summaryrefslogtreecommitdiff
path: root/providers
Commit message (Expand)AuthorAgeFilesLines
* make updateTomas Mraz2022-12-013-132/+158
* Update copyright yearTomas Mraz2022-12-0138-38/+38
* Honor OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT as set and default to UNCOMP...Nicola Tuveri2022-11-291-1/+3
* Fix AES-GCM on Power 8 CPUsTomas Mraz2022-11-231-18/+54
* Fix PROV_RC5_CTX's original structure namePaul Yang2022-11-231-1/+1
* Cleanup EBCDIC string defintionsTodd Short2022-11-231-7/+2
* provider: cipher: aes: add riscv32 zkn (zbkb) supportHongren (Zenithal) Zheng2022-11-238-0/+311
* s390x: Optimize kmacJuergen Christ2022-11-231-1/+38
* Cleanup : directly include of `internal/nelem.h` when required.FdaSilvaYY2022-11-238-2/+6
* providers: cipher: aes: add riscv64 zkn supportHongren (Zenithal) Zheng2022-11-218-4/+192
* Make IV/buf in prov_cipher_ctx_st alignedHongren (Zenithal) Zheng2022-11-211-6/+7
* Remove duplicated #include headersJHH202022-11-215-6/+0
* fix some typoscuishuang2022-11-211-1/+1
* SM4 optimization for ARM by ASIMDDaniel Hu2022-11-212-0/+31
* Refactor OSSL_LIB_CTX to avoid using CRYPTO_EX_DATAHugo Landau2022-11-213-39/+16
* Fix the check of EC_GROUP_check_named_curvePeiwei Hu2022-11-161-1/+1
* cmac_set_ctx_params(): Fail if cipher mode is not CBCTomas Mraz2022-11-111-2/+12
* Fix bug in scrypt KDF provider dup methodHugo Landau2022-11-111-3/+8
* Further acceleration for SM4-GCM on ARMDaniel Hu2022-11-111-1/+24
* AES-GCM enabled with AVX512 vAES and vPCLMULQDQ.Andrey Matyukov2022-11-112-2/+216
* Fixed counter overflowDanny Tsen2022-11-111-1/+81
* Move e_os.h to include/internalRichard Levitte2022-11-118-8/+8
* indentation fixPauli2022-11-111-1/+1
* tls1 prf: implement ctx dup operationPauli2022-11-111-0/+27
* pkcs12 kdf: implement ctx dup operationPauli2022-11-111-0/+25
* k942 kdf: implement ctx dup operationPauli2022-11-111-0/+37
* ss KDF: implement ctx dup operationPauli2022-11-111-0/+32
* ssh kdf: implement ctx dup operationPauli2022-11-111-0/+26
* scrypt: implement ctx dup operationPauli2022-11-111-0/+35
* krb5kdf: implement ctx dup operationPauli2022-11-111-0/+23
* kbkdf: implement ctx dup operationPauli2022-11-111-0/+32
* hkdf: implement ctx dup operationPauli2022-11-111-0/+33
* pbkdf2: implement ctx dup operationPauli2022-11-111-2/+36
* pbkdf1: implement ctx dup operationPauli2022-11-111-0/+24
* prov: add a safe memdup function for context cloningPauli2022-11-112-0/+21
* Support different R_BITS lengths for KBKDFPatrick Uiterwijk2022-11-111-3/+27
* Optimize AES-GCM for uarchs with unroll and new instructionsXiaokangQian2022-11-111-6/+30
* AES-GCM performance optimzation with stitched method for p9+ ppc64leDanny Tsen2022-11-112-0/+41
* Put 3DES back into the FIPS provider as a non-approved algorithmPauli2022-11-101-1/+9
* fix indentationPauli2022-11-092-5/+5
* SM4 optimization for ARM by HW instructionDaniel Hu2022-11-093-9/+69
* providers: Add SM4 GCM implementationTianjia Zhang2022-11-0910-1/+216
* Fix typosDimitris Apostolou2022-11-095-7/+7
* check the return value of EVP_MD_fetch in ecdh_exch.c:285 & dh_exch.c:347x20182022-11-092-4/+6
* Add support for RNDRRS ProviderOrr Toledano2022-11-092-1/+73
* Check for private key existence before calling eddsa sign functionsWangchong Zhou2022-11-041-0/+8
* providers/common/der/oids_to_c.pm: Remove use of Data::DumperRichard Levitte2022-11-021-2/+0
* fips: verify that the RNG was restored after the self testsPauli2022-11-021-0/+14
* Update FIPS KATs for 140-3Pauli2022-11-023-33/+266
* Remove DES cipher from the FIPS providerPauli2022-11-021-4/+0