summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/dh (follow)
Commit message (Expand)AuthorAgeFilesLines
* Avoid leak in error path of dh_priv_decodeinoguchi2020-01-041-1/+2
* Fix BN_is_prime_* calls in libcrypto, the API returns -1 on error.tb2019-01-201-5/+12
* Missing initialization for pub_key. CID 184303.tb2018-11-121-2/+2
* Initialize priv_key and pub_key on first use instead of at the top.tb2018-11-091-6/+4
* unrevert the use of bn_rand_interval().tb2018-11-061-6/+9
* revert use of bn_rand_interval due to failures with ECDHE and TLStb2018-11-061-9/+6
* Make use of bn_rand_interval() where appropriate.tb2018-11-051-6/+9
* Eliminate a few "} else" branches, a few unneeded NULL checks beforetb2018-11-051-16/+12
* Remove two unnecessary BN_FLG_CONSTTIME dances: BN_mod_exp_ct() alreadytb2018-11-051-12/+4
* Add consts to EVP_PKEY_asn1_set_private()tb2018-08-241-2/+2
* After removing support for broken PKCS#8 formats (it was high time),tb2018-08-241-2/+2
* zap stray tabsthen2018-06-121-2/+2
* Reject excessively large primes in DH key generation. Problem reportedsthen2018-06-121-1/+6
* Remove incorrect NULL checks in DH_set0_key().tb2018-05-021-5/+1
* Convert a handful of X509_*() functions to take const as in OpenSSL.tb2018-05-011-5/+5
* make ENGINE_finish() succeed on NULL and simplify callers as intb2018-04-141-10/+6
* Provide DH_get0_engine().jsing2018-02-222-2/+9
* Fix bogus check. Spotted by brynet, thanks.tb2018-02-201-2/+4
* Provide DH_set_length()tb2018-02-202-2/+12
* Provide DH_bits()tb2018-02-202-2/+9
* Provide DH_{clear,set,test}_flags().tb2018-02-202-2/+23
* Provide {DH,DSA}_set0_key(). Requested by sthen.tb2018-02-182-2/+22
* Provide DH_set0_pqg.tb2018-02-182-2/+25
* Provide further parts of the OpenSSL 1.1 API: {DH,DSA}_get0_{key,pqg}(),tb2018-02-172-2/+26
* Send the function codes from the error functions to the bit bucket,beck2017-01-297-55/+38
* Make explicit _ct and _nonct versions of bn_mod_exp funcitons thatbeck2017-01-211-2/+4
* Expand ASN1_ITEM_rptr macro - no change in generated assembly.jsing2016-12-301-2/+2
* Kill a bunch of OLD_ASN1 usage by replacing ASN1_{d2i,i2d}_* withjsing2016-11-042-8/+30
* call BN_init on temporaries to avoid use-before-set warningsbcook2016-07-071-1/+2
* On systems where we do not have BN_ULLONG defined (most 64-bit systems),bcook2016-07-051-1/+5
* Remove flags for disabling constant-time operations.bcook2016-06-302-34/+12
* Expand ASN1_CHOICE*, ASN1_SEQUENCE* and associated macros, making thejsing2015-02-141-6/+42
* Enable building with -DOPENSSL_NO_DEPRECATED.doug2015-02-111-1/+2
* Expand the -IMPLEMENT_ASN1_ENCODE_FUNCTIONS_(const_)?fname macros so thatjsing2015-02-101-2/+14
* BN_CTX_get() can fail - consistently check its return value.jsing2015-02-092-6/+7
* This is neither code not proper documentation.miod2015-02-097-157/+0
* Delete a lot of #if 0 code in libressl.doug2015-02-072-16/+2
* Avoid a double-free in an error path.doug2015-01-081-1/+2
* None of these need to include <openssl/rand.h>jsing2014-10-181-2/+1
* if (x) FOO_free(x) -> FOO_free(x).miod2014-07-124-30/+17
* Only import cryptlib.h in the four source files that actually need it.jsing2014-07-119-26/+31
* Explicitly include <openssl/opensslconf.h> in every file that referencesjsing2014-07-103-4/+12
* Stop including standard headers via cryptlib.h - pull in the headers thatjsing2014-07-101-2/+4
* ASN1_STRING_free can handle NULL, so callers don't need to check. ok miodtedu2014-07-091-7/+4
* Simplify error path of DH_check_pub_key()miod2014-07-091-8/+4
* KNFmiod2014-07-099-567/+599
* remove unused, private version strings except SSL_version_strbcook2014-07-091-3/+1
* simplify and unobfuscate a variable to fix a mem leak.tedu2014-06-301-6/+9
* replace atoi() calls with strtol(). Follow the idiomatic pattern in ourderaadt2014-06-121-12/+30
* tags as requested by miod and teduderaadt2014-06-1211-9/+11