aboutsummaryrefslogtreecommitdiff
path: root/src/lib/crypto
AgeCommit message (Expand)AuthorFilesLines
2010-10-02Be more parsimonious with /dev/random when using the NSS PRNGnssGreg Hudson1-3/+6
2010-10-02Make the NSS back end compile and work again in the presence of theGreg Hudson6-18/+197
2010-09-30Merge r24242:24397 from trunk to branches/nss. This will break theGreg Hudson77-611/+6669
2010-09-30Wrap cached symkeys in a structure containing the current pid, so thatGreg Hudson1-16/+41
2010-09-30Apply Red Hat copyright and license statements (using the one fromGreg Hudson14-365/+385
2010-09-30Follow-up to r24365: call both PK11_Finalize and PK11_DestroyContextGreg Hudson1-5/+16
2010-09-29Make DO_FAST_XOR code unconditional in the NSS back endGreg Hudson1-6/+0
2010-09-29Make USE_OPAQUE_KEYS unconditional in the NSS back endGreg Hudson1-28/+0
2010-09-29Remove NSS_LOOKUP_STRING code since we aren't likely to need itGreg Hudson1-26/+0
2010-09-28Clean up hash and digest contexts in the back end to avoid refcountGreg Hudson2-2/+2
2010-09-28Use the PK11_DestroyContext() instead of PK11_Finalize() to destroyGreg Hudson1-1/+1
2010-09-27Use the PK11_DestroyContext() instead of PK11_Finalize() to destroyGreg Hudson1-6/+6
2010-09-27Revert unintended change in last commit to k5_nss_init()Greg Hudson1-1/+1
2010-09-27Fix cleanup handler in k5_nss_init to return an error if there is oneGreg Hudson1-2/+2
2010-09-26When using stream ciphers with NSS, use a loopback pointer instead ofGreg Hudson1-15/+37
2010-09-25When NSS is the crypto implementation, use the NSS PRNG. Avoids theGreg Hudson3-12/+81
2010-09-25In the NSS crypto back end, add mutex protection and fork protectionGreg Hudson6-25/+149
2010-09-11In the NSS mit_des_string_to_key_int, zero out pbe_params beforeGreg Hudson1-0/+1
2010-08-21Style pass over the NSS back endGreg Hudson24-664/+627
2010-08-19Remove unneeded file in NSS back endGreg Hudson1-3/+0
2010-08-19Make NSS back-end build when the build directory is separate from theGreg Hudson2-2/+2
2010-08-19Merge changes from branches/krb5-1-8-nss. Omit the t_encrypt.c changesGreg Hudson46-1/+3561
2010-07-19Allow Microsoft HMAC-MD5 checksum types to use non-RC4 keysGreg Hudson2-4/+6
2010-06-10In yarrow.c, undefine k5-trace.h's TRACE before defining it to avoid aGreg Hudson1-0/+1
2010-06-07make dependGreg Hudson18-428/+489
2010-06-04Add krb5_enctype_to_name() APIGreg Hudson3-3/+30
2010-05-16Reformat with shorter linesKen Raeburn1-15/+23
2010-05-16Delete an old pre-Yarrow itemKen Raeburn1-4/+0
2010-04-26Squash some warnings in the old crypto API glue. Use make_data()Greg Hudson1-42/+20
2010-02-18Fix cipher state chaining in OpenSSL back endGreg Hudson3-61/+90
2010-02-17Add display statements for the encrypted tokens generated by t_encryptGreg Hudson1-0/+24
2010-01-27Get rid of kdb_ext.h and allow out-of-tree KDB pluginsGreg Hudson1-0/+10
2010-01-12Add test program for decryption of overly short buffersGreg Hudson2-2/+135
2010-01-09krb5int_pbkdf2_hmac_sha1 fails to set enctype on keyblockEzra Peisach1-0/+1
2010-01-08krb5int_dk_string_to_key fails to set enctypeEzra Peisach1-0/+1
2010-01-08Set enctype in crypto_tests to prevent memory leaksEzra Peisach2-17/+13
2010-01-08yarrow code does not initialize keyblock enctype and uses unitialized valueEzra Peisach2-0/+2
2010-01-08krb5int_derive_key results in cache with uninitialized valuesEzra Peisach1-0/+4
2010-01-03Update dependenciesKen Raeburn4-54/+24
2010-01-03Enable caching of key-derived context info such as key schedules fromKen Raeburn2-18/+60
2010-01-03Fix a case where krb5int_aes_decrypt was trying to encrypt a blockGreg Hudson1-1/+1
2009-12-31Declare function as static to avoid compiler warning on missing prototypesEzra Peisach1-1/+2
2009-12-31Remove $(TOBJS) for make cleanEzra Peisach1-1/+1
2009-12-31Initialize hash_iov, in case of premature error exitKen Raeburn1-1/+1
2009-12-29Combine the related code into one fileZhanna Tsitkov5-143/+55
2009-12-14fast negotiation projecSam Hartman1-0/+8
2009-12-10Don't use sizeof(pointertype) to get the length of an allocated arrayTom Yu1-1/+1
2009-12-10Add comments to make it slightly clearer howGreg Hudson1-1/+2
2009-12-10Restructure the crypto checksum implementation to minimizeGreg Hudson44-1278/+858
2009-12-06Initialize ihash_iov in case fall through to cleanup handler and tryEzra Peisach1-1/+1