index
:
wireguard-openbsd
jd/histogram
jd/queueboosts
jd/simplify-queueing
master
WireGuard implementation for the OpenBSD kernel
Matt Dunwoodie
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
lib
/
libcrypto
/
evp
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
Provide EVP_PKEY_new_CMAC_key(3)
tb
2021-03-31
1
-5
/
+1
*
Prepare to provide EVP_PKEY_new_CMAC_key()
tb
2021-03-29
4
-20
/
+84
*
Pull in fix for EVP_CipherUpdate() overflow from OpenSSL.
tb
2021-02-18
1
-1
/
+23
*
Add a custom copy handler for AES key wrap
tb
2020-06-05
1
-5
/
+31
*
Allow GOST R 34.11-2012 in PBE/PBKDF2/PKCS#5.
jsing
2020-06-05
1
-1
/
+3
*
Disallow setting the AES-GCM IV length to 0
tb
2020-04-30
1
-1
/
+5
*
Disallow the use of zero length IVs in AES-GCM via
tb
2020-04-27
3
-3
/
+15
*
Check high bit for base64 decode
inoguchi
2020-03-04
1
-2
/
+10
*
Fix base64 processing of long lines
inoguchi
2020-03-03
1
-99
/
+66
*
typo
tb
2020-01-26
1
-2
/
+2
*
Improve the comment explaining why the previous change matches OpenSSL's
tb
2020-01-26
1
-8
/
+15
*
Adjust EVP_chacha20()'s behavior to match OpenSSL's semantics:
tb
2020-01-26
1
-7
/
+14
*
Avoid leak in error path of PKCS5_PBE_keyivgen
inoguchi
2020-01-12
1
-1
/
+2
*
Wire up PKEY methods for RSA-PSS.
jsing
2019-11-01
1
-2
/
+6
*
Provide EVP_PKEY_CTX_md().
jsing
2019-10-29
2
-8
/
+18
*
Add EVP_PKEY_RSA_PSS.
jsing
2019-10-24
1
-1
/
+2
*
Provide EVP_PKEY_CTX_get_signature_md() macro and implement the
jsing
2019-09-09
1
-4
/
+10
*
Provide ASN1_PKEY_CTRL_CMS_RI_TYPE.
jsing
2019-08-11
1
-1
/
+2
*
Correct missing test to determine if length is in bytes or in bits.
beck
2019-05-14
1
-1
/
+3
*
Revert the other hunk of r1.36 as well: in the case of CCM, ccm.key is
tb
2019-05-12
1
-1
/
+11
*
Revert part of r1.36: in the case of GCM, gcm.key is assigned from
tb
2019-05-10
1
-1
/
+7
*
Allocate md_data with calloc to avoid use of uninitialised memory.
jsing
2019-04-19
1
-6
/
+6
*
Some more malloc() to calloc() conversions.
jsing
2019-04-14
1
-7
/
+5
*
Remove two pointless chunks of code.
jsing
2019-04-14
1
-16
/
+1
*
Use calloc() when allocating cipher_data.
jsing
2019-04-14
1
-5
/
+5
*
Annotate a future improvement.
jsing
2019-04-14
1
-1
/
+2
*
Avoid potential double-frees following EVP_CIPHER_CTX_copy().
jsing
2019-04-14
1
-4
/
+17
*
Avoid some out of bound accesses in aesni_cbc_hmac_sha1_cipher().
tb
2019-04-03
1
-7
/
+13
*
Cast nonce bytes to avoid undefined behaviour when left shifting.
jsing
2019-03-27
1
-3
/
+3
*
Cast nonce bytes to avoid undefined behaviour when left shifting.
jsing
2019-03-24
1
-3
/
+3
*
Expand the ERR_PACK() macro to ERR_REASON() for consistency.
tb
2019-03-18
1
-2
/
+2
*
Provide EVP_PKEY_get0_hmac(). From OpenSSL 1.1.1 which is still
tb
2019-03-17
3
-3
/
+22
*
Provide EVP_aes_{128,192,256}_wrap(). This is a compatible
tb
2019-03-17
5
-6
/
+171
*
Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.
tb
2019-03-17
3
-2
/
+134
*
add support for xchacha20 and xchacha20-poly1305
dlg
2019-01-22
2
-2
/
+125
*
provide EVP_ENCODE_CTX_{new,free}().
tb
2019-01-19
2
-2
/
+16
*
Make AES CCM available in tables.
tb
2018-12-26
1
-1
/
+4
*
zap 10 tab leading whitespace before 'struct evp_pkey_ctx_st {'
tb
2018-11-24
1
-2
/
+2
*
Add EVP_sm3() to OpenSSL_add_all_digests_internal().
tb
2018-11-11
1
-1
/
+4
*
Add Ribose Inc's implementation of the SM3 hashing function with
tb
2018-11-11
2
-1
/
+77
*
Add some accessor functions:
djm
2018-09-12
2
-2
/
+44
*
Add const to EVP_PKCS82PKEY().
tb
2018-08-24
1
-2
/
+2
*
Add consts to EVP_PKEY_asn1_set_private()
tb
2018-08-24
1
-2
/
+2
*
After removing support for broken PKCS#8 formats (it was high time),
tb
2018-08-24
1
-2
/
+2
*
Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken()
tb
2018-08-24
1
-30
/
+2
*
Check return value of EVP_EncodeUpdate() in b64_write().
tb
2018-08-24
1
-3
/
+4
*
Convert EVP_EncodeUpdate() to return an int to allow for error
tb
2018-08-24
2
-8
/
+10
*
Provide EVP_CIPHER_CTX_encrypting().
tb
2018-08-24
2
-2
/
+9
*
Return an int in BIO_set_cipher() to be able to report errors.
tb
2018-08-24
2
-13
/
+22
*
Add a comment that explains what the check is doing and why len >= 1.
tb
2018-08-14
1
-1
/
+2
[next]