summaryrefslogtreecommitdiffstats
path: root/crypto/dsa (follow)
Commit message (Expand)AuthorAgeFilesLines
* Add dsa signature alg to fips providerShane Lontis2020-01-126-313/+349
* Update source files for pre-3.0 deprecationRichard Levitte2019-11-071-1/+1
* Update source files for deprecation at 3.0Richard Levitte2019-11-071-1/+1
* DSA: Add export of domain parameters to providerRichard Levitte2019-10-171-10/+9
* Add BN_check_prime()Kurt Roeckx2019-10-141-6/+4
* Explicitly test against NULL; do not use !p or similarRich Salz2019-10-091-2/+2
* Reorganize local header filesDr. Matthias St. Pierre2019-09-2811-10/+10
* Reorganize private crypto header filesDr. Matthias St. Pierre2019-09-284-5/+5
* s390x assembly pack: accelerate X25519, X448, Ed25519 and Ed448Patrick Steuer2019-09-251-1/+6
* fix for dsa key size feature request issue: pkey -text or -text_pub should sh...jayaram2019-09-241-0/+7
* util/mkerr.pl: make it not depend on the function codeRichard Levitte2019-09-121-1/+1
* Implement DSA in the default providerMatt Caswell2019-09-095-3/+76
* make RSA and DSA operations throw MISSING_PRIVATE_KEY if needed, adapt ECDSADavid von Oheimb2019-07-312-0/+10
* Regenerate mkerr filesRich Salz2019-07-161-34/+2
* Convert asn1_dsa.c to use the WPACKET API insteadMatt Caswell2019-07-111-16/+28
* Add simple ASN.1 utils for DSA signature DER.David Makepeace2019-07-111-7/+57
* Fix TyposAntoine Cœur2019-07-021-1/+1
* The SHA256 is not a mandatory digest for DSA.Tomas Mraz2019-05-281-1/+1
* EVP_Digest*: enable SHA3 pre-hashing for DSAPatrick Steuer2019-05-221-1/+5
* Change default RSA, DSA and DH size to 2048 bitKurt Roeckx2019-05-211-4/+4
* Reject obviously invalid DSA parameters during signingMatt Caswell2019-05-071-0/+6
* Added NULL check to BN_clear() & BN_CTX_end()Shane Lontis2019-03-191-4/+2
* remove needless empty lines when printing certificatesDavid von Oheimb2019-03-181-0/+2
* constify *_dup() and *i2d_*() and related functions as far as possible, intro...David von Oheimb2019-03-062-6/+6
* Document and add macros for additional DSA optionsDavid Benjamin2019-01-301-6/+2
* Following the license change, modify the boilerplates in crypto/dsa/Richard Levitte2018-12-0614-15/+15
* Refactor the computation of API version limitsRichard Levitte2018-12-062-2/+2
* Switch future deprecation version from 1.2.0 to 3.0Richard Levitte2018-12-061-1/+1
* Add a constant time flag to one of the bignums to avoid a timing leak.Pauli2018-11-011-0/+1
* DSA: Check for sanity of input parametersVitezslav Cizek2018-10-291-0/+6
* Timing vulnerability in DSA signature generation (CVE-2018-0734).Pauli2018-10-281-13/+15
* DSA mod inverse fixPauli2018-10-281-1/+31
* Update copyright yearMatt Caswell2018-09-112-2/+2
* Harmonize the error handling codepathNicola Tuveri2018-09-051-3/+5
* Fix segfault in RSA_free() (and DSA/DH/EC_KEY)Nicola Tuveri2018-09-051-1/+1
* Remove DSA digest length checks when no digest is passedBryan Donlan2018-07-291-14/+4
* Use DEPRECATEDIN_1_2_0 macro for DSA_sign_setup declarationNicola Tuveri2018-06-211-0/+2
* Add blinding to a DSA signatureMatt Caswell2018-06-211-17/+49
* Update copyright yearMatt Caswell2018-05-291-1/+1
* DSA: add simple getters for commonly used struct membersDr. Matthias St. Pierre2018-05-281-0/+25
* Update copyright yearRichard Levitte2018-04-172-2/+2
* Pick a q size consistent with the digest for DSA param generationMatt Caswell2018-04-052-4/+12
* Don't crash if an unrecognised digest is used with dsa_paramgen_mdMatt Caswell2018-04-051-1/+7
* Update copyright yearMatt Caswell2018-04-031-1/+1
* Convert _meth_get_ functions to const gettersJack Bates2018-03-211-1/+1
* Check return value of OBJ_nid2obj in dsa_pub_encode.Pavel Kopyl2017-11-031-2/+6
* Address a timing side channel whereby it is possible to determine somePauli2017-11-011-10/+25
* Remove parentheses of return.KaoruToda2017-10-186-14/+14
* Remove email addresses from source code.Rich Salz2017-10-134-8/+0
* Since return is inconsistent, I removed unnecessary parentheses andKaoruToda2017-10-092-3/+3