summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/evp (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Add a const qualifier to the argument of EVP_PKEY_get0(3).tb2018-05-132-4/+4
* Add a const qualifier to the argument of EVP_PKEY_bits(3).tb2018-05-132-4/+4
* Add a const qualifier to the second argument of EVP_DigestVerifyFinal(3).tb2018-05-132-4/+5
* Add const qualifiers to return value of BIO_f_{base64,cipher,md}().tb2018-05-024-13/+13
* make ENGINE_finish() succeed on NULL and simplify callers as intb2018-04-144-36/+19
* Bring in compatibility for OpenSSL 1.1 style init functions.beck2018-03-172-5/+38
* Provide EVP_PKEY_get0_EC_KEY() and 'if (ret)' vs 'if (ret != 0)' cosmetics.tb2018-02-202-13/+23
* Provide EVP_CIPHER_CTX_reset().jsing2018-02-172-18/+27
* Provide EVP_MD_CTX_new(), EVP_MD_CTX_free() and EVP_MD_CTX_reset().jsing2018-02-172-21/+46
* Provide further parts of the OpenSSL 1.1 API: {DH,DSA}_get0_{key,pqg}(),tb2018-02-172-23/+55
* Provide EVP_PKEY_up_ref().jsing2018-02-142-2/+10
* GNU ld has prefixed the contents of .gnu.warning.SYMBOL sectionstb2017-11-281-4/+4
* Remove EVP_aead_chacha20_poly1305_old() now that the original/oldjsing2017-08-282-82/+28
* Fix a problem introduced in freezero() conversion and usejsg2017-05-111-2/+2
* use freezero() instead of memset/explicit_bzero + free. Substantiallyderaadt2017-05-025-20/+12
* Stop calling OPENSSL_init() internally, since it is a no-op. Also placejsing2017-04-291-5/+1
* Include EVP_md5_sha1() via OpenSSL_add_all_digests().jsing2017-03-011-1/+2
* Add an EVP interface that provides concatenated MD5+SHA1 hashes, which arejsing2017-02-282-1/+85
* LibreSSL : Truncated packet could crash via OOB readinoguchi2017-01-312-3/+10
* Send the function codes from the error functions to the bit bucket,beck2017-01-2925-347/+187
* Expand DECLARE_OBJ_BSEARCH_CMP_FN and IMPLEMENT_OBJ_BSEARCH_CMP_FN macros.jsing2017-01-212-8/+38
* Explicitly export a list of symbols from libcrypto.jsing2016-12-211-1/+5
* Stricter checks of ASN1_INTEGER to reject ASN1_NEG_INTEGER in places whenmiod2016-11-082-5/+12
* No need to duplicate definitions from evp.h locally.miod2016-11-052-14/+2
* Replace all uses of magic numbers when operating on OPENSSL_ia32_P[] bymiod2016-11-043-14/+13
* Remove I386_ONLY define. It was only used to prefer amiod2016-11-041-3/+3
* back out calls to EVP_CIPHER_CTX_cleanup() in EVP_Cipher/Encrypt/DecryptFinalbcook2016-09-091-4/+1
* include <sys/types.h> to get <sys/cdefs.h> instead (for __warn_references)bcook2016-09-041-2/+2
* include <sys/cdefs.h> for portablebcook2016-09-041-1/+3
* deprecate EVP_EncryptFinal(), EVP_DecryptFinal() and EVP_CipherFinal()bcook2016-09-031-3/+15
* deprecate internal use of EVP_[Cipher|Encrypt|Decrypt]_Final.beck2016-05-302-8/+16
* fix for integer overflow in encode and encrypt update functions.tedu2016-05-042-6/+11
* fix a padding oracle in aesni cbc mac check. there must be enough datatedu2016-05-041-1/+4
* revert the big change from yesterday to prepare for smaller commits.tedu2016-05-043-15/+7
* prefer limits.h over sys/limits.hbcook2016-05-031-2/+2
* patch from openssl for multiple issues:tedu2016-05-033-7/+16
* Rename EVP_aead_chacha20_poly1305() to EVP_aead_chacha20_poly1305_old()jsing2016-04-282-13/+13
* Use the correct iv and counter when decrypting the ciphertext forjsing2016-04-131-4/+4
* initialize md_len to 0 for readability to quell warnings.beck2015-12-141-3/+3
* Fix typo in comment of previous commit: "that that".reyk2015-11-021-3/+3
* Add EVP_aead_chacha20_poly1305_ietf() - The informational RFC 7539,reyk2015-11-022-19/+113
* unifdef EVP_CHECK_DES_KEY: Ben Kaduk noticed it has a syntax error; thatguenther2015-10-122-20/+2
* Temporarily revive MD4 for MS CHAP support.doug2015-09-143-2/+127
* Remove MD4 support from LibreSSL.doug2015-09-133-127/+2
* Remove SHA-0 support.doug2015-09-133-122/+3
* Correct spelling of OPENSSL_cleanse.jsing2015-09-1010-26/+28
* Replace remaining CRYPTO_memcmp() calls with timingsafe_memcmp().jsing2015-06-202-4/+4
* Remove obsolete MDC-2DES from libcrypto.doug2015-06-203-126/+2
* Regenmiod2015-02-151-89/+99
* 1.18 would introduce a possible out-of-bounds access in the error path;miod2015-02-141-7/+5