index
:
openssl
master
openssl
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
providers
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
If oaep_md is not initialized, correctly initialize it
Dmitry Belyavskiy
2023-05-23
1
-3
/
+5
*
Update the FIPS checksums
Tomas Mraz
2023-05-22
3
-138
/
+174
*
Update hkdf.c to avoid potentially vulnerable code pattern
Nicky Mouha
2023-05-19
1
-1
/
+1
*
provider: return error if buf too small when getting ec pubkey param
Yi Li
2023-05-12
1
-1
/
+1
*
Update KDFs to use shared functions.
Pauli
2023-04-26
3
-109
/
+42
*
Replaced '{ 0, NULL }' with OSSL_DISPATCH_END in OSSL_DISPATCH arrays
Irak Rigia
2023-04-21
86
-100
/
+100
*
Minor refactoring of the Argon2 derive function
Tomas Mraz
2023-04-21
1
-48
/
+30
*
fix test failure on Kunpeng-920
zhangzhilei
2023-04-18
1
-1
/
+1
*
FFC cleanups
slontis
2023-04-03
2
-8
/
+5
*
Declare FIPS option functions in their own header
Pauli
2023-03-29
4
-5
/
+20
*
DRBG: restrict the digests that can be used with HMAC and Hash DRBGs.
Pauli
2023-03-29
4
-14
/
+37
*
fips: rework the option handling code
Pauli
2023-03-29
1
-49
/
+74
*
providers/implementations/kdfs/argon2.c: Don't use UINT64_C
Richard Levitte
2023-03-21
1
-1
/
+1
*
enable hardware acceleration for sm4-ccm
zhangzhilei
2023-03-21
1
-6
/
+30
*
Avoid freeing context on error
Pauli
2023-03-20
1
-2
/
+0
*
Coverity 1522032: use after free
Pauli
2023-03-20
1
-2
/
+2
*
providers/implementations/kdfs/argon2.c: Include openssl/e_os2.h instead of s...
Richard Levitte
2023-03-17
1
-4
/
+3
*
providers: add Argon2 KDF
Čestmír Kalina
2023-03-17
5
-0
/
+1601
*
proverr: add PROV_R_{INVALID_MEMORY_SIZE,INVALID_THREAD_POOL_SIZE}
Čestmír Kalina
2023-03-17
1
-0
/
+4
*
providers: add XOF support to blake2b
Čestmír Kalina
2023-03-17
3
-8
/
+128
*
riscv: Clean up extension test macros
Christoph Müllner
2023-03-16
11
-31
/
+35
*
enable VPSM4_EX_CAPABLE for sm4_gcm
zhangzhilei
2023-03-15
1
-12
/
+21
*
Segmentation fault in parent rng cleanup
afshinpir
2023-03-14
1
-1
/
+1
*
Updated `rsa_has()` for correct validation
afshinpir
2023-03-14
1
-2
/
+2
*
Fix size_t/int mismatch in cms_ec.c and rsa_sig.c
Tomas Mraz
2023-03-14
1
-3
/
+6
*
Remove duplicate code
zhangzhilei
2023-03-14
1
-1
/
+0
*
fips: Use salt >= 16 bytes in PBKDF2 selftest
Clemens Lang
2023-03-07
1
-6
/
+16
*
Add option to FIPS module to enforce EMS check during KDF TLS1_PRF.
slontis
2023-03-07
7
-4
/
+72
*
S390X: Accelerate keccak XOF
Juergen Christ
2023-03-07
1
-8
/
+5
*
Remove AES SIV ciphers from the FIPS provider
Pauli
2023-03-01
2
-6
/
+1
*
Fix incomplete error check on RSA_public_decrypt()
ndossche
2023-02-28
1
-1
/
+1
*
Revert "Put EdDSA back as approved algorithms."
Pauli
2023-02-22
1
-4
/
+4
*
kbkdf: Fix kbkdf_dup function pointer type
Clemens Lang
2023-02-16
1
-1
/
+1
*
Rationalize FIPS sources
Tomas Mraz
2023-02-08
5
-320
/
+362
*
des: prevent error when using two key triple DES with a random key
Pauli
2023-02-08
1
-5
/
+4
*
Put EdDSA back as approved algorithms.
Pauli
2023-02-07
1
-4
/
+4
*
Do not create DSA keys without parameters by decoder
Tomas Mraz
2023-02-07
1
-1
/
+1
*
Prevent creating DSA and DH keys without parameters through import
Tomas Mraz
2023-02-07
2
-4
/
+5
*
SM4 AESE optimization for ARMv8
Xu Yizhou
2023-02-02
4
-18
/
+47
*
ChaCha20-Poly1305 no longer supports truncated IV's.
slontis
2023-01-30
3
-23
/
+18
*
Put X25519 and X448 back as approved algorithms
Pauli
2023-01-24
1
-4
/
+4
*
Typos fixing
FdaSilvaYY
2023-01-24
1
-1
/
+1
*
Allow OSSL_SIGNATURE_PARAM_NONCE_TYPE to be retrieved
Ingo Franzki
2023-01-23
2
-0
/
+10
*
S390X: Fix Ed448ph
Juergen Christ
2023-01-19
1
-6
/
+8
*
Fix potential NULL pointer dereference
Juergen Christ
2023-01-17
1
-4
/
+4
*
s390x: Fix keccak xofs via CPACF
Juergen Christ
2023-01-16
1
-1
/
+10
*
Support all five EdDSA instances from RFC 8032
James Muir
2023-01-13
1
-22
/
+289
*
fips: make EdDSA unapproved for FIPS
Pauli
2023-01-12
1
-8
/
+9
*
SSKDF with KMAC should return SIZE_MAX when EVP_KDF_CTX_get_kdf_size()
slontis
2023-01-12
1
-6
/
+19
*
remove extra define for __NR_getrandom and add some comments
zhangzhilei
2023-01-06
1
-3
/
+1
[next]