aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/dh
Commit message (Collapse)AuthorAgeFilesLines
* make updateRichard Levitte2003-04-101-9/+5
|
* We seem to carry some rests of the 0.9.6 [engine] ENGINE framework in formRichard Levitte2003-04-081-3/+0
| | | | of unneeded includes of openssl/engine.h.
* Make sure we get the definition of OPENSSL_NO_DH.Richard Levitte2003-03-201-0/+2
|
* Make sure we get the definition of OPENSSL_NO_ERR.Richard Levitte2003-03-201-0/+1
|
* more mingw related cleanups.Ulf Möller2003-02-221-7/+0
|
* The OPENSSL_NO_ENGINE has small problem: it changes certain structures. That'sRichard Levitte2003-01-301-2/+0
| | | | | | bad, so let's not check OPENSSL_NO_ENGINE in those places. Fortunately, all the header files where the problem existed include ossl_typ.h, which makes a 'forward declaration' of the ENGINE type.
* Add the possibility to build without the ENGINE framework.Richard Levitte2003-01-303-0/+14
| | | | PR: 287
* As with RSA, which was modified recently, this change makes it possible toGeoff Thorpe2003-01-153-1/+13
| | | | | | override key-generation implementations by placing handlers in the methods for DSA and DH. Also, parameter generation for DSA and DH is possible by another new handler for each method.
* make updateRichard Levitte2002-12-091-0/+8
|
* Nils Larsch submitted;Geoff Thorpe2002-12-081-3/+1
| | | | | | | | - a patch to fix a memory leak in rsa_gen.c - a note about compiler warnings with unions - a note about improving structure element names This applies his patch and implements a solution to the notes.
* This is a first-cut at improving the callback mechanisms used inGeoff Thorpe2002-12-086-21/+113
| | | | | | | | | | | | | | | | | | | | | | | | | | | key-generation and prime-checking functions. Rather than explicitly passing callback functions and caller-defined context data for the callbacks, a new structure BN_GENCB is defined that encapsulates this; a pointer to the structure is passed to all such functions instead. This wrapper structure allows the encapsulation of "old" and "new" style callbacks - "new" callbacks return a boolean result on the understanding that returning FALSE should terminate keygen/primality processing. The BN_GENCB abstraction will allow future callback modifications without needing to break binary compatibility nor change the API function prototypes. The new API functions have been given names ending in "_ex" and the old functions are implemented as wrappers to the new ones. The OPENSSL_NO_DEPRECATED symbol has been introduced so that, if defined, declaration of the older functions will be skipped. NB: Some openssl-internal code will stick with the older callbacks for now, so appropriate "#undef" logic will be put in place - this is in case the user is *building* openssl (rather than *including* its headers) with this symbol defined. There is another change in the new _ex functions; the key-generation functions do not return key structures but operate on structures passed by the caller, the return value is a boolean. This will allow for a smoother transition to having key-generation as "virtual function" in the various ***_METHOD tables.
* Have all tests use EXIT() to exit rather than exit(), since the latter doesn'tRichard Levitte2002-11-281-2/+5
| | | | always give the expected result on some platforms.
* Use double dashes so makedepend doesn't misunderstand the flags weRichard Levitte2002-10-091-1/+1
| | | | | | | give it. For 0.9.7 and up, that means util/domd needs to remove those double dashes from the argument list when gcc is used to find the dependencies.
* make updateBodo Möller2002-08-091-16/+16
|
* "make update"Lutz Jänicke2002-07-301-4/+2
|
* Pass CFLAG to dependency makers, so non-standard system include paths areRichard Levitte2002-06-271-1/+1
| | | | | handled properly. Part of PR 75
* fix DH_generate_parameters for general 'generator'Bodo Möller2002-03-204-9/+39
|
* Ensure EVP_CipherInit() uses the correct encode/decode parameter ifDr. Stephen Henson2002-03-161-1/+1
| | | | | | | | enc == -1 [Reported by Markus Friedl <markus@openbsd.org>] Fix typo in dh_lib.c (use of DSAerr instead of DHerr).
* Make {RSA,DSA,DH}_new_method obtain and release an ENGINEDr. Stephen Henson2002-03-093-6/+17
| | | | functional reference in all cases.
* Make sure the type accessed by the LONG and ZLONG ASN1 typeDr. Stephen Henson2002-03-051-1/+1
| | | | | is really a long, to avoid problems on platforms where sizeof(int) != sizeof(long).
* ECDSA supportBodo Möller2002-02-131-2/+6
| | | | Submitted by: Nils Larsch <nla@trustcenter.de>
* remove redundant ERR_load_... declarationsBodo Möller2001-12-171-1/+0
|
* make updateRichard Levitte2001-11-151-1/+1
| | | | perl util/mkerr.pl -recurse -write -rebuild
* 'make update'Richard Levitte2001-10-041-19/+19
|
* Because there's chances we clash with the system's types.h, rename ourRichard Levitte2001-10-041-1/+1
| | | | types.h to ossl_typ.h.
