aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/dh/dh_ameth.c
Commit message (Collapse)AuthorAgeFilesLines
* Use p==NULL not !p (in if statements, mainly)Rich Salz2015-05-111-10/+11
| | | | Reviewed-by: Tim Hudson <tjh@openssl.org>
* Remove goto inside an if(0) blockRich Salz2015-05-011-6/+6
| | | | | | | There were a dozen-plus instances of this construct: if (0) { label: ..... } Reviewed-by: Tim Hudson <tjh@openssl.org>
* free null cleanup finaleRich Salz2015-05-011-11/+6
| | | | | | Don't check for NULL before calling OPENSSL_free Reviewed-by: Richard Levitte <levitte@openssl.org>
* free NULL cleanup 7Rich Salz2015-04-301-2/+1
| | | | | | | | | | | This gets BN_.*free: BN_BLINDING_free BN_CTX_free BN_FLG_FREE BN_GENCB_free BN_MONT_CTX_free BN_RECP_CTX_free BN_clear_free BN_free BUF_MEM_free Also fix a call to DSA_SIG_free to ccgost engine and remove some #ifdef'd dead code in engines/e_ubsec. Reviewed-by: Richard Levitte <levitte@openssl.org>
* free NULL cleanup 5aRich Salz2015-04-301-8/+4
| | | | | | | | | Don't check for NULL before calling a free routine. This gets X509_.*free: x509_name_ex_free X509_policy_tree_free X509_VERIFY_PARAM_free X509_STORE_free X509_STORE_CTX_free X509_PKEY_free X509_OBJECT_free_contents X509_LOOKUP_free X509_INFO_free Reviewed-by: Richard Levitte <levitte@openssl.org>
* free NULL cleanup 8Rich Salz2015-04-301-6/+3
| | | | | | | | | | Do not check for NULL before calling a free routine. This addresses: ASN1_BIT_STRING_free ASN1_GENERALIZEDTIME_free ASN1_INTEGER_free ASN1_OBJECT_free ASN1_OCTET_STRING_free ASN1_PCTX_free ASN1_SCTX_free ASN1_STRING_clear_free ASN1_STRING_free ASN1_TYPE_free ASN1_UTCTIME_free M_ASN1_free_of Reviewed-by: Richard Levitte <levitte@openssl.org>
* Code style: space after 'if'Viktor Dukhovni2015-04-161-1/+1
| | | | Reviewed-by: Matt Caswell <matt@openssl.org>
* free NULL cleanupRich Salz2015-03-281-4/+2
| | | | | | | | | EVP_.*free; this gets: EVP_CIPHER_CTX_free EVP_PKEY_CTX_free EVP_PKEY_asn1_free EVP_PKEY_asn1_set_free EVP_PKEY_free EVP_PKEY_free_it EVP_PKEY_meth_free; and also EVP_CIPHER_CTX_cleanup Reviewed-by: Kurt Roeckx <kurt@openssl.org>
* free NULL cleanupRich Salz2015-03-241-4/+2
| | | | | | | | Start ensuring all OpenSSL "free" routines allow NULL, and remove any if check before calling them. This gets DH_free, DSA_free, RSA_free Reviewed-by: Matt Caswell <matt@openssl.org>
* Move some ASN.1 internals to asn1_int.hDr. Stephen Henson2015-03-241-1/+1
| | | | | | | | Move ASN.1 internals used across multiple directories into new internal header file asn1_int.h remove crypto/Makefile hack which allowed other directories to include "asn1_locl.h" Reviewed-by: Matt Caswell <matt@openssl.org>
* free NULL cleanupRich Salz2015-03-241-4/+2
| | | | | | | | Start ensuring all OpenSSL "free" routines allow NULL, and remove any if check before calling them. This gets ASN1_OBJECT_free and ASN1_STRING_free. Reviewed-by: Matt Caswell <matt@openssl.org>
* Fix dh_pub_encodeMatt Caswell2015-03-121-5/+7
| | | | | | | | The return value from ASN1_STRING_new() was not being checked which could lead to a NULL deref in the event of a malloc failure. Also fixed a mem leak in the error path. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Cleanse PKCS#8 private key components.Dr. Stephen Henson2015-03-081-4/+4
| | | | | | | | | New function ASN1_STRING_clear_free which cleanses an ASN1_STRING structure before freeing it. Call ASN1_STRING_clear_free on PKCS#8 private key components. Reviewed-by: Rich Salz <rsalz@openssl.org>
* Fix memory leakKurt Roeckx2015-02-221-0/+1
| | | | Reviewed-by: Matt Caswell <matt@openssl.org>
* Avoid a double-free in an error path.Doug Hogan2015-02-221-0/+1
| | | | | Signed-off-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Matt Caswell <matt@openssl.org>
* Run util/openssl-format-source -v -c .Matt Caswell2015-01-221-853/+820
| | | | Reviewed-by: Tim Hudson <tjh@openssl.org>
* Add functions returning security bits.Dr. Stephen Henson2014-03-281-0/+7
| | | | | Add functions to return the "bits of security" for various public key algorithms. Based on SP800-57.
