summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/Symbols.list (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Provide RSA_PKCS1_OpenSSL().jsing2019-11-021-0/+1
| | | | Prompted by inoguchi@
* Make RSA_padding_{add,check}_PKCS1_OAEP_mgf1() public.jsing2019-11-021-0/+2
|
* Make RSA_OAEP_PARAMs public.jsing2019-11-021-0/+5
|
* Enable CMS in LibreSSL.jsing2019-11-021-0/+128
| | | | ok bcook@ deraadt@ inoguchi@ job@ tb@
* Provide RSA_pkey_ctx_ctrl().jsing2019-10-241-0/+1
| | | | | | | | | This is a wrapper around EVP_PKEY_CTX_ctrl() which requires the key to be either RSA or RSA-PSS. From OpenSSL 1.1.1d. ok tb@
* provide getters and setters for the RSA_METHOD interfacegilles2019-06-051-0/+23
| | | | ok tb@, jsing@, sthen@
* Provide EVP_PKEY_get0_hmac(). From OpenSSL 1.1.1 which is stilltb2019-03-171-0/+1
| | | | | | freely licensed. From jsing
* Provide EVP_aes_{128,192,256}_wrap(). This is a compatibletb2019-03-171-0/+3
| | | | | | | | | | | | | implementation based on the one in OpenSSL 1.0.2r which is still freely licensed. The functions are undocumented in OpenSSL. To use them, one needs to set the undocumented EVP_CIPHER_CTX_FLAG_WRAP_ALLOW flag on the EVP_CIPHER_CTX. resolves #505 ok jsing
* Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.tb2019-03-171-0/+8
| | | | | | | | This is an ISC licensed version based on the sources by Ribose Inc that were ported to OpenSSL in 2017. Patch from Daniel Wyatt with minor tweaks. ok inoguchi, jsing
* Add missing symbols from the EC_KEY_METHOD port.tb2019-01-221-0/+8
| | | | Reported by bcook and sthen
* add support for xchacha20 and xchacha20-poly1305dlg2019-01-221-0/+3
| | | | | | | xchacha is a chacha stream that allows for an extended nonce, which in turn makes it feasible to use random nonces. ok tb@
* provide EVP_ENCODE_CTX_{new,free}().tb2019-01-191-0/+2
| | | | ok jsing
* Partial port of EC_KEY_METHOD from OpenSSL 1.1.tb2019-01-191-0/+6
| | | | | | This commit adds missing API for ECDH/ECDSA_verify. from markus
* Partial port of EC_KEY_METHOD from OpenSSL 1.1.tb2019-01-191-0/+13
| | | | | | | This commit adds init/free, support for signing, setting and getting the method, engine support as well as extra data. from markus
* Add Ribose Inc's implementation of the SM3 hashing function withtb2018-11-111-0/+4
| | | | | | | | | tweaks from jsing and myself. The SM2/SM3/SM4 algorithms are mandatory for legal use of cryptography within China and [are] widely applied in the country, covering identification/financial cards, contactless, TPM 2.0 and PKI. ok beck inoguchi jsing
* move X509_get0_serialNumber where it belongstb2018-11-021-1/+1
|
* Remove a GOST data symbol that should not be exported.jsing2018-10-241-1/+0
|
* Remove a bunch of ancient and highly crufty ASN.1 related code fromjsing2018-10-241-13/+0
| | | | | | libcrypto (the "new" stuff replaced this back around 2000 or so...). ok tb@
* Add some accessor functions:djm2018-09-121-0/+4
| | | | | | RSA_meth_get_finish() RSA_meth_set1_name() EVP_CIPHER_CTX_(get|set)_iv() feedback and ok jsing@ tb@
* Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken()tb2018-08-241-2/+2
| | | | | | | | | | | Provide PKCS8_pkey_add1_attr_by_NID() and PKCS8_pkey_get0_attrs(). Remove the whole broken code and simplify pkcs8_priv_key_info_st accordingly. Based on OpenSSL commit 54dbf42398e23349b59f258a3dd60387bbc5ba13 plus some const that was added later. tested in a bulk build by sthen ok jsing
