summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/ocsp (follow)
Commit message (Expand)AuthorAgeFilesLines
* spelling; from miodjmc2018-11-251-2/+2
* Add const to two arguments of OCSP_cert_to_id()tb2018-08-242-6/+7
* wrap an overlong linetb2018-05-141-2/+3
* Add const qualifier to the path and url{,s} parameters oftb2018-05-134-15/+16
* Add const qualifier to the X509_NAME *, ASN1_BIT_STRING *, andtb2018-05-132-6/+6
* Add const qualifier to the ASN1_OBJECT * argument of:tb2018-05-132-11/+12
* Provide OCSP_SINGLERESP_get0_id().jsing2018-03-172-2/+9
* Send the function codes from the error functions to the bit bucket,beck2017-01-296-87/+43
* Expand ASN1_ITEM_rptr macros - no change in preprocessor output.jsing2016-12-301-6/+6
* Expand ASN1_ITEM_rptr macros - no change in generated assembly.jsing2016-12-302-4/+4
* Remove all DECLARE_ASN1_SET_OF macro usage - since 2000 these have beenjsing2016-12-271-3/+1
* Kill some #if 0 code that uses old-style ASN.1 encoding.jsing2016-12-271-45/+1
* rewrite OCSP_parse_url to be sligthly less nasty and not have one byte buffer...beck2016-12-211-78/+34
* Check BIO_new*() for failure.miod2016-11-051-2/+5
* X509_STORE_CTX_set_*() may fail, so check for errors.miod2016-11-051-4/+14
* Kill a bunch of OLD_ASN1 usage by replacing ASN1_{d2i,i2d}_* withjsing2016-11-042-15/+30
* make public ASN1_time_parse and ASN1_time_tm_cmp to replace former hiddenbeck2016-11-041-10/+7
* Expand DECLARE_ASN1_.*FUNCTIONS macros.jsing2016-09-041-17/+81
* Clean up OCSP_check_validity() a bit more.beck2016-07-161-11/+10
* remove unneeded duplicate call - spotted by jsing@beck2016-07-051-3/+1
* Add several fixes from OpenSSL to make OCSP work with intermediatebeck2016-07-051-10/+24
* Fix from kinichiro.inoguchi@gmail.com to ensure that OCSP usesbeck2016-06-251-2/+2
* Fix the ocsp code to actually check for errors when comparing time valuesbeck2016-06-251-7/+31
* Use ASN1_item_dup() instead of ASN1_dup().jsing2015-09-261-4/+3
* Expand ASN.1 template macros - no change in generated assembly.jsing2015-07-251-76/+496
* Drop stupid (int) casts for the arguments of malloc() and friends. This ismiod2015-07-191-3/+3
* Check return value of all used functions in OCSP_REQUEST_print(); coversmiod2015-07-161-5/+9
* Manually expand ASN1_ITEM_rptr macros that should have been expanded withjsing2015-02-101-2/+2
* Expand the IMPLEMENT_ASN1_DUP_FUNCTION macro so that the code is visiblejsing2015-02-101-2/+7
* Expand the IMPLEMENT_ASN1_FUNCTIONS macro so that the code is visible andjsing2015-02-091-16/+376
* Check the result of sk_*_push() operations for failure.miod2014-10-281-2/+5
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-221-3/+3
* None of these need to include <openssl/rand.h>jsing2014-10-183-6/+3
* Use string literals in printf style calls so gcc's -Wformat works.doug2014-10-031-8/+4
* BIO_free() returns immediately when the sole input is NULL.doug2014-07-251-3/+2
* The bell tolls for BUF_strdup - Start the migration to usingbeck2014-07-131-6/+6
* Principle of least surprise: make CMAC_CTX_free(), OCSP_REQ_CTX_free() andmiod2014-07-121-1/+4
* Only import cryptlib.h in the four source files that actually need it.jsing2014-07-114-16/+17
* Explicitly include <openssl/opensslconf.h> in every file that referencesjsing2014-07-102-2/+7
* Stop including standard headers via cryptlib.h - pull in the headers thatjsing2014-07-102-4/+8
* reset host, port, path to null after freeing so the caller doesn'ttedu2014-07-091-1/+4
* ocsp_check_ids says "If algoritm mismatch let caller deal with it" beforetedu2014-07-091-6/+1
* tags as requested by miod and teduderaadt2014-06-1210-10/+10
* no need for null check before free. from Brendan MacDonelltedu2014-05-301-2/+1
* Not OPENSSL_SYS_SUNOS.jsing2014-05-231-3/+0
* Plug memory leaks upon error in OCSP_url_svcloc_new().miod2014-05-181-6/+9
* In OCSP_sendreq_bio(), cope with OCSP_sendreq_new() returning NULL.miod2014-05-181-4/+6
* More KNF.jsing2014-05-1810-193/+208
* unchecked malloc() return value in OCSP_sendreq_new().miod2014-05-171-0/+2
* KNFmiod2014-05-178-1274/+1332