summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/x509v3 (follow)
Commit message (Expand)AuthorAgeFilesLines
* Check ASN1_OCTET_STRING_new() for failure. Coverity CID 78904miod2015-02-151-6/+8
* Memory leak in `should not happen' condition; Coverity CID 78889.miod2015-02-141-4/+4
* Memory leak upon error; Coverity CID 78857miod2015-02-141-1/+4
* Don't leak memory on errors - fixes coverity issues 105353 105253beck2015-02-131-4/+9
* unifdef OPENSSL_NO_RFC3779 - this is currently disabled and unlikely tojsing2015-02-105-2695/+3
* Remove more IMPLEMENT_STACK_OF noops that have been hiding for the lastjsing2015-02-103-10/+3
* The IMPLEMENT_STACK_OF and IMPLEMENT_ASN1_SET_OF macros were turned intojsing2015-02-102-8/+2
* Expand the IMPLEMENT_ASN1_ALLOC_FUNCTIONS macro so that the code is visiblejsing2015-02-103-7/+51
* Expand the IMPLEMENT_ASN1_FUNCTIONS macro so that the code is visible andjsing2015-02-0912-43/+787
* Delete a lot of #if 0 code in libressl.doug2015-02-074-78/+4
* Avoid modifying input on failure in X509_(TRUST|PURPOSE)_add.doug2014-12-061-11/+13
* further BUF_strdup conversion: these places should be safe to rely ontedu2014-11-181-2/+2
* Check the result of sk_*_push() operations for failure.miod2014-10-282-11/+26
* The fixes to X509_PURPOSE_add() in r1.18 actually could cause a globalmiod2014-10-051-27/+29
* Be sure to check the stack push operation for success in v2i_POLICY_MAPPINGS();miod2014-10-051-17/+19
* In v2i_AUTHORITY_INFO_ACCESS(), separate object allocation from object pushmiod2014-10-051-3/+8
* Memory leak upon error in set_dist_point_name().miod2014-10-051-1/+2
* Be sure to check object allocation for success before using them.miod2014-10-051-5/+10
* Missing deallocation upon error.miod2014-10-051-2/+3
* Fix memory leak in the error path of v2i_AUTHORITY_KEYID().miod2014-10-051-3/+6
* level_add_node(): if a memory allocation failure causes us to attempt to cleanmiod2014-07-231-4/+7
* The bell tolls for BUF_strdup - Start the migration to usingbeck2014-07-135-17/+20
* Only import cryptlib.h in the four source files that actually need it.jsing2014-07-1133-79/+73
* Explicitly include <openssl/opensslconf.h> in every file that referencesjsing2014-07-107-7/+24
* Upon realloc() failure, free() the original pointer and remove the stupidmiod2014-07-101-3/+3
* Stop including standard headers via cryptlib.h - pull in the headers thatjsing2014-07-1017-27/+54
* {malloc,reallocarray} + memset(,0,) -> callocmiod2014-07-091-4/+2
* Fix 9 memory leaks.logan2014-06-281-1/+10
* tags as requested by miod and teduderaadt2014-06-1239-37/+39
* c-file-style hints, begone; ok beckderaadt2014-06-112-2/+2
* Remove various test stubs. The good ones have been moved by jsingderaadt2014-06-073-323/+0
* There is no need for is{upper,lower}() tests before to{lower,uppper}(),deraadt2014-06-011-4/+2
* EBCDIC support died a while ago, except in a comment.deraadt2014-06-011-2/+0
* more: no need for null check before freederaadt2014-05-302-14/+7
* ok, next pass after review: when possible, put the reallocarray argumentsderaadt2014-05-291-1/+1
* convert 53 malloc(a*b) to reallocarray(NULL, a, b). that is 53deraadt2014-05-291-1/+1
* Everything sane has stdio, and FILE *. we don't need ifdefs for this.beck2014-05-291-2/+0
* KNF.jsing2014-05-263-360/+479
* KNF.jsing2014-05-267-538/+656
* if (x) free(x) -> free(x); semantic patch generated with coccinelle, carefullymiod2014-05-222-5/+3
* Put explicit (void) in function declarations and shuffle keywords in somemiod2014-04-271-1/+1
* Fix leak last commit introduced. Spotted by Sebastian Kapfer.beck2014-04-271-0/+1
* Replace all use of ERR_add_error_data with ERR_asprintf_error_data.beck2014-04-265-16/+15
* KNF.jsing2014-04-212-239/+249
* KNF.jsing2014-04-217-343/+409
* KNF.jsing2014-04-214-102/+119
* no need for malloc castsderaadt2014-04-212-2/+2
* KNF.jsing2014-04-215-659/+722
* KNF.jsing2014-04-215-1971/+2092
* KNF.jsing2014-04-218-548/+456