aboutsummaryrefslogtreecommitdiff
path: root/crypto/dh
AgeCommit message (Collapse)AuthorFilesLines
2007-04-02check correct pointer before freeing it (Coverity CID 79,86)Nils Larsch1-1/+1
2007-03-28Change to mitigate branch prediction attacksBodo Möller1-2/+2
Submitted by: Matthew D Wood Reviewed by: Bodo Moeller
2007-01-21Constify version strings and some structures.Dr. Stephen Henson1-1/+1
2006-11-21Update from 0.9.8 stable. Eliminate duplicate error codes.Dr. Stephen Henson2-8/+5
2006-09-29Initialise ctx to NULL to avoid uninitialized free, noticed byMark J. Cox1-1/+1
Steve Kiernan
2006-09-28Introduce limits to prevent malicious keys being able toBodo Möller3-1/+13
cause a denial of service. (CVE-2006-2940) [Steve Henson, Bodo Moeller]
2006-07-17Fix various error codes to match functions.Dr. Stephen Henson3-3/+3
2006-05-24New function to dup EVP_PKEY_CTX. This will be needed to make new signingDr. Stephen Henson1-0/+14
functions and EVP_MD_CTX_copy work properly.
2006-05-24Use size_t for new crypto size parameters.Dr. Stephen Henson1-1/+1
2006-04-17Fix (most) WIN32 warnings and errors.Dr. Stephen Henson1-1/+1
2006-04-15Use more flexible method of determining output length, by setting &outlenDr. Stephen Henson1-1/+1
value of the passed output buffer is NULL. The old method of using EVP_PKEY_size(pkey) isn't flexible enough to cover all cases where the output length may depend on the operation or the parameters associated with it.
2006-04-13Complete key derivation support.Dr. Stephen Henson4-8/+41
2006-04-13Update dependencies.Dr. Stephen Henson1-0/+14
2006-04-13Add key derivation support.Dr. Stephen Henson1-0/+2
2006-04-13Typo.Dr. Stephen Henson3-1/+3
2006-04-12Extend DH ASN1 method, add DH EVP_PKEY_METHOD.Dr. Stephen Henson5-8/+235
2006-04-12PKCS#3 DH PKCS#8 ASN1 support.Dr. Stephen Henson3-2/+121
2006-04-12Extend DH ASN1 method to support public key encode/decode and parameterDr. Stephen Henson3-21/+237
utilities.
2006-04-04New function to retrieve ASN1 info on public key algorithms. New commandDr. Stephen Henson1-1/+1
line option to print out info.
2006-03-28New utility pkeyparam. Enhance and bugfix algorithm specific parameterDr. Stephen Henson4-47/+84
functions to support it.
2006-03-23Add information and pem strings. Update dependencies.Dr. Stephen Henson2-0/+26
2006-03-22Make EVP_PKEY_ASN1_METHOD opaque. Add application level functions toDr. Stephen Henson1-0/+1
initialize it. Initial support for application added public key ASN1.
2006-03-22Move algorithm specific print code from crypto/asn1/t_pkey.c to separateDr. Stephen Henson2-2/+126
*_prn.c files in each algorithm directory.
2006-03-20DH EVP_PKEY_ASN1_METHOD, doesn't do much (yet?).Dr. Stephen Henson1-0/+92
2006-03-20Transfer parameter handling and key comparison to algorithm methods.Dr. Stephen Henson1-2/+4
2006-03-13fix error found by coverity: check if ctx is != NULL before calling BN_CTX_end()Nils Larsch1-2/+5
2006-02-04Update filenames in makefiles.Dr. Stephen Henson1-1/+1
2005-09-01Extend callback function to support print customization.Dr. Stephen Henson1-2/+3
2005-08-21Make D-H safer, include well-known primes.Ben Laurie4-0/+36
2005-05-27Use BN_with_flags() in a cleaner way.Bodo Möller1-0/+1
2005-05-16Further BUILDENV refinement, further fool-proofing of Makefiles andAndy Polyakov1-2/+1
[most importantly] put back dependencies accidentaly eliminated in check-in #13342.
2005-05-16Implement fixed-window exponentiation to mitigate hyper-threadingBodo Möller3-4/+36
timing attacks. BN_FLG_EXP_CONSTTIME requests this algorithm, and this done by default for RSA/DSA/DH private key computations unless RSA_FLAG_NO_EXP_CONSTTIME/DSA_FLAG_NO_EXP_CONSTTIME/ DH_FLAG_NO_EXP_CONSTTIME is set. Submitted by: Matthew D Wood Reviewed by: Bodo Moeller
2005-05-15Fool-proofing MakefilesAndy Polyakov1-4/+1
2005-04-28Pointer to BN_MONT_CTX could be used uninitialized.Andy Polyakov1-2/+2
2005-04-27Change method_mont_p from (char *) to (BN_MONT_CTX *) and remove severalDr. Stephen Henson2-6/+4
casts.
2005-04-26Port BN_MONT_CTX_set_locked() from stable branch.Dr. Stephen Henson1-10/+14
The function rsa_eay_mont_helper() has been removed because it is no longer needed after this change.
2005-04-26Fix various incorrect error function codes.Bodo Möller4-11/+13
("perl util/ck_errf.pl */*.c */*/*.c" still reports many more.)
2005-04-12Rebuild error codes.Dr. Stephen Henson1-12/+15
2005-04-11Add emacs cache files to .cvsignore.Richard Levitte1-0/+2
2005-03-31Give everything prototypes (well, everything that's actually used).Ben Laurie1-11/+3
2005-03-30Blow away Makefile.ssl.Ben Laurie1-4/+3
2004-11-02Don't use $(EXHEADER) directly in for loops, as most shells will breakRichard Levitte1-1/+1
if $(EXHEADER) is empty. Notified by many, solution suggested by Carson Gaspar <carson@taltos.org>
2004-05-17After the latest round of header-hacking, regenerate the dependencies inGeoff Thorpe1-7/+7
the Makefiles. NB: this commit is probably going to generate a huge posting and it is highly uninteresting to read.
2004-05-17Deprecate the recursive includes of bn.h from various API headers (asn1.h,Geoff Thorpe1-2/+3
dh.h, dsa.h, ec.h, ecdh.h, ecdsa.h, rsa.h), as the opaque bignum types are already declared in ossl_typ.h. Add explicit includes for bn.h in those C files that need access to structure internals or API functions+macros.
2004-04-19make updateGeoff Thorpe1-15/+7
2004-04-19Reduce header interdependencies, initially in engine.h (the rest of theGeoff Thorpe1-3/+6
changes are the fallout). As this could break source code that doesn't directly include headers for interfaces it uses, changes to recursive includes are covered by the OPENSSL_NO_DEPRECATED symbol. It's better to define this when building and using openssl, and then adapt code where necessary - this is how to stay current. However the mechanism exists for the lethargic.
2003-12-27Use sh explicitely to run point.shRichard Levitte1-1/+1
This is part of a large change submitted by Markus Friedl <markus@openbsd.org>
2003-11-28Netware-specific changes,Richard Levitte1-3/+3
PR: 780 Submitted by: Verdon Walker <VWalker@novell.com> Reviewed by: Richard Levitte
2003-10-29Update any code that was using deprecated functions so that everything buildsGeoff Thorpe1-6/+10
and links with OPENSSL_NO_DEPRECATED defined.
2003-10-29When OPENSSL_NO_DEPRECATED is defined, deprecated functions are (or shouldGeoff Thorpe1-0/+4
be) precompiled out in the API headers. This change is to ensure that if it is defined when compiling openssl, the deprecated functions aren't implemented either.