CVSROOT:/cvs
Module name:www
Changes by: schwa...@cvs.openbsd.org2023/11/07 17:49:54
Modified files:
faq: faq4.html
Log message:
Fix the broken hyperlink to firmware.openbsd.org.
Patch from ,
minimally tweaked by me to avoid a long line and
to better
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 15:35:03
Modified files:
lib/libcrypto/rsa: rsa_ameth.c
Log message:
Move CMS_RecipientInfo_ktri_get0_algs() down a few lines and fix its
error check
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 15:32:09
Modified files:
lib/libcrypto/rsa: rsa_ameth.c
Log message:
Move CMS_RecipientInfo_get0_pkey_ctx() to first use of pkctx
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 14:22:34
Modified files:
regress/lib/libcrypto/wycheproof: wycheproof.go
Log message:
Fix an error message left out in the mustDecodeHexString() conversion
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 14:20:48
Modified files:
regress/lib/libcrypto/wycheproof: wycheproof.go
Log message:
Pull up the handling of the two webcrypto special snowflakes
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 09:56:12
Modified files:
regress/lib/libcrypto/wycheproof: wycheproof.go
Log message:
Drop a useless line and bump copyright years
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 09:54:43
Modified files:
regress/lib/libcrypto/wycheproof: wycheproof.go
Log message:
Unwrap a few lines
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 09:46:12
Modified files:
regress/lib/libcrypto/wycheproof: wycheproof.go
Log message:
Wrap hex.DecodeString() into mustDecodeHexString()
The hex decoding is only done from the JSON files
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 09:37:02
Modified files:
regress/lib/libcrypto/wycheproof: wycheproof.go
Log message:
Use maps to retrieve various AES variants
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 09:35:55
Modified files:
regress/lib/libcrypto/wycheproof: wycheproof.go
Log message:
Convert hashEvpMdFromString() to a map
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 09:27:56
Modified files:
regress/lib/libcrypto/wycheproof: wycheproof.go
Log message:
Add stringer interfaces to the test groups
This simplifies and unifies a lot of error messages.
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 09:22:04
Modified files:
lib/libcrypto/rsa: rsa_ameth.c
Log message:
Inline rsa_ctx_to_pss_string()
After previous refactoring, rsa_all_set_pss_padding() is the last remaining
caller of the
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 09:12:36
Modified files:
lib/libcrypto/rsa: rsa_ameth.c
Log message:
Rename pkctx to pkey_ctx in rsa_{cms,item}_sign()
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 09:09:13
Modified files:
lib/libcrypto/rsa: rsa_ameth.c
Log message:
Trivial cleanup in rsa_cms_sign()
Check and assign the EVP_PKEY_CTX and move the extraction of the algorithm
identifier from
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 09:04:12
Modified files:
lib/libcrypto/rsa: rsa_ameth.c
Log message:
Rework RSA_PKCS1_PSS_PADDING handling in rsa_item_sign()
The current convoluted mess can be handled with two calls to the new
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 08:59:29
Modified files:
lib/libcrypto/rsa: rsa_ameth.c
Log message:
Add a helper to set RSASSA-PSS padding parameters
This sets the AlgorithmIdentifier's algorithm to id-RSASSA-PSS with
CVSROOT:/cvs
Module name:src
Changes by: t...@cvs.openbsd.org2023/11/07 08:45:41
Modified files:
lib/libcrypto/rsa: rsa_ameth.c
Log message:
Add a helper to set RSA PKCS #1 v1.5 padding OID
This removes a few duplicated and unchecked X509_ALGOR_set0() calls and
CVSROOT:/cvs
Module name:src
Changes by: clau...@cvs.openbsd.org 2023/11/07 04:29:05
Modified files:
usr.sbin/ospfd : auth.c
Log message:
iface->auth_key is not a real C string so use strnlen() to define the maximum.
This fixes the use of 8 char passwords with auth
CVSROOT:/cvs
Module name:src
Changes by: clau...@cvs.openbsd.org 2023/11/07 04:18:35
Modified files:
usr.sbin/bgpd : bgpd.c control.c rde.c rtr.c session.c
Log message:
Rename struct imsgbuf *ibuf to *imsgbuf in all places.
ibuf should be reserved for struct ibuf *
CVSROOT:/cvs
Module name:src
Changes by: clau...@cvs.openbsd.org 2023/11/07 04:17:35
Modified files:
usr.sbin/bgpd : rde_peer.c
Log message:
Alter imsg_move() to clear the full imsg buffer instead of just the
imsg->data field. This is needed for future imsg API changes.
20 matches
Mail list logo