summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/evp (follow)
Commit message (Expand)AuthorAgeFilesLines
* Add EVP_sm3() to OpenSSL_add_all_digests_internal().tb2018-11-111-1/+4
* Add Ribose Inc's implementation of the SM3 hashing function withtb2018-11-112-1/+77
* Add some accessor functions:djm2018-09-122-2/+44
* Add const to EVP_PKCS82PKEY().tb2018-08-241-2/+2
* Add consts to EVP_PKEY_asn1_set_private()tb2018-08-241-2/+2
* After removing support for broken PKCS#8 formats (it was high time),tb2018-08-241-2/+2
* Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken()tb2018-08-241-30/+2
* Check return value of EVP_EncodeUpdate() in b64_write().tb2018-08-241-3/+4
* Convert EVP_EncodeUpdate() to return an int to allow for errortb2018-08-242-8/+10
* Provide EVP_CIPHER_CTX_encrypting().tb2018-08-242-2/+9
* Return an int in BIO_set_cipher() to be able to report errors.tb2018-08-242-13/+22
* Add a comment that explains what the check is doing and why len >= 1.tb2018-08-141-1/+2
* The UI_add_{input,verify}_string() functions want a length not includingtb2018-08-141-5/+8
* Add glue to EVP_md5_sha1() so that it can be used with EVP_Sign* andjsing2018-08-101-1/+12
* Add a const qualifier to the argument of EVP_PKEY_size().tb2018-05-302-4/+4
* Add a const qualifier to the ASN1_OBJECT * argument of the following:tb2018-05-131-2/+3
* Add a const qualifier to the argument of EVP_PKEY_get0_asn1(3).tb2018-05-131-2/+2
* Add a const qualifier to the argument of EVP_PKEY_get0(3).tb2018-05-132-4/+4
* Add a const qualifier to the argument of EVP_PKEY_bits(3).tb2018-05-132-4/+4
* Add a const qualifier to the second argument of EVP_DigestVerifyFinal(3).tb2018-05-132-4/+5
* Add const qualifiers to return value of BIO_f_{base64,cipher,md}().tb2018-05-024-13/+13
* make ENGINE_finish() succeed on NULL and simplify callers as intb2018-04-144-36/+19
* Bring in compatibility for OpenSSL 1.1 style init functions.beck2018-03-172-5/+38
* Provide EVP_PKEY_get0_EC_KEY() and 'if (ret)' vs 'if (ret != 0)' cosmetics.tb2018-02-202-13/+23
* Provide EVP_CIPHER_CTX_reset().jsing2018-02-172-18/+27
* Provide EVP_MD_CTX_new(), EVP_MD_CTX_free() and EVP_MD_CTX_reset().jsing2018-02-172-21/+46
* Provide further parts of the OpenSSL 1.1 API: {DH,DSA}_get0_{key,pqg}(),tb2018-02-172-23/+55
* Provide EVP_PKEY_up_ref().jsing2018-02-142-2/+10
* GNU ld has prefixed the contents of .gnu.warning.SYMBOL sectionstb2017-11-281-4/+4
* Remove EVP_aead_chacha20_poly1305_old() now that the original/oldjsing2017-08-282-82/+28
* Fix a problem introduced in freezero() conversion and usejsg2017-05-111-2/+2
* use freezero() instead of memset/explicit_bzero + free. Substantiallyderaadt2017-05-025-20/+12
* Stop calling OPENSSL_init() internally, since it is a no-op. Also placejsing2017-04-291-5/+1
* Include EVP_md5_sha1() via OpenSSL_add_all_digests().jsing2017-03-011-1/+2
* Add an EVP interface that provides concatenated MD5+SHA1 hashes, which arejsing2017-02-282-1/+85
* LibreSSL : Truncated packet could crash via OOB readinoguchi2017-01-312-3/+10
* Send the function codes from the error functions to the bit bucket,beck2017-01-2925-347/+187
* Expand DECLARE_OBJ_BSEARCH_CMP_FN and IMPLEMENT_OBJ_BSEARCH_CMP_FN macros.jsing2017-01-212-8/+38
* Explicitly export a list of symbols from libcrypto.jsing2016-12-211-1/+5
* Stricter checks of ASN1_INTEGER to reject ASN1_NEG_INTEGER in places whenmiod2016-11-082-5/+12
* No need to duplicate definitions from evp.h locally.miod2016-11-052-14/+2
* Replace all uses of magic numbers when operating on OPENSSL_ia32_P[] bymiod2016-11-043-14/+13
* Remove I386_ONLY define. It was only used to prefer amiod2016-11-041-3/+3
* back out calls to EVP_CIPHER_CTX_cleanup() in EVP_Cipher/Encrypt/DecryptFinalbcook2016-09-091-4/+1
* include <sys/types.h> to get <sys/cdefs.h> instead (for __warn_references)bcook2016-09-041-2/+2
* include <sys/cdefs.h> for portablebcook2016-09-041-1/+3
* deprecate EVP_EncryptFinal(), EVP_DecryptFinal() and EVP_CipherFinal()bcook2016-09-031-3/+15
* deprecate internal use of EVP_[Cipher|Encrypt|Decrypt]_Final.beck2016-05-302-8/+16
* fix for integer overflow in encode and encrypt update functions.tedu2016-05-042-6/+11
* fix a padding oracle in aesni cbc mac check. there must be enough datatedu2016-05-041-1/+4