mirror of
https://github.com/openssl/openssl.git
synced 2024-12-15 06:01:37 +08:00
738ee1819e
DH_set0_pqg() is now responsible for caching the nid, q and length. DH with or without named safe prime groups now default to using the maximum private key length (BN_num_bits(q) - 1) when generating a DH private key. The code is now shared between fips and non fips mode for DH key generation. The OSSL_PKEY_PARAM_DH_PRIV_LEN parameter can be used during keygen to override the maximum private key length to be in the range (2 * strength ... bits(q) - 1). Where the strength depends on the length of p. Added q = (p - 1) / 2 safe prime BIGNUMS so that the code is data driven (To simplify adding new names). The BIGNUMS were code generated. Fix error in documented return value for DH_get_nid Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11562) |
||
---|---|---|
.. | ||
__DECC_INCLUDE_EPILOGUE.H | ||
__DECC_INCLUDE_PROLOGUE.H | ||
aes_platform.h | ||
aria.h | ||
asn1_dsa.h | ||
asn1.h | ||
async.h | ||
bn_conf.h.in | ||
bn_dh.h | ||
bn_srp.h | ||
bn.h | ||
chacha.h | ||
cmll_platform.h | ||
cms.h | ||
cryptlib.h | ||
ctype.h | ||
des_platform.h | ||
dh.h | ||
dsa.h | ||
dso_conf.h.in | ||
ec.h | ||
ecx.h | ||
engine.h | ||
err.h | ||
ess.h | ||
evp.h | ||
lhash.h | ||
md32_common.h | ||
modes.h | ||
objects.h | ||
poly1305.h | ||
rand.h | ||
rsa.h | ||
security_bits.h | ||
serializer.h | ||
sha.h | ||
siphash.h | ||
siv.h | ||
sm2.h | ||
sm2err.h | ||
sm4.h | ||
sparse_array.h | ||
store.h | ||
x509.h | ||
x509v3.h |