Matt Caswell
75dd6d64f1
Implement AES CFB ciphers in the default provider
...
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8700 )
2019-04-19 09:31:54 +01:00
Matt Caswell
ed98df51c6
Implement AES OFB ciphers in the default provider
...
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8700 )
2019-04-19 09:31:54 +01:00
Matt Caswell
718b133a53
Implement AES CBC ciphers in the default provider
...
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8700 )
2019-04-19 09:31:54 +01:00
Matt Caswell
f4a129bb8d
Add support in the default provider for 192/128 bit AES ECB
...
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8700 )
2019-04-19 09:31:54 +01:00
Matt Caswell
861b8f8747
Add the provider_algs.h internal header file
...
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8700 )
2019-04-19 09:31:54 +01:00
Matt Caswell
aab26e6f7b
Implement support for AES-256-ECB in the default provider
...
We also lay the ground work for various of other the basic AES ciphers.
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8700 )
2019-04-19 09:31:54 +01:00
Matt Caswell
df05f2ce6d
Make EVP_Encrypt*/EVP_Decrypt* and EVP_Cipher* provider aware
...
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8700 )
2019-04-19 09:31:54 +01:00
Richard Levitte
f2dbb71cb6
providers/common/digests/sha2.c: forward declare all dispatched functions
...
Forward declare the dispatched functions using typedefs from
core_numbers.h. This will ensure that they have correct signatures.
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8747 )
2019-04-15 10:46:09 +02:00
Richard Levitte
0ad50b4dee
Providers: for the digest_final operation, pass a output buffer size
...
This allows the provider digest_final operation to check that it
doesn't over-run the output buffer.
The EVP_DigestFinal_ex function doesn't take that same parameter, so
it will have to assume that the user provided a properly sized buffer,
but this leaves better room for future enhancements of the public API.
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8747 )
2019-04-15 10:46:09 +02:00
Matt Caswell
d030892312
Add a legacy provider and put MD2 in it
...
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/8541 )
2019-04-09 10:24:43 +01:00
Matt Caswell
9efa0ae0b6
Create a FIPS provider and put SHA256 in it
...
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/8537 )
2019-04-04 23:09:47 +01:00
Matt Caswell
7556b9df59
Support EVP_MD_block_size() with providers
...
Fixes #8565
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8604 )
2019-04-03 15:50:13 +01:00
Matt Caswell
de29ff17a2
Implement SHA256 in the default provider
...
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8513 )
2019-03-21 09:23:38 +00:00
Matt Caswell
8a73348be0
Add a skeleton default provider
...
Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/8513 )
2019-03-21 09:23:38 +00:00