summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/evp/evp.h (follow)
Commit message (Expand)AuthorAgeFilesLines
* Remove mkerr.pl remnants from LibreSSLkn2022-07-121-5/+1
* Expose new API in headers.tb2022-07-071-5/+1
* Prepare to provide EVP_PKEY_security_bits()tb2022-06-271-1/+8
* Provide EVP_PKEY_HKDF alias for NID_hkdftb2022-05-051-1/+2
* Remove legacy sign/verify from EVP_MD.tb2022-01-141-45/+1
* Make structs in evp.h and hmac.h opaquetb2022-01-141-133/+2
* Unifdef LIBRESSL_OPAQUE_* and LIBRESSL_NEXT_APItb2022-01-141-15/+1
* Fix typo in header guardtb2022-01-121-3/+3
* Prepare to provide the EVP_MD_meth_* APItb2022-01-101-1/+21
* Prepare to provide EVP_PKEY_{public,param}_checktb2022-01-101-1/+11
* Prepare to provide EVP_PKEY_check()tb2022-01-101-1/+14
* Prepare to provide EVP_MD_CTX{,_set}_pkey_ctx()tb2022-01-091-1/+5
* Prepare to provide EVP_AEAD_CTX_{new,free}()tb2022-01-071-2/+12
* Prepare to provide EVP_CIPHER_CTX_{get,set}_cipher_datatb2021-12-241-2/+4
* Prepare to provide EVP_CIPHER_CTX_buf_noconst()tb2021-12-241-1/+4
* Annotate the structs that will be moved to hmac_local.h and evp_locl.htb2021-12-121-3/+10
* Fix some annoying whitespace inconsistencies.tb2021-11-301-20/+20
* Provide EVP_CTRL_AEAD_* defines.tb2021-11-301-7/+10
* Unifdef LIBRESSL_NEW_API. Now that the library is bumped, this istb2021-11-011-3/+1
* Prepare to provide EVP_MD_CTX_get_md_data()tb2021-10-241-1/+4
* Expose EVP_Digest{Sign,Verify}(3)tb2021-05-101-5/+1
* Prepare to provide EVP_Digest{Sign,Verify}tb2021-05-091-2/+12
* Provide EVP_PKEY_new_CMAC_key(3)tb2021-03-311-5/+1
* Prepare to provide EVP_PKEY_new_CMAC_key()tb2021-03-291-1/+8
* Disallow the use of zero length IVs in AES-GCM viatb2020-04-271-1/+2
* Add EVP_PKEY_RSA_PSS.jsing2019-10-241-1/+2
* Provide EVP_PKEY_CTX_get_signature_md() macro and implement thejsing2019-09-091-4/+10
* Provide ASN1_PKEY_CTRL_CMS_RI_TYPE.jsing2019-08-111-1/+2
* Provide EVP_PKEY_get0_hmac(). From OpenSSL 1.1.1 which is stilltb2019-03-171-1/+3
* Provide EVP_aes_{128,192,256}_wrap(). This is a compatibletb2019-03-171-1/+12
* Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.tb2019-03-171-1/+10
* add support for xchacha20 and xchacha20-poly1305dlg2019-01-221-1/+3
* provide EVP_ENCODE_CTX_{new,free}().tb2019-01-191-1/+3
* Add Ribose Inc's implementation of the SM3 hashing function withtb2018-11-111-1/+4
* Add some accessor functions:djm2018-09-121-1/+5
* Add consts to EVP_PKEY_asn1_set_private()tb2018-08-241-2/+2
* Convert EVP_EncodeUpdate() to return an int to allow for errortb2018-08-241-2/+2
* Provide EVP_CIPHER_CTX_encrypting().tb2018-08-241-1/+2
* Return an int in BIO_set_cipher() to be able to report errors.tb2018-08-241-2/+2
* Add a const qualifier to the argument of EVP_PKEY_size().tb2018-05-301-2/+2
* Add a const qualifier to the argument of EVP_PKEY_get0_asn1(3).tb2018-05-131-2/+2
* Add a const qualifier to the argument of EVP_PKEY_get0(3).tb2018-05-131-2/+2
* Add a const qualifier to the argument of EVP_PKEY_bits(3).tb2018-05-131-2/+2
* Add a const qualifier to the second argument of EVP_DigestVerifyFinal(3).tb2018-05-131-2/+3
* Add const qualifiers to return value of BIO_f_{base64,cipher,md}().tb2018-05-021-4/+4
* Provide EVP_PKEY_get0_EC_KEY() and 'if (ret)' vs 'if (ret != 0)' cosmetics.tb2018-02-201-2/+3
* Provide EVP_CIPHER_CTX_reset().jsing2018-02-171-1/+2
* Provide EVP_MD_CTX_new(), EVP_MD_CTX_free() and EVP_MD_CTX_reset().jsing2018-02-171-2/+6
* Provide further parts of the OpenSSL 1.1 API: {DH,DSA}_get0_{key,pqg}(),tb2018-02-171-4/+7
* Provide EVP_PKEY_up_ref().jsing2018-02-141-1/+2