index
:
openbsd
OPENBSD_2_0
OPENBSD_2_1
OPENBSD_2_2
OPENBSD_2_3
OPENBSD_2_4
OPENBSD_2_5
OPENBSD_2_6
OPENBSD_2_7
OPENBSD_2_8
OPENBSD_2_9
OPENBSD_3_0
OPENBSD_3_1
OPENBSD_3_2
OPENBSD_3_3
OPENBSD_3_4
OPENBSD_3_5
OPENBSD_3_6
OPENBSD_3_7
OPENBSD_3_8
OPENBSD_3_9
OPENBSD_4_0
OPENBSD_4_1
OPENBSD_4_2
OPENBSD_4_3
OPENBSD_4_4
OPENBSD_4_5
OPENBSD_4_6
OPENBSD_4_7
OPENBSD_4_8
OPENBSD_4_9
OPENBSD_5_0
OPENBSD_5_1
OPENBSD_5_2
OPENBSD_5_3
OPENBSD_5_4
OPENBSD_5_5
OPENBSD_5_6
OPENBSD_5_7
OPENBSD_5_8
OPENBSD_5_9
OPENBSD_6_0
OPENBSD_6_1
OPENBSD_6_2
OPENBSD_6_3
OPENBSD_6_4
OPENBSD_6_5
OPENBSD_6_6
OPENBSD_6_7
OPENBSD_6_8
OPENBSD_6_9
OPENBSD_7_0
OPENBSD_7_1
OPENBSD_7_2
OPENBSD_7_3
OPENBSD_7_4
OPENBSD_7_5
OPENBSD_7_6
master
A mirror of https://github.com/libressl/openbsd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
src
/
lib
/
libcrypto
/
x509v3
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
Allow leading . in nameConstraints. from openssl via jabberwock. ok jsing
tedu
2017-07-20
1
-2
/
+2
*
Distinguish between self-issued certificates and self-signed certificates.
jsing
2017-06-22
2
-30
/
+40
*
the XXXfree functions being called accept NULL, so don't check first.
deraadt
2017-05-02
3
-26
/
+14
*
Send the function codes from the error functions to the bit bucket,
beck
2017-01-29
20
-256
/
+167
*
Expand DECLARE_OBJ_BSEARCH_CMP_FN and IMPLEMENT_OBJ_BSEARCH_CMP_FN macros.
jsing
2017-01-21
2
-8
/
+38
*
Expand ASN1_ITEM_rptr macros - no change in preprocessor output.
jsing
2016-12-30
1
-3
/
+3
*
Expand ASN1_ITEM_ref and ASN1_ITEM_ptr macros - no change in generated
jsing
2016-12-30
22
-66
/
+66
*
Remove all DECLARE_ASN1_SET_OF macro usage - since 2000 these have been
jsing
2016-12-27
1
-7
/
+1
*
Expand DECLARE_ASN1_ITEM macros - no change in preprocessor output.
jsing
2016-12-27
1
-6
/
+6
*
Explicitly export a list of symbols from libcrypto.
jsing
2016-12-21
2
-2
/
+9
*
Stricter checks of ASN1_INTEGER to reject ASN1_NEG_INTEGER in places when
miod
2016-11-08
1
-3
/
+9
*
Check BIO_new*() for failure.
miod
2016-11-05
1
-2
/
+4
*
Expand DECLARE_ASN1_.*FUNCTIONS macros.
jsing
2016-09-04
1
-32
/
+128
*
Bring in functions used by stunnel and exim from BoringSSL - this brings
beck
2016-09-03
2
-2
/
+452
*
X509_free(3) is NULL-safe, so remove NULL checks before its calls.
mmcc
2016-03-11
1
-3
/
+2
*
initialize ext_len to 0.
beck
2015-12-14
1
-2
/
+6
*
Replace M_ASN1_OCTET_STRING_(free|new) with ASN1_OCTET_STRING_(free|new).
