summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/dh (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Expose new API in headers.tb2022-07-071-3/+1
* Prepare to provide EVP_PKEY_security_bits()tb2022-06-271-1/+8
* Prepare to provide DH_security_bits()tb2022-06-272-2/+18
* Add check for BIO_indent return valueinoguchi2022-01-201-3/+5
* Make structs in dh.h opaquetb2022-01-142-51/+44
* Unifdef LIBRESSL_OPAQUE_* and LIBRESSL_NEXT_APItb2022-01-141-5/+1
* Prepare to provide EVP_PKEY_{public,param}_checktb2022-01-101-1/+31
* Provide DH_check*_ex and many error codestb2022-01-104-4/+102
* zap trailing whitespacetb2022-01-101-5/+5
* Add an essentially empty dh_local.h and include it in the files wheretb2022-01-078-7/+83
* zap trailing whitespacetb2022-01-071-9/+9
* Prepare to provide DH_get_length()tb2022-01-052-2/+11
* Prepare to provide DH_get0_{p,q,g,{priv,pub}_key}()tb2022-01-052-2/+39
* Include evp_locl.h where it will be needed once most structs fromtb2021-12-121-1/+2
* Simplify DH_check_params a bit.tb2021-12-051-12/+4
* Add #include "bn_lcl.h" to the files that will soon need it.tb2021-12-042-2/+5
* Clean up DH_check_pub_key() and ensure that y^q (mod p) == 1.tb2021-11-291-18/+53
* Increase number of iterations in Miller-Rabin checks for DH.tb2021-11-291-4/+9
* Synchronize DH_check() mostly with OpenSSL 1.1.1 with sometb2021-11-291-32/+47
* Provide a version of DH_check_params() for internal use.tb2021-11-291-1/+43
* Provide a number of flags for DH_check and DH_check_pubkeytb2021-11-291-1/+5
* In DH_set0_pqg() also set dh->length if q is set to match what OpenSSL do.tb2021-11-231-1/+2
* Avoid leak in error path of dh_priv_decodeinoguchi2020-01-041-1/+2
* Fix BN_is_prime_* calls in libcrypto, the API returns -1 on error.tb2019-01-201-5/+12
* Missing initialization for pub_key. CID 184303.tb2018-11-121-2/+2
* Initialize priv_key and pub_key on first use instead of at the top.tb2018-11-091-6/+4
* unrevert the use of bn_rand_interval().tb2018-11-061-6/+9
* revert use of bn_rand_interval due to failures with ECDHE and TLStb2018-11-061-9/+6
* Make use of bn_rand_interval() where appropriate.tb2018-11-051-6/+9
* Eliminate a few "} else" branches, a few unneeded NULL checks beforetb2018-11-051-16/+12
* Remove two unnecessary BN_FLG_CONSTTIME dances: BN_mod_exp_ct() alreadytb2018-11-051-12/+4
* Add consts to EVP_PKEY_asn1_set_private()tb2018-08-241-2/+2
* After removing support for broken PKCS#8 formats (it was high time),tb2018-08-241-2/+2
* zap stray tabsthen2018-06-121-2/+2
* Reject excessively large primes in DH key generation. Problem reportedsthen2018-06-121-1/+6
* Remove incorrect NULL checks in DH_set0_key().tb2018-05-021-5/+1
* Convert a handful of X509_*() functions to take const as in OpenSSL.tb2018-05-011-5/+5
* make ENGINE_finish() succeed on NULL and simplify callers as intb2018-04-141-10/+6
* Provide DH_get0_engine().jsing2018-02-222-2/+9
* Fix bogus check. Spotted by brynet, thanks.tb2018-02-201-2/+4
* Provide DH_set_length()tb2018-02-202-2/+12
* Provide DH_bits()tb2018-02-202-2/+9
* Provide DH_{clear,set,test}_flags().tb2018-02-202-2/+23
* Provide {DH,DSA}_set0_key(). Requested by sthen.tb2018-02-182-2/+22
* Provide DH_set0_pqg.tb2018-02-182-2/+25
* Provide further parts of the OpenSSL 1.1 API: {DH,DSA}_get0_{key,pqg}(),tb2018-02-172-2/+26
* Send the function codes from the error functions to the bit bucket,beck2017-01-297-55/+38
* Make explicit _ct and _nonct versions of bn_mod_exp funcitons thatbeck2017-01-211-2/+4
* Expand ASN1_ITEM_rptr macro - no change in generated assembly.jsing2016-12-301-2/+2
* Kill a bunch of OLD_ASN1 usage by replacing ASN1_{d2i,i2d}_* withjsing2016-11-042-8/+30