aboutsummaryrefslogtreecommitdiff
path: root/crypto/evp
AgeCommit message (Expand)AuthorFilesLines
2007-02-27Update from stable branch.Dr. Stephen Henson1-1/+1
2007-02-26allow EVP_PKEY_CTX_free(NULL)Nils Larsch1-0/+2
2007-02-08Add -hmac option to dgst from 0.9.7 stable branch.Dr. Stephen Henson2-0/+7
2007-01-21Constify version strings and some structures.Dr. Stephen Henson2-2/+2
2006-12-21fix orderNils Larsch1-1/+1
2006-12-20add support for ecdsa-with-sha256 etc.Nils Larsch1-4/+4
2006-12-19remove trailing '\'Nils Larsch1-1/+1
2006-11-29replace macros with functionsNils Larsch2-28/+140
2006-11-21Update from 0.9.8 stable. Eliminate duplicate error codes.Dr. Stephen Henson1-7/+4
2006-11-08Fix various warnings.Ben Laurie1-3/+0
2006-08-31Fix C++ style comments, change assert to OPENSSL_assert, stop warning withDr. Stephen Henson1-0/+6
2006-08-28Make things static that should be. Declare stuff in headers that should be.Ben Laurie2-2/+7
2006-07-17Fix various error codes to match functions.Dr. Stephen Henson4-2/+4
2006-07-12New docs for EVP_Digest{Sign,Verify}*() function. Update existing docs.Dr. Stephen Henson2-12/+5
2006-07-10Allow digests to supply S/MIME micalg values from a ctrl.Dr. Stephen Henson2-3/+11
2006-07-09New functions to add and free up application defined signature OIDs.Dr. Stephen Henson1-0/+1
2006-07-09New functions to enumerate digests and ciphers.Dr. Stephen Henson2-0/+79
2006-07-04Typos(?) in HEAD/crypto/evp/p_lib.c.Andy Polyakov1-3/+3
2006-07-02Make return value from EVP_PKEY_cmp() and EVP_PKEY_cmp_parameters() consistent.Dr. Stephen Henson1-5/+14
2006-06-27Fix EVP_PKEY_CTX_dup() to return correct value and handle NULL keys inDr. Stephen Henson1-7/+5
2006-06-11Camellia cipher, contributed by NTTBodo Möller1-0/+125
2006-06-09Camellia cipher, contributed by NTTBodo Möller6-12/+211
2006-06-05Complete EVP_PKEY_ASN1_METHOD ENGINE support.Dr. Stephen Henson5-40/+114
2006-06-02Make update.Dr. Stephen Henson1-3/+3
2006-06-02Extend default method string to include public key methods.Dr. Stephen Henson1-2/+9
2006-06-02Typo.Dr. Stephen Henson1-1/+1
2006-06-02Add ENGINE support for EVP_PKEY_METHOD including lookups of ENGINEDr. Stephen Henson4-3/+51
2006-06-01Fix error code. make updateDr. Stephen Henson1-0/+13
2006-05-31New pkey functions for keygen callbacks and retrieving operation type.Dr. Stephen Henson3-0/+21
2006-05-25Add prototypes, update Win32 ordinals.Dr. Stephen Henson1-0/+4
2006-05-25Update EVP_MD_CTX_copy_ex() to use EVP_PKEY_CTX_dup().Dr. Stephen Henson2-0/+11
2006-05-24New function to dup EVP_PKEY_CTX. This will be needed to make new signingDr. Stephen Henson2-0/+43
2006-05-24New functions for enchanced digest sign/verify.Dr. Stephen Henson3-2/+156
2006-05-24Fix warnings.Dr. Stephen Henson1-1/+1
2006-05-24Use size_t for new crypto size parameters.Dr. Stephen Henson4-59/+60
2006-05-22Add ctrl to EVP_MD and EVP_PKEY_CTX to EVP_MD_CTX. These will be usedDr. Stephen Henson1-0/+36
2006-05-18Code tidy.Dr. Stephen Henson1-2/+1
2006-05-18make updateDr. Stephen Henson1-5/+5
2006-05-17HMAC OIDs from RFC4231.Dr. Stephen Henson1-0/+4
2006-05-15Add PRF preference ctrl to ciphers.Dr. Stephen Henson2-0/+6
2006-05-15Change builting PBE to use static table. Add entries for HMAC and MD5, GOST.Dr. Stephen Henson3-39/+96
2006-05-14Extend PBE code to support non default PKCS#5 v2.0 PRFs.Dr. Stephen Henson4-60/+171
2006-05-11New functions to get key types without dereferncing EVP_PKEY.Dr. Stephen Henson2-0/+12
2006-05-08Update PKCS#7 enveloped data to new API.Dr. Stephen Henson1-1/+4
2006-05-07Add support for default public key digest type ctrl.Dr. Stephen Henson2-0/+12
2006-04-28Update EVP_PKEY_cmp() and X509_check_private() to return sensible values andDr. Stephen Henson1-1/+1
2006-04-27Replace RSA specific PKCS7_RECIP_INFO set up with an public key algorithmDr. Stephen Henson1-0/+1
2006-04-26Add prototypes and pkey accessor function for EVP_PKEY_CTX.Dr. Stephen Henson2-0/+10
2006-04-21Add 'flags' parameter to EVP_PKEY_asn1_meth_new() to set algorithm flags.Dr. Stephen Henson1-1/+1
2006-04-20as we encrypt every bit separately we need to loop through the numberNils Larsch1-1/+1