aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/dsa/dsa_gen.c
Commit message (Expand)AuthorAgeFilesLines
* RAND_bytes updatesMatt Caswell2015-03-251-2/+2
* OPENSSL_NO_xxx cleanup: SHARich Salz2015-01-271-22/+8
* Run util/openssl-format-source -v -c .Matt Caswell2015-01-221-627/+644
* remove OPENSSL_FIPSAPIDr. Stephen Henson2014-12-081-1/+1
* remove FIPS module code from crypto/dsaDr. Stephen Henson2014-12-081-105/+0
* Remove fips_constseg references.Dr. Stephen Henson2014-12-081-1/+0
* return error if counter exceeds limit and seed value suppliedDr. Stephen Henson2011-11-251-0/+6
* check counter value against 4 * L, not 4096Dr. Stephen Henson2011-11-251-1/+1
* L=3072, N=256 provides 128 bits of security not 112.Dr. Stephen Henson2011-10-161-1/+1
* Allow for dynamic base in Win64 FIPS module.Andy Polyakov2011-09-141-0/+1
* Add support for DSA2 PQG generation of g parameter.Dr. Stephen Henson2011-08-271-12/+17
* Add support for canonical generation of DSA parameter g.Dr. Stephen Henson2011-08-261-11/+107
* Rename FIPS_mode_set and FIPS_mode. Theses symbols will be defined inDr. Stephen Henson2011-05-111-2/+2
* Fix warning.Dr. Stephen Henson2011-04-241-1/+2
* fips_check_dsa_prng() should only be built when OPENSSL_FIPS is defined.Richard Levitte2011-04-241-0/+2
* Add PRNG security strength checking.Dr. Stephen Henson2011-04-231-8/+60
* check RAND_pseudo_bytes return valueDr. Stephen Henson2011-04-041-2/+6
* Return security strength for supported DSA parameters: will be usedDr. Stephen Henson2011-02-111-7/+10
* fixes for DSA2 parameter generationDr. Stephen Henson2011-02-011-4/+5
* Provisional, experimental support for DSA2 parameter generation algorithm.Dr. Stephen Henson2011-01-311-2/+266
* Change OPENSSL_FIPSEVP to OPENSSL_FIPSAPI as it doesn't just referDr. Stephen Henson2011-01-271-1/+1
* FIPS mode DSA changes:Dr. Stephen Henson2011-01-261-0/+21
* Add additional parameter to dsa_builtin_paramgen to output the generatedDr. Stephen Henson2011-01-191-1/+4
* Fix warnings.Ben Laurie2010-06-121-2/+1
* Audit libcrypto for unchecked return values: fix all cases enounteredDr. Stephen Henson2009-09-231-3/+7
* Remove misleading dead code. Constify. (Coverity ID 142)Ben Laurie2008-12-261-7/+2
* Fix from fips branch.Dr. Stephen Henson2007-10-051-2/+9
* Win32 fixes. Add GOST algorithm to mkdef, update ordinals. Signed/unsigned fi...Dr. Stephen Henson2007-03-161-2/+2
* size_t -> intNils Larsch2007-03-021-2/+1
* add support for DSA with SHA2Nils Larsch2007-02-031-43/+72
* when building with OPENSSL_NO_DEPRECATED defined BN_zero is a macroNils Larsch2005-03-281-1/+1
* Remaing bits of PR:620 relevant to 0.9.8.Dr. Stephen Henson2004-12-051-17/+23
* The new BN_CTX code makes this sort of abuse unnecessary.Geoff Thorpe2004-04-281-19/+15
* Make sure we get the definition of OPENSSL_NO_DSA and OPENSSL_NO_SHA.Richard Levitte2003-03-201-0/+2
* As with RSA, which was modified recently, this change makes it possible toGeoff Thorpe2003-01-151-0/+15
* This is a first-cut at improving the callback mechanisms used inGeoff Thorpe2002-12-081-21/+21
* Retain compatibility of EVP_DigestInit() and EVP_DigestFinal()Dr. Stephen Henson2001-10-161-3/+3
* Really add the EVP and all of the DES changes.Ben Laurie2001-07-301-0/+1
* Change all calls to low level digest routines in the library andDr. Stephen Henson2001-06-191-6/+6
* Make all configuration macros available for application by makingRichard Levitte2001-02-191-1/+1
* Constify DSA-related code.Richard Levitte2000-11-071-1/+2
* New functions BN_CTX_start(), BN_CTX_get(), BN_CTX_end() to accessUlf Möller2000-02-051-11/+14
* Add new -notext option to 'ca', -pubkey option to spkac.Dr. Stephen Henson2000-02-031-1/+2
* Tolerate negative numbers in BN_is_prime.Bodo Möller2000-02-021-2/+4
* rndsort{Miller, Rabin} primality test.Bodo Möller2000-02-021-5/+3
* Tiny changes to previous patch (the log message was meant to beBodo Möller2000-01-301-3/+5
* Make DSA_generate_parameters, and fix a couple of bugBodo Möller2000-01-301-94/+46
* Document DSA and SHA.Ulf Möller2000-01-271-10/+13
* Check RAND_bytes() return value or use RAND_pseudo_bytes().Ulf Möller2000-01-211-1/+1
* Avoid some memory holes, one of which was pointed out byBodo Möller1999-06-251-0/+1