summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/crypto (follow)
Commit message (Expand)AuthorAgeFilesLines
* i'm a dumbdumb. fix build.tedu2014-07-1114-15/+15
* move all the feature settings to a common header.tedu2014-07-1115-938/+17
* Make sure we leave OPENSSL_NO_PSK in the conf files so thingsbeck2014-07-1113-0/+13
* remove unused variables getentropy for OS Xbcook2014-07-091-3/+3
* RSA_NULL used to be a compile option allowing the RSA interfaces to bemiod2014-07-091-2/+2
* Remove undocumented _des_crypt() interface and its companion header file,miod2014-07-081-2/+2
* getentropy for osx and solaris. will be needed for a portable releasebeck2014-07-082-0/+838
* fix oops, accidental delete.. darn copying of files between machinesbeck2014-07-081-2/+2
* j should be an int, like repeatbeck2014-07-081-3/+4
* unbreak last commit - but same intent, make re-seed less expensivebeck2014-07-081-12/+16
* repeat calls to getentrypy() with the same pid likely indicate reseeds.deraadt2014-07-081-3/+10
* fix HD() misuse; from brent cookderaadt2014-06-261-2/+2
* AT_BASE returns us the *address* of the start of ld.so, sobeck2014-06-251-2/+2
* get the page of data at AT_SYSINFO_EHDRbeck2014-06-251-2/+2
* comment fixes from theobeck2014-06-251-5/+6
* Possibly obtain a little bit of entropy from addresses returnedbeck2014-06-251-2/+23
* O_NOFOLLOW would be very nice to have here if the version of linuxbeck2014-06-251-10/+11
* Remove BIO_f_reliable(), guilty of playing with EVP_MD_CTX internals itmiod2014-06-241-2/+2
* Crank libcrypto major since my previous commit changed the size of thejsing2014-06-241-1/+1
* unbreak build of getentropy_sysctl - we need linux/sysctl.h, andbeck2014-06-231-18/+21
* unbreak - main needs to be extern in here somewhere.beck2014-06-231-1/+2
* repair indentation for an inner loop; shorten some macros and variablederaadt2014-06-211-129/+135
* hash in correct pointerderaadt2014-06-211-2/+2
* KNFbeck2014-06-201-48/+56
* indentderaadt2014-06-201-2/+2
* rearrange so that the main function with the important comments is at the topotto2014-06-201-78/+80
* Work in progress on how to deal with the inherit unreliability ofbeck2014-06-201-0/+439
* Provide support for non-funopen systems.deraadt2014-06-111-2/+2
* Abandon the auto-ENGINE /dev/crypto interface. VIA 3des cbc receivesderaadt2014-06-101-2/+2
* A few months back there was a big community fuss regarding direct-usederaadt2014-06-021-2/+2
* Fix ia64 cross-gcc target.tobiasu2014-05-271-0/+3
* "for every change..."tedu2014-05-251-1/+1
* define LIBRESSL_INTERNAL, and use it to hide the bad stuff from ourselvestedu2014-05-251-1/+2
* When OPENSSL_LOAD_CONF was added it ended up with more #if 0 code,jsing2014-05-161-2/+2
* Add a ChaCha20-Poly1305 AEAD EVP implementation to libcrypto, from Adamjsing2014-05-151-2/+2
* Add an AEAD EVP interface to libcrypto, along with AES-GCM AEADjsing2014-05-151-2/+2
* Add poly1305 to libcrypto utilising Andrew Moon's public domainjsing2014-05-141-1/+6
* Move the `pqueue' part of libcrypto, which is a glorified sorted linked listmiod2014-05-122-8/+3
* miod forgot about fcrypt_b.c being needed, before he went off to get hisderaadt2014-05-071-1/+2
* Sort CFLAGS, SRC and SSLASM stanzas by the directories they apply to, to makemiod2014-05-062-68/+83
* Enable assembler code for DES. Assembler code for BN is commented out as itmiod2014-05-051-0/+27
* Enable the assembler code for BN, which was lost quite some time ago.miod2014-05-041-0/+19
* Remove the !SSLASM conditional. Either there is an arch-specific Makefile.inc,miod2014-05-041-4/+2
* Enable assembler code for AES, DES, GCM, SHA1, SHA256 and SHA512.miod2014-05-031-0/+46
* Enable assembler code for AES, BN (Montgomery), GCM128, SHA1, SHA256 and SHA512.miod2014-05-031-0/+45
* Correctly enable Montgomery code.miod2014-05-031-1/+2
* Enable assembler bits for BN (Montgomery), SHA1 and SHA256.miod2014-05-031-0/+44
* Correctly enable assembler Montgomery routine.miod2014-05-021-1/+2
* Correctly enable assembler Montgomery routine.miod2014-05-021-1/+2
* Reenable assembler code for SHA384 and SHA512 now that it no longer miscomputesmiod2014-05-021-3/+3