summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Expand)AuthorAgeFilesLines
* Shuffle getters and adders down a bittb2023-11-151-34/+30
* Make X509_certificate_type() less badtb2023-11-131-24/+29
* Garbage collect an incoherent export crypto checktb2023-11-131-4/+1
* Use a sensible variable name (i.e. nid) instead of i for a NIDtb2023-11-131-5/+6
* Use X509_get_signature_nid() instead of inlining ittb2023-11-131-2/+2
* X509_certificate_type() needs to know about RSA-PSStb2023-11-131-1/+4
* Prepare to expose OPENSSL_gmtime and OPENSSL_timegm as publicbeck2023-11-134-5/+68
* Kill last user of ASN1_time_parse() in the treetb2023-11-131-23/+3
* Check notBefore/notAfter validity with ASN1_TIME_to_tm(3)tb2023-11-131-5/+3
* Replace ASN1_time_parse() with ASN1_TIME_to_tm()tb2023-11-131-3/+4
* Remove last caller of ASN1_time_parse(3) in libtlstb2023-11-131-3/+4
* Remove ASN1_time_parse() dependency in tls_conninfo.ctb2023-11-131-3/+3
* Eliminate the timegm(3) dependency in libcryptotb2023-11-134-19/+36
* split the Symbols.list up so that arch specific symbols do not end up everywhererobert2023-11-124-2/+7
* Fix a few bugs in X509v3_asid_add*()tb2023-11-111-38/+96
* Forgot to fix the RFC number in the new commenttb2023-11-091-2/+2
* Convert PKCS7_SIGNER_INFO_set() to X509_ALGOR_set0_by_nid()tb2023-11-091-5/+11
* Convert ecx_item_sign() to X509_ALGOR_set0_by_nid()tb2023-11-091-8/+5
* Convert asn1_item_sign() to X509_ALGOR_set0_by_nid()tb2023-11-091-8/+4
* Fix X509_ALGOR_set0() usage in rsa_alg_set_oaep_padding()tb2023-11-091-4/+6
* Use X509_ALGOR_set0_by_nid() in rsa_mgf1md_to_maskGenAlgorithm()tb2023-11-091-5/+2
* More minor cleanup in rsa_alg_set_oaep_padding()tb2023-11-081-4/+3
* Prepare further fixes of X509_ALGOR_set0() misusetb2023-11-081-8/+7
* zap a stray spacetb2023-11-081-2/+2
* Rename os into astr in rsa_alg_set_oaep_padding()tb2023-11-081-6/+6
* Rename pkctx to pkey_ctx in rsa_alg_set_oaep_padding() and rsa_cms_encrypt()tb2023-11-081-9/+9
* Some simple cosmetics in rsa_alg_set_oaep_padding()tb2023-11-081-4/+8
* Split OAEP padding handling into a helper functiontb2023-11-081-53/+59
* Move CMS_RecipientInfo_ktri_get0_algs() down a few lines and fix itstb2023-11-071-3/+6
* Move CMS_RecipientInfo_get0_pkey_ctx() to first use of pkctxtb2023-11-071-3/+3
* Fix an error message left out in the mustDecodeHexString() conversiontb2023-11-071-2/+2
* Pull up the handling of the two webcrypto special snowflakestb2023-11-071-13/+9
* Drop a useless line and bump copyright yearstb2023-11-071-4/+3
* Unwrap a few linestb2023-11-071-72/+32
* Wrap hex.DecodeString() into mustDecodeHexString()tb2023-11-071-390/+78
* Use maps to retrieve various AES variantstb2023-11-071-60/+72
* Convert hashEvpMdFromString() to a maptb2023-11-071-26/+19
* Add stringer interfaces to the test groupstb2023-11-071-102/+126
* Inline rsa_ctx_to_pss_string()tb2023-11-071-16/+6
* Rename pkctx to pkey_ctx in rsa_{cms,item}_sign()tb2023-11-071-26/+26
* Trivial cleanup in rsa_cms_sign()tb2023-11-071-5/+5
* Rework RSA_PKCS1_PSS_PADDING handling in rsa_item_sign()tb2023-11-071-14/+4
* Add a helper to set RSASSA-PSS padding parameterstb2023-11-071-10/+29
* Add a helper to set RSA PKCS #1 v1.5 padding OIDtb2023-11-071-12/+15
* Pull everything except the actual run call out of the closuretb2023-11-061-11/+9
* Introduce testGroupFromAlgorithm()tb2023-11-061-50/+54
* Add a wycheproofTestGroupRunner interfacetb2023-11-061-72/+26
* Add aliases for AES AEAD constructions and ChaChatb2023-11-061-9/+12
* Fix a for loop bug introduced in the concurrency refactortb2023-11-061-3/+4
* Uncomment json webcrypto line. Packages will have caught up...tb2023-11-061-3/+2