aboutsummaryrefslogtreecommitdiffstats
path: root/src/pubkey
Commit message (Expand)AuthorAgeFilesLines
* In RSA and RW key generation, if we generate a key that isn't exactlylloyd2010-09-222-11/+12
* Update all uses of MemoryRegion::append to use either push_back or operator+=lloyd2010-09-152-4/+3
* Remove more implicit vector to pointer conversionslloyd2010-09-141-4/+4
* More changes to avoid vector to pointer implicit conversionslloyd2010-09-142-3/+3
* Remove constructors of MemoryVector and SecureVector that took twolloyd2010-09-131-2/+4
* Remove more uses of vector to pointer implicit conversionslloyd2010-09-133-14/+14
* More vector->pointer conversion removals.lloyd2010-09-131-4/+3
* First set of changes for avoiding use implicit vector->pointer conversionslloyd2010-09-133-5/+6
* The changelog for 1.9.4 claimed that the default PKCS #8 encryptionlloyd2010-08-131-1/+1
* These functions are internal use only, and don't need to be exported withlloyd2010-06-303-13/+15
* Doxygenlloyd2010-06-211-0/+12
* Doxygenlloyd2010-06-211-0/+3
* Replace "@return a blah" and "@return the blah" with just "@return blah"lloyd2010-06-168-44/+44
* Require all PK keys implement check_key. Add for ECC keys.lloyd2010-06-163-5/+11
* Doxygen commentslloyd2010-06-161-3/+19
* Use Doxygen deprecation warningslloyd2010-06-152-4/+9
* More Doxygen updates/fixeslloyd2010-06-1512-18/+75
* Fix a few hundred Doxygen warningslloyd2010-06-157-15/+19
* New BER encoding funcs for PKCS and X.509. Remove Private_Key dep herelloyd2010-06-156-108/+122
* Simplify PKCS8::copy_keylloyd2010-06-151-7/+1
* Some PKCS #8 simplificationslloyd2010-06-143-21/+19
* Add typedefs for the named EME encryptor/decryptor classes so codelloyd2010-06-111-0/+6
* If you didn't specify a qbits for the DSA kosherizer, then it wouldlloyd2010-05-281-19/+20
* Expose public_value() in ECDH public keylloyd2010-04-201-3/+10
* In the string constructor of EC_Domain_Params, check if the PEM decodinglloyd2010-04-192-6/+16
* Move class decls togetherlloyd2010-03-211-10/+10
* Move where pk_ops is included, remove rng.h from dl_algo.hlloyd2010-03-214-5/+3
* KeyPair::check_key's behavior of throwing an exception upon failure waslloyd2010-03-219-112/+75
* Replace PointGFp::check_invaraints, which would either return silentlylloyd2010-03-194-42/+12
* Add a couple of new helper functions to BER_Decoder:lloyd2010-03-194-43/+12
* A number of changes to primality tests:lloyd2010-03-191-1/+1
* There are some nasty API problems that are caused by having to pass alloyd2010-03-195-37/+6
* Don't call get_eme or get_kdf with name "Raw" (returns NULL); ideallylloyd2010-03-191-3/+3
* Add a couple of verification tests for GOST 34.10lloyd2010-03-161-3/+16
* Remove stdio includelloyd2010-03-131-2/+0
* Remove iostream/stdio includeslloyd2010-03-131-3/+0
* Fix GOST 34.10 pub key loading (uses little endian format, what the fsck?)lloyd2010-03-131-6/+25
* Fix GOST, wasn't getting found in enginelloyd2010-03-132-4/+4
* Use a Modular_Reducer in ECDSA oplloyd2010-03-132-6/+8
* Give PK_Signer users the option of disabling fault protectionlloyd2010-03-132-6/+17
* DSA and NR require certain parameters (which depend on the randomlylloyd2010-03-092-18/+24
* Remove decls of removed RSA encrypt/decryptlloyd2010-03-091-5/+0
* Oops. Secret nonce/seed for blinding for DH and ElGamal was 2^x mod p.lloyd2010-03-092-2/+2
* De-name unused rng arglloyd2010-03-091-1/+1
* Deconstify PK_Ops. It's quite reasonable that some op will want tolloyd2010-03-0919-101/+59
* Add back RSA consistency checking (decrypt only)lloyd2010-03-092-3/+8
* Have PK_Signer check the validity of all signatures before releasing.lloyd2010-03-092-8/+52
* Use preexisting powermod precomputations for setting up blinderslloyd2010-03-092-2/+2
* Remove decls of unimplemented functionslloyd2010-03-081-3/+0
* Blinder::choose_nonce added a single byte of the timestamps 8 times,lloyd2010-03-081-2/+2