summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/pkcs12 (follow)
Commit message (Expand)AuthorAgeFilesLines
* libressl *_namespace.h: adjust *_ALIAS() to require a semicolontb2023-02-1616-93/+93
* Check return value of X509_digestjob2023-01-241-2/+3
* Make header guards of internal headers consistenttb2022-11-261-2/+2
* Make internal header file names consistenttb2022-11-268-17/+17
* Hide symbols in libcrypto/pkcs12beck2022-11-1216-17/+93
* Make structs in pkcs12.h opaquetb2022-09-114-162/+45
* Add an empty pkcs12_local.h and include it where it will soon be needed.tb2022-08-2011-10/+92
* Prepare to provide PKCS12 accessorstb2022-08-038-20/+347
* Eliminate the somewhat pointless Ij variabletb2022-07-301-5/+4
* Transform two || chains into individually checked functionstb2022-07-301-8/+13
* fix indenttb2022-07-251-2/+2
* Align PKCS12_key_gen_uni() with OpenSSLtb2022-07-241-58/+50
* Minor fixes in PKCS12_parse()tb2022-07-241-24/+23
* Per RFC 7292, safeContentsBag is a SEQUENCE OF, not a SET OFtb2022-07-241-2/+2
* Clear key on exit in PKCS12_gen_mac()tb2022-07-241-25/+38
* Plug a leak in PKCS12_setup_mac()tb2022-07-241-2/+3
* Remove mkerr.pl remnants from LibreSSLkn2022-07-122-12/+2
* Don't pass uninitialized pointer to ASN1_STRING_to_UTF8()tb2022-05-201-2/+2
* Simplify X509_ATTRIBUTE ASN.1 encoding.jsing2022-05-091-7/+3
* Add check for OBJ_nid2obj return valueinoguchi2022-01-201-2/+3
* Add check for ASN1_INTEGER_setinoguchi2022-01-201-2/+3
* Garbage collect the app_items field of ASN1_ADBtb2022-01-141-3/+1
* Include evp_locl.h where it will be needed once most structs fromtb2021-12-123-3/+8
* Add a mostly empty hmac_local.h. HMAC_CTX and a few other thingstb2021-12-121-1/+2
* Move the now internal X.509-related structs into x509_lcl.h.tb2021-11-015-5/+15
* KNF: remove whitespace between functions and parenthesestb2021-07-096-28/+28
* Do not leave errors on the error stack on PKCS12_parse() success.tb2021-04-241-1/+3
* Remove remaining error *_str_functs[]jsing2020-06-051-30/+2
* Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken()tb2018-08-241-8/+4
* Add a const qualifier to the `uni' argument of OPENSSL_uni2asc().tb2018-05-302-4/+4
* Add const qualifiers to the X509_SIG * and char * arguments oftb2018-05-132-4/+5
* Add const to the argument of PKCS12_pack_authsafes(3).tb2018-05-132-4/+4
* Add const to the X509_ALGOR and other arguments oftb2018-05-133-20/+23
* Add const to the attr argument of PKCS12_get_attr_gen(3).tb2018-05-132-4/+5
* Add const qualifier to the PKCS12_SAFEBAG argument oftb2018-05-132-5/+5
* Add const qualifiers to the 'pass' and 'name' arguments oftb2018-05-132-9/+9
* use freezero() instead of memset/explicit_bzero + free. Substantiallyderaadt2017-05-021-5/+2
* Send the function codes from the error functions to the bit bucket,beck2017-01-2910-96/+69
* Expand ASN1_ITEM_rptr macros - no change in generated assembly.jsing2016-12-304-20/+20
* Place M_PKCS12_* compatibility macros under #ifndef LIBRESSL_INTERNAL.jsing2016-12-301-1/+5
* Expand M_PKCS12_* "compatibility" macros. No change to generated assembly.jsing2016-12-303-10/+10
* Remove all DECLARE_ASN1_SET_OF macro usage - since 2000 these have beenjsing2016-12-271-2/+1
* Expand DECLARE_ASN1_ITEM macros - no change to preprocessor output.jsing2016-12-271-3/+3
* Stricter checks of ASN1_INTEGER to reject ASN1_NEG_INTEGER in places whenmiod2016-11-082-6/+11
* Stricter validation of inputs of OPENSSL_asc2uni() and OPENSSL_uni2asc().miod2016-11-051-17/+34
* Do not leak the ressources possibly allocated by EVP_MD_CTX_init() in themiod2016-11-051-2/+3
* Expand DECLARE_ASN1_.*FUNCTIONS macros.jsing2016-09-041-5/+21
* X509_free(3) is NULL-safe, so remove NULL checks before its calls.mmcc2016-03-111-6/+4
* Replace M_ASN1_OCTET_STRING_(free|new) with ASN1_OCTET_STRING_(free|new).jsing2015-09-304-10/+10
* Replace M_ASN1_INTEGER_(new|free) with ASN1_INTEGER_(new|free) - this isjsing2015-09-301-2/+2