summaryrefslogtreecommitdiff
path: root/src/lib/libc/stdlib/seed48.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2024-11-15Use a better curve and a better hash for the ECDSA_do_sign() exampletb1-9/+9
(Many examples in this directory are really bad. This is no exception.)
2024-11-15ec_mult: fix includestb1-2/+5
2024-11-15EC_KEY_copy() don't leave stale private keys in placetb1-6/+3
As most other objects, EC_KEYs can be as sparsely and invalidly populated as imagination permits and the competent designers of EC_KEY_copy() chose to just copy over what's available (yeah, what kind of copy is that?) and leave in place what happens to be there. In particular, if the dest EC key was used with a different group and has a private key, but the source key doesn't, the dest private key remains intact, as invalid, incompatible and unusable as it may be. Fix this by clearing said private key. ok jsing
2024-11-14x509_policy.c: point at RFC 9618tb1-3/+3
2024-11-14eck_prn: some more air to breathetb1-1/+3
2024-11-14eck_prn: fix includestb1-2/+4
2024-11-14ec_prn: use pkey rather than pk for an EC_KEYtb1-11/+11
2024-11-14eck_prn: use group rather than x for an EC_GROUPtb1-3/+3
2024-11-14eck_prn: use ec_key rather than x for an EC_KEYtb1-9/+9
2024-11-14eck_prn: consistently use bio for a BIO rather than b and bp randomlytb1-43/+43
2024-11-14eck_prn: sprinkle some empty lines and drop some parens for consistencytb1-7/+23
2024-11-14eck_prn: shuffle printing functions into a better ordertb1-47/+47
2024-11-13AES_{decrypt,encrypt}() don't return void internal functiontb1-3/+3
"A return statement with an expression shall not appear in a function whose return type is void." ok deraadt miod
2024-11-12The subject of a certificate is not optionaltb1-2/+2
A certificate must have a subject, so X509_get_subject_name() cannot return NULL on a correctly parsed certificate, even if the subject is empty (which is allowed). So if X509_get_subject_name() returns NULL, error instead of silently ignoring it in tls_check_common_name(). This is currently no issue. Where it matters, the match against the common name will fail later, so we fail closed anyway. ok jsing
2024-11-12Link the new manual page EVP_PKEY_new_CMAC_key(3) to the buildschwarze2-29/+5
and purge the superseded information from the algorithm-independent page EVP_PKEY_new(3).