summaryrefslogtreecommitdiff
path: root/rsa-keygen.c
Commit message (Collapse)AuthorAgeFilesLines
* Update copyright headers for dual licensing.Niels Möller2014-04-121-23/+31
|
* Updated FSF address. Patch from David Woodhouse.Niels Möller2012-07-071-2/+2
|
* Consistently use foo_func *f (rather than foo_func f) for declaring function ↵Niels Möller2012-06-251-2/+2
| | | | pointer arguments.
* Converted files to utf-8.Niels Möller2012-02-181-1/+1
|
* (bignum_random_prime): Deleted function.Niels Möller2010-06-011-44/+7
| | | | | | | (rsa_generate_keypair): Use new nettle_random_prime. Generate secret factors p and q with the two most significant bits set. Rev: nettle/rsa-keygen.c:1.8
* Reverted change from mpz_tstbit to mpz_even_p.Niels Möller2010-03-241-1/+1
| | | | Rev: nettle/rsa-keygen.c:1.7
* (rsa_generate_keypair): Ensure that bit size of e is less than bitNiels Möller2010-03-241-3/+12
| | | | | | size of n, and check for the unlikely case p = q. Rev: nettle/rsa-keygen.c:1.6
* * bignum-next-prime.c (nettle_next_prime): Renamed function, for nameNiels Möller2008-01-051-1/+1
| | | | | | space reasons. Was bignum_next_prime. Updated call in rsa-keygen.c. Rev: nettle/rsa-keygen.c:1.5
* (bignum_next_prime): Deleted, moved toNiels Möller2008-01-051-108/+1
| | | | | | | bignum-next-prime.c. Call with a larger prime limit, this improves the running time of lsh-keygen by roughly 25%. Rev: nettle/rsa-keygen.c:1.4
* FIXME-comment for next_prime.Niels Möller2007-09-301-0/+7
| | | | Rev: nettle/rsa-keygen.c:1.3
* Don't use WITH_PUBLIC_KEY / WITH_HOGWEED, then Makefile sorts outNiels Möller2007-05-141-4/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | which files should be compiled. Rev: nettle/der2rsa.c:1.2 Rev: nettle/dsa-keygen.c:1.2 Rev: nettle/dsa-sign.c:1.2 Rev: nettle/dsa-verify.c:1.2 Rev: nettle/dsa.c:1.2 Rev: nettle/pkcs1-rsa-md5.c:1.2 Rev: nettle/pkcs1-rsa-sha1.c:1.2 Rev: nettle/pkcs1-rsa-sha256.c:1.2 Rev: nettle/pkcs1.c:1.2 Rev: nettle/rsa-compat.c:1.2 Rev: nettle/rsa-decrypt.c:1.2 Rev: nettle/rsa-encrypt.c:1.2 Rev: nettle/rsa-keygen.c:1.2 Rev: nettle/rsa-md5-sign.c:1.2 Rev: nettle/rsa-md5-verify.c:1.2 Rev: nettle/rsa-sha1-sign.c:1.2 Rev: nettle/rsa-sha1-verify.c:1.2 Rev: nettle/rsa-sha256-sign.c:1.2 Rev: nettle/rsa-sha256-verify.c:1.2 Rev: nettle/rsa-sign.c:1.2 Rev: nettle/rsa-verify.c:1.2 Rev: nettle/rsa.c:1.2 Rev: nettle/rsa2openpgp.c:1.2 Rev: nettle/rsa2sexp.c:1.2 Rev: nettle/sexp2dsa.c:1.2 Rev: nettle/sexp2rsa.c:1.2
* (bignum_next_prime): Fixed off-by-one error whenNiels Möller2004-01-081-28/+25
| | | | | | | comparing input to the largest listed prime. General cleanup, as prime_limit > 0 always. Use TMP_DECL and TMP_ALLOC. Rev: src/nettle/rsa-keygen.c:1.6
* * Reordered includes in most or all .c-files. All should now includeNiels Möller2003-05-121-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | config.h. Rev: src/nettle/ChangeLog:1.195 Rev: src/nettle/aes-decrypt-table.c:1.4 Rev: src/nettle/aes-decrypt.c:1.5 Rev: src/nettle/aes-encrypt-table.c:1.4 Rev: src/nettle/aes-encrypt.c:1.5 Rev: src/nettle/aes-meta.c:1.3 Rev: src/nettle/aes-set-decrypt-key.c:1.2 Rev: src/nettle/aes-set-encrypt-key.c:1.2 Rev: src/nettle/aes.c:1.12 Rev: src/nettle/aesdata.c:1.2 Rev: src/nettle/arcfour-meta.c:1.2 Rev: src/nettle/arcfour.c:1.3 Rev: src/nettle/base16-decode.c:1.2 Rev: src/nettle/base16-encode.c:1.2 Rev: src/nettle/base16-meta.c:1.3 Rev: src/nettle/base64-decode.c:1.5 Rev: src/nettle/base64-encode.c:1.3 Rev: src/nettle/base64-meta.c:1.4 Rev: src/nettle/bignum-random.c:1.3 Rev: src/nettle/bignum.c:1.7 Rev: src/nettle/blowfish.c:1.4 Rev: src/nettle/buffer-init.c:1.3 Rev: src/nettle/buffer.c:1.8 Rev: src/nettle/cast128-meta.c:1.3 Rev: src/nettle/cast128.c:1.4 Rev: src/nettle/cbc.c:1.6 Rev: src/nettle/des-compat.c:1.10 Rev: src/nettle/des.c:1.7 Rev: src/nettle/des3.c:1.2 Rev: src/nettle/dsa-keygen.c:1.6 Rev: src/nettle/dsa-sign.c:1.7 Rev: src/nettle/dsa-verify.c:1.4 Rev: src/nettle/dsa.c:1.5 Rev: src/nettle/examples/io.c:1.4 Rev: src/nettle/examples/nettle-benchmark.c:1.8 Rev: src/nettle/examples/nettle-openssl.c:1.2 Rev: src/nettle/examples/rsa-keygen.c:1.10 Rev: src/nettle/examples/rsa-sign.c:1.5 Rev: src/nettle/examples/rsa-verify.c:1.4 Rev: src/nettle/hmac-md5.c:1.5 Rev: src/nettle/hmac-sha1.c:1.2 Rev: src/nettle/hmac-sha256.c:1.2 Rev: src/nettle/hmac.c:1.4 Rev: src/nettle/knuth-lfib.c:1.2 Rev: src/nettle/md5-compat.c:1.3 Rev: src/nettle/md5-meta.c:1.2 Rev: src/nettle/md5.c:1.6 Rev: src/nettle/memxor.c:1.2 Rev: src/nettle/nettle-internal.c:1.3 Rev: src/nettle/pgp-encode.c:1.4 Rev: src/nettle/pkcs1-rsa-md5.c:1.2 Rev: src/nettle/pkcs1-rsa-sha1.c:1.2 Rev: src/nettle/pkcs1.c:1.2 Rev: src/nettle/realloc.c:1.3 Rev: src/nettle/rsa-compat.c:1.8 Rev: src/nettle/rsa-decrypt.c:1.4 Rev: src/nettle/rsa-encrypt.c:1.5 Rev: src/nettle/rsa-keygen.c:1.5 Rev: src/nettle/rsa-md5-sign.c:1.2 Rev: src/nettle/rsa-md5-verify.c:1.2 Rev: src/nettle/rsa-sha1-sign.c:1.2 Rev: src/nettle/rsa-sha1-verify.c:1.2 Rev: src/nettle/rsa-sign.c:1.3 Rev: src/nettle/rsa-verify.c:1.2 Rev: src/nettle/rsa.c:1.12 Rev: src/nettle/rsa2openpgp.c:1.2 Rev: src/nettle/rsa2sexp.c:1.7 Rev: src/nettle/serpent-meta.c:1.2 Rev: src/nettle/serpent.c:1.4 Rev: src/nettle/sexp-format.c:1.9 Rev: src/nettle/sexp-transport-format.c:1.2 Rev: src/nettle/sexp-transport.c:1.4 Rev: src/nettle/sexp.c:1.14 Rev: src/nettle/sexp2bignum.c:1.5 Rev: src/nettle/sexp2dsa.c:1.4 Rev: src/nettle/sexp2rsa.c:1.11 Rev: src/nettle/sha1-meta.c:1.2 Rev: src/nettle/sha1.c:1.8 Rev: src/nettle/sha256-meta.c:1.2 Rev: src/nettle/sha256.c:1.3 Rev: src/nettle/tools/input.c:1.2 Rev: src/nettle/tools/misc.c:1.2 Rev: src/nettle/tools/output.c:1.3 Rev: src/nettle/tools/parse.c:1.2 Rev: src/nettle/tools/sexp-conv.c:1.14 Rev: src/nettle/twofish-meta.c:1.2 Rev: src/nettle/twofish.c:1.6 Rev: src/nettle/yarrow256.c:1.17 Rev: src/nettle/yarrow_key_event.c:1.4
* * bignum-random.c: New file.Niels Möller2002-10-091-18/+4
| | | | | | | | | | | (nettle_mpz_random): New function. (nettle_mpz_random_size): New function, renamed and moved here from... * rsa-keygen.c (bignum_random_size): ... here. Updated all callers. Rev: src/nettle/bignum-random.c:1.1 Rev: src/nettle/rsa-keygen.c:1.4
* New define WITH_PUBLIC_KEY, and new configure flagNiels Möller2002-10-011-2/+2
| | | | | | | | | | | | | | | | | | --disable-public-key. Updated rsa-files to check for that, rather than for HAVE_LIBGMP. Rev: src/nettle/rsa-keygen.c:1.3 Rev: src/nettle/rsa.c:1.8 Rev: src/nettle/rsa2sexp.c:1.2 Rev: src/nettle/rsa_md5.c:1.5 Rev: src/nettle/rsa_sha1.c:1.5 Rev: src/nettle/sexp2rsa.c:1.3 Rev: src/nettle/testsuite/rsa-keygen-test.c:1.4 Rev: src/nettle/testsuite/rsa-test.c:1.5 Rev: src/nettle/testsuite/rsa2sexp-test.c:1.2 Rev: src/nettle/testsuite/sexp2rsa-test.c:1.2 Rev: src/nettle/testsuite/testutils.c:1.13 Rev: src/nettle/testsuite/testutils.h:1.11
* (rsa_generate_keypair): Output a newline after aNiels Möller2002-03-181-14/+21
| | | | | | non-empty line of 'e':s (bad e was chosen, try again). Rev: src/nettle/rsa-keygen.c:1.2
* New file.Niels Möller2002-01-161-0/+346
Rev: src/nettle/rsa-keygen.c:1.1