index
:
openbsd
OPENBSD_2_0
OPENBSD_2_1
OPENBSD_2_2
OPENBSD_2_3
OPENBSD_2_4
OPENBSD_2_5
OPENBSD_2_6
OPENBSD_2_7
OPENBSD_2_8
OPENBSD_2_9
OPENBSD_3_0
OPENBSD_3_1
OPENBSD_3_2
OPENBSD_3_3
OPENBSD_3_4
OPENBSD_3_5
OPENBSD_3_6
OPENBSD_3_7
OPENBSD_3_8
OPENBSD_3_9
OPENBSD_4_0
OPENBSD_4_1
OPENBSD_4_2
OPENBSD_4_3
OPENBSD_4_4
OPENBSD_4_5
OPENBSD_4_6
OPENBSD_4_7
OPENBSD_4_8
OPENBSD_4_9
OPENBSD_5_0
OPENBSD_5_1
OPENBSD_5_2
OPENBSD_5_3
OPENBSD_5_4
OPENBSD_5_5
OPENBSD_5_6
OPENBSD_5_7
OPENBSD_5_8
OPENBSD_5_9
OPENBSD_6_0
OPENBSD_6_1
OPENBSD_6_2
OPENBSD_6_3
OPENBSD_6_4
OPENBSD_6_5
OPENBSD_6_6
OPENBSD_6_7
OPENBSD_6_8
OPENBSD_6_9
OPENBSD_7_0
OPENBSD_7_1
OPENBSD_7_2
OPENBSD_7_3
OPENBSD_7_4
OPENBSD_7_5
OPENBSD_7_6
master
A mirror of https://github.com/libressl/openbsd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
src
/
lib
/
libcrypto
/
evp
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
Disallow setting the AES-GCM IV length to 0
tb
2020-04-30
1
-1
/
+5
*
Disallow the use of zero length IVs in AES-GCM via
tb
2020-04-27
3
-3
/
+15
*
Check high bit for base64 decode
inoguchi
2020-03-04
1
-2
/
+10
*
Fix base64 processing of long lines
inoguchi
2020-03-03
1
-99
/
+66
*
typo
tb
2020-01-26
1
-2
/
+2
*
Improve the comment explaining why the previous change matches OpenSSL's
tb
2020-01-26
1
-8
/
+15
*
Adjust EVP_chacha20()'s behavior to match OpenSSL's semantics:
tb
2020-01-26
1
-7
/
+14
*
Avoid leak in error path of PKCS5_PBE_keyivgen
inoguchi
2020-01-12
1
-1
/
+2
*
Wire up PKEY methods for RSA-PSS.
jsing
2019-11-01
1
-2
/
+6
*
Provide EVP_PKEY_CTX_md().
jsing
2019-10-29
2
-8
/
+18
*
Add EVP_PKEY_RSA_PSS.
jsing
2019-10-24
1
-1
/
+2
*
Provide EVP_PKEY_CTX_get_signature_md() macro and implement the
jsing
2019-09-09
1
-4
/
+10
*
Provide ASN1_PKEY_CTRL_CMS_RI_TYPE.
jsing
2019-08-11
1
-1
/
+2
*
Correct missing test to determine if length is in bytes or in bits.
beck
2019-05-14
1
-1
/
+3
*
Revert the other hunk of r1.36 as well: in the case of CCM, ccm.key is
tb
2019-05-12
1
-1
/
+11
*
Revert part of r1.36: in the case of GCM, gcm.key is assigned from
tb
2019-05-10
1
-1
/
+7
*
Allocate md_data with calloc to avoid use of uninitialised memory.
jsing
2019-04-19
1
-6
/
+6
*
Some more malloc() to calloc() conversions.
jsing
2019-04-14
1
-7
/
+5
*
Remove two pointless chunks of code.
jsing
2019-04-14
1
-16
/
+1
*
Use calloc() when allocating cipher_data.
jsing
2019-04-14
1
-5
/
+5
*
Annotate a future improvement.
jsing
2019-04-14
1
-1
/
+2
*
Avoid potential double-frees following EVP_CIPHER_CTX_copy().
jsing
2019-04-14
1
-4
/
+17
*
Avoid some out of bound accesses in aesni_cbc_hmac_sha1_cipher().
tb
2019-04-03
1
-7
/
+13
*
Cast nonce bytes to avoid undefined behaviour when left shifting.
jsing
2019-03-27
1
-3
/
+3
*
Cast nonce bytes to avoid undefined behaviour when left shifting.
jsing
2019-03-24
1
-3
/
+3
*
Expand the ERR_PACK() macro to ERR_REASON() for consistency.
tb
2019-03-18
1
-2
/
+2
*
Provide EVP_PKEY_get0_hmac(). From OpenSSL 1.1.1 which is still
tb
2019-03-17
3
-3
/
+22
*
Provide EVP_aes_{128,192,256}_wrap(). This is a compatible
tb
2019-03-17
5
-6
/
+171
*
Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.
tb
2019-03-17
3
-2
/
+134
*
add support for xchacha20 and xchacha20-poly1305
dlg
2019-01-22
2
-2
/
+125
*
provide EVP_ENCODE_CTX_{new,free}().
tb
2019-01-19
2
-2
/
+16
*
Make AES CCM available in tables.
tb
2018-12-26
1
-1
/
+4
*
zap 10 tab leading whitespace before 'struct evp_pkey_ctx_st {'
tb
2018-11-24
1
-2
/
+2
*
Add EVP_sm3() to OpenSSL_add_all_digests_internal().
tb
2018-11-11
1
-1
/
+4
*
Add Ribose Inc's implementation of the SM3 hashing function with
tb
2018-11-11
2
-1
/
+77
*
Add some accessor functions:
djm
2018-09-12
2
-2
/
+44
*
Add const to EVP_PKCS82PKEY().
tb
2018-08-24
1
-2
/
+2
*
Add consts to EVP_PKEY_asn1_set_private()
tb
2018-08-24
1
-2
/
+2
*
After removing support for broken PKCS#8 formats (it was high time),
tb
2018-08-24
1
-2
/
+2
*
Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken()
tb
2018-08-24
1
-30
/
+2
*
Check return value of EVP_EncodeUpdate() in b64_write().
tb
2018-08-24
1
-3
/
+4
*
Convert EVP_EncodeUpdate() to return an int to allow for error
tb
2018-08-24
2
-8
/
+10
*
Provide EVP_CIPHER_CTX_encrypting().
tb
2018-08-24
2
-2
/
+9
*
Return an int in BIO_set_cipher() to be able to report errors.
tb
2018-08-24
2
-13
/
+22
*
Add a comment that explains what the check is doing and why len >= 1.
tb
2018-08-14
1
-1
/
+2
*
The UI_add_{input,verify}_string() functions want a length not including
tb
2018-08-14
1
-5
/
+8
*
Add glue to EVP_md5_sha1() so that it can be used with EVP_Sign* and
jsing
2018-08-10
1
-1
/
+12
*
Add a const qualifier to the argument of EVP_PKEY_size().
tb
2018-05-30
2
-4
/
+4
*
Add a const qualifier to the ASN1_OBJECT * argument of the following:
tb
2018-05-13
1
-2
/
+3
*
Add a const qualifier to the argument of EVP_PKEY_get0_asn1(3).
tb
2018-05-13
1
-2
/
+2
[next]