3
* assign pointer NULL rather than 0mmcc2015-12-231-2/+2
* assign pointer to NULL rather than 0mmcc2015-12-231-2/+2
* initialize a pointer to NULL rather than 0mmcc2015-12-221-2/+2