Commit message (Collapse) | Author | Files | Lines | ||
---|---|---|---|---|---|
2024-11-16 | Specify size for K256 symbol. | jsing | 1 | -1/+2 | |
Missing sizes spotted by guenther@ | |||||
2024-11-16 | Merge ec_kmeth into ec_key | tb | 3 | -331/+272 | |
2024-11-16 | Shuffle the global default_ec_key_meth down a few lines | tb | 1 | -3/+3 | |
2024-11-16 | Move the default EC_KEY_METHOD to the end of the file | tb | 1 | -50/+50 | |
2024-11-15 | Use a better curve and a better hash for the ECDSA_do_sign() example | tb | 1 | -9/+9 | |
(Many examples in this directory are really bad. This is no exception.) | |||||
2024-11-15 | ec_mult: fix includes | tb | 1 | -2/+5 | |
2024-11-15 | EC_KEY_copy() don't leave stale private keys in place | tb | 1 | -6/+3 | |
As most other objects, EC_KEYs can be as sparsely and invalidly populated as imagination permits and the competent designers of EC_KEY_copy() chose to just copy over what's available (yeah, what kind of copy is that?) and leave in place what happens to be there. In particular, if the dest EC key was used with a different group and has a private key, but the source key doesn't, the dest private key remains intact, as invalid, incompatible and unusable as it may be. Fix this by clearing said private key. ok jsing | |||||
2024-11-14 | x509_policy.c: point at RFC 9618 | tb | 1 | -3/+3 | |
2024-11-14 | eck_prn: some more air to breathe | tb | 1 | -1/+3 | |
2024-11-14 | eck_prn: fix includes | tb | 1 | -2/+4 | |
2024-11-14 | ec_prn: use pkey rather than pk for an EC_KEY | tb | 1 | -11/+11 | |
2024-11-14 | eck_prn: use group rather than x for an EC_GROUP | tb | 1 | -3/+3 | |
2024-11-14 | eck_prn: use ec_key rather than x for an EC_KEY | tb | 1 | -9/+9 | |
2024-11-14 | eck_prn: consistently use bio for a BIO rather than b and bp randomly | tb | 1 | -43/+43 | |
2024-11-14 | eck_prn: sprinkle some empty lines and drop some parens for consistency | tb | 1 | -7/+23 | |
2024-11-14 | eck_prn: shuffle printing functions into a better order | tb | 1 | -47/+47 | |
2024-11-13 | AES_{decrypt,encrypt}() don't return void internal function | tb | 1 | -3/+3 | |
"A return statement with an expression shall not appear in a function whose return type is void." ok deraadt miod | |||||
2024-11-12 | The subject of a certificate is not optional | tb | 1 | -2/+2 | |
A certificate must have a subject, so X509_get_subject_name() cannot return NULL on a correctly parsed certificate, even if the subject is empty (which is allowed). So if X509_get_subject_name() returns NULL, error instead of silently ignoring it in tls_check_common_name(). This is currently no issue. Where it matters, the match against the common name will fail later, so we fail closed anyway. ok jsing | |||||
2024-11-12 | Link the new manual page EVP_PKEY_new_CMAC_key(3) to the build | schwarze | 2 | -29/+5 | |
and purge the superseded information from the algorithm-independent page EVP_PKEY_new(3). |