summaryrefslogtreecommitdiffstats
path: root/lib/libcrypto/evp
AgeCommit message (Expand)AuthorFilesLines
2021-03-31Provide EVP_PKEY_new_CMAC_key(3)tb1-5/+1
2021-03-29Prepare to provide EVP_PKEY_new_CMAC_key()tb4-20/+84
2021-02-18Pull in fix for EVP_CipherUpdate() overflow from OpenSSL.tb1-1/+23
2020-06-05Add a custom copy handler for AES key wraptb1-5/+31
2020-06-05Allow GOST R 34.11-2012 in PBE/PBKDF2/PKCS#5.jsing1-1/+3
2020-04-30Disallow setting the AES-GCM IV length to 0tb1-1/+5
2020-04-27Disallow the use of zero length IVs in AES-GCM viatb3-3/+15
2020-03-04Check high bit for base64 decodeinoguchi1-2/+10
2020-03-03Fix base64 processing of long linesinoguchi1-99/+66
2020-01-26typotb1-2/+2
2020-01-26Improve the comment explaining why the previous change matches OpenSSL'stb1-8/+15
2020-01-26Adjust EVP_chacha20()'s behavior to match OpenSSL's semantics:tb1-7/+14
2020-01-12Avoid leak in error path of PKCS5_PBE_keyivgeninoguchi1-1/+2
2019-11-01Wire up PKEY methods for RSA-PSS.jsing1-2/+6
2019-10-29Provide EVP_PKEY_CTX_md().jsing2-8/+18
2019-10-24Add EVP_PKEY_RSA_PSS.jsing1-1/+2
2019-09-09Provide EVP_PKEY_CTX_get_signature_md() macro and implement thejsing1-4/+10
2019-08-11Provide ASN1_PKEY_CTRL_CMS_RI_TYPE.jsing1-1/+2
2019-05-14Correct missing test to determine if length is in bytes or in bits.beck1-1/+3
2019-05-12Revert the other hunk of r1.36 as well: in the case of CCM, ccm.key istb1-1/+11
2019-05-10Revert part of r1.36: in the case of GCM, gcm.key is assigned fromtb1-1/+7
2019-04-19Allocate md_data with calloc to avoid use of uninitialised memory.jsing1-6/+6
2019-04-14Some more malloc() to calloc() conversions.jsing1-7/+5
2019-04-14Remove two pointless chunks of code.jsing1-16/+1
2019-04-14Use calloc() when allocating cipher_data.jsing1-5/+5
2019-04-14Annotate a future improvement.jsing1-1/+2
2019-04-14Avoid potential double-frees following EVP_CIPHER_CTX_copy().jsing1-4/+17
2019-04-03Avoid some out of bound accesses in aesni_cbc_hmac_sha1_cipher().tb1-7/+13
2019-03-27Cast nonce bytes to avoid undefined behaviour when left shifting.jsing1-3/+3
2019-03-24Cast nonce bytes to avoid undefined behaviour when left shifting.jsing1-3/+3
2019-03-18Expand the ERR_PACK() macro to ERR_REASON() for consistency.tb1-2/+2
2019-03-17Provide EVP_PKEY_get0_hmac(). From OpenSSL 1.1.1 which is stilltb3-3/+22
2019-03-17Provide EVP_aes_{128,192,256}_wrap(). This is a compatibletb5-6/+171
2019-03-17Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.tb3-2/+134
2019-01-22add support for xchacha20 and xchacha20-poly1305dlg2-2/+125
2019-01-19provide EVP_ENCODE_CTX_{new,free}().tb2-2/+16
2018-12-26Make AES CCM available in tables.tb1-1/+4
2018-11-24zap 10 tab leading whitespace before 'struct evp_pkey_ctx_st {'tb1-2/+2
2018-11-11Add EVP_sm3() to OpenSSL_add_all_digests_internal().tb1-1/+4
2018-11-11Add Ribose Inc's implementation of the SM3 hashing function withtb2-1/+77
2018-09-12Add some accessor functions:djm2-2/+44
2018-08-24Add const to EVP_PKCS82PKEY().tb1-2/+2
2018-08-24Add consts to EVP_PKEY_asn1_set_private()tb1-2/+2
2018-08-24After removing support for broken PKCS#8 formats (it was high time),tb1-2/+2
2018-08-24Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken()tb1-30/+2
2018-08-24Check return value of EVP_EncodeUpdate() in b64_write().tb1-3/+4
2018-08-24Convert EVP_EncodeUpdate() to return an int to allow for errortb2-8/+10
2018-08-24Provide EVP_CIPHER_CTX_encrypting().tb2-2/+9
2018-08-24Return an int in BIO_set_cipher() to be able to report errors.tb2-13/+22
2018-08-14Add a comment that explains what the check is doing and why len >= 1.tb1-1/+2