summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/reallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2022-07-16Add NID for signingCertificateV2kn2-0/+2
https://oidref.com/1.2.840.113549.1.9.16.2.47 OK tb
2022-07-16Avoid direct X509 structure accesskn2-12/+12
Cherry-picked from OpenSSL commit a8d8e06b0ac06c421fd11cc1772126dcb98f79ae. This reduces upcoming TS changes. OK jsing tb
2022-07-16Zap duplicate ERR_load_TS_strings() prototypekn1-3/+1
It's defined again (more appropiately) further down above the error codes. OK jsing tb
2022-07-16Revert previous. The added includes were already there. Duh.tb1-4/+1
2022-07-15Expand the comment explaining the for loop with bn_lucas_step() a bit.tb1-3/+3
2022-07-15Comment for factorization of n - 1 = k * 2^s in bn_miller_rabin_base_2()tb1-1/+2
2022-07-15Rename is_perfect_square to out_perfect in prototype to matchtb1-2/+2
the code in bn_isqrt.c.
2022-07-14Zap trailing whitespacetb1-4/+4
2022-07-14Suppress output of the deprecated -tls1 option in usage() and helptb1-3/+2
output. The option wasn't documented in the manpage. pointed out by jsing
2022-07-14Switch to using TLS_client_method()tb1-2/+2
Apparently, TLSv1_client_method() is used for historical reasons. This behavior is no longer helpful if we want to know what ciphers a TLS connection could use. This could change again after further investigation of what the behavior should be... ok beck jsing
2022-07-14Only run the client connection test with supported ciphers. Avoids testtb1-2/+2
breakage also noted by anton.
2022-07-14Document openssl ciphers -stb1-3/+5
ok beck jsing
2022-07-14Add -s option to openssl cipherstb1-4/+20
With this option, the command only shows the ciphers supported by the SSL method. ok beck jsing
2022-07-13add .Xr links to SSL_CTX_set_security_level(3)schwarze5-15/+20
2022-07-13add a few .Xr links to new manual pagesschwarze11-24/+36
2022-07-13In dsa.h rev. 1.34 (14 Jan 2022), tb@ provided DSA_bits(3).schwarze1-10/+51
Document it from scratch. While here, merge a few details from the OpenSSL 1.1.1 branch, which is still under a free license, into the documentation of DSA_size(3).
2022-07-13In x509_vfy.h rev. 1.54, tb@ provided X509_VERIFY_PARAM_get_time(3)schwarze1-3/+44
and X509_VERIFY_PARAM_set_auth_level(3). Document them. For the latter, i included a few sentences from the OpenSSL 1.1.1 branch, which is still under a free license.
2022-07-13link three new manual pages to the buildschwarze1-1/+4
2022-07-13Start documenting our new pet octopus, SSL_CTX_set_security_level(3).schwarze2-1/+161
Or should we call it a centipede? Feedback and OK on a previous version from jsing@ and from our chief myriapodologist, tb@.
2022-07-13Cast int64_t to uint64_t before negating.jsing1-3/+7
Avoid undefined behaviour/integer overflow by casting an int64_t to uint64_t before negating. Fixes oss-fuzz #49043 ok tb@
2022-07-13Write documentation for EVP_PKEY_check(3), EVP_PKEY_public_check(3),schwarze5-44/+504
EVP_PKEY_param_check(3), and EVP_PKEY_security_bits(3) from scratch. Move the documentation of EVP_PKEY_size(3) and EVP_PKEY_bits(3) to the new manual page EVP_PKEY_size(3). Merge the documentation of the related function pointers from the OpenSSL 1.1.1 branch, which is still under a free license. OK tb@ on the new page EVP_PKEY_size(3).
2022-07-13Simplify computation of max_pub_key = dh->p - 1.tb1-4/+2
ok jsing