summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Expand)AuthorFilesLines
2023-05-14add missing #include <string.h>; ok tb@op8-8/+18
2023-05-13Assert that test->want != NULL at this pointtb1-1/+3
2023-05-12Bob points out that one error should be an X509V3error()tb1-2/+2
2023-05-12x509_utl.c: fix some style nits.tb1-4/+3
2023-05-12Rewrite string_to_hex() and hex_to_string() using CBB/CBStb1-70/+124
2023-05-12asn1oct: add a couple more teststb1-1/+10
2023-05-12Reduce the number of SHA-512 C implementations from three to one.jsing1-134/+1
2023-05-12asn1oct: minor tweak in error messagetb1-3/+3
2023-05-12Add regress coverage for {s2i,i2s}_ASN1_OCTET_STRINGtb2-1/+271
2023-05-12primility -> primalityjsg1-3/+3
2023-05-12Be a bit more precise on how s2i_ASN1_OCTET_STRING handles colonstb1-5/+6
2023-05-11tls_verify.c: give up on variable alignment in this filetb1-6/+6
2023-05-11Document recent changes in primality testingtb1-8/+23
2023-05-10Use is_pseudoprime instead of is_prime in bn_bpsw.ctb1-30/+33
2023-05-10switch two ASN1_STRING_data() to ASN1_STRING_get0_data()op1-5/+5
2023-05-10Add Miller-Rabin test for random bases to BPSWtb3-33/+130
2023-05-10As mmap(2) is no longer a LOCK syscall, do away with the extraotto1-23/+1
2023-05-09Make malloc tests that set flags more robust against the user alsootto2-15/+19
2023-05-09Make failure mode of EVP_AEAD_CTX_new() more explicittb1-4/+9
2023-05-09Add regress coverage for -1 modulus as well.tb1-25/+38
2023-05-09bn_exp: also special case -1 modulustb1-6/+6
2023-05-09Rewrite BN_bn2hex() using CBB/CBS.jsing1-25/+35
2023-05-09Rewrite BN_bn2dec() using CBB/CBS.jsing1-63/+61
2023-05-08Rename the other_ctx in X509_STORE_CTX into trustedtb2-12/+12
2023-05-08Add RCS tagtb1-0/+1
2023-05-08Enable malloc_errs testotto1-2/+2
2023-05-08Add a regress test to test various malloc API and heap mismanagementotto2-0/+291
2023-05-08X509_verify_cert(): Garbage collect the unused roots variabletb1-4/+1
2023-05-08Avoid trailing whitespace in extension printingtb1-2/+2
2023-05-07Recommit -Wshadow now that the warning on BIG_ENDIAN is fixedtb1-2/+2
2023-05-07xts128 mode: avoid two -Wshadow warnings in the BIG_ENDIAN code path.tb1-5/+5
2023-05-07Backout -Wshadow, it breaks build on powerpc64.bluhm1-2/+2
2023-05-07Remove a misplaced empty linetb1-2/+1
2023-05-06Regen cert.pemtb1-419/+402
2023-05-05Use -Wshadow with clangtb3-6/+6
2023-05-05Reinstate X9.31 padding mode support in rsautltb2-7/+18
2023-05-05Fix error handling in tls_check_common_name()tb1-6/+10
2023-05-05Salt shares the blame of the continued existence of the X9.31 padding modetb1-2/+2
2023-05-05Reinstate documentation of RSA_X931_PADDINGtb1-7/+6
2023-05-05Add back support for RSA_X931_PADDINGtb3-65/+127
2023-05-05Link rsa_x931.c to buildtb1-1/+2