* misspellings fixes by https://github.com/vlajos/misspell_fixerVeres Lajos2013-09-051-1/+1
|
* Fix compile errors.Ben Laurie2013-08-211-3/+4
|
* CMS RFC2631 X9.42 DH enveloped data support.Dr. Stephen Henson2013-08-051-1/+349
|
* Enhance DH dup functions.Dr. Stephen Henson2013-08-051-17/+60
| | | | Make DHparams_dup work properly with X9.42 DH parameters.
* If present print j, seed and counter values for DHDr. Stephen Henson2013-08-051-0/+25
|
* Initial experimental support for X9.42 DH parameter format to handleDr. Stephen Henson2011-12-071-16/+82
| | | | RFC5114 parameters and X9.42 DH public and private keys.
* print out subgroup order if presentDr. Stephen Henson2011-10-111-0/+2
|
* Add algorithm specific signature printing. An individual ASN1 method canDr. Stephen Henson2010-03-061-0/+1
| | | | | | | | | | | now print out signatures instead of the standard hex dump. More complex signatures (e.g. PSS) can print out more meaningful information. Sample DSA version included that prints out the signature parameters r, s. [Note EVP_PKEY_ASN1_METHOD is an application opaque structure so adding new fields in the middle has no compatibility issues]
* Revert the size_t modifications from HEAD that had led to moreGeoff Thorpe2008-11-121-1/+1
| | | | | | knock-on work than expected - they've been extracted into a patch series that can be completed elsewhere, or in a different branch, before merging back to HEAD.
* Update obsolete email address...Dr. Stephen Henson2008-11-051-1/+1
|
* More size_tification.Ben Laurie2008-11-011-1/+1
|
* Fix a variety of warnings generated by some elevated compiler-fascism,Geoff Thorpe2008-03-161-0/+1
| | | | OPENSSL_NO_DEPRECATED, etc. Steve, please double-check the CMS stuff...
* check correct pointer before freeing it (Coverity CID 79,86)Nils Larsch2007-04-021-1/+1
|
* Fix various error codes to match functions.Dr. Stephen Henson2006-07-171-1/+1
|
* Fix (most) WIN32 warnings and errors.Dr. Stephen Henson2006-04-171-1/+1
|
* Complete key derivation support.Dr. Stephen Henson2006-04-131-7/+14
|
* Extend DH ASN1 method, add DH EVP_PKEY_METHOD.Dr. Stephen Henson2006-04-121-4/+4
|
* PKCS#3 DH PKCS#8 ASN1 support.Dr. Stephen Henson2006-04-121-2/+113
|
* Extend DH ASN1 method to support public key encode/decode and parameterDr. Stephen Henson2006-04-121-21/+227
| | | | utilities.
* New function to retrieve ASN1 info on public key algorithms. New commandDr. Stephen Henson2006-04-041-1/+1
| | | | line option to print out info.
* New utility pkeyparam. Enhance and bugfix algorithm specific parameterDr. Stephen Henson2006-03-281-1/+80
| | | | functions to support it.
* Add information and pem strings. Update dependencies.Dr. Stephen Henson2006-03-231-0/+3
|
* Make EVP_PKEY_ASN1_METHOD opaque. Add application level functions toDr. Stephen Henson2006-03-221-0/+1
| | | | initialize it. Initial support for application added public key ASN1.
* DH EVP_PKEY_ASN1_METHOD, doesn't do much (yet?).Dr. Stephen Henson2006-03-201-0/+92