summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* add support for xchacha20 and xchacha20-poly1305dlg2019-01-227-8/+208
* lenght -> lengthjsg2019-01-212-3/+3
* Fix BN_is_prime_* calls in libcrypto, the API returns -1 on error.tb2019-01-203-18/+35
* spelling;jmc2019-01-191-2/+2
* In evp.h rev. 1.71, tb@ added EVP_ENCODE_CTX_new(3) andschwarze2019-01-191-4/+38
* bump minors after symbol additiontb2019-01-191-1/+1
* provide EVP_ENCODE_CTX_{new,free}().tb2019-01-193-2/+18
* $OpenBSD$tb2019-01-192-0/+2
* Partial port of EC_KEY_METHOD from OpenSSL 1.1.tb2019-01-193-12/+12
* Partial port of EC_KEY_METHOD from OpenSSL 1.1.tb2019-01-199-63/+213
* Partial port of EC_KEY_METHOD from OpenSSL 1.1.tb2019-01-1916-56/+659
* correct article;jmc2019-01-022-6/+6
* Make AES CCM available in tables.tb2018-12-261-1/+4
* Make this page much more readable by deleting as much text as possibleschwarze2018-12-241-28/+9
* EVP_MD_CTX_cleanup() is deprecated and doesn't free, so recommend usingtb2018-12-234-12/+12
* Document EVP_PKEY_new_mac_key(3);schwarze2018-12-221-8/+50
* Delete irrelevant HISTORY details. Simply use BN_rand(3); thereschwarze2018-12-221-12/+2
* The wrong header file was given for EVP_PKEY_CTX_set_signature_md(3).schwarze2018-12-211-13/+69
* Document the ECDSA_SIG_new(3) return value.schwarze2018-12-211-2/+10
* Clarify behaviour of DH_get0_pqg(3) and DH_get0_key(3) with NULL arguments;schwarze2018-12-211-4/+19
* grammar and style fixes from wesinator at githubschwarze2018-12-211-13/+14
* Since OpenBSD 6.1, BN_pseudo_rand*(3) does the same as BN_rand*(3).schwarze2018-12-211-10/+18
* Mention that some functions call BN_GENCB_call(3) with a secondschwarze2018-12-211-4/+15
* Correctly describe the return values of BN_hex2bn(3) and BN_dec2bn(3).schwarze2018-12-191-5/+8
* Specify the return values of some of these functions more precisely;schwarze2018-12-191-15/+16
* typo;schwarze2018-12-191-4/+5
* Regenerate root CA list using updated format-pem.pl. Specifically thissthen2018-12-161-101/+1
* Add a check that libressl is actually able to verify CA certs.sthen2018-12-161-12/+28
* Restore function prototype for ASN1_dup, fixing usage on I32LP64 platforms.jeremy2018-11-301-1/+7
* Correct lock initialisation for libcrypto.jsing2018-11-282-16/+55
* spelling; from miodjmc2018-11-251-2/+2
* zap 10 tab leading whitespace before 'struct evp_pkey_ctx_st {'tb2018-11-241-2/+2
* Store and return the locking callbacks, restoring previous behaviour.jsing2018-11-241-6/+12
* Saw a mention somewhere a while back that the gotdata() function inderaadt2018-11-205-144/+27
* Fix whitespace around assignment operators.tb2018-11-171-7/+7
* Port OpenSSL commit 99540ec79491f59ed8b46b4edf130e17dc907f52 -- mitigationtb2018-11-151-4/+4
* Missing initialization for pub_key. CID 184303.tb2018-11-121-2/+2
* Add back a few missing compatibility stubsbcook2018-11-112-4/+37
* Add EVP_sm3() to OpenSSL_add_all_digests_internal().tb2018-11-111-1/+4
* bump minors after symbol addition.tb2018-11-111-1/+1
* Add Ribose Inc's implementation of the SM3 hashing function withtb2018-11-118-3/+437
* Add automatic threading initialization for libcrypto.bcook2018-11-116-452/+140
* include crypto.h from the correct path, remove unused variablebcook2018-11-111-5/+2
* Initialize priv_key and pub_key on first use instead of at the top.tb2018-11-091-6/+4
* Initialize priv_key and pub_key on first use instead of at the top.tb2018-11-091-4/+4
* Avoid dereferencing eckey before checking it for NULL.tb2018-11-091-5/+6
* Avoid leaking memory that was already allocated in ASN1_item_new().tb2018-11-091-5/+1
* Fix a buffer overrun in asn1_parse2().tb2018-11-091-4/+7
* Add const to the data argument of ASN1_set{,_int}_octetstring().tb2018-11-092-6/+6
* Remove some function prototypes that should have been removed in thejsing2018-11-081-10/+2