summaryrefslogtreecommitdiff
path: root/crypto/asn1/a_object.c
Commit message (Expand)AuthorAgeFilesLines
* Stop raising ERR_R_MALLOC_FAILURE in most placesRichard Levitte2022-10-051-15/+5
* ASN1: Ensure that d2i_ASN1_OBJECT() frees the strings on ASN1_OBJECT reuseRichard Levitte2021-04-271-5/+8
* crypto: raise error on malloc failureFdaSilvaYY2021-04-141-1/+3
* Update copyright yearMatt Caswell2021-04-081-1/+1
* Check for integer overflow in i2a_ASN1_OBJECT and error out if found.Pauli2021-04-071-3/+9
* Add ossl_asn1 symbolsShane Lontis2021-03-181-3/+3
* Update copyright yearMatt Caswell2020-11-261-1/+1
* Convert all {NAME}err() in crypto/ to their corresponding ERR_raise() callRichard Levitte2020-11-131-14/+13
* Reorganize local header filesDr. Matthias St. Pierre2019-09-281-1/+1
* Reorganize private crypto header filesDr. Matthias St. Pierre2019-09-281-2/+2
* Following the license change, modify the boilerplates in crypto/asn1/Richard Levitte2018-12-061-1/+1
* i2d_ASN1_OBJECT(): allocate memory if the user didn't provide a bufferRichard Levitte2018-08-111-4/+15
* Update copyright yearRichard Levitte2018-04-171-1/+1
* Set error code on alloc failuresRich Salz2018-04-031-2/+3
* Consistent formatting for sizeof(foo)Rich Salz2017-12-071-2/+2
* Remove parentheses of return.KaoruToda2017-10-181-14/+14
* This has been added to avoid the situation where some host ctype.h functionsPauli2017-08-221-3/+3
* Consolidate to a single asn1_time_from_tm() functionTodd Short2017-08-041-1/+2
* Check for errors in a2d_ASN1_OBJECT()Dr. Stephen Henson2016-08-161-2/+6
* Check for overlows and error return from ASN1_object_size()Dr. Stephen Henson2016-08-021-1/+1
* Constify i2t_ASN1_OBJECT, i2d_ASN1_OBJECT, i2a_ASN1_OBJECT.FdaSilvaYY2016-07-251-3/+3
* Copyright consolidation 08/10Rich Salz2016-05-171-54/+6
* Remove /* foo.c */ commentsRich Salz2016-01-261-1/+0
* Continue standardising malloc style for libcryptoMatt Caswell2015-11-091-4/+4
* Return shared OIDs when decoding.Dr. Stephen Henson2015-09-191-1/+24
* remove 0 assignments.Rich Salz2015-09-031-6/+1
* Identify and move common internal libcrypto header filesRichard Levitte2015-05-141-1/+1
* Use safer sizeof variant in mallocRich Salz2015-05-041-1/+1
* free null cleanup finaleRich Salz2015-05-011-8/+4
* free NULL cleanup 7Rich Salz2015-04-301-4/+2
* free NULL cleanup 8Rich Salz2015-04-301-1/+1
* remove malloc castsRich Salz2015-04-281-2/+2
* Move more internal only functions to asn1_locl.hDr. Stephen Henson2015-03-261-0/+1
* make ASN1_OBJECT opaqueDr. Stephen Henson2015-03-241-0/+1
* Remove obsolete IMPLEMENT_ASN1_SET_OFDr. Stephen Henson2015-02-091-2/+0
* util/mkstack.pl now generates entire safestack.hRich Salz2015-02-061-2/+0
* Run util/openssl-format-source -v -c .Matt Caswell2015-01-221-318/+304
* Fix OID handling:Emilia Kasper2014-08-061-9/+21
* More diagnostics for invalid OIDs.Ben Laurie2013-09-201-1/+5
* PR: 2556 (partial)Dr. Stephen Henson2011-07-141-2/+2
* correctly encode OIDs near 2^32Dr. Stephen Henson2011-06-221-1/+1
* The OID sanity check was incorrect. It should only disallow *leading* 0x80Dr. Stephen Henson2010-03-071-3/+3
* Reject leading 0x80 in OID subidentifiers.Dr. Stephen Henson2009-08-061-0/+11
* Revert the size_t modifications from HEAD that had led to moreGeoff Thorpe2008-11-121-18/+15
* size_tification.Ben Laurie2008-11-011-15/+18
* Fix a variety of warnings generated by some elevated compiler-fascism,Geoff Thorpe2008-03-161-0/+1
* Addenum to "Constify obj_dat.[ch]."Andy Polyakov2007-09-181-7/+15
* fix problems found by coverity: remove useless codeNils Larsch2006-03-151-2/+0
* Print out <INVALID> if an OID value is invalid.Dr. Stephen Henson2006-02-211-0/+2
* Update from stable branch.Dr. Stephen Henson2005-12-051-1/+1