jsing
2015-09-30
4
-16
/
+16
*
Replace M_ASN1_IA5STRING_(new|free) with ASN1_IA5STRING_(new|free). Same
jsing
2015-09-30
3
-9
/
+9
*
Replace M_ASN1_INTEGER_(new|free) with ASN1_INTEGER_(new|free) - this is
jsing
2015-09-30
2
-10
/
+10
*
Replace remaining M_ASN1_BIT_STRING_(new|free) macros with calls to
jsing
2015-09-29
1
-4
/
+4
*
Use ASN1_item_dup() instead of ASN1_dup().
jsing
2015-09-26
1
-3
/
+2
*
Use named initialisers for X509V3_EXT_METHOD structs (for the usual
jsing
2015-07-29
19
-228
/
+588
*
Expand obsolete M_ASN1.*(cmp|dup|print|set) macros - no change in generated
jsing
2015-07-29
5
-12
/
+12
*
Expand ASN.1 template macros that got missed in the last pass - only change
jsing
2015-07-25
3
-11
/
+31
*
Expand ASN.1 template macros - the generated assembly only differs by
jsing
2015-07-25
13
-141
/
+806
*
Remove case that can never happen.
doug
2015-07-19
1
-5
/
+1
*
Fix leak found by coverity, issue 78897 - which also brough to
beck
2015-07-18
3
-25
/
+33
*
Memory leak; Coverity CID 78836
miod
2015-07-15
1
-6
/
+8
*
Unchecked allocations, and make sure we do not leak upon error. Fixes
miod
2015-07-15
1
-21
/
+36
*
Avoid leaking objects upon error; tweaks & ok doug@
miod
2015-07-15
1
-18
/
+18
*
Memory leak in error path. Coverity CID 78822.
miod
2015-02-17
1
-8
/
+9
*
Check ASN1_OCTET_STRING_new() for failure. Coverity CID 78904
miod
2015-02-15
1
-6
/
+8
*
Memory leak in `should not happen' condition; Coverity CID 78889.
miod
2015-02-14
1
-4
/
+4
*
Memory leak upon error; Coverity CID 78857
miod
2015-02-14
1
-1
/
+4
*
Don't leak memory on errors - fixes coverity issues 105353 105253
beck
2015-02-13
1
-4
/
+9
*
unifdef OPENSSL_NO_RFC3779 - this is currently disabled and unlikely to
jsing
2015-02-10
5
-2695
/
+3
*
Remove more IMPLEMENT_STACK_OF noops that have been hiding for the last
jsing
2015-02-10
3
-10
/
+3
*
The IMPLEMENT_STACK_OF and IMPLEMENT_ASN1_SET_OF macros were turned into
jsing
2015-02-10
2
-8
/
+2
*
Expand the IMPLEMENT_ASN1_ALLOC_FUNCTIONS macro so that the code is visible
jsing
2015-02-10
3
-7
/
+51
*
Expand the IMPLEMENT_ASN1_FUNCTIONS macro so that the code is visible and
jsing
2015-02-09
12
-43
/
+787
*
Delete a lot of #if 0 code in libressl.
doug
2015-02-07
4
-78
/
+4
*
Avoid modifying input on failure in X509_(TRUST|PURPOSE)_add.
doug
2014-12-06
1
-11
/
+13
*
further BUF_strdup conversion: these places should be safe to rely on
tedu
2014-11-18
1
-2
/
+2
*
Check the result of sk_*_push() operations for failure.
miod
2014-10-28
2
-11
/
+26
*
The fixes to X509_PURPOSE_add() in r1.18 actually could cause a global
miod
2014-10-05
1
-27
/
+29
*
Be sure to check the stack push operation for success in v2i_POLICY_MAPPINGS();
miod
2014-10-05
1
-17
/
+19
*
In v2i_AUTHORITY_INFO_ACCESS(), separate object allocation from object push
miod
2014-10-05
1
-3
/
+8
*
Memory leak upon error in set_dist_point_name().
miod
2014-10-05
1
-1
/
+2
*
Be sure to check object allocation for success before using them.
miod
2014-10-05
1
-5
/
+10
*
Missing deallocation upon error.
miod
2014-10-05
1
-2
/
+3
[next]