summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509v3 (follow)
Commit message (Expand)AuthorAgeFilesLines
* If X509_check_{host,email}() are called with a length of zero, use strlen()jsing2018-03-201-3/+7
* Allow leading . in nameConstraints. from openssl via jabberwock. ok jsingtedu2017-07-201-2/+2
* Distinguish between self-issued certificates and self-signed certificates.jsing2017-06-222-30/+40
* the XXXfree functions being called accept NULL, so don't check first.deraadt2017-05-023-26/+14
* Send the function codes from the error functions to the bit bucket,beck2017-01-2920-256/+167
* Expand DECLARE_OBJ_BSEARCH_CMP_FN and IMPLEMENT_OBJ_BSEARCH_CMP_FN macros.jsing2017-01-212-8/+38
* Expand ASN1_ITEM_rptr macros - no change in preprocessor output.jsing2016-12-301-3/+3
* Expand ASN1_ITEM_ref and ASN1_ITEM_ptr macros - no change in generatedjsing2016-12-3022-66/+66
* Remove all DECLARE_ASN1_SET_OF macro usage - since 2000 these have beenjsing2016-12-271-7/+1
* Expand DECLARE_ASN1_ITEM macros - no change in preprocessor output.jsing2016-12-271-6/+6
* Explicitly export a list of symbols from libcrypto.jsing2016-12-212-2/+9
* Stricter checks of ASN1_INTEGER to reject ASN1_NEG_INTEGER in places whenmiod2016-11-081-3/+9
* Check BIO_new*() for failure.miod2016-11-051-2/+4
* Expand DECLARE_ASN1_.*FUNCTIONS macros.jsing2016-09-041-32/+128
* Bring in functions used by stunnel and exim from BoringSSL - this bringsbeck2016-09-032-2/+452
* X509_free(3) is NULL-safe, so remove NULL checks before its calls.mmcc2016-03-111-3/+2
* initialize ext_len to 0.beck2015-12-141-2/+6
* Replace M_ASN1_OCTET_STRING_(free|new) with ASN1_OCTET_STRING_(free|new).jsing2015-09-304-16/+16
* Replace M_ASN1_IA5STRING_(new|free) with ASN1_IA5STRING_(new|free). Samejsing2015-09-303-9/+9
* Replace M_ASN1_INTEGER_(new|free) with ASN1_INTEGER_(new|free) - this isjsing2015-09-302-10/+10
* Replace remaining M_ASN1_BIT_STRING_(new|free) macros with calls tojsing2015-09-291-4/+4
* Use ASN1_item_dup() instead of ASN1_dup().jsing2015-09-261-3/+2
* Use named initialisers for X509V3_EXT_METHOD structs (for the usualjsing2015-07-2919-228/+588
* Expand obsolete M_ASN1.*(cmp|dup|print|set) macros - no change in generatedjsing2015-07-295-12/+12
* Expand ASN.1 template macros that got missed in the last pass - only changejsing2015-07-253-11/+31
* Expand ASN.1 template macros - the generated assembly only differs byjsing2015-07-2513-141/+806
* Remove case that can never happen.doug2015-07-191-5/+1
* Fix leak found by coverity, issue 78897 - which also brough tobeck2015-07-183-25/+33
* Memory leak; Coverity CID 78836miod2015-07-151-6/+8
* Unchecked allocations, and make sure we do not leak upon error. Fixesmiod2015-07-151-21/+36
* Avoid leaking objects upon error; tweaks & ok doug@miod2015-07-151-18/+18
* Memory leak in error path. Coverity CID 78822.miod2015-02-171-8/+9
* Check ASN1_OCTET_STRING_new() for failure. Coverity CID 78904miod2015-02-151-6/+8
* Memory leak in `should not happen' condition; Coverity CID 78889.miod2015-02-141-4/+4
* Memory leak upon error; Coverity CID 78857miod2015-02-141-1/+4
* Don't leak memory on errors - fixes coverity issues 105353 105253beck2015-02-131-4/+9
* unifdef OPENSSL_NO_RFC3779 - this is currently disabled and unlikely tojsing2015-02-105-2695/+3
* Remove more IMPLEMENT_STACK_OF noops that have been hiding for the lastjsing2015-02-103-10/+3
* The IMPLEMENT_STACK_OF and IMPLEMENT_ASN1_SET_OF macros were turned intojsing2015-02-102-8/+2
* Expand the IMPLEMENT_ASN1_ALLOC_FUNCTIONS macro so that the code is visiblejsing2015-02-103-7/+51
* Expand the IMPLEMENT_ASN1_FUNCTIONS macro so that the code is visible andjsing2015-02-0912-43/+787
* Delete a lot of #if 0 code in libressl.doug2015-02-074-78/+4
* Avoid modifying input on failure in X509_(TRUST|PURPOSE)_add.doug2014-12-061-11/+13
* further BUF_strdup conversion: these places should be safe to rely ontedu2014-11-181-2/+2
* Check the result of sk_*_push() operations for failure.miod2014-10-282-11/+26
* The fixes to X509_PURPOSE_add() in r1.18 actually could cause a globalmiod2014-10-051-27/+29
* Be sure to check the stack push operation for success in v2i_POLICY_MAPPINGS();miod2014-10-051-17/+19
* In v2i_AUTHORITY_INFO_ACCESS(), separate object allocation from object pushmiod2014-10-051-3/+8
* Memory leak upon error in set_dist_point_name().miod2014-10-051-1/+2
* Be sure to check object allocation for success before using them.miod2014-10-051-5/+10