aboutsummaryrefslogtreecommitdiffstats
path: root/providers
Commit message (Expand)AuthorAgeFilesLines
* Do not use stitched AES-GCM implementation on PPC32Tomas Mraz2023-06-301-1/+1
* Add support for SHA256/192Fergus Dall2023-06-284-1/+9
* fips: use tsan counter instead of tsan_add to incrementPauli2023-06-161-1/+1
* Fix typos found by codespellDimitri Papadopoulos2023-06-154-4/+4
* fips: update DSA security check to fix legacy verify strengthsPauli2023-06-151-7/+15
* fips: use memory ordering rather than locksPauli2023-06-141-36/+14
* configure: introduce no-ecx to remove ECX related featureYi Li2023-06-1413-49/+91
* add cygwin CIMichael Baentsch2023-06-121-1/+1
* Fix build on cygwinMichael Baentsch2023-06-121-1/+3
* Coverity 1531836: Check return value of CRYPTO_atomic_add()Tomas Mraz2023-06-101-2/+3
* Set RC4 defines on libcrypto/liblegacyTomas Mraz2023-06-101-0/+3
* Cast the argument to unsigned char when calling isdigit()Michael Baentsch2023-06-061-3/+3
* gcm: use the new faster param location mechanism.Pauli2023-06-021-0/+1
* params: provide a faster TRIE based param lookup.Pauli2023-06-021-135/+152
* Enable obtaining certain DRBG params without a lockMatt Caswell2023-06-025-10/+59
* Refactor the DRBG implementations to manage locking themselvesMatt Caswell2023-06-025-59/+261
* If oaep_md is not initialized, correctly initialize itDmitry Belyavskiy2023-05-231-3/+5
* Update the FIPS checksumsTomas Mraz2023-05-223-138/+174
* Update hkdf.c to avoid potentially vulnerable code patternNicky Mouha2023-05-191-1/+1
* provider: return error if buf too small when getting ec pubkey paramYi Li2023-05-121-1/+1
* Update KDFs to use shared functions.Pauli2023-04-263-109/+42
* Replaced '{ 0, NULL }' with OSSL_DISPATCH_END in OSSL_DISPATCH arraysIrak Rigia2023-04-2186-100/+100
* Minor refactoring of the Argon2 derive functionTomas Mraz2023-04-211-48/+30
* fix test failure on Kunpeng-920zhangzhilei2023-04-181-1/+1
* FFC cleanupsslontis2023-04-032-8/+5
* Declare FIPS option functions in their own headerPauli2023-03-294-5/+20
* DRBG: restrict the digests that can be used with HMAC and Hash DRBGs.Pauli2023-03-294-14/+37
* fips: rework the option handling codePauli2023-03-291-49/+74
* providers/implementations/kdfs/argon2.c: Don't use UINT64_CRichard Levitte2023-03-211-1/+1
* enable hardware acceleration for sm4-ccmzhangzhilei2023-03-211-6/+30
* Avoid freeing context on errorPauli2023-03-211-2/+0
* Coverity 1522032: use after freePauli2023-03-211-2/+2
* providers/implementations/kdfs/argon2.c: Include openssl/e_os2.h instead of s...Richard Levitte2023-03-171-4/+3
* providers: add Argon2 KDFČestmír Kalina2023-03-175-0/+1601
* proverr: add PROV_R_{INVALID_MEMORY_SIZE,INVALID_THREAD_POOL_SIZE}Čestmír Kalina2023-03-171-0/+4
* providers: add XOF support to blake2bČestmír Kalina2023-03-173-8/+128
* riscv: Clean up extension test macrosChristoph Müllner2023-03-1611-31/+35
* enable VPSM4_EX_CAPABLE for sm4_gcmzhangzhilei2023-03-151-12/+21
* Segmentation fault in parent rng cleanupafshinpir2023-03-151-1/+1
* Updated `rsa_has()` for correct validationafshinpir2023-03-151-2/+2
* Fix size_t/int mismatch in cms_ec.c and rsa_sig.cTomas Mraz2023-03-151-3/+6
* Remove duplicate codezhangzhilei2023-03-151-1/+0
* fips: Use salt >= 16 bytes in PBKDF2 selftestClemens Lang2023-03-071-6/+16
* Add option to FIPS module to enforce EMS check during KDF TLS1_PRF.slontis2023-03-077-4/+72
* S390X: Accelerate keccak XOFJuergen Christ2023-03-071-8/+5
* Remove AES SIV ciphers from the FIPS providerPauli2023-03-012-6/+1
* Fix incomplete error check on RSA_public_decrypt()ndossche2023-02-281-1/+1
* Revert "Put EdDSA back as approved algorithms."Pauli2023-02-221-4/+4
* kbkdf: Fix kbkdf_dup function pointer typeClemens Lang2023-02-161-1/+1
* Rationalize FIPS sourcesTomas Mraz2023-02-085-320/+362