* Provide X509_get0_serialNumber()tb2018-08-241-0/+1
| | | | | tested in a bulk by sthen ok jsing
* Turn a number of #defines into proper functions with prototypes matchingtb2018-08-241-0/+9
| | | | | | those that OpenSSL has had for ages. ok jsing
* Provide EVP_CIPHER_CTX_encrypting().tb2018-08-241-0/+1
| | | | | tested in a bulk by sthen ok jsing
* Bring in compatibility for OpenSSL 1.1 style init functions.beck2018-03-171-0/+1
| | | | | | | | | This adds OPENSSL_init_crypto and OPENSSL_init_ssl, as well thread safety modifications for the existing LibreSSL init functions. The initialization routines are called automatically by the normal entry points into the library, as in newer OpenSSL ok jsing@, nits by tb@ and deraadt@
* Provide X509_STORE_get0_param()tb2018-03-171-0/+1
| | | | ok jsing
* Provide X509_OBJECT_get_type(). Instead of the X509_LOOKUP_TYPE enumtb2018-03-171-0/+1
| | | | | | (which we don't have) it returns a plain int. ok jsing
* Provide X509_NAME_ENTRY_set()tb2018-03-171-0/+1
| | | | ok jsing
* Provide ECDSA_SIG_{g,s}et0().tb2018-03-171-0/+2
| | | | ok jsing
* Add DSA_meth_{dup,free,new,set_{finish,sign}}()tb2018-03-171-0/+5
| | | | | | | As in RSA_meth_*, note that these functions return NULL in out-of-memory situations, but they do not set an error explicitly. ok jsing
* Provide RSA_meth_{dup,free,new,set_{finish,priv_{dec,enc}}}()tb2018-03-171-0/+6
| | | | | | | Note that these functions return NULL in out-of-memory situations, but contrary to OpenSSL's versions they do not set an error. ok jsing
* Make BIO_meth_get_write() public. Omission spotted by schwarze.tb2018-03-171-0/+1
| | | | ok jsing
* Provide X509_PUBKEY_get0() by splitting X509_PUBKEY_get() and turning itjsing2018-03-171-0/+1
| | | | into a wrapper that calls X509_PUBKEY_get0() and up refs.
* Provide OCSP_SINGLERESP_get0_id().jsing2018-03-171-0/+1
|
* Provide X509_REVOKED_dup().jsing2018-03-171-0/+1
|
* Provide X509_chain_up_ref().jsing2018-02-221-0/+1
| | | | From BoringSSL.
* Provide X509_STORE_get0_objects(), X509_STORE_get_ex_data() andjsing2018-02-221-0/+3
| | | | X509_STORE_set_ex_data().
* Provide X509_OBJECT_get0_X509() and X509_OBJECT_get0_X509_CRL().jsing2018-02-221-0/+2
|
* Provide X509_STORE_up_ref().jsing2018-02-221-0/+1
|
* Provide X509_STORE_CTX_get0_chain() and X509_STORE_CTX_get0_store().jsing2018-02-221-0/+2
|
* Provide X509_get0_tbs_sigalg().jsing2018-02-221-0/+1
|
* Provide X509_set1_notBefore() and X509_set1_notAfter().jsing2018-02-221-0/+2
|
* Provide X509_get0_pubkey().jsing2018-02-221-0/+1
|
* Provide X509_CRL_set1_lastUpdate() and X509_CRL_set1_nextUpdate().jsing2018-02-221-0/+2
|
* Provide X509_CRL_get0_extensions() and X509_CRL_get_signature_nid().jsing2018-02-221-0/+2
|
* Provide X509_CRL_up_ref().jsing2018-02-221-0/+1
|
* Provide X509_REQ_get_signature_nid().jsing2018-02-221-0/+1
|
* Provide X509_REVOKED_get0_extensions(), X509_REVOKED_get0_revocationDate()jsing2018-02-221-0/+3
| | | | and X509_REVOKED_get0_serialNumber().
* Provide DH_get0_engine().jsing2018-02-221-0/+1
|
* Provide BIO_up_ref().jsing2018-02-221-0/+1
|
* RSA_get_flags should be RSA_test_flags.tb2018-02-201-1/+1
| | | | Noted by sthen. Rides previous minor bump.