summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/dh (follow)
Commit message (Expand)AuthorAgeFilesLines
* Move some includes out of OPENSSL_NO_DEPRECATEDtb2023-04-181-3/+1
* Fix whitespace in DHparam_print_fp()tb2023-04-171-2/+4
* Remove now unused dh_prn.ctb2023-04-171-64/+0
* Move DHparam_print_fp() next to DHparam_print()tb2023-04-172-17/+18
* The NBs have been duly noted and ignored. Drop them.tb2023-04-131-6/+1
* Zap trailing whitespacetb2023-04-131-9/+9
* Remove files that definitely contain no code anymoretb2023-04-131-65/+0
* Move DH_generate_parameters() from dh_depr.c to dh_gen.ctb2023-04-132-20/+21
* Move a few functions out of OPENSSL_NO_DEPRECATEDtb2023-04-092-7/+6
* Call BN_free() instead of BN_clear_free().jsing2023-03-071-8/+8
* spelling fixes; from paul tagliamontejmc2022-12-261-2/+2
* Make internal header file names consistenttb2022-11-265-12/+12
* Simplify computation of max_pub_key = dh->p - 1.tb2022-07-131-4/+2
* Remove mkerr.pl remnants from LibreSSLkn2022-07-122-12/+2
* Expose new API in headers.tb2022-07-071-3/+1
* Prepare to provide EVP_PKEY_security_bits()tb2022-06-271-1/+8
* Prepare to provide DH_security_bits()tb2022-06-272-2/+18
* Add check for BIO_indent return valueinoguchi2022-01-201-3/+5
* Make structs in dh.h opaquetb2022-01-142-51/+44
* Unifdef LIBRESSL_OPAQUE_* and LIBRESSL_NEXT_APItb2022-01-141-5/+1
* Prepare to provide EVP_PKEY_{public,param}_checktb2022-01-101-1/+31
* Provide DH_check*_ex and many error codestb2022-01-104-4/+102
* zap trailing whitespacetb2022-01-101-5/+5
* Add an essentially empty dh_local.h and include it in the files wheretb2022-01-078-7/+83
* zap trailing whitespacetb2022-01-071-9/+9
* Prepare to provide DH_get_length()tb2022-01-052-2/+11
* Prepare to provide DH_get0_{p,q,g,{priv,pub}_key}()tb2022-01-052-2/+39
* Include evp_locl.h where it will be needed once most structs fromtb2021-12-121-1/+2
* Simplify DH_check_params a bit.tb2021-12-051-12/+4
* Add #include "bn_lcl.h" to the files that will soon need it.tb2021-12-042-2/+5
* Clean up DH_check_pub_key() and ensure that y^q (mod p) == 1.tb2021-11-291-18/+53
* Increase number of iterations in Miller-Rabin checks for DH.tb2021-11-291-4/+9
* Synchronize DH_check() mostly with OpenSSL 1.1.1 with sometb2021-11-291-32/+47
* Provide a version of DH_check_params() for internal use.tb2021-11-291-1/+43
* Provide a number of flags for DH_check and DH_check_pubkeytb2021-11-291-1/+5
* In DH_set0_pqg() also set dh->length if q is set to match what OpenSSL do.tb2021-11-231-1/+2
* Avoid leak in error path of dh_priv_decodeinoguchi2020-01-041-1/+2
* Fix BN_is_prime_* calls in libcrypto, the API returns -1 on error.tb2019-01-201-5/+12
* Missing initialization for pub_key. CID 184303.tb2018-11-121-2/+2
* Initialize priv_key and pub_key on first use instead of at the top.tb2018-11-091-6/+4
* unrevert the use of bn_rand_interval().tb2018-11-061-6/+9
* revert use of bn_rand_interval due to failures with ECDHE and TLStb2018-11-061-9/+6
* Make use of bn_rand_interval() where appropriate.tb2018-11-051-6/+9
* Eliminate a few "} else" branches, a few unneeded NULL checks beforetb2018-11-051-16/+12
* Remove two unnecessary BN_FLG_CONSTTIME dances: BN_mod_exp_ct() alreadytb2018-11-051-12/+4
* Add consts to EVP_PKEY_asn1_set_private()tb2018-08-241-2/+2
* After removing support for broken PKCS#8 formats (it was high time),tb2018-08-241-2/+2
* zap stray tabsthen2018-06-121-2/+2
* Reject excessively large primes in DH key generation. Problem reportedsthen2018-06-121-1/+6
* Remove incorrect NULL checks in DH_set0_key().tb2018-05-021-5/+1