summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/ts (follow)
Commit message (Expand)AuthorAgeFilesLines
* Change ts to only support one second precision.beck2024-03-263-84/+9
* Fix time conversion that broke regress.beck2024-03-251-5/+5
* Convert libressl to use the BoringSSL style time conversionsbeck2024-03-241-2/+2
* Unifdef OPENSSL_NO_ENGINE in libcryptotb2023-11-192-61/+2
* Plug a leak of ASN1_INTEGR in def_serial_cb()tb2023-08-221-4/+7
* Set OPENSSL_NO_ENGINE, remove engine codetb2023-07-281-1/+3
* Unbreak the namespace build after a broken mk.conf and tool misfire hadbeck2023-07-072-2/+4
* Hide symbols in tsbeck2023-07-0711-11/+199
* Remove TS_VERIFY_CTX_init()tb2023-04-252-11/+2
* Mark TS_VERIFY_CTX_init() for removaltb2023-04-161-1/+3
* Inline only use of TS_VERIFY_CTX_init()tb2023-03-311-2/+2
* Make header guards of internal headers consistenttb2022-11-261-2/+2
* Make internal header file names consistenttb2022-11-263-9/+9
* Make structs in ts.h opaquetb2022-09-112-215/+223
* Prepare to resurrect TS_RESP_CTX_set_time_cb()tb2022-07-242-2/+14
* Prepare to provide TS_VERIFY_CTX accessorstb2022-07-242-2/+79
* Prepare to provide various TS_STATUS_INFO accessorstb2022-07-242-2/+34
* Start making ts opaquetb2022-07-249-49/+132
* Fix file names in comments.tb2022-07-231-7/+7
* Handle X509_check_purpose(3) and EVP_get_digestbyobj(3)kn2022-07-171-2/+5
* Add initial support for ESSCertIDv2 verificationkn2022-07-171-19/+99
* Add ESSCertIDv2 ASN.1 boilerplatekn2022-07-162-2/+170
* Avoid direct X509 structure accesskn2022-07-162-12/+12
* Zap duplicate ERR_load_TS_strings() prototypekn2022-07-161-3/+1
* Remove mkerr.pl remnants from LibreSSLkn2022-07-122-13/+2
* Include evp_locl.h where it will be needed once most structs fromtb2021-12-122-2/+4
* Add #include "bn_lcl.h" to the files that will soon need it.tb2021-12-041-1/+2
* Cache sha512 hash and parsed not_before and not_after with X509 cert.beck2021-11-042-7/+14
* Move the now internal X.509-related structs into x509_lcl.h.tb2021-11-013-3/+9
* call the API function X509_NAME_cmp(3) instead of the obsolete,schwarze2021-07-021-2/+2
* Make TS_compute_imprint a bit more robust.tb2021-05-021-20/+28
* Prevent double free in int_TS_RESP_verify_tokentb2021-05-011-1/+2
* snprintf/vsnprintf return < 0 on error, rather than -1.deraadt2019-07-031-2/+2
* Add const to the ASN1_OBJECT argument of TS_TST_INFO_get_ext_by_OBJ(3).tb2018-05-132-4/+5
* Add const qualifier to the ASN1_OBJ * argument oftb2018-05-133-11/+11
* Make ENGINE_free() succeed on NULL. Matches OpenSSL's behavior andtb2018-04-141-3/+2
* Send the function codes from the error functions to the bit bucket,beck2017-01-298-139/+81
* Remove all DECLARE_ASN1_SET_OF macro usage - since 2000 these have beenjsing2016-12-271-4/+1
* More X509_STORE_CTX_set_*() return value checks.miod2016-11-051-2/+4
* Kill a bunch of OLD_ASN1 usage by replacing ASN1_{d2i,i2d}_* withjsing2016-11-041-21/+17
* X509_free(3) is NULL-safe, so remove NULL checks before its calls.mmcc2016-03-111-3/+2
* Replace M_ASN1_GENERALIZEDTIME_(new|free) withjsing2015-09-301-2/+2
* Replace remaining M_ASN1_STRING_* macros with calls to ASN1_STRING_*.jsing2015-09-101-4/+4
* Expand obsolete M_ASN1.*(cmp|dup|print|set) macros - no change in generatedjsing2015-07-292-4/+4
* Expand ASN.1 template macros - the generated assembly only differs byjsing2015-07-241-51/+341
* Verify ASN1 objects types before attempting to access them as a particularmiod2015-07-191-1/+3
* Now that it is safe to invoke X509_STORE_CTX_cleanup() if X509_STORE_CTX_init()miod2015-07-191-5/+11
* Put explicit braces around assignment used in a conditional.miod2015-07-191-2/+2
* Do not allow TS_check_signer_name() with signer == NULL frommiod2015-07-151-1/+4
* Enable building with -DOPENSSL_NO_DEPRECATED.doug2015-02-111-1/+2