summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Tweak some comments and whitespace around commentstb2022-07-291-9/+32
* Do not pass input length <= 0 to the cipher handlerstb2022-07-261-11/+17
* fix indenttb2022-07-251-2/+2
* Plug leak in X509V3_add1_i2d()tb2022-07-241-2/+3
* Prepare to resurrect TS_RESP_CTX_set_time_cb()tb2022-07-242-2/+14
* Prepare to provide TS_VERIFY_CTX accessorstb2022-07-242-2/+79
* Prepare to provide various TS_STATUS_INFO accessorstb2022-07-242-2/+34
* Align PKCS12_key_gen_uni() with OpenSSLtb2022-07-241-58/+50
* Minor fixes in PKCS12_parse()tb2022-07-241-24/+23
* Per RFC 7292, safeContentsBag is a SEQUENCE OF, not a SET OFtb2022-07-241-2/+2
* Clear key on exit in PKCS12_gen_mac()tb2022-07-241-25/+38
* Plug a leak in PKCS12_setup_mac()tb2022-07-241-2/+3
* Start making ts opaquetb2022-07-2410-50/+134
* Fix file names in comments.tb2022-07-231-7/+7
* Avoid unnecessary loops in BN_generate_prime_ex()tb2022-07-191-4/+6
* Handle X509_check_purpose(3) and EVP_get_digestbyobj(3)kn2022-07-171-2/+5
* Add initial support for ESSCertIDv2 verificationkn2022-07-171-19/+99
* Add ESSCertIDv2 stack macroskn2022-07-161-1/+25
* Add ESSCertIDv2 ASN.1 boilerplatekn2022-07-162-2/+170
* Add NID for signingCertificateV2kn2022-07-162-0/+2
* Avoid direct X509 structure accesskn2022-07-162-12/+12
* Zap duplicate ERR_load_TS_strings() prototypekn2022-07-161-3/+1
* Expand the comment explaining the for loop with bn_lucas_step() a bit.tb2022-07-151-3/+3
* Comment for factorization of n - 1 = k * 2^s in bn_miller_rabin_base_2()tb2022-07-151-1/+2
* Rename is_perfect_square to out_perfect in prototype to matchtb2022-07-151-2/+2
* Zap trailing whitespacetb2022-07-141-4/+4
* add a few .Xr links to new manual pagesschwarze2022-07-1311-24/+36
* In dsa.h rev. 1.34 (14 Jan 2022), tb@ provided DSA_bits(3).schwarze2022-07-131-10/+51
* In x509_vfy.h rev. 1.54, tb@ provided X509_VERIFY_PARAM_get_time(3)schwarze2022-07-131-3/+44
* link three new manual pages to the buildschwarze2022-07-131-1/+4
* Cast int64_t to uint64_t before negating.jsing2022-07-131-3/+7
* Write documentation for EVP_PKEY_check(3), EVP_PKEY_public_check(3),schwarze2022-07-135-44/+504
* Simplify computation of max_pub_key = dh->p - 1.tb2022-07-131-4/+2
* New manual page written from scratch;schwarze2022-07-131-0/+137
* On May 4 14:19:08 2006 UTC, while fixing a security issue, djm@schwarze2022-07-131-11/+64
* Do not make tables static so we can access them from regress.tb2022-07-131-5/+5
* Enable BPSW primality test.tb2022-07-131-1/+3
* Hook BPSW into BN_is_prime_fasttest_ex()tb2022-07-131-3/+13
* Link bn_bpsw.c to buildtb2022-07-131-2/+2
* Implement the Baillie-PSW primality testtb2022-07-132-1/+423
* Link bn_isqrt.c to buildtb2022-07-131-1/+2
* Integer square root and perfect square testtb2022-07-132-1/+241
* Unbreak the tree, after the previous commit.jsing2022-07-121-2/+1
* Move BN_lsw() to bn_lcl.h so that other code can use it.tb2022-07-122-5/+5
* Remove mkerr.pl remnants from LibreSSLkn2022-07-1261-1249/+59
* Sync cert.pem with certdata.txt from the NSS release branch. OK tb@ bcook@sthen2022-07-111-382/+849
* fix NULL return adding missing semicolonbcook2022-07-111-2/+2
* In dsa.h rev. 1.38, tb@ provided DSA_meth_get0_name(3)schwarze2022-07-101-8/+55
* Make ASN1_{INTEGER,ENUMERATED}_get() return 0 on NULL againtb2022-07-092-2/+6
* Document ASN1_INTEGER_get_uint64(3), ASN1_INTEGER_get_int64(3),schwarze2022-07-091-6/+90