summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
* BN_get_word(): return (BN_ULONG)-1 on error rather than BN_MASK2tb10 days3-7/+7
* x509.h: add missing spaces after ,tb13 days1-63/+63
* Remove last internal use of ASN1_STRING_data()tb2025-12-071-13/+19
* libcrypto: remove BN_{DEC,HEX}_FMT1tb2025-12-051-5/+1
* Replace trivial uses of ASN1_STRING_data()tb2025-12-055-13/+13
* libcrypto: make most of the BN_* macro pollution internaltb2025-12-055-31/+29
* Clean up confusing logic in CMS_EncryptedData_encrypt()tb2025-11-281-15/+20
* Fix double free in certificate policies configurationtb2025-11-281-12/+7
* libcrypto: add header guards to *_local.htb2025-11-269-9/+54
* Correct the MLKEM hybrid objects values.beck2025-11-192-8/+5
* sync cert.pem with updated Mozilla list; ok tb@sthen2025-11-171-1/+237
* bn_prime.c: fix includestb2025-11-081-3/+4
* move the sentence about X509_VERIFY_PARAM_get_hostflags(3)schwarze2025-11-071-6/+7
* Use 64 bit BN_ULONG on 64 bit Windows platforms.jsing2025-11-071-2/+2
* Use BN_ULONG in probable_prime_dh()tb2025-11-061-2/+2
* Use more specific types for BN.jsing2025-11-051-27/+29
* In nref_nos() don't leak the ASN1_INTEGER if the push failstb2025-11-031-2/+4
* x509_cpols: pass correct free function to sk_ASN1_INTEGER_free()tb2025-11-031-2/+2
* x509_cpols: indent labels to make diffs more readabletb2025-11-031-8/+8
* Plug memeory leak in CMS_EncryptedData_encrypt()tb2025-11-031-2/+4
* ec_curve: Remove outdated creditstb2025-11-021-4/+1
* des_key: add missing hyphen in semi-weak keystb2025-10-271-2/+2
* bump lib{crypto,ssl,tls} minors after symbol additiontb2025-10-241-1/+1
* Document X509_VERIFY_PARAM_set_hostflags(3)tb2025-10-241-2/+15
* Expose X509_VERIFY_PARAM_get_hostflags()tb2025-10-244-4/+7
* const correct X509_VERIFY_PARAM_get_hostflags()tb2025-10-101-2/+2
* Remove unused sequence member from x509_revoked_sttb2025-10-102-11/+2
* cms: fix incorrect length check in kek_unwrap_key()tb2025-09-301-2/+2
* cms_RecipientInfo_pwri_crypt: fix incorrect return checktb2025-09-301-3/+3
* cms_RecipientInfo_pwri_crypt: plug leak of kekalgtb2025-09-301-3/+3
* libcrypto: rsa gen: min. distance between p and qjan2025-09-291-3/+19
* Bump libressl version to 4.2.0tb2025-09-281-3/+3
* Revert NULL,0 -> OPENSSL_FILE,OPENSSL_LINE from r1.78tb2025-09-281-9/+9
* mlkem_generate_key_external_entropy: normalize sizeof() usetb2025-09-161-2/+2
* Simplify MLKEM_{private,public}_key_new()tb2025-09-161-19/+7
* aes: move explicit_bzero() after NULL checktb2025-09-151-5/+7
* MLKEM_private_key_new: add missing space before =tb2025-09-151-2/+2
* mlkem_public_to_private: fix overread/information leaktb2025-09-141-3/+3
* Call aes_set_encrypt_key_generic() from aes_set_decrypt_key_generic().jsing2025-09-081-2/+2
* Allow generic AES implementation to be used as a fallback.jsing2025-09-083-19/+65
* Zero the round keys on AES_set_{en,de}crypt_key() function entry.jsing2025-09-081-1/+5
* Validate AES_set_{encrypt,decrypt}_key() inputs at API boundary.jsing2025-09-082-18/+28
* Remove BN_DIV2W.jsing2025-09-073-28/+4
* Re-enable bn_sqr_words() assembly.jsing2025-09-073-8/+8
* Rename old assembly bn_sqr_words() to bn_sqr_word_wise().jsing2025-09-076-30/+27
* Deduplicate the mlkem 768 and mlkem 1024 code.beck2025-09-056-1788/+527
* Disable assembly bn_sqr_words() again for now.jsing2025-09-023-8/+8
* Add const here as well...jsing2025-09-011-2/+2
* Use bn_mul_words() from bn_mod_mul_words().jsing2025-09-011-5/+3
* Constify bn_mul_words().jsing2025-09-013-6/+9