index
:
wireguard-openbsd
jd/histogram
jd/queueboosts
jd/simplify-queueing
master
WireGuard implementation for the OpenBSD kernel
Matt Dunwoodie
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
lib
/
libcrypto
/
evp
Age
Commit message (
Expand
)
Author
Files
Lines
2021-03-31
Provide EVP_PKEY_new_CMAC_key(3)
tb
1
-5
/
+1
2021-03-29
Prepare to provide EVP_PKEY_new_CMAC_key()
tb
4
-20
/
+84
2021-02-18
Pull in fix for EVP_CipherUpdate() overflow from OpenSSL.
tb
1
-1
/
+23
2020-06-05
Add a custom copy handler for AES key wrap
tb
1
-5
/
+31
2020-06-05
Allow GOST R 34.11-2012 in PBE/PBKDF2/PKCS#5.
jsing
1
-1
/
+3
2020-04-30
Disallow setting the AES-GCM IV length to 0
tb
1
-1
/
+5
2020-04-27
Disallow the use of zero length IVs in AES-GCM via
tb
3
-3
/
+15
2020-03-04
Check high bit for base64 decode
inoguchi
1
-2
/
+10
2020-03-03
Fix base64 processing of long lines
inoguchi
1
-99
/
+66
2020-01-26
typo
tb
1
-2
/
+2
2020-01-26
Improve the comment explaining why the previous change matches OpenSSL's
tb
1
-8
/
+15
2020-01-26
Adjust EVP_chacha20()'s behavior to match OpenSSL's semantics:
tb
1
-7
/
+14
2020-01-12
Avoid leak in error path of PKCS5_PBE_keyivgen
inoguchi
1
-1
/
+2
2019-11-01
Wire up PKEY methods for RSA-PSS.
jsing
1
-2
/
+6
2019-10-29
Provide EVP_PKEY_CTX_md().
jsing
2
-8
/
+18
2019-10-24
Add EVP_PKEY_RSA_PSS.
jsing
1
-1
/
+2
2019-09-09
Provide EVP_PKEY_CTX_get_signature_md() macro and implement the
jsing
1
-4
/
+10
2019-08-11
Provide ASN1_PKEY_CTRL_CMS_RI_TYPE.
jsing
1
-1
/
+2
2019-05-14
Correct missing test to determine if length is in bytes or in bits.
beck
1
-1
/
+3
2019-05-12
Revert the other hunk of r1.36 as well: in the case of CCM, ccm.key is
tb
1
-1
/
+11
2019-05-10
Revert part of r1.36: in the case of GCM, gcm.key is assigned from
tb
1
-1
/
+7
2019-04-19
Allocate md_data with calloc to avoid use of uninitialised memory.
jsing
1
-6
/
+6
2019-04-14
Some more malloc() to calloc() conversions.
jsing
1
-7
/
+5
2019-04-14
Remove two pointless chunks of code.
jsing
1
-16
/
+1
2019-04-14
Use calloc() when allocating cipher_data.
jsing
1
-5
/
+5
2019-04-14
Annotate a future improvement.
jsing
1
-1
/
+2
2019-04-14
Avoid potential double-frees following EVP_CIPHER_CTX_copy().
jsing
1
-4
/
+17
2019-04-03
Avoid some out of bound accesses in aesni_cbc_hmac_sha1_cipher().
tb
1
-7
/
+13
2019-03-27
Cast nonce bytes to avoid undefined behaviour when left shifting.
jsing
1
-3
/
+3
2019-03-24
Cast nonce bytes to avoid undefined behaviour when left shifting.
jsing
1
-3
/
+3
2019-03-18
Expand the ERR_PACK() macro to ERR_REASON() for consistency.
tb
1
-2
/
+2
2019-03-17
Provide EVP_PKEY_get0_hmac(). From OpenSSL 1.1.1 which is still
tb
3
-3
/
+22
2019-03-17
Provide EVP_aes_{128,192,256}_wrap(). This is a compatible
tb
5
-6
/
+171
2019-03-17
Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.
tb
3
-2
/
+134
2019-01-22
add support for xchacha20 and xchacha20-poly1305
dlg
2
-2
/
+125
2019-01-19
provide EVP_ENCODE_CTX_{new,free}().
tb
2
-2
/
+16
2018-12-26
Make AES CCM available in tables.
tb
1
-1
/
+4
2018-11-24
zap 10 tab leading whitespace before 'struct evp_pkey_ctx_st {'
tb
1
-2
/
+2
2018-11-11
Add EVP_sm3() to OpenSSL_add_all_digests_internal().
tb
1
-1
/
+4
2018-11-11
Add Ribose Inc's implementation of the SM3 hashing function with
tb
2
-1
/
+77
2018-09-12
Add some accessor functions:
djm
2
-2
/
+44
2018-08-24
Add const to EVP_PKCS82PKEY().
tb
1
-2
/
+2
2018-08-24
Add consts to EVP_PKEY_asn1_set_private()
tb
1
-2
/
+2
2018-08-24
After removing support for broken PKCS#8 formats (it was high time),
tb
1
-2
/
+2
2018-08-24
Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken()
tb
1
-30
/
+2
2018-08-24
Check return value of EVP_EncodeUpdate() in b64_write().
tb
1
-3
/
+4
2018-08-24
Convert EVP_EncodeUpdate() to return an int to allow for error
tb
2
-8
/
+10
2018-08-24
Provide EVP_CIPHER_CTX_encrypting().
tb
2
-2
/
+9
2018-08-24
Return an int in BIO_set_cipher() to be able to report errors.
tb
2
-13
/
+22
2018-08-14
Add a comment that explains what the check is doing and why len >= 1.
tb
1
-1
/
+2
[next]