openssl/providers/implementations
Shane Lontis 7cc355c2e4 Add AES_CBC_CTS ciphers to providers
Added Algorithm names AES-128-CBC-CTS, AES-192-CBC-CTS and AES-256-CBC-CTS.
CS1, CS2 and CS3 variants are supported.
Only single shot updates are supported.
The cipher returns the mode EVP_CIPH_CBC_MODE (Internally it shares the aes_cbc cipher code). This
would allow existing code that uses AES_CBC to switch to the CTS variant without breaking code that
tests for this mode. Because it shares the aes_cbc code the cts128.c functions could not be used directly.
The cipher returns the flag EVP_CIPH_FLAG_CTS.
EVP_CIPH_FLAG_FIPS & EVP_CIPH_FLAG_NON_FIPS_ALLOW have been deprecated.

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/12094)
2020-07-15 23:11:50 +02:00
..
asymciphers Make the naming scheme for dispatched functions more consistent 2020-06-24 22:01:22 +02:00
ciphers Add AES_CBC_CTS ciphers to providers 2020-07-15 23:11:50 +02:00
digests Add and use internal header that implements endianness check 2020-07-11 10:00:33 +02:00
exchange Make the naming scheme for dispatched functions more consistent 2020-06-24 22:01:22 +02:00
include/prov Add AES_CBC_CTS ciphers to providers 2020-07-15 23:11:50 +02:00
kdfs Add and use internal header that implements endianness check 2020-07-11 10:00:33 +02:00
keymgmt Make the naming scheme for dispatched functions more consistent 2020-06-24 22:01:22 +02:00
macs Update copyright year 2020-06-25 14:13:12 +01:00
rands coverity 1464983: null pointer dereference 2020-07-05 13:20:09 +10:00
serializers [EC][ASN1] Detect missing OID when serializing EC parameters and keys 2020-07-06 19:15:36 +03:00
signature Make the naming scheme for dispatched functions more consistent 2020-06-24 22:01:22 +02:00
build.info rand: set up EVP and DRBG infrastructure for RAND from providers. 2020-06-24 20:05:41 +10:00