summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/pem (follow)
Commit message (Expand)AuthorAgeFilesLines
* Use EVP_MD_CTX_legacy_clear() internallytb2024-02-181-2/+2
* Use EVP_CIPHER_CTX_legacy_clear() internallytb2024-02-181-3/+3
* Ignore ENGINE at the API boundarytb2023-11-291-3/+2
* Unifdef OPENSSL_NO_ENGINE in libcryptotb2023-11-192-12/+2
* Hide symbols in lhash, pem, and rc2beck2023-07-0711-12/+131
* Remove PEM wrappers for NETSCAPE_CERT_SEQUENCEtb2023-04-252-36/+2
* The #ifdef missed a few NETSCAPE_CERT thingstb2023-04-251-2/+2
* Mark NETSCAPE_CERT_SEQUENCE for removaltb2023-04-242-2/+6
* Make internal header file names consistenttb2022-11-264-13/+13
* Allow a NULL header in PEM_write{,_bio}()tb2022-07-311-3/+2
* Remove mkerr.pl remnants from LibreSSLkn2022-07-122-12/+2
* Remove PEM_Seal{Init,Update,Final}tb2022-01-142-221/+1
* Unifdef LIBRESSL_OPAQUE_* and LIBRESSL_NEXT_APItb2022-01-141-3/+1
* Prepare to make RSA and RSA_METHOD opaque by including rsa_locl.htb2022-01-071-1/+2
* Prepare the move of DSA_SIG, DSA_METHOD and DSA to dsa_locl.h bytb2022-01-071-1/+2
* Prepare to provide PEM_write_bio_PrivateKey_traditional()tb2021-12-242-5/+19
* Include evp_locl.h where it will be needed once most structs fromtb2021-12-124-4/+9
* Remove the unused X509_CERT_PAIR struct and the assicated API.tb2021-10-312-33/+2
* remove half a dozen "goto" statements and a labelschwarze2020-07-251-14/+1
* Fix a bug in PEM_X509_INFO_read_bio(3) that is very likely to causeschwarze2020-07-231-21/+17
* Handle CMS PEM headers.jsing2019-09-061-1/+11
* Clean up pvkfmt.cinoguchi2019-07-081-63/+66
* Fix pvk format processing in libcryptoinoguchi2019-07-071-11/+11
* Change PEM_Sign{Init,Update}() to return an int.tb2018-08-242-8/+8
* Check return value of EVP_EncodeUpdate() in PEM_write_bio().tb2018-08-241-2/+3
* Fix memory leak in i2b_PVK in error handling.bcook2018-08-051-14/+10
* Add const qualifier to the 'name', 'header', and 'data' arguments oftb2018-05-132-9/+10
* make ENGINE_finish() succeed on NULL and simplify callers as intb2018-04-141-3/+2
* use freezero() instead of memset/explicit_bzero + free. Substantiallyderaadt2017-05-023-19/+8
* Send the function codes from the error functions to the bit bucket,beck2017-01-299-154/+95
* Make explicit _ct and _nonct versions of bn_mod_exp funcitons thatbeck2017-01-211-2/+4
* Make sure PEM_SealInit() will correctly destroy the PEM_ENCODE_SEAL_CTXmiod2016-11-051-8/+22
* unifdef OPENSSL_NO_CMSjsing2016-10-191-10/+1
* Place IMPLEMENT_PEM macros under #ifndef LIBRESSL_INTERNAL.jsing2016-09-041-2/+4
* Sort and group functions.jsing2016-09-044-238/+215
* Expand IMPLEMENT_PEM macros.jsing2016-09-044-30/+545
* fix the rest of the read_ledword() calls used as lengths to be bounded.beck2016-03-021-1/+5
* bound lengths coming out of a pem file to something like realitybeck2016-03-021-3/+7
* Correct spelling of OPENSSL_cleanse.jsing2015-09-106-25/+26
* Drop stupid (int) casts for the arguments of malloc() and friends. This ismiod2015-07-191-2/+2
* Make sure the `reject negative sizes' logic introduced in 1.34 is actuallymiod2015-07-161-3/+4
* Fix return paths with missing EVP_CIPHER_CTX_cleanup() calls.jsg2015-05-151-7/+5
* Guenther has plans for OPENSSL_NO_CMS, so revert this for the moment.beck2015-02-111-1/+10
* get rid of OPENSSL_NO_CMS code we do not use.beck2015-02-111-10/+1
* Enable building with -DOPENSSL_NO_DEPRECATED.doug2015-02-112-2/+4
* Replace assert() and OPENSSL_assert() calls with proper error return paths.miod2015-02-102-7/+17
* Use arc4random_buf() instead of RAND_bytes() or RAND_pseudo_bytes().jsing2014-10-222-8/+6
* None of these need to include <openssl/rand.h>jsing2014-10-185-10/+5
* Make sure PEM_def_callback() correctly handles negative buffer sizes; all usesmiod2014-07-231-10/+17
* if (x) FOO_free(x) -> FOO_free(x).miod2014-07-123-21/+12