summaryrefslogtreecommitdiffstats
path: root/providers (follow)
Commit message (Expand)AuthorAgeFilesLines
* Fix typo in cipher_chacha20_poly1305_hw.c.Kelvin Lee2019-10-311-1/+1
* KDF: use string names not macros to align with other algorithms.Pauli2019-10-312-15/+15
* Add KRB5KDF from RFC 3961Simo Sorce2019-10-236-0/+444
* ciphers/chacha20,poly1303: Fix two coverity errorsDr. Matthias St. Pierre2019-10-202-2/+2
* New RSA keymgmt implementation to handle import / export of RSA keysRichard Levitte2019-10-174-0/+253
* DSA: Add export of keys and domain parameters from providerRichard Levitte2019-10-171-0/+61
* DH: Add export of keys and domain parameters from providerRichard Levitte2019-10-171-0/+60
* DSA: Add export of domain parameters to providerRichard Levitte2019-10-171-17/+49
* DH: Add export of domain parameters to providerRichard Levitte2019-10-171-14/+47
* [KDF] Add feedback-mode and CMAC support to KBKDFRobbie Harwood2019-10-174-21/+67
* Add ChaCha related ciphers to default providerShane Lontis2019-10-1610-6/+1132
* Remove providers/default which seems to have been missed.Pauli2019-10-101-68/+0
* Remove EVP_CIPH_FLAG_CUSTOM_CIPHER in all our providersRichard Levitte2019-10-113-7/+3
* Providers: fix OSSL_FUNC_CIPHER_CIPHER functionsRichard Levitte2019-10-113-5/+5
* Cleanup: move provider mains upRichard Levitte2019-10-105-13/+4
* Cleanup: move remaining providers/common/include/internal/*.hRichard Levitte2019-10-1041-61/+61
* Cleanup: move providers/common/include/internal/provider_args.hRichard Levitte2019-10-1057-57/+57
* Providers: move all ciphersRichard Levitte2019-10-1088-69/+148
* Providers: move all digestsRichard Levitte2019-10-1027-64/+75
* Providers: move default kdfs,macsRichard Levitte2019-10-1013-16/+25
* Providers: move common exchange,kdfs,keymgmt,macs,signatureRichard Levitte2019-10-1028-36/+70
* Rework how our providers are builtRichard Levitte2019-10-1022-125/+266
* Add rc2 ciphers to default providerShane Lontis2019-10-089-20/+352
* Move cipher ctx 'original iv' parameter into the providerShane Lontis2019-10-0816-55/+40
* RC4 is not a block cipherMatt Caswell2019-10-051-2/+2
* Move MD5-SHA1 digest completely to the default providerRichard Levitte2019-10-041-0/+37
* Adapt existing providers to posibly have name listsRichard Levitte2019-10-033-98/+172
* Add EVP_DigestSign/EVP_DigestVerify support for DSAMatt Caswell2019-10-031-5/+205
* Add rc5 ciphers to default providerShane Lontis2019-10-0311-28/+260
* Fix Coverity issuesShane Lontis2019-10-032-7/+12
* Remove EVP_CIPH_FLAG_DEFAULT_ASN1 from all provided implementationsRichard Levitte2019-10-019-34/+35
* Fix header file include guard namesDr. Matthias St. Pierre2019-09-283-8/+8
* Reorganize public header files (part 1)Dr. Matthias St. Pierre2019-09-281-1/+1
* Reorganize local header filesDr. Matthias St. Pierre2019-09-2814-13/+13
* Reorganize private crypto header filesDr. Matthias St. Pierre2019-09-2822-25/+25
* [KDF] Add KBKDF implementation for counter-mode HMACRobbie Harwood2019-09-276-1/+309
* When building of modules is disabled, build the legacy provider into libcryptoRichard Levitte2019-09-264-13/+33
* Missing else in cipher_hw_aes_ocb_generic_initkeyFangming.Fang2019-09-261-1/+1
* Remove engine param from the settable listPauli2019-09-253-3/+0
* Make the "engine" parameter to some provider algorithms (KDF/PRF) hidden.Pauli2019-09-251-3/+3
* Add rc4 cipher to default providerShane Lontis2019-09-256-0/+160
* Add des ciphers to default providerShane Lontis2019-09-236-4/+388
* Remove name string from PROV_CIPHER and PROV_DIGESTRichard Levitte2019-09-202-24/+0
* Refactor SSKDF to create the MAC contexts earlyRichard Levitte2019-09-201-53/+32
* Refactor TLS-PRF's kdf_tls1_prf_mkmacctx() to a provider utilityRichard Levitte2019-09-203-50/+124
* Add aes_wrap cipher to providersShane Lontis2019-09-205-2/+283
* Move gcm decryption tag check higher up in the callstackShane Lontis2019-09-202-3/+4
* Modify providers that keep track of underlying algorithmsRichard Levitte2019-09-193-10/+31
* Fix Solaris compile errors in provider ciphersShane Lontis2019-09-192-3/+3
* Add aes_ocb cipher to providersShane Lontis2019-09-198-4/+665