index
:
openssl
OpenSSL-engine-0_9_6-stable
OpenSSL-fips-0_9_7-stable
OpenSSL-fips-0_9_8-stable
OpenSSL-fips-1_2-stable
OpenSSL-fips-2_0-dev
OpenSSL-fips-2_0-stable
OpenSSL-fips2-0_9_7-stable
OpenSSL_0_9_6-stable
OpenSSL_0_9_7-stable
OpenSSL_0_9_8-stable
OpenSSL_0_9_8fg-stable
OpenSSL_1_0_0-stable
OpenSSL_1_0_1-stable
OpenSSL_1_0_2-stable
OpenSSL_1_1_0-stable
OpenSSL_1_1_1-stable
SSLeay
feature/dtls-1.3
feature/ech
feature/quic-server
master
openssl-3.0
openssl-3.1
openssl-3.2
openssl-3.3
openssl-3.4
tls1.3-draft-18
tls1.3-draft-19
Mirror of https://github.com/openssl/openssl
matthias
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
providers
Age
Commit message (
Expand
)
Author
2023-03-21
providers/implementations/kdfs/argon2.c: Don't use UINT64_C
Richard Levitte
2023-03-21
enable hardware acceleration for sm4-ccm
zhangzhilei
2023-03-21
Avoid freeing context on error
Pauli
2023-03-21
Coverity 1522032: use after free
Pauli
2023-03-17
providers/implementations/kdfs/argon2.c: Include openssl/e_os2.h instead of s...
Richard Levitte
2023-03-17
providers: add Argon2 KDF
Čestmír Kalina
2023-03-17
proverr: add PROV_R_{INVALID_MEMORY_SIZE,INVALID_THREAD_POOL_SIZE}
Čestmír Kalina
2023-03-17
providers: add XOF support to blake2b
Čestmír Kalina
2023-03-16
riscv: Clean up extension test macros
Christoph Müllner
2023-03-15
enable VPSM4_EX_CAPABLE for sm4_gcm
zhangzhilei
2023-03-15
Segmentation fault in parent rng cleanup
afshinpir
2023-03-15
Updated `rsa_has()` for correct validation
afshinpir
2023-03-15
Fix size_t/int mismatch in cms_ec.c and rsa_sig.c
Tomas Mraz
2023-03-15
Remove duplicate code
zhangzhilei
2023-03-07
fips: Use salt >= 16 bytes in PBKDF2 selftest
Clemens Lang
2023-03-07
Add option to FIPS module to enforce EMS check during KDF TLS1_PRF.
slontis
2023-03-07
S390X: Accelerate keccak XOF
Juergen Christ
2023-03-01
Remove AES SIV ciphers from the FIPS provider
Pauli
2023-02-28
Fix incomplete error check on RSA_public_decrypt()
ndossche
2023-02-22
Revert "Put EdDSA back as approved algorithms."
Pauli
2023-02-16
kbkdf: Fix kbkdf_dup function pointer type
Clemens Lang
2023-02-08
Rationalize FIPS sources
Tomas Mraz
2023-02-08
des: prevent error when using two key triple DES with a random key
Pauli
2023-02-08
Put EdDSA back as approved algorithms.
Pauli
2023-02-07
Do not create DSA keys without parameters by decoder
Tomas Mraz
2023-02-07
Prevent creating DSA and DH keys without parameters through import
Tomas Mraz
2023-02-02
SM4 AESE optimization for ARMv8
Xu Yizhou
2023-01-30
ChaCha20-Poly1305 no longer supports truncated IV's.
slontis
2023-01-24
Put X25519 and X448 back as approved algorithms
Pauli
2023-01-24
Typos fixing
FdaSilvaYY
2023-01-23
Allow OSSL_SIGNATURE_PARAM_NONCE_TYPE to be retrieved
Ingo Franzki
2023-01-19
S390X: Fix Ed448ph
Juergen Christ
2023-01-17
Fix potential NULL pointer dereference
Juergen Christ
2023-01-16
s390x: Fix keccak xofs via CPACF
Juergen Christ
2023-01-13
Support all five EdDSA instances from RFC 8032
James Muir
2023-01-13
fips: make EdDSA unapproved for FIPS
Pauli
2023-01-12
SSKDF with KMAC should return SIZE_MAX when EVP_KDF_CTX_get_kdf_size()
slontis
2023-01-06
remove extra define for __NR_getrandom and add some comments
zhangzhilei
2022-12-22
Change HKDF to alloc the info buffer.
slontis
2022-12-22
ec_kmgmt.c: check the return of BN_CTX_get() in time.
xkernel
2022-12-16
Add KMAC support to KBKDF.
slontis
2022-12-12
rsa: Add option to disable implicit rejection
Hubert Kario
2022-12-08
signature: Clamp PSS salt len to MD len
Clemens Lang
2022-11-30
Implement deterministic ECDSA sign (RFC6979)
slontis
2022-11-30
aes: add AES-GCM-SIV modes to the FIPS provider
Pauli
2022-11-29
providers: Add SM4 XTS implementation
Xu Yizhou
2022-11-29
Honor OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT as set and default to UNCOMP...
Nicola Tuveri
2022-11-25
Implements Hybrid Public Key Encryption (HPKE) as per RFC9180.
Stephen Farrell
2022-11-23
Cleanup : directly include of `internal/nelem.h` when required.
FdaSilvaYY
2022-11-16
Fix the check of EC_GROUP_check_named_curve
Peiwei Hu
[next]