aboutsummaryrefslogtreecommitdiff
path: root/crypto/dsa
AgeCommit message (Expand)AuthorFilesLines
2019-10-14Add BN_check_prime()Kurt Roeckx1-6/+4
2019-10-09Explicitly test against NULL; do not use !p or similarRich Salz1-2/+2
2019-09-28Reorganize local header filesDr. Matthias St. Pierre11-10/+10
2019-09-28Reorganize private crypto header filesDr. Matthias St. Pierre4-5/+5
2019-09-25s390x assembly pack: accelerate X25519, X448, Ed25519 and Ed448Patrick Steuer1-1/+6
2019-09-24fix for dsa key size feature request issue: pkey -text or -text_pub should sh...jayaram1-0/+7
2019-09-12util/mkerr.pl: make it not depend on the function codeRichard Levitte1-1/+1
2019-09-09Implement DSA in the default providerMatt Caswell5-3/+76
2019-07-31make RSA and DSA operations throw MISSING_PRIVATE_KEY if needed, adapt ECDSADavid von Oheimb2-0/+10
2019-07-16Regenerate mkerr filesRich Salz1-34/+2
2019-07-12Convert asn1_dsa.c to use the WPACKET API insteadMatt Caswell1-16/+28
2019-07-12Add simple ASN.1 utils for DSA signature DER.David Makepeace1-7/+57
2019-07-02Fix TyposAntoine Cœur1-1/+1
2019-05-28The SHA256 is not a mandatory digest for DSA.Tomas Mraz1-1/+1
2019-05-22EVP_Digest*: enable SHA3 pre-hashing for DSAPatrick Steuer1-1/+5
2019-05-21Change default RSA, DSA and DH size to 2048 bitKurt Roeckx1-4/+4
2019-05-07Reject obviously invalid DSA parameters during signingMatt Caswell1-0/+6
2019-03-19Added NULL check to BN_clear() & BN_CTX_end()Shane Lontis1-4/+2
2019-03-18remove needless empty lines when printing certificatesDavid von Oheimb1-0/+2
2019-03-06constify *_dup() and *i2d_*() and related functions as far as possible, intro...David von Oheimb2-6/+6
2019-01-30Document and add macros for additional DSA optionsDavid Benjamin1-6/+2
2018-12-06Following the license change, modify the boilerplates in crypto/dsa/Richard Levitte14-15/+15
2018-12-06Refactor the computation of API version limitsRichard Levitte2-2/+2
2018-12-06Switch future deprecation version from 1.2.0 to 3.0Richard Levitte1-1/+1
2018-11-02Add a constant time flag to one of the bignums to avoid a timing leak.Pauli1-0/+1
2018-10-30DSA: Check for sanity of input parametersVitezslav Cizek1-0/+6
2018-10-29Timing vulnerability in DSA signature generation (CVE-2018-0734).Pauli1-13/+15
2018-10-29DSA mod inverse fixPauli1-1/+31
2018-09-11Update copyright yearMatt Caswell2-2/+2
2018-09-05Harmonize the error handling codepathNicola Tuveri1-3/+5
2018-09-05Fix segfault in RSA_free() (and DSA/DH/EC_KEY)Nicola Tuveri1-1/+1
2018-07-29Remove DSA digest length checks when no digest is passedBryan Donlan1-14/+4
2018-06-21Use DEPRECATEDIN_1_2_0 macro for DSA_sign_setup declarationNicola Tuveri1-0/+2
2018-06-21Add blinding to a DSA signatureMatt Caswell1-17/+49
2018-05-29Update copyright yearMatt Caswell1-1/+1
2018-05-28DSA: add simple getters for commonly used struct membersDr. Matthias St. Pierre1-0/+25
2018-04-17Update copyright yearRichard Levitte2-2/+2
2018-04-05Pick a q size consistent with the digest for DSA param generationMatt Caswell2-4/+12
2018-04-05Don't crash if an unrecognised digest is used with dsa_paramgen_mdMatt Caswell1-1/+7
2018-04-03Update copyright yearMatt Caswell1-1/+1
2018-03-21Convert _meth_get_ functions to const gettersJack Bates1-1/+1
2017-11-03Check return value of OBJ_nid2obj in dsa_pub_encode.Pavel Kopyl1-2/+6
2017-11-01 Address a timing side channel whereby it is possible to determine somePauli1-10/+25
2017-10-18Remove parentheses of return.KaoruToda6-14/+14
2017-10-13Remove email addresses from source code.Rich Salz4-8/+0
2017-10-09Since return is inconsistent, I removed unnecessary parentheses andKaoruToda2-3/+3
2017-09-29Added const-time flag to DSA key decoding to avoid potential leak of privkeySamuel Weiser1-0/+1
2017-08-30Move the REF_PRINT support from e_os.h to internal/refcount.h.Pauli1-1/+1
2017-08-30e_os.h removal from other headers and source files.Pauli1-1/+2
2017-08-03Add RAND_priv_bytes() for private keysRich Salz2-2/+2