index
:
delta/openssl-new.git
1.0.2-aead
BRANCH_ASN1
BRANCH_OpenSSL_0_9_8k
BRANCH_VMS_64BIT
BRANCH_WIN64
BRANCH_engine
OpenSSL-engine-0_9_6-stable
OpenSSL-fips-0_9_7-stable
OpenSSL-fips-0_9_8-stable
OpenSSL-fips-1_2-stable
OpenSSL-fips-2_0-dev
OpenSSL-fips-2_0-stable
OpenSSL-fips2-0_9_7-stable
OpenSSL-rfc3820-0_9_7-stable
OpenSSL_0_9_6-stable
OpenSSL_0_9_7-stable
OpenSSL_0_9_8-stable
OpenSSL_0_9_8fg-stable
OpenSSL_1_0_0-stable
OpenSSL_1_0_1-stable
OpenSSL_1_0_2-stable
OpenSSL_1_1_0-stable
OpenSSL_1_1_1-stable
OpenTLS
SSLeay
baserock/OpenSSL_1_0_1g
baserock/OpenSSL_1_0_2-stable
baserock/larswirzenius/morph
baserock/morph
baserock/pedroalvarez/power-port
baserock/ps/proto-web-system
eliminate-ssl-ctrl
master
openssl-3.0
openssl-3.1
rsalz-monolith
rt4526
supplemental-data-api-2
tls1.3-draft-18
tls1.3-draft-19
github.com: openssl/openssl.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
providers
Commit message (
Expand
)
Author
Age
Files
Lines
*
fix test failure on Kunpeng-920
zhangzhilei
2023-04-18
1
-1
/
+1
*
FFC cleanups
slontis
2023-04-03
2
-8
/
+5
*
Declare FIPS option functions in their own header
Pauli
2023-03-29
4
-5
/
+20
*
DRBG: restrict the digests that can be used with HMAC and Hash DRBGs.
Pauli
2023-03-29
4
-14
/
+37
*
fips: rework the option handling code
Pauli
2023-03-29
1
-49
/
+74
*
providers/implementations/kdfs/argon2.c: Don't use UINT64_C
Richard Levitte
2023-03-21
1
-1
/
+1
*
enable hardware acceleration for sm4-ccm
zhangzhilei
2023-03-21
1
-6
/
+30
*
Avoid freeing context on error
Pauli
2023-03-21
1
-2
/
+0
*
Coverity 1522032: use after free
Pauli
2023-03-21
1
-2
/
+2
*
providers/implementations/kdfs/argon2.c: Include openssl/e_os2.h instead of s...
Richard Levitte
2023-03-17
1
-4
/
+3
*
providers: add Argon2 KDF
Čestmír Kalina
2023-03-17
5
-0
/
+1601
*
proverr: add PROV_R_{INVALID_MEMORY_SIZE,INVALID_THREAD_POOL_SIZE}
Čestmír Kalina
2023-03-17
1
-0
/
+4
*
providers: add XOF support to blake2b
Čestmír Kalina
2023-03-17
3
-8
/
+128
*
riscv: Clean up extension test macros
Christoph Müllner
2023-03-16
11
-31
/
+35
*
enable VPSM4_EX_CAPABLE for sm4_gcm
zhangzhilei
2023-03-15
1
-12
/
+21
*
Segmentation fault in parent rng cleanup
afshinpir
2023-03-15
1
-1
/
+1
*
Updated `rsa_has()` for correct validation
afshinpir
2023-03-15
1
-2
/
+2
*
Fix size_t/int mismatch in cms_ec.c and rsa_sig.c
Tomas Mraz
2023-03-15
1
-3
/
+6
*
Remove duplicate code
zhangzhilei
2023-03-15
1
-1
/
+0
*
fips: Use salt >= 16 bytes in PBKDF2 selftest
Clemens Lang
2023-03-07
1
-6
/
+16
*
Add option to FIPS module to enforce EMS check during KDF TLS1_PRF.
slontis
2023-03-07
7
-4
/
+72
*
S390X: Accelerate keccak XOF
Juergen Christ
2023-03-07
1
-8
/
+5
*
Remove AES SIV ciphers from the FIPS provider
Pauli
2023-03-01
2
-6
/
+1
*
Fix incomplete error check on RSA_public_decrypt()
ndossche
2023-02-28
1
-1
/
+1
*
Revert "Put EdDSA back as approved algorithms."
Pauli
2023-02-22
1
-4
/
+4
*
kbkdf: Fix kbkdf_dup function pointer type
Clemens Lang
2023-02-16
1
-1
/
+1
*
Rationalize FIPS sources
Tomas Mraz
2023-02-08
5
-320
/
+362
*
des: prevent error when using two key triple DES with a random key
Pauli
2023-02-08
1
-5
/
+4
*
Put EdDSA back as approved algorithms.
Pauli
2023-02-08
1
-4
/
+4
*
Do not create DSA keys without parameters by decoder
Tomas Mraz
2023-02-07
1
-1
/
+1
*
Prevent creating DSA and DH keys without parameters through import
Tomas Mraz
2023-02-07
2
-4
/
+5
*
SM4 AESE optimization for ARMv8
Xu Yizhou
2023-02-02
4
-18
/
+47
*
ChaCha20-Poly1305 no longer supports truncated IV's.
slontis
2023-01-30
3
-23
/
+18
*
Put X25519 and X448 back as approved algorithms
Pauli
2023-01-24
1
-4
/
+4
*
Typos fixing
FdaSilvaYY
2023-01-24
1
-1
/
+1
*
Allow OSSL_SIGNATURE_PARAM_NONCE_TYPE to be retrieved
Ingo Franzki
2023-01-23
2
-0
/
+10
*
S390X: Fix Ed448ph
Juergen Christ
2023-01-19
1
-6
/
+8
*
Fix potential NULL pointer dereference
Juergen Christ
2023-01-17
1
-4
/
+4
*
s390x: Fix keccak xofs via CPACF
Juergen Christ
2023-01-16
1
-1
/
+10
*
Support all five EdDSA instances from RFC 8032
James Muir
2023-01-13
1
-22
/
+289
*
fips: make EdDSA unapproved for FIPS
Pauli
2023-01-13
1
-8
/
+9
*
SSKDF with KMAC should return SIZE_MAX when EVP_KDF_CTX_get_kdf_size()
slontis
2023-01-12
1
-6
/
+19
*
remove extra define for __NR_getrandom and add some comments
zhangzhilei
2023-01-06
1
-3
/
+1
*
Change HKDF to alloc the info buffer.
slontis
2022-12-22
1
-18
/
+60
*
ec_kmgmt.c: check the return of BN_CTX_get() in time.
xkernel
2022-12-22
1
-2
/
+8
*
Add KMAC support to KBKDF.
slontis
2022-12-16
2
-14
/
+57
*
rsa: Add option to disable implicit rejection
Hubert Kario
2022-12-12
1
-2
/
+24
*
signature: Clamp PSS salt len to MD len
Clemens Lang
2022-12-08
1
-10
/
+30
*
Implement deterministic ECDSA sign (RFC6979)
slontis
2022-11-30
10
-31
/
+361
*
aes: add AES-GCM-SIV modes to the FIPS provider
Pauli
2022-11-30
2
-4
/
+11
[next]