summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Do not install mlkem.h and bytestring.h into /usr/include/openssl for nowtb2024-12-191-3/+1
* #ifdef out the inclusion of openssl/mlkem.h for nowtb2024-12-191-3/+4
* Do not assume mlkem.h and bytestring.h are public in libcryptotb2024-12-194-14/+8
* ec_mult: use 1ULL to avoid C4334 warning on Visual Studiotb2024-12-191-2/+2
* mlkem: fix whitespacetb2024-12-182-4/+6
* kength -> lengthjsg2024-12-181-3/+3
* New manual page EVP_aes_128_gcm(3).schwarze2024-12-174-75/+260
* Avoid a reduce once that can cause Clang misoptomization.beck2024-12-172-22/+54
* Plug two memory leaks in MLKEM*_generate_key_external_entropy()tb2024-12-172-2/+6
* mlkem: clean up top matter in headerstb2024-12-172-8/+14
* Simplify ec_point_to_octets()tb2024-12-161-8/+3
* Add ML-KEM 1024 from BoringSSLbeck2024-12-135-2/+1290
* KNF nit tb wanted me to fixbeck2024-12-131-2/+4
* Add ML-KEM 768 from BoringSSLbeck2024-12-135-1/+1412
* Rewrite a comment to use p rather than qtb2024-12-121-10/+10
* Rename group->field to group->ptb2024-12-124-52/+46
* sm3: fix ugly whitespacetb2024-12-121-5/+5
* Avoid an oob access in asn1_item_free()tb2024-12-111-4/+3
* Drop a pair of useless parenthesestb2024-12-111-2/+2
* Improve a rather misleading sentence about EVP_PKEY_new_mac_key(3).schwarze2024-12-101-4/+8
* Add a paragraph about HMAC because that algorithm also involvesschwarze2024-12-101-3/+15
* insert a forgotten .Dv macroschwarze2024-12-091-3/+3
* Mark the constants EVP_PK_*, EVP_PKS_*, and EVP_PKT_* as intentionallyschwarze2024-12-091-2/+7
* Move the algorithm-specific functions EVP_rc2_*(3) out of EVP_EncryptInit(3)schwarze2024-12-084-55/+214
* Document the low-level rc2.h API.schwarze2024-12-072-2/+198
* ec_mult: forgot to make one helper statictb2024-12-071-2/+2
* Move initialization of sign out of the middle of bits handlingtb2024-12-071-3/+3
* Rename ec_wNAF_mul() to ec_wnaf_mul()tb2024-12-063-7/+7
* ec_mult: manage wNAF data in a structtb2024-12-061-86/+131
* Adjust the return type and value of EVP_MD_CTX_init(3)schwarze2024-12-062-7/+12
* Delete the manual pages EVP_PKEY_meth_new(3) and EVP_PKEY_meth_get0_info(3)schwarze2024-12-0618-776/+60
* Delete the manual page EVP_PKEY_check(3).schwarze2024-12-065-158/+5
* Delete the manual page EVP_PKEY_asn1_new(3).schwarze2024-12-0614-566/+30
* Provide a SHA-1 assembly implementation for amd64 using SHA-NI.jsing2024-12-063-2/+179
* Explain what "EVP" is supposed to mean.schwarze2024-12-061-2/+16
* Fix previous and thus regress failures reported by antontb2024-12-061-2/+3
* ec_asn1: update a comment to match realitytb2024-12-061-2/+2
* Set nid on group decoded from EC parameterstb2024-12-063-7/+14
* Zap a trailing spacetb2024-12-051-2/+2
* Make the DSS_prime_checks macro internaltb2024-12-052-11/+12
* Remove the undocumented DSA_is_prime() macrotb2024-12-051-3/+1
* document the #define'd constant PKCS5_SALT_LENschwarze2024-12-051-4/+6
* drop comments asking for documentation of three ASN1_PKEY_CTRL_CMS_*schwarze2024-12-051-5/+2
* Apply a little bit of lipstick to PKCS7tb2024-12-051-3/+7
* Use ASIdentifiers rather than struct ASIdentifiers_sttb2024-12-041-2/+2
* Another now unused perlasm script can bite the dust.jsing2024-12-041-1267/+0
* Provide a replacement assembly implementation for SHA-1 on amd64.jsing2024-12-043-2/+345
* Annotate WTLS7 as being wrongtb2024-12-041-1/+2
* Meant to split the sentence in twotb2024-11-301-3/+3
* Be a bit more precise on the error conditions of CMS_get1_{certs,crls}()tb2024-11-301-3/+4