summaryrefslogtreecommitdiffstats
path: root/crypto/dsa (follow)
Commit message (Expand)AuthorAgeFilesLines
* Rename FIPS_MODE to FIPS_MODULERichard Levitte2020-04-285-22/+22
* Update copyright yearMatt Caswell2020-04-2311-11/+11
* Fix DH_get_nid() so that it does not cache values.Shane Lontis2020-04-201-0/+5
* When calling the import_to function pass the libctx tooMatt Caswell2020-04-171-3/+4
* Use build.info, not ifdef for crypto modulesRich Salz2020-04-162-13/+11
* Add DSA keygen to providerShane Lontis2020-04-156-16/+186
* Enable export_to functions to have access to the libctxMatt Caswell2020-04-091-1/+2
* PROV: Add DERlib support for DSARichard Levitte2020-04-072-71/+1
* Param build: make structures opaque.Pauli2020-03-281-14/+18
* Param builder: make the OSSL_PARAM_BLD APIs public.Pauli2020-03-281-9/+9
* EVP: Implement support for key downgrading in backendsRichard Levitte2020-03-253-2/+81
* DH, DSA, EC_KEY: Fix exporters to allow domain parameter keysRichard Levitte2020-03-231-5/+10
* Constify various mostly X509-related parameter types in crypto/ and apps/Dr. David von Oheimb2020-03-231-1/+1
* EVP: Check that key methods aren't foreign when exportingRichard Levitte2020-03-091-0/+7
* Add DSA Key validation to default providerShane Lontis2020-03-042-3/+3
* Add pairwise consistency self tests to asym keygeneratorsShane Lontis2020-03-031-5/+62
* PROV: Add a OP_keymgmt_match() function to our DH, DSA, RSA and EC_KEY implRichard Levitte2020-03-021-0/+5
* DSA: More conforming names in crypto/dsa/dsa_aid.cRichard Levitte2020-02-221-17/+22
* Add FFC param/key validationShane Lontis2020-02-167-64/+145
* Deprecate the low level DSA functions.Pauli2020-02-1112-0/+68
* Implement Provider side Key Management for X25519 and X448Matt Caswell2020-02-111-2/+2
* Redesign the KEYMGMT libcrypto <-> provider interface - the basicsRichard Levitte2020-02-072-48/+44
* Add FFC param/key generationShane Lontis2020-02-065-612/+89
* PROV: Adapt the DSA signature implementation to provide AlgorithmidentifiersRichard Levitte2020-01-282-1/+66
* Modify DSA and DH keys to use a shared FFC_PARAMS structShane Lontis2020-01-248-170/+130
* DSA: Move DSA_security_bits() and DSA_bits()Richard Levitte2020-01-171-12/+11
* CRYPTO: Remove support for ex_data fields when building the FIPS moduleRichard Levitte2020-01-152-7/+8
* Add dsa signature alg to fips providerShane Lontis2020-01-126-313/+349
* Update source files for pre-3.0 deprecationRichard Levitte2019-11-071-1/+1
* Update source files for deprecation at 3.0Richard Levitte2019-11-071-1/+1
* DSA: Add export of domain parameters to providerRichard Levitte2019-10-171-10/+9
* Add BN_check_prime()Kurt Roeckx2019-10-141-6/+4
* Explicitly test against NULL; do not use !p or similarRich Salz2019-10-091-2/+2
* Reorganize local header filesDr. Matthias St. Pierre2019-09-2811-10/+10
* Reorganize private crypto header filesDr. Matthias St. Pierre2019-09-284-5/+5
* s390x assembly pack: accelerate X25519, X448, Ed25519 and Ed448Patrick Steuer2019-09-251-1/+6
* fix for dsa key size feature request issue: pkey -text or -text_pub should sh...jayaram2019-09-241-0/+7
* util/mkerr.pl: make it not depend on the function codeRichard Levitte2019-09-121-1/+1
* Implement DSA in the default providerMatt Caswell2019-09-095-3/+76
* make RSA and DSA operations throw MISSING_PRIVATE_KEY if needed, adapt ECDSADavid von Oheimb2019-07-312-0/+10
* Regenerate mkerr filesRich Salz2019-07-161-34/+2
* Convert asn1_dsa.c to use the WPACKET API insteadMatt Caswell2019-07-111-16/+28
* Add simple ASN.1 utils for DSA signature DER.David Makepeace2019-07-111-7/+57
* Fix TyposAntoine Cœur2019-07-021-1/+1
* The SHA256 is not a mandatory digest for DSA.Tomas Mraz2019-05-281-1/+1
* EVP_Digest*: enable SHA3 pre-hashing for DSAPatrick Steuer2019-05-221-1/+5
* Change default RSA, DSA and DH size to 2048 bitKurt Roeckx2019-05-211-4/+4
* Reject obviously invalid DSA parameters during signingMatt Caswell2019-05-071-0/+6
* Added NULL check to BN_clear() & BN_CTX_end()Shane Lontis2019-03-191-4/+2
* remove needless empty lines when printing certificatesDavid von Oheimb2019-03-181-0/+2