* indentation.Geoff Thorpe2001-09-251-1/+1
|
* "make update".Geoff Thorpe2001-09-251-3/+4
|
* This commits changes to various parts of libcrypto required by the recentGeoff Thorpe2001-09-254-93/+63
| | | | | | | | | | | ENGINE surgery. DH, DSA, RAND, and RSA now use *both* "method" and ENGINE pointers to manage their hooking with ENGINE. Previously their use of "method" pointers was replaced by use of ENGINE references. See crypto/engine/README for details. Also, remove the ENGINE iterations from evp_test - even when the cipher/digest code is committed in, this functionality would require a different set of API calls.
* "DH_up" had been changed to "DH_up_ref" in libeay.num but the functionGeoff Thorpe2001-09-052-2/+2
| | | | | | declaration and implementation had not. So a recent update recreated the original definition in libeay.num ... this corrects it and changes the "dh" code to the "up_ref" variant.
* Make the necessary changes to work with the recent "ex_data" overhaul.Geoff Thorpe2001-09-011-9/+5
| | | | | | | | | | | See the commit log message for that for more information. NB: X509_STORE_CTX's use of "ex_data" support was actually misimplemented (initialisation by "memset" won't/can't/doesn't work). This fixes that but requires that X509_STORE_CTX_init() be able to handle errors - so its prototype has been changed to return 'int' rather than 'void'. All uses of that function throughout the source code have been tracked down and adjusted.
* Give DH, DSA, and RSA functions to "up" their reference counts. Otherwise,Geoff Thorpe2001-08-252-0/+17
| | | | | | | dependant code has to directly increment the "references" value of each such structure using the corresponding lock. Apart from code duplication, this provided no "REF_CHECK/REF_PRINT" checking and violated encapsulation.
* The indexes returned by ***_get_ex_new_index() functions are used whenGeoff Thorpe2001-08-121-3/+4
| | | | | | | | setting stack (actually, array) values in ex_data. So only increment the global counters if the underlying CRYPTO_get_ex_new_index() call succeeds. This change doesn't make "ex_data" right (see the comment at the head of ex_data.c to know why), but at least makes the source code marginally less frustrating.
* Start to reduce some of the header bloat.Ben Laurie2001-08-051-17/+9
|
* make updateRichard Levitte2001-07-311-5/+6
|
* Really add the EVP and all of the DES changes.Ben Laurie2001-07-301-30/+15
|
* length of secret exponent is needed only when we create oneBodo Möller2001-07-271-2/+1
|
* Undo DH_generate_key() change: s3_srvr.c was using it correctlyBodo Möller2001-07-271-1/+6
|
* Another uninitialized static that may lead to problems on Solaris under someLutz Jänicke2001-07-271-1/+1
| | | | circumstances.
* DH key generation should not use a do ... while loop,Bodo Möller2001-07-251-7/+3
| | | | or bogus DH parameters can be used for launching DOS attacks
* Don't preserve existing keys in DH_generate_key.Bodo Möller2001-07-251-6/+10
|
* In {RSA,DSA,DH}_new_method(x) need to increase the referenceDr. Stephen Henson2001-06-231-8/+13
| | | | | count of the ENGINE is x is not NULL since it will be freed in {RSA,DSA,DH}_free().
* make updateRichard Levitte2001-06-231-4/+6
|
* 'make update'Richard Levitte2001-06-051-14/+18
|
* In RSA, DSA, DH, and RAND - if the "***_new()" function fails because theGeoff Thorpe2001-04-301-0/+1
| | | | ENGINE code does not return a default, set an error.
* Instead of telling both 'make' and the user that ranlibBodo Möller2001-03-091-2/+1
| | | | | | errors can be tolerated, hide the error from 'make'. This gives shorter output both if ranlib fails and if it works.
* Hide BN_CTX structure details.Bodo Möller2001-03-081-13/+15
| | | | Incease the number of BIGNUMs in a BN_CTX.
* Get rid of ASN1_ITEM_FUNCTIONS dummy functionDr. Stephen Henson2001-02-231-1/+1
| | | | | | prototype hack. This unfortunately means that every ASN1_*_END construct cannot have a trailing ;
* e_os.h does not belong with the exported headers. Do not put it thereRichard Levitte2001-02-221-46/+45
| | | | | | | | and make all files the depend on it include it without prefixing it with openssl/. This means that all Makefiles will have $(TOP) as one of the include directories.
* make it a loop as in dsaUlf Möller2001-02-201-1/+3
|
* Use new-style system-id macros everywhere possible. I hope I haven'tRichard Levitte2001-02-201-3/+3
| | | | | | | missed any. This compiles and runs on Linux, and external applications have no problems with it. The definite test will be to build this on VMS.