| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
| |
This test depends on RAND_set_rand_method() allowing stupid things like
making ECDSA signatures deterministic. This was gutted a long time ago
and the function should have followed its wrappers into the attic.
|
|
|
|
| |
for output, use 'err' as a label and avoid some silly repetitions.
|
| |
|
|
|
|
|
|
| |
The ASN.1 encoding of the modified ECDSA signature can grow in size due to
padding of the ASN.1 integers. Instead of reusing the same signature buffer
freshly allocate it. Avoids some buffer overflows caught by ASAN.
|
| |
|
|
|
|
|
|
| |
The ASN.1 encoding of the modified ECDSA signature can grow in size due to
padding of the ASN.1 integers. Instead of reusing the same signature buffer
freshly allocate it. Avoids some buffer overflows caught by ASAN.
|
|
|
|
| |
CID 351293
|
| |
|
| |
|
| |
|
|
|
|
| |
right spot helps this a bit. Other whitespace and typo fixes while there.
|
|
|
|
| |
with unchecked return values).
|
|
|
|
| |
ok miod@ jsing@ guenther@
|
|
|
|
|
| |
force what RAND_bytes() will return and comparing it against known values -
I can't let you do this, Dave.
|
|
infrastructure.
The following tests have not been imported, for their code lacks a licence:
asn1, rsa, sha256, sha512, wp.
|