summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/evp (follow)
Commit message (Expand)AuthorAgeFilesLines
* Disallow setting the AES-GCM IV length to 0tb2020-04-301-1/+5
* Disallow the use of zero length IVs in AES-GCM viatb2020-04-273-3/+15
* Check high bit for base64 decodeinoguchi2020-03-041-2/+10
* Fix base64 processing of long linesinoguchi2020-03-031-99/+66
* typotb2020-01-261-2/+2
* Improve the comment explaining why the previous change matches OpenSSL'stb2020-01-261-8/+15
* Adjust EVP_chacha20()'s behavior to match OpenSSL's semantics:tb2020-01-261-7/+14
* Avoid leak in error path of PKCS5_PBE_keyivgeninoguchi2020-01-121-1/+2
* Wire up PKEY methods for RSA-PSS.jsing2019-11-011-2/+6
* Provide EVP_PKEY_CTX_md().jsing2019-10-292-8/+18
* Add EVP_PKEY_RSA_PSS.jsing2019-10-241-1/+2
* Provide EVP_PKEY_CTX_get_signature_md() macro and implement thejsing2019-09-091-4/+10
* Provide ASN1_PKEY_CTRL_CMS_RI_TYPE.jsing2019-08-111-1/+2
* Correct missing test to determine if length is in bytes or in bits.beck2019-05-141-1/+3
* Revert the other hunk of r1.36 as well: in the case of CCM, ccm.key istb2019-05-121-1/+11
* Revert part of r1.36: in the case of GCM, gcm.key is assigned fromtb2019-05-101-1/+7
* Allocate md_data with calloc to avoid use of uninitialised memory.jsing2019-04-191-6/+6
* Some more malloc() to calloc() conversions.jsing2019-04-141-7/+5
* Remove two pointless chunks of code.jsing2019-04-141-16/+1
* Use calloc() when allocating cipher_data.jsing2019-04-141-5/+5
* Annotate a future improvement.jsing2019-04-141-1/+2
* Avoid potential double-frees following EVP_CIPHER_CTX_copy().jsing2019-04-141-4/+17
* Avoid some out of bound accesses in aesni_cbc_hmac_sha1_cipher().tb2019-04-031-7/+13
* Cast nonce bytes to avoid undefined behaviour when left shifting.jsing2019-03-271-3/+3
* Cast nonce bytes to avoid undefined behaviour when left shifting.jsing2019-03-241-3/+3
* Expand the ERR_PACK() macro to ERR_REASON() for consistency.tb2019-03-181-2/+2
* Provide EVP_PKEY_get0_hmac(). From OpenSSL 1.1.1 which is stilltb2019-03-173-3/+22
* Provide EVP_aes_{128,192,256}_wrap(). This is a compatibletb2019-03-175-6/+171
* Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.tb2019-03-173-2/+134
* add support for xchacha20 and xchacha20-poly1305dlg2019-01-222-2/+125
* provide EVP_ENCODE_CTX_{new,free}().tb2019-01-192-2/+16
* Make AES CCM available in tables.tb2018-12-261-1/+4
* zap 10 tab leading whitespace before 'struct evp_pkey_ctx_st {'tb2018-11-241-2/+2
* Add EVP_sm3() to OpenSSL_add_all_digests_internal().tb2018-11-111-1/+4
* Add Ribose Inc's implementation of the SM3 hashing function withtb2018-11-112-1/+77
* Add some accessor functions:djm2018-09-122-2/+44
* Add const to EVP_PKCS82PKEY().tb2018-08-241-2/+2
* Add consts to EVP_PKEY_asn1_set_private()tb2018-08-241-2/+2
* After removing support for broken PKCS#8 formats (it was high time),tb2018-08-241-2/+2
* Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken()tb2018-08-241-30/+2
* Check return value of EVP_EncodeUpdate() in b64_write().tb2018-08-241-3/+4
* Convert EVP_EncodeUpdate() to return an int to allow for errortb2018-08-242-8/+10
* Provide EVP_CIPHER_CTX_encrypting().tb2018-08-242-2/+9
* Return an int in BIO_set_cipher() to be able to report errors.tb2018-08-242-13/+22
* Add a comment that explains what the check is doing and why len >= 1.tb2018-08-141-1/+2
* The UI_add_{input,verify}_string() functions want a length not includingtb2018-08-141-5/+8
* Add glue to EVP_md5_sha1() so that it can be used with EVP_Sign* andjsing2018-08-101-1/+12
* Add a const qualifier to the argument of EVP_PKEY_size().tb2018-05-302-4/+4
* Add a const qualifier to the ASN1_OBJECT * argument of the following:tb2018-05-131-2/+3
* Add a const qualifier to the argument of EVP_PKEY_get0_asn1(3).tb2018-05-131-2/+2