index
:
openssl
OpenSSL-engine-0_9_6-stable
OpenSSL-fips-0_9_7-stable
OpenSSL-fips-0_9_8-stable
OpenSSL-fips-1_2-stable
OpenSSL-fips-2_0-dev
OpenSSL-fips-2_0-stable
OpenSSL-fips2-0_9_7-stable
OpenSSL_0_9_6-stable
OpenSSL_0_9_7-stable
OpenSSL_0_9_8-stable
OpenSSL_0_9_8fg-stable
OpenSSL_1_0_0-stable
OpenSSL_1_0_1-stable
OpenSSL_1_0_2-stable
OpenSSL_1_1_0-stable
OpenSSL_1_1_1-stable
SSLeay
feature/dtls-1.3
feature/ech
feature/quic-server
master
openssl-3.0
openssl-3.1
openssl-3.2
openssl-3.3
tls1.3-draft-18
tls1.3-draft-19
Mirror of https://github.com/openssl/openssl
matthias
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
providers
Age
Commit message (
Expand
)
Author
2023-10-26
riscv: Provide vector crypto implementation of AES-ECB mode.
Phoebe Chen
2023-10-26
riscv: Provide vector crypto implementation of AES-128/256-XTS mode.
Jerry Shih
2023-10-26
Fix the aes-xts key-length checking condition and hw declaration.
Jerry Shih
2023-10-26
Provide additional AES-GCM test patterns to enhance test coverage.
Phoebe Chen
2023-10-26
riscv: Provide vector crypto implementation of AES-GCM mode.
Jerry Shih
2023-10-26
Minor changes of the GCM-related code.
Jerry Shih
2023-10-26
riscv: Provide vector crypto implementation of AES-CTR mode.
Phoebe Chen
2023-10-26
riscv: Use the optimized rvv AES-128/192/256-CBC.
Phoebe Chen
2023-10-26
Update for Zvkb extension.
Jerry Shih
2023-10-26
riscv: Implement AES-192
Ard Biesheuvel
2023-10-26
riscv: SM4: Provide a Zvksed-based implementation
Christoph Müllner
2023-10-26
riscv: AES: Provide a Zvkned-based implementation
Christoph Müllner
2023-10-26
Accept longer context for TLS 1.2 exporters
Daiki Ueno
2023-10-25
Blake2b: Use OSSL_DIGEST_PARAM_SIZE as settable instead of XOFLEN
Tomas Mraz
2023-10-24
rand: fix seeding from a weak entropy source
Matthias St. Pierre
2023-10-20
rand: add callbacks to cleanup the user entropy resp. nonce
Matthias St. Pierre
2023-10-16
Avoid another copy of key schedule pointer in PROV_GCM_CTX
Tomas Mraz
2023-10-11
DH_check_pub_key() should not fail when setting result code
Tomas Mraz
2023-10-09
Avoid divide-by-zero in kmac_prov.c's bytepad()
Klavishnik
2023-10-05
Fix coverity alert on use of uninitialised data
Matt Caswell
2023-10-04
Restore the meaning of EVP_PKEY_print_private()
Richard Levitte
2023-10-02
Coverity 1545174: calling risky function
Pauli
2023-09-28
make update
Matt Caswell
2023-09-28
Copyright year updates
Matt Caswell
2023-09-27
Fix a mem leak when the FIPS provider is used in a different thread
Matt Caswell
2023-09-27
fips: use seed source requested
Pauli
2023-09-27
fips selftest: avoid relying on a real RNG for self tests
Pauli
2023-09-27
fix indentation
Pauli
2023-09-27
remove redundant free of NULL
Pauli
2023-09-18
Fix new typos found by codespell
Dimitri Papadopoulos
2023-09-17
Fix a key repointing in various ciphers
Neil Horman
2023-09-15
Remove use of _Static_assert
Matt Caswell
2023-09-15
Fix build of SHA3 on ARM64 with no-asm
Tomas Mraz
2023-09-14
Have legacy blake2 EVP structure use base blake2 implementation
Richard Levitte
2023-09-13
Fix a memleak in prepare_rsa_params
Bernd Edlinger
2023-09-12
Add dupctx support to rc4_hmac_md5 algo
Neil Horman
2023-09-12
implement dupctx for chacha20_poly1305
Neil Horman
2023-09-12
Fix aes_gcm_siv dupctx function
Neil Horman
2023-09-12
implement dupctx for aes_WRAP methods
Neil Horman
2023-09-12
Add dupctx support to aead ciphers
Neil Horman
2023-09-11
"foo * bar" should be "foo *bar"
Dimitri Papadopoulos
2023-09-11
Remove repeated words
Dimitri Papadopoulos
2023-09-07
make update
Matt Caswell
2023-09-07
Copyright year updates
Matt Caswell
2023-09-04
Implement dupctx for chacha20 cipher
Neil Horman
2023-08-16
Fix decoders so that they use the passed in propq.
slontis
2023-08-04
When exporting/importing decoded keys do not use 0 as selection
Tomas Mraz
2023-08-04
Avoid exporting bogus (empty) data if empty selection is used
Tomas Mraz
2023-08-01
Don't add the msblob/pvk decoders if they're not suitable
Matt Caswell
2023-07-21
Update with `ARMV8_HAVE_SHA3_AND_WORTH_USING`
sdlyyxy
[next]