mirror of
https://github.com/openssl/openssl.git
synced 2025-01-18 13:44:20 +08:00
738ee1819e
DH_set0_pqg() is now responsible for caching the nid, q and length. DH with or without named safe prime groups now default to using the maximum private key length (BN_num_bits(q) - 1) when generating a DH private key. The code is now shared between fips and non fips mode for DH key generation. The OSSL_PKEY_PARAM_DH_PRIV_LEN parameter can be used during keygen to override the maximum private key length to be in the range (2 * strength ... bits(q) - 1). Where the strength depends on the length of p. Added q = (p - 1) / 2 safe prime BIGNUMS so that the code is data driven (To simplify adding new names). The BIGNUMS were code generated. Fix error in documented return value for DH_get_nid Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/11562) |
||
---|---|---|
.. | ||
build.info | ||
dh_ameth.c | ||
dh_asn1.c | ||
dh_backend.c | ||
dh_check.c | ||
dh_depr.c | ||
dh_err.c | ||
dh_gen.c | ||
dh_group_params.c | ||
dh_kdf.c | ||
dh_key.c | ||
dh_lib.c | ||
dh_local.h | ||
dh_meth.c | ||
dh_pmeth.c | ||
dh_prn.c | ||
dh_rfc5114.c |