aboutsummaryrefslogtreecommitdiffstats
path: root/providers
Commit message (Expand)AuthorAgeFilesLines
* Add appropriate NULL checks in EVP_CIPHER apiNeil Horman2024-01-251-0/+6
* Fix the encoding of SM2 keysRichard Levitte2024-01-121-1/+9
* Fix partial block encryption in cfb and ofb for s390xHolger Dengler2024-01-122-7/+4
* cleanse stack variable in kdf_pbkdf1_do_deriveNeil Horman2024-01-051-0/+1
* cleanse stack variable in blake2[b|s] finalizationNeil Horman2024-01-032-2/+6
* validate requested key length in kdf_pbkdf1_do_deriveNeil Horman2024-01-031-0/+5
* riscv: Fix mispelling of extension test macroGrant Nichol2024-01-021-1/+1
* Add missing settable entry OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST_PROPS for RSA asymslontis2023-12-291-0/+1
* Fix new typos found by codespellDimitri Papadopoulos2023-12-291-1/+1
* Ignore OSSL_MAC_PARAM_DIGEST_NOINIT/OSSL_MAC_PARAM_DIGEST_ONESHOTNeil Horman2023-12-261-27/+0
* Avoid setting gen_type to -1 in dsa_gen_set_paramsNeil Horman2023-12-142-2/+29
* Avoid setting gen_type to -1 in dh_gen_common_set_paramsNeil Horman2023-12-141-1/+13
* Fix detection for riscv64/riscv32Matt Caswell2023-12-121-2/+2
* evp-cmac: do not seg-fault when getting mac-size before initJames Muir2023-12-011-1/+5
* Initialize dstctx->mgf1_md to NULL in rsa_dupctx functionlan11202023-11-301-0/+1
* Optimize AES-CTR for ARM Neoverse V1 and V2.fisher.yu2023-11-293-3/+44
* Fix a possible memory leak in SM2 providerHuiyue Xu2023-11-231-0/+9
* Fix BLAKE2s reporting the same EVP_MD_get_size() as BLAKE2b (64)наб2023-11-151-1/+1
* Properly limit the variable output size for BLAKE2Tomas Mraz2023-11-131-1/+1
* Support EVP_DigestSqueeze() for in the digest provider for s390x.Holger Dengler2023-11-101-3/+100
* Fix state handling of keccak_final for s390x.Holger Dengler2023-11-101-0/+4
* Fix state handling of shake_final for s390x.Holger Dengler2023-11-101-0/+4
* Fix state handling of sha3_final for s390x.Holger Dengler2023-11-101-0/+4
* Fix state handling of sha3_absorb for s390x.Holger Dengler2023-11-101-0/+4
* Add xof state handing for generic sha3 absorb.Holger Dengler2023-11-101-0/+4
* Add EVP_DigestSqueeze() API.slontis2023-11-101-22/+92
* Implement BLAKE2s with the same macro as BLAKE2bнаб2023-11-082-16/+11
* Lift BLAKE2B provider definition into a macroнаб2023-11-082-169/+171
* update/final: Return error if key is not setTomas Mraz2023-11-034-1/+35
* When changing IV length invalidate previously set IVTomas Mraz2023-11-033-3/+14
* riscv: Provide vector crypto implementation of AES-ECB mode.Phoebe Chen2023-10-261-0/+6
* riscv: Provide vector crypto implementation of AES-128/256-XTS mode.Jerry Shih2023-10-261-3/+33
* Fix the aes-xts key-length checking condition and hw declaration.Jerry Shih2023-10-261-2/+2
* Provide additional AES-GCM test patterns to enhance test coverage.Phoebe Chen2023-10-261-8/+8
* riscv: Provide vector crypto implementation of AES-GCM mode.Jerry Shih2023-10-261-13/+60
* Minor changes of the GCM-related code.Jerry Shih2023-10-261-1/+1
* riscv: Provide vector crypto implementation of AES-CTR mode.Phoebe Chen2023-10-261-0/+4
* riscv: Use the optimized rvv AES-128/192/256-CBC.Phoebe Chen2023-10-261-19/+22
* Update for Zvkb extension.Jerry Shih2023-10-264-4/+4
* riscv: Implement AES-192Ard Biesheuvel2023-10-265-16/+15
* riscv: SM4: Provide a Zvksed-based implementationChristoph Müllner2023-10-269-0/+202
* riscv: AES: Provide a Zvkned-based implementationChristoph Müllner2023-10-265-6/+191
* Accept longer context for TLS 1.2 exportersDaiki Ueno2023-10-261-16/+32
* Blake2b: Use OSSL_DIGEST_PARAM_SIZE as settable instead of XOFLENTomas Mraz2023-10-254-19/+69
* rand: fix seeding from a weak entropy sourceMatthias St. Pierre2023-10-241-23/+22
* rand: add callbacks to cleanup the user entropy resp. nonceMatthias St. Pierre2023-10-201-4/+20
* Avoid another copy of key schedule pointer in PROV_GCM_CTXTomas Mraz2023-10-163-7/+3
* DH_check_pub_key() should not fail when setting result codeTomas Mraz2023-10-111-1/+1
* Avoid divide-by-zero in kmac_prov.c's bytepad()Klavishnik2023-10-091-2/+2
* Fix coverity alert on use of uninitialised dataMatt Caswell2023-10-052-2/+4