summaryrefslogtreecommitdiffstats
path: root/crypto/dh (follow)
Commit message (Expand)AuthorAgeFilesLines
* Enable export_to functions to have access to the libctxMatt Caswell2020-04-091-1/+2
* Param build: make structures opaque.Pauli2020-03-281-16/+19
* Param builder: make the OSSL_PARAM_BLD APIs public.Pauli2020-03-281-9/+9
* EVP: Implement support for key downgrading in backendsRichard Levitte2020-03-253-1/+78
* DH, DSA, EC_KEY: Fix exporters to allow domain parameter keysRichard Levitte2020-03-231-5/+9
* Constify various mostly X509-related parameter types in crypto/ and apps/Dr. David von Oheimb2020-03-231-1/+1
* DH: remove DH parameter files that aren't used or installed.Pauli2020-03-145-42/+0
* DH: add internal dh_get_method()Richard Levitte2020-03-091-0/+5
* EVP: Check that key methods aren't foreign when exportingRichard Levitte2020-03-091-0/+8
* Change DH_get_nid() to set the value of q if it is not already setShane Lontis2020-03-063-75/+85
* Add DH key validation to default providerShane Lontis2020-03-041-2/+2
* Add pairwise consistency self tests to asym keygeneratorsShane Lontis2020-03-031-1/+6
* Deprecate the low level Diffie-Hellman functions.Pauli2020-02-2013-1/+73
* Add FFC param/key validationShane Lontis2020-02-166-100/+201
* Deprecate the low level DSA functions.Pauli2020-02-111-0/+6
* Implement Provider side Key Management for X25519 and X448Matt Caswell2020-02-111-2/+2
* Redesign the KEYMGMT libcrypto <-> provider interface - the basicsRichard Levitte2020-02-071-24/+20
* Add FFC param/key generationShane Lontis2020-02-064-78/+168
* Params: change UTF8 construct calls to avoid explicit strlen(3) calls.Pauli2020-02-061-2/+2
* Missing "obj_mac" header file in "dh_lib"Davide Galassi2020-02-031-4/+4
* Add support for DH 'modp' group parameters (RFC 3526)Shane Lontis2020-01-306-92/+158
* Modify DSA and DH keys to use a shared FFC_PARAMS structShane Lontis2020-01-249-204/+135
* Add DH key exchange to fips providerShane Lontis2020-01-234-94/+134
* CRYPTO: Remove support for ex_data fields when building the FIPS moduleRichard Levitte2020-01-152-0/+8
* coverity 1201478: check BIO_indent returnsPauli2020-01-071-7/+9
* Update source files for pre-3.0 deprecationRichard Levitte2019-11-071-1/+1
* Fix potential memory leak in dh_ameth.cScott Wilson2019-11-011-0/+1
* DH: Add export of domain parameters to providerRichard Levitte2019-10-171-12/+11
* Add BN_check_prime()Kurt Roeckx2019-10-141-5/+3
* Explicitly test against NULL; do not use !p or similarRich Salz2019-10-092-9/+12
* Reorganize local header filesDr. Matthias St. Pierre2019-09-2811-10/+10
* Reorganize private crypto header filesDr. Matthias St. Pierre2019-09-285-6/+6
* s390x assembly pack: accelerate X25519, X448, Ed25519 and Ed448Patrick Steuer2019-09-251-2/+12
* util/mkerr.pl: make it not depend on the function codeRichard Levitte2019-09-121-1/+1
* Usages of KDFs converted to use the name macrosPauli2019-09-111-1/+1
* Enable DH "keys" which only contain domain parametersMatt Caswell2019-09-091-6/+15
* Implement DSA in the default providerMatt Caswell2019-09-091-3/+3
* DH_check_pub_key_ex was accidentally calling DH_check,Bernd Edlinger2019-09-091-1/+2
* Use BN_clear_free in DH_set0_keyBernd Edlinger2019-09-091-2/+2
* Check the DH modulus bit lengthBernd Edlinger2019-09-091-0/+12
* Fix users of KDFs to use params not ctlsPauli2019-09-061-11/+21
* Enforce a minimum DH modulus size of 512 bitsBernd Edlinger2019-07-244-0/+23
* Adapt DH to use with KEYMGMTRichard Levitte2019-07-237-2/+65
* Change DH parameters to generate the order q subgroup instead of 2qBernd Edlinger2019-07-223-58/+47
* Regenerate mkerr filesRich Salz2019-07-161-38/+1
* Add X9.42 KDF.Shane Lontis2019-07-091-129/+31
* TLS1.3 FFDHE Supportraja-ashok2019-06-124-3/+83
* Change default RSA, DSA and DH size to 2048 bitKurt Roeckx2019-05-211-1/+1
* Increase rounds of Miller-Rabin testing DH_checkJake Massimo2019-03-271-3/+5
* Added NULL check to BN_clear() & BN_CTX_end()Shane Lontis2019-03-193-